A tax headache is looming if Scotland gets more powers from Westminster.
(2015)
Newspaper / Magazine
Steven, G. (2015). A tax headache is looming if Scotland gets more powers from Westminster
All Outputs (221)
Mobilfunk 5G Die ferngesteuerte Welt (2015)
Newspaper / Magazine
Thuemmler, C. (2015). Mobilfunk 5G Die ferngesteuerte WeltErst die neue Mobilfunkgeneration 5G soll den Durchbruch für
die Industrie 4.0 bringen. Während die Forschung schon um die
ersten Patente wetteifert, fürchten Kritiker das Ende der
Netzneutralität
Celebrities are grabbing more control over how they are portrayed in the media. (2015)
Newspaper / Magazine
Niu, Z. (2015). Celebrities are grabbing more control over how they are portrayed in the media
Björk at MoMA – the line between art and music is becoming ever more blurred (2015)
Newspaper / Magazine
Boughey, A. (2015). Björk at MoMA – the line between art and music is becoming ever more blurred
The Tour de Maths Reaches Out in Cornwall (2015)
Newspaper / Magazine
Guiver, C., Mueller, M., Lloyd, S., & Townley, S. (2015). The Tour de Maths Reaches Out in Cornwall
Can a zen-like state of mind power super cyclist to one of sport’s great world records? (2015)
Newspaper / Magazine
Westbury, T. (2015). Can a zen-like state of mind power super cyclist to one of sport’s great world records?No abstract available.
Lenovo’s security debacle reveals blurred boundary between adware and malware (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). Lenovo’s security debacle reveals blurred boundary between adware and malwareA widely disliked habit of PC vendors is their bundling of all manner of unwanted software into brand new computers – demo software, games, or part-functional trials. Faced with shrinking margins vendors have treated this as an alternative income str... Read More about Lenovo’s security debacle reveals blurred boundary between adware and malware.
If Obama is talking about securing the net, it should be on everyone else’s lips too. (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). If Obama is talking about securing the net, it should be on everyone else’s lips tooWe have spent years promoting the need for change in our approach to internet infrastructure, forcing politicians to recognise it as a serious issue. So it’s great to see Barack Obama tackling the issue in his State of the Union address. You may agre... Read More about If Obama is talking about securing the net, it should be on everyone else’s lips too..
Comment: Taking scares out of cancer care. (2015)
Newspaper / Magazine
Cruickshank, S. (2015). Comment: Taking scares out of cancer care
If you seek to ‘switch off’ encryption, you may as well switch off the whole internet. (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). If you seek to ‘switch off’ encryption, you may as well switch off the whole internetPrime Minister David Cameron has stated that the UK government will look at “switching off” some forms of encryption in order to make society safer from terror attacks. This might make a grand statement but it is impossible to implement and extremely... Read More about If you seek to ‘switch off’ encryption, you may as well switch off the whole internet..
How the love of one teenager brought Tweetdeck to its knees. (2014)
Newspaper / Magazine
Buchanan, W. J. (2014). How the love of one teenager brought Tweetdeck to its kneesTweetDeck, a Twitter app with millions of users, is back online after a rather surprising security scare. For several hours, the service was taken down all because a 19-year-old user tried to add a cute heart to his messages.
Traffic light hacking shows the Internet of Things must come with better security. (2014)
Newspaper / Magazine
Buchanan, W. J. (2014). Traffic light hacking shows the Internet of Things must come with better securityThe growing extent to which our day-to-day infrastructure is computer-controlled and internet-connected leaves it open to the possibility that malicious