The original concept was for the system to display a number of images on a tabbed-page HTML layout. Each tab/page of images needed to be centered and allow a user to touch a thumbnail to bring up larger rendering of that image.
Most search engines do an adequate job at sorting out some of these FLUFF sites but they still somehow show up in search results. Maybe what we need in the search engine tools arsenal is a FLUFF filter.
Within the next few years, we will see an exponential growth in micro touch screen devices that can be unfolded from 3x6 to 12x6 (and other sizes) to form a touch screen. These devices will have no hard drive, no CD/DVD, no memory other than an ultra-thin EPROM, and no external ports.
When talking about the Semantic Web there are a few premises one must acknowledge. One premise is that any data exchange on the internet is originally initiated by a human. There is no information retrieval without a request for that information and that request can be directly tied to a human request for the information.
Twitter is fighting back against cyber-crime and malicious activity in its recent actions toward Tor users and Isis.
A critical vulnerability in glibc, a core Linux library, can be exploited remotely through PHP applications.
As the Sony hack investigation unfolds, revelations regarding its possible origin, type of hack used, and the damage it is purported to have caused, are starting to be revealed.
Google is pioneering another innovation which may someday replace the need for passwords. The device they are introducing is a pluggable USB device that acts as the authentication mechanism to login. By inserting the device into a USB port and touching it a process is started that authenticates the user through that physical device.
VR (Virtual Reality) is not a new concept and it has seen its share of failures and even long spans of time in virtual limbo. The idea and reality of VR have, for some time, been separated by a chasm of ergonomics, hardware requirements, and consumer acceptance.
Headlines like "Devastating Heartbleed Flaw Was Used in Hospital Hack" and others tend to make one wonder if anybody is paying attention. The hackers are letting the security firms do the grunt work of finding flaws and then all they have to do is troll for sites don't update.