#Cyberculture agenda: “Apple vs. Google company structure, as seen through patents…

Apple vs. Google company structure, as seen through patents

For Co.Design, Periscopic compared patent ownership between Apple and Google, which ends up providing a good idea of company structure.

Medical Devices Are the Next Security Nightmare

More internet-connected medical devices flood into healthcare industry every day, but we’re not moving fast enough to defend them.

A deep-learning machine has learned to tease apart the income and education levels of an area just by looking at Google Street View images.
Chatbots and Social Media: New Research

Are you considering including chatbots in your marketing and customer support? Wondering how consumers are responding to chatbots? In this article, you’ll discover new research that shares consumer reactions to chatbots and the issues businesses should address before integrating chatbots. #1: Millennials Are the Biggest Group of Early Chatbot Adopters According to a recent study

Bitcoin reached a new high at $1,271 per bitcoin yesterday, and for the first time surpassed the price of gold per ounce, which was worth $1,235 by the end of last night. A year ago, one bitcoin was valued at $421, so it’s nearly tripled in 12 months, while gold’s price was about the same last year as it is today.

The International Game Developers Association was one of the first in the games industry to speak out against Trump’s immigration ban. It’s no surprise they’ve taken their protest of the ban a step further to actually help developers in the seven affected countries get visas to come work in the US.


It’s been five years since I published the first in We Are Social’s series of Global Digital reports, so I thought it might be interesting to see how much things have changed in that time.

The world’s most wanted hacker is basically a nerdy supervillain

On Sunday, the New York Times published a story on Evgeniy M. Bogachev, described as “the most wanted cybercriminal in the world,” full of details about the hacker’s crimes, plots, some incredible tidbits and a photo to end all amazing FBI photos.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.