Quantum on the edge: Light shines on new pathway for quantum technology
How neuroscience is breaking out of the lab
Europe Shows First Cards in €1-billion Quantum Bet
Father of Web says tech giants may have to be split up
Neuroscience discovered power of "Lesion Network Mapping"
The new thermodynamics: how quantum physics is bending the rules
Homeland Security reaches out to Pentagon for help with election cybersecurity
Dear tech: Stop doing business with Nazis
SECURITY ROUNDUP: NEW LEGISLATION CHAMPIONS A RADICAL FUTURE FOR US DATA PRIVACY
7 unexpected ways GDPR and other privacy regulations make security harder
Cyber Security Relics: 4 older technologies still plaguing...
Cyber threats fueled by AI: Security's next big challenge
If Wi-Fi security is a real concern, launch a virtual private network
Intel CPUs fall to new hyperthreading exploit that pilfers crypto keys
Let's Kill All the Lawyers: analysis
F.D.A. Approves Powerful New Opioid Despite Warnings of Likely Abuse
Cisco ups the ante for 400G Ethernet with big-bandwidth data-center switches
SoftBank’s Latest Investment Is a $1.1 Billion Bet on Smart Windows
“Full-Blown Incompatibility” –Hubble and Gaia Discoveries Could Point to a New Physics Underlying the Universe
Diamond Science Begins With Carbon and Ends in the Four Cs
GQ article: LA cult of betterness
Learn Modern Web Programming with the Best Online Teachers
'Ghost moons' discovered in orbit around Earth
The day computer security turned real: The Morris Worm turns 30
Elon Musk: The Recode interview
Should programming languages be made for IDEs rather than humans?
Scientific American: Illuminating the Dark Web
A Cryptocurrency Millionaire Wants to Build a Utopia in Nevada
2018 Los Angeles Business Awards and Calendar of Events
A pair of new Bluetooth security flaws expose wireless access points to attack
Cybersecurity class challenged to hack a Raspberry-Pi-enabled "smart pumpkin"
Scientists 'tame' some disruptive environmental effects on quantum computers
Pro-privacy search engine DuckDuckGo hits 30M daily searches, up 50% in a year
Freenet: A Distributed Anonymous Information Storage and Retrieval System
This Tiny Dock Could Increase Your Laptop's Network Performance By 10X
Startling new research finds large buildup of heat in the oceans, suggesting a faster rate of global warming
That old birth certificate may not be good for RealID: Roadshow
Feds Expand Security Researchers' Ability to Hack Without Going to Jail
<a href="https://hubski.com//pub/417827">Discuss this on Hubski.</a>
Text surrounded by asterisks (*) is italicized.
Text surrounded by plus signs (+) is bolded.
Text surrounded by vertical bars (|) is quoted. If you double-click a paragraph, it will be quoted.
Text surrounded by tildes (~) is blocked out.
Symbols such as *, +, |, and ~ can be used literally by placed a \ in front of the text.
A user's name surrounded by at signs (@) links to their profile, and the user is notified that you mentioned them.
A word surrounded by hash signs (#) becomes a tag and links to posts with that tag.
Text after a blank line that is indented by two or more spaces is reproduced verbatim in a different font.
URLs become links. However, new users cannot post links in comments.
Hubski URLS become embedded cards, displaying information about the post or comment.
Text can link to URLs by using the following format: [linked text](http://theurl.com)
Youtube, Vimeo, Soundcloud, Twitter, and Spotify urls will embed the content automatically.
Image URLs (.png, .tif, .gif, and .jpg) will embed automatically.