Originally published on Fri February 28, 2014 11:14 am
Kevin Counihan, the CEO of Access Health CT, is walking through the 15th floor of a downtown Hartford office building that houses Connecticut's health insurance marketplace. He passes the legal department, the IT folks and the consultants, then stops in front of three large, wall-mounted computer screens.
Originally published on Thu February 27, 2014 1:58 pm
For something that's become so ubiquitous in our lives, the World Wide Web is just a youngster. It was only 25 years ago that Tim Berners-Lee first created a rudimentary information retrieval system that relied on the Internet. It's since exploded into a primary means by which we learn, work and connect. (To put things in perspective, the film Die Hard is older than the World Wide Web.)
One of Bitcoin's largest trading exchanges shut down Tuesday, and you probably couldn't care less.
So what if rumors are circulating that millions of dollars' worth of Bitcoin are stolen? If you don't understand Bitcoin in the first place, it's hard to figure out why this matters. So we're using this as an opportunity to go back to the basics: what this b-word means, where it came from and why it just might matter.
Last Sunday morning, I read with interest this essay by writer Beth Boyle Machlan on the joys of driving with her kids and listening to commercial radio -- the antithesis of the modern i-music experience which involves carefully choosing and curating one's own "playlists," and never subjecting oneself to anything as vulgar and top-down as listening to a whole bunch of songs picked out by other people.
Originally published on Fri February 21, 2014 2:29 pm
Malware is malicious, bad software. It's the code that cybercriminals use to steal credit card numbers and bank accounts. And the big hack against Target showed how good these criminals are getting: They've built a thriving underground where credit cards go on sale before anyone even knows that a massive breach has happened.
In 1962, the Nobel Prize was awarded to three scientists, James Watson, Francis Crick, and Maurice Wilkins, for their work in discovering the fundamental structure of DNA: the double helix. Today, Watson, Crick, and Wilkins maintain international prestige for their findings.
Originally published on Wed February 19, 2014 4:53 pm
With just 11 days before the end of 2013, The New York Times posted a dialect quiz on its website that drew in millions of readers, making it the site’s most popular page for the year. The quiz is designed to pinpoint the quiz-taker’s exact region, based on the words he or she uses.
The graphics intern who created the mapping algorithm, Josh Katz, was hired for a full-time position and Bert Vaux, the linguist who created the data for the test, began to see an uptick in the activity on his website.
We're starting out today with a segment about "Generation-Like," the media term media theorist Douglas Rushkoff uses for the generation of Millennials who live huge chunks of their lives on social media where they subsist on a form of metered approval.
Originally published on Tue February 18, 2014 11:39 am
Inside one in a series of abandoned homes along a blighted block of Detroit's Brightmoor neighborhood, filmmaker Tom McPhee walks through the remnants of a life — broken furniture, scattered knickknacks and a flooded basement.
"This is fresh water that's coming into the basement here," McPhee points out. "All of that plumbing has been ripped away 'cause someone found a value in it, so they don't care that it's running. This is all over the city."
It will focus on the increasing use of sophisticated tools to hack into the computers of targets, including remotely enabling webcams, turning on microphones, and downloading documents and other files from hacked computers.
Originally published on Fri February 14, 2014 7:59 am
An announced $45 billion merger between Comcast and Time Warner Cable — the largest and second-largest cable companies in the U.S., respectively — is under scrutiny not just for its massive size but also for its potential impact on Internet use.
Originally published on Thu February 13, 2014 10:44 am
(We put a new top on this story at 9:25 a.m. ET and added an update at 10:15 a.m. ET.)
As NPR's David Folkenflik pointed out earlier today, Comcast's proposed $45 billion purchase of fellow cable company Time Warner will receive some scrutiny from federal officials. Here's some more about that part of the story:
According to Secretary of the State Denise Merrill, the web resource has a very simple aim. "If you were a small business person who just wanted to start your own business for the first time," she said, "where would you start, and how would you do it?"
Originally published on Thu February 6, 2014 2:26 pm
The teenage years are a tumultuous time, with about 11 percent developing depression by age 18. Lack of sleep may increase teenagers' risk of depression, two studies say.
