What are the possible ways in which privacy in a setup like Aadhar may be breached?
The ability to sample instrumental sounds for later use and to mimic a wide range of instruments using synthesisers was not good news for professional musicians.
Reliance Industries launched on Friday a “zero-cost” phone with 4G-enabled features in a move aimed at further disrupting the country’s highly competitive telecoms sector.
A comprehensive vision will help the government optimise the allocation of its research capabilities towards the development of specific AI capabilities.
A group of seven Indian students has bagged two awards at the first global robotics Olympiad in the US where 157 countries participated.
One of India’s most vocal advocates for youth rights to sexual health, Franklin Paul, has been introducing digital technologies to the rural youth.
The creation of emoji can be likened to Newspeak in George Orwell’s 1984 – they are tightly controlled by the few for the many.
While some PhD graduates have their sights set on jobs in industry, there are many who find that there are simply not enough opportunities in academia.
AI’s capabilities drive science fiction novels and movies and fuel interesting philosophical debates, but we have yet to build a single self-improving program capable of general artificial intelligence, and there’s no indication that intelligence could be infinite.
Although it set up India’s first inter-campus network, ERNET’s biggest success was in having trained a generation of individuals skilled in data networking.
The same rocket type had been expected to take China’s latest lunar probe to the Moon this year and to return with samples.
Can we use technology to solve the problems of farmers and create a possible e-governance framework to solve issues scalable from a farm level perspective to the entire nation?
With cyber interference in elections going beyond hijacking the ballot box, the Election Commission must prepare to address all potential threats – both domestic and international.
When national security meets the global Internet of Things (IoT), who’s in charge?
Even though the provisions on information security and privacy in India’s 2011 IT rules are rudimentary, they are, more often than not, callously ignored.
India’s remaining competent in both domestic and global markets is hinged on building a society upon the four pillars of technology, institutions, infrastructure and incentives.
Tehran is fostering a start-up industry as a possible motor to solve Iran’s unemployment crisis.
Comments like ‘little girl needs to keep to herself before daddy breaks her face’ get a free pass in the name of free speech.
Facebook should give the public more insight into how content moderation decisions are made.
The content and culture around the game are troubling, but China’s response may be misguided and in fact creating more interest around ‘Blue Whale’.
Though the devastating WannaCry ransomware attack was a failure on the NSA’s part, current UN cyber norms are far too weak to hold any international actor – let alone the US – responsible.
Cyber security researchers have said that they found technical evidence that could link North Korea with the global WannaCry “ransomware” cyber attack.
The underground market for software vulnerabilities has been growing steadily since the 1990s, so the latest WannaCry could be a sign of things to come.
Over the weekend, the ransomware called ‘Wanna Cry’ hit systems in over 100 countries in one of the most widespread cyber attacks in history.
The UK’s National Health Service data is being held to ransom by criminals. This is the mother of all wake-up calls.
He was one of the brilliant mathematical geniuses who helped crack the Nazi codes, but few have ever heard of his name. So who was Bill Tutte?
Asia may have been less effected because it was evening on the continent by the time the virus hit European countries, although the damage remains unknown.
Going as far back as the Bible, and as widely known as the phrase ‘Open, Sesame,’ passwords are a textual link to our past. But they may not be around much longer.
There are as many flaws with the technology as there are with the processes used to secure the EVMs, the laws that create the sanctions and, as always, with the people involved.
About nine GB of data, apparently emails and documents stolen from Macron’s campaign, spread rapidly on Twitter, Facebook and the messaging forum 4chan.
Laws cannot keep pace with technological advances – but that may not be a bad thing.
IT companies have become political targets in the US for taking away American jobs by flying in Indians on temporary visas, a sore point for many.
Facebook has a new, depressingly incompetent strategy for tackling fake news.
Nostalgic Stardew Valley lets Chinese gamers find meaning through chopping wood and growing vegetables, choosing the simple life on the farm over city life.
With climate change leading to increasing disasters, effectively using social media data and other means of discovering the unknown will become crucial.
Is India ready for this high-speed transit system? Or are there cheaper upgrades to the current rail network that would be more sensible?
The costs that Ola and Uber inflict on the financial and physical health of their driver-owners, road space and safety and city transport infrastructure are too significant to be left to Silicon Valley-based venture capitalists.
You can learn a lot about the movement of people and animals if you tap into the tracking data from many of today’s mobile phones.
An unprotected, publicly accessible API endpoint leaks everything from phone numbers to home addresses.
Mangal Singh continues to display the potential to install many of his turbines, which can lead to a useful reduction in greenhouse gas emissions as well as costs.