Writing Studio : Vanderbilt University - 0 views
Walking on Eggshells: Anatomy of a Science Story | Cocktail Party Physics, Scientific A... - 0 views
Adaptation: Why your brain loves to tune out - 0 views
-
Our brains are wired such that we automatically cancel out things that are not changing around us, in a process called adaptation. I really like this article because it not only gives a lot of interesting information about the brain, but it also hooks the reader effectively by providing physical, relatable examples of how our brains tune stuff out. I quickly found myself drawn into the article and interested to learn more.
Robots: Can biohybrid model sink or swim? - 0 views
-
This article describes an ongoing project to build an artificial organism that integrates biological parts with electrical components. The article, while introducing scientific jargon, does a great job of explaining technical terms in depth. It also quotes members of the project team, presenting a realistic assessment of the project's progress and odds of success. Lastly, the article includes several links to videos and pages of extremely interesting and relevant content.
BBC - Future-Intelligence agencies turn to crowdsourcing - 0 views
-
This article on how the CIA is using crowdsourcing to make intelligence more accurate is particularly well written because if its inclusion of a quick attention draw with the reference to the new James Bond movie, good historical background, an inviting writing style that includes rhetorical questions, and interviews with experts that add to the legitimacy of the article.
Cell Phone Data Could Help Clip Malaria Spread - 0 views
Come Firewalk With Me - 0 views
In cyberattacks, hacking humans is highly effective way to access systems - The Washing... - 0 views
SIGSALY - NSA/CSS - 0 views
Firesheep Users May Be Breaking the Law - Kashmir Hill - The Not-So Private Parts - Forbes - 0 views
-
"The legality of using Firesheep is less wooly when it comes to the Computer Fraud and Abuse Act, which criminalizes accessing computer systems without authorization."
-
"The legality of using Firesheep is less wooly when it comes to the Computer Fraud and Abuse Act, which criminalizes accessing computer systems without authorization."
Beneblog: Technology Meets Society: Benetech's Human Rights Spin-off - 0 views
-
During one of our classes, we briefly discussed the use of cryptography to protect eyewitness and victim information during the investigation of human rights violations. The individual I mentioned that day was Patrick Ball, who now will lead a new organization focused on "the data-driven and scientific side of analyzing human rights violations around the world."
Codebreaker Challenge - 0 views
« First
‹ Previous
541 - 560
Next ›
Last »
Showing 20▼ items per page