Author Archive

The Science Behind Leap Years And How They Work | IFLScience

Not only are leap years the result of millennia of mathematical work, they are also the consequence of rulers imposing their will on people’s day to day lives, and the gradual understanding of our place in the universe. http://www.iflscience.com/editors-blog/science-behind-leap-years-and-how-they-work Posted from WordPress for Android

UN panel bans lithium-ion battery shipments from passenger flights | Chips | Geek.com

A UN panel has recommended that airlines ban all lithium-ion shipments from commercial flights. Why? Because batteries catch fire sometimes. A new packaging standard is expected in 2018 that might make batteries safe enough to be shipped on passenger planes again, but there’s no guarantee. http://www.geek.com/chips/un-panel-bans-lithium-ion-battery-shipments-from-passenger-flights-1648244/ Posted from WordPress for Android

Turing Robotics Drops Android And Sets Up Shop In Finland Amid Global Security Concerns | TechCrunch

California-based secure smartphone manufacturer Turing Robotics Industries announced that it will move manufacturing and its new global headquarter to the Finnish city of Salo. Turing’s decision is rooted in security concerns. “Finland’s Act on the Protection of Privacy in Electronic Communications which safeguards confidentiality and privacy in telecommunications was the main reason behind TRI’s move

Google Cloud Platform Blog: Spotify chooses Google Cloud Platform to power data infrastructure

It’s not every day you move a 75 million+ user company from a home-grown infrastructure to the cloud. But if you use Spotify, more and more of your musical experience will be delivered by Google Cloud Platform over the coming weeks and months http://googlecloudplatform.blogspot.fi/2016/02/Spotify-chooses-Google-Cloud-Platform-to-power-data-infrastructure.html?m=1 Posted from WordPress for Android

Mousejack lets attackers take over your computer via your wireless mouse | News | Geek.com

An analysis by researchers at Bastille Networks indicates that your wireless mouse might provide an attacker with a route to get malware onto your machine, provided they’re within about 100 meters. They’ve dubbed this vulnerability “Mousejack.” The researchers tested many mice from manufacturers like Logitech, Dell, and Lenovo that operate over 2.4GHz wireless communications. This