License plate scanners have become a fact of life. They're attached to traffic lights, on police cars — even "repo" staff use them. All those devices have created a torrent of data, raising new concerns about how it's being stored and analyzed.
Bryce Newell's laptop is filled with the comings and goings of Seattle residents. The data comes from the city's license plate scanner, acquired from the police through public disclosure requests. He plugs in a license plate number, uncovering evidence of long-forgotten errands.
Originally published on Fri April 17, 2015 6:01 am
You may not know it but most of today's smartphones have FM radios inside of them. But the FM chip is not activated on two-thirds of devices. That's because mobile makers have the FM capability switched off.
The National Association of Broadcasters has been asking mobile makers to change this. But the mobile industry, which profits from selling data to smartphone users, says that with the consumer's move toward mobile streaming apps, the demand for radio simply isn't there.
Originally published on Tue March 24, 2015 8:30 am
Several efforts in Washington are converging on the sensitive question of how best to safeguard the information software programs are gathering on students.
A proposed Student Digital Privacy and Parental Rights Act of 2015 is circulating in draft form. It has bipartisan sponsorship from Democratic Rep. Jared S. Polis of Colorado and Republican Rep. Luke Messer of Indiana.
Technology entrepreneur Jonathan Bush says he was recently watching a patient move from a hospital to a nursing home. The patient's information was in an electronic medical record, or EMR. And getting the patient's records from the hospital to the nursing home, Bush says, wasn't exactly drag and drop.
"These two guys then type — I kid you not — the printout from the brand new EMR into their EMR, so that their fax server can fax it to the bloody nursing home," Bush says.
Originally published on Mon February 16, 2015 2:57 pm
On a breezy morning next to a cornfield in rural Weld County, Colo., Jimmy Underhill quickly assembles a black and orange drone with four spinning rotors.
"This one just flies itself," he says. "It's fully autonomous."
Underhill is a drone technician with Agribotix, a Colorado-based drone startup that sees farmers as its most promising market. Today he's training his fellow employees how to work the machine in the field.
But there's another kind of attack that makes itself known — on purpose. It sneaks into your network and takes your files, holding them for ransom. It's called ransomware, and, according to cybersecurity experts, this kind of attack is getting more sophisticated.