South by Southwest Interactive is the technology-driven part of the annual Austin-based festival for digital, film and music and it starts on Friday. An expected 30,000 people will take part in the interactive and film week that precedes music, and they love it for the spontaneity and the chaos. They also hate it because of the chaos — parties on every corner, marketing handouts at every turn and a sprawling program of panels, screenings and speakers that span at least a dozen city blocks in the heart of Texas.
This post was updated at 10:30 a.m. ET on March 6.
Facebook said Wednesday that it will limit minors' access to pages and posts that offer firearms for sale, along with other measures intended to curtail illegal gun trafficking.
"This is something we've been working on for a while," says Facebook spokesman Matt Steinfeld. "We want to balance the interests of people who come here to express themselves while promoting an environment that is safe and respectful."
Today on The Scramble, one of our favorite writers, A.J. Jacobs takes us deep inside the world of modern ancestry research where websites are all too happy to tell you that you're distantly related to Gwynyth Paltrow, Michael Bloomberg, Quincy Jones, and King David. Those are all actual examples of people A.J. was told are his relatives.
Online competitive gaming is increasingly mirroring the world of professional sports. E-sports are attracting hard-working teams that compete for millions of dollars in prize money.
Generally, gamers wage battles with one another using rapid clicks of a computer mouse. "A lot of it comes down to reflexes, but a lot of [it] is strategy," says David Gorman, a sportscaster for the popular e-sport, Dota 2. "It's very much like chess, except it's in real time. Almost like speed chess."
Kevin Counihan, the CEO of Access Health CT, is walking through the 15th floor of a downtown Hartford office building that houses Connecticut's health insurance marketplace. He passes the legal department, the IT folks and the consultants, then stops in front of three large, wall-mounted computer screens.
Originally published on Thu February 27, 2014 1:58 pm
For something that's become so ubiquitous in our lives, the World Wide Web is just a youngster. It was only 25 years ago that Tim Berners-Lee first created a rudimentary information retrieval system that relied on the Internet. It's since exploded into a primary means by which we learn, work and connect. (To put things in perspective, the film Die Hard is older than the World Wide Web.)
One of Bitcoin's largest trading exchanges shut down Tuesday, and you probably couldn't care less.
So what if rumors are circulating that millions of dollars' worth of Bitcoin are stolen? If you don't understand Bitcoin in the first place, it's hard to figure out why this matters. So we're using this as an opportunity to go back to the basics: what this b-word means, where it came from and why it just might matter.
Last Sunday morning, I read with interest this essay by writer Beth Boyle Machlan on the joys of driving with her kids and listening to commercial radio -- the antithesis of the modern i-music experience which involves carefully choosing and curating one's own "playlists," and never subjecting oneself to anything as vulgar and top-down as listening to a whole bunch of songs picked out by other people.
Malware is malicious, bad software. It's the code that cybercriminals use to steal credit card numbers and bank accounts. And the big hack against Target showed how good these criminals are getting: They've built a thriving underground where credit cards go on sale before anyone even knows that a massive breach has happened.
In 1962, the Nobel Prize was awarded to three scientists, James Watson, Francis Crick, and Maurice Wilkins, for their work in discovering the fundamental structure of DNA: the double helix. Today, Watson, Crick, and Wilkins maintain international prestige for their findings.
This map from the Cambridge Online Survey of World Englishes shows the distribution of words used for "the thing from which you might drink water in a school." Red is water fountain (60%), green is drinking fountain (33%), blue is bubbler (3%) and yellow is other (1%).
This map based on Bert Vaux's research shows the breakdown of terms used for a long cold sandwich. (Cambridge Online Survey of World Englishes)
With just 11 days before the end of 2013, The New York Times posted a dialect quiz on its website that drew in millions of readers, making it the site’s most popular page for the year. The quiz is designed to pinpoint the quiz-taker’s exact region, based on the words he or she uses.
The graphics intern who created the mapping algorithm, Josh Katz, was hired for a full-time position and Bert Vaux, the linguist who created the data for the test, began to see an uptick in the activity on his website.
We're starting out today with a segment about "Generation-Like," the media term media theorist Douglas Rushkoff uses for the generation of Millennials who live huge chunks of their lives on social media where they subsist on a form of metered approval.
Inside one in a series of abandoned homes along a blighted block of Detroit's Brightmoor neighborhood, filmmaker Tom McPhee walks through the remnants of a life — broken furniture, scattered knickknacks and a flooded basement.
"This is fresh water that's coming into the basement here," McPhee points out. "All of that plumbing has been ripped away 'cause someone found a value in it, so they don't care that it's running. This is all over the city."
It will focus on the increasing use of sophisticated tools to hack into the computers of targets, including remotely enabling webcams, turning on microphones, and downloading documents and other files from hacked computers.
Originally published on Fri February 14, 2014 7:59 am
An announced $45 billion merger between Comcast and Time Warner Cable — the largest and second-largest cable companies in the U.S., respectively — is under scrutiny not just for its massive size but also for its potential impact on Internet use.
Originally published on Thu February 13, 2014 10:44 am
(We put a new top on this story at 9:25 a.m. ET and added an update at 10:15 a.m. ET.)
As NPR's David Folkenflik pointed out earlier today, Comcast's proposed $45 billion purchase of fellow cable company Time Warner will receive some scrutiny from federal officials. Here's some more about that part of the story:
According to Secretary of the State Denise Merrill, the web resource has a very simple aim. "If you were a small business person who just wanted to start your own business for the first time," she said, "where would you start, and how would you do it?"
Originally published on Thu February 6, 2014 2:26 pm
The teenage years are a tumultuous time, with about 11 percent developing depression by age 18. Lack of sleep may increase teenagers' risk of depression, two studies say.
Teenagers who don't get enough sleep are four times as likely to develop major depressive disorder as their peers who sleep more, according to researchers at the University of Texas Health Science Center in Houston. They tracked the habits of more than 4,000 adolescents over a year.
Originally published on Fri January 31, 2014 11:16 am
Yahoo has become the latest target of hackers, with usernames and passwords stolen from some of its estimated 273 million email customers.
"Recently, we identified a coordinated effort to gain unauthorized access to Yahoo Mail accounts," the company said in a blog post Thursday. "Upon discovery, we took immediate action to protect our users, prompting them to reset passwords on impacted accounts."
Women’s health is the next frontier for a team of medical researchers at Yale who believe video games can be powerful tools in the fight against HIV and other serious diseases.
For the last several years, Yale’s Play2Prevent lab has been a hub of collaboration between doctors and computer programmers testing the capacity of games to educate users and, perhaps, even change risky behavior. Their work is part of a fast-growing movement in public health to better understand how virtual gaming environments can improve players’ lives in the real world.
Shortly after protests began in Ukraine, Connecticut Senator Chris Murphy flew to Kiev and met with the anti-government demonstrators.
"The protesters are down there because they’re sick of seeing a government that too often resorts to violence, that has become endemic with corruption and is moving toward Russia instead of towards the European Union," said Murphy.
We hear more from Murphy about the recent, violent developments in the Kiev protests.
The credit and debit card data breaches at Target and Neiman Marcus compromised more than 70 million American consumers, and analysts say even more of us are at risk. That's because the technology we use to swipe for our purchases — magnetic stripes on the backs of cards — isn't hard for a skilled fraudster to hack.
This coming Friday marks the 30th anniversary of the first Apple Mac that went on sale.
NPR technology correspondent Steve Henn joins Here & Now’s Jeremy Hobson to discuss the genesis of the Macintosh, the future of Apple and how the Mac has influenced both Apple and the technological world.
If there was a consensus emanating from Congress Friday after President Obama's NSA reform speech, it was — not surprisingly — that Congress itself has a major role to play in the ultimate fix.
Whether from strong NSA supporters or agency critics, the reactions sounded similar: Congress intends to do much of the steering in the drive to overhaul the NSA's gathering of certain non-public information, especially consumer phone records, in the nation's counterterrorism efforts.
Even so, if you listened closely, you could hear the sound of politics in some of the reaction.
Originally published on Fri January 17, 2014 4:23 pm
The holiday season data breach at Target that hit more than 70 million consumers was part of a wide and highly skilled international hacking campaign that's "almost certainly" based in Russia. That's according to a report prepared for federal and private investigators by Dallas-based cybersecurity firm iSight Partners.
And the fraudsters are so skilled that sources say at least a handful of other retailers have been compromised.
"The intrusion operators displayed innovation and a high degree of skill," the iSight report says.