‘Earthrise,’ which appeared on the cover of the second and third Whole Earth Catalog, was taken by Apollo 8 astronaut Bill Anders during lunar orbit, Dec. 24, 1968.
The Whole Earth Catalog was a blueprint for sustainability that envisioned humans living in balance with nature. Its creative spirit was welcomed in a year riven by war, assassinations and riots.
Your connected speaker can quickly become a problem if it is not secured.
Connected objects can do a lot of good, but they can also become weapons in the hands of abusive partners. How can these new risks be prevented?
AT&T and Time Warner are among the latest companies to merge.
A scholar of the media business tries to make sense of the flurry of merger news lately, and why the contested tie-up between AT&T and Time Warner will profoundly reshape the American media landscape.
The Viva Tech Fair took place in May 2018 in Paris, showcasing innovation in Africa. The continent’s fablabs, driven by digital tools and collaborative dynamics, are shaking up traditional foundations.
Platforms for radicalisation?
Companies, such as Google, Facebook and Microsoft are working together to take down terrorist propaganda.
A common online conspiracy theory is the illuminati.
Conspiracy theories have always existed but the internet fuels them in new ways.
Young people are especially careful about expressing political view on social media.
It may be because we're early adopters and know the risks of social media, but a new study has found Australians are particularly careful about expressing political views online.
Cloud services are flexible, but are they secure?
Outside IT projects managed without the knowledge of IT departments are on the rise. What are the risks and possible consequences?
A new study shows that one in five children between the ages of nine and 17 report having accidentally seen sexual material online. Parents and educators can help their kids use the internet in a safe and responsible way.
Our experts offer 12 tips to parents and educators -- to protect their kids from sexual solicitation online and encourage safe and responsible internet use.
Poorly secured IoT devices could lead to attacks on national security.
As more physical objects are becoming digitalised, it is leading to greater national security risks.
Social media presents a powerful platform for creating multiple stories about Africa.
"If you think that hackers are just a bunch of anarchists ready to put everything on fire because it amuses them, you are wrong at all: we are much worse than that". (No One Is Innocent)
The link between exposure to online content and radicalisation to violence is ambiguous.
The internet may provide the forum, but radicalisation remains a social process.
Are toys sharing too much information on the internet?
As Amazon introduces a new smart-home device aimed at children, it's important to know many internet-connected toys are not secure, putting kids' security and privacy at risk.
Securing your home’s connection to the internet.
Here's how to secure your home network, whether or not it has already been attacked by hackers.
Some say the gig economy is capitalism's final victory, but maybe it's not.
Conversations on Facebook ethics are part of a bigger conversation about information architecture.
AP Photo/Alastair Grant
An expert explains how Facebook's privacy issues are linked to a bigger problem – a 'hostile information architecture,' largely controlled by corporate interests.
Two views of the internet collide in the net neutrality debate.
The Conversation composite from Malyugin and AAR Studios/Shutterstock.com
The internet developed as a place for open collaboration; there are technical limits on its transformation into a commercial marketplace.
Google’s Project Loon uses high altitude navigable balloons to deliver internet to rural and remote areas.
Tech companies such as SpaceX, Facebook, Google and Microsoft are competing to bring internet to areas without access in the developing world. And that's a problem.
As cities get smarter, we need to examine carefully who gets our data and what it is used for.