Teenagers who don't get enough sleep are four times as likely to develop major depressive disorder as their peers who sleep more, according to researchers at the University of Texas Health Science Center in Houston. They tracked the habits of more than 4,000 adolescents over a year.
Originally published on Fri January 31, 2014 11:16 am
Yahoo has become the latest target of hackers, with usernames and passwords stolen from some of its estimated 273 million email customers.
"Recently, we identified a coordinated effort to gain unauthorized access to Yahoo Mail accounts," the company said in a blog post Thursday. "Upon discovery, we took immediate action to protect our users, prompting them to reset passwords on impacted accounts."
Women’s health is the next frontier for a team of medical researchers at Yale who believe video games can be powerful tools in the fight against HIV and other serious diseases.
For the last several years, Yale’s Play2Prevent lab has been a hub of collaboration between doctors and computer programmers testing the capacity of games to educate users and, perhaps, even change risky behavior. Their work is part of a fast-growing movement in public health to better understand how virtual gaming environments can improve players’ lives in the real world.
Shortly after protests began in Ukraine, Connecticut Senator Chris Murphy flew to Kiev and met with the anti-government demonstrators.
"The protesters are down there because they’re sick of seeing a government that too often resorts to violence, that has become endemic with corruption and is moving toward Russia instead of towards the European Union," said Murphy.
We hear more from Murphy about the recent, violent developments in the Kiev protests.
Originally published on Thu January 23, 2014 3:01 pm
The credit and debit card data breaches at Target and Neiman Marcus compromised more than 70 million American consumers, and analysts say even more of us are at risk. That's because the technology we use to swipe for our purchases — magnetic stripes on the backs of cards — isn't hard for a skilled fraudster to hack.
This coming Friday marks the 30th anniversary of the first Apple Mac that went on sale.
NPR technology correspondent Steve Henn joins Here & Now’s Jeremy Hobson to discuss the genesis of the Macintosh, the future of Apple and how the Mac has influenced both Apple and the technological world.
If there was a consensus emanating from Congress Friday after President Obama's NSA reform speech, it was — not surprisingly — that Congress itself has a major role to play in the ultimate fix.
Whether from strong NSA supporters or agency critics, the reactions sounded similar: Congress intends to do much of the steering in the drive to overhaul the NSA's gathering of certain non-public information, especially consumer phone records, in the nation's counterterrorism efforts.
Even so, if you listened closely, you could hear the sound of politics in some of the reaction.
Originally published on Fri January 17, 2014 4:23 pm
The holiday season data breach at Target that hit more than 70 million consumers was part of a wide and highly skilled international hacking campaign that's "almost certainly" based in Russia. That's according to a report prepared for federal and private investigators by Dallas-based cybersecurity firm iSight Partners.
And the fraudsters are so skilled that sources say at least a handful of other retailers have been compromised.
"The intrusion operators displayed innovation and a high degree of skill," the iSight report says.
Originally published on Fri January 17, 2014 2:20 pm
LISTEN: President Obama's national security address
(This post was most recently updated at 1:30 p.m. ET.)
Saying that "critics are right to point out that without proper safeguards, this type of program could be used to yield more information about our private lives," President Obama said Friday that he wants the National Security Agency to stop holding on to massive amounts of "metadata" about the phone calls and electronic communications of millions of people around the world.
Originally published on Tue January 21, 2014 1:31 pm
Shortening words, swapping them out, giving them different meanings — that's not new. Remember in Mean Girls when the queen bee character, Regina George, berated one of her underlings for trying to make the word "fetch" catch on?
Originally published on Fri January 17, 2014 9:51 am
President Obama is expected to announce Friday morning that he is "ordering a transition that will significantly change the handling of what is known as the telephone 'metadata' " that the National Security Agency collects, officials are telling Reuters and NPR.
The wire service, which broke the story, writes that:
Originally published on Fri January 17, 2014 2:34 pm
A committee tasked by the White House with reviewing U.S. electronic surveillance has come up with 46 proposed changes to National Security Agency spying practices. Here are arguments for and against five recommendations that President Obama may take up in a speech announcing policy changes Friday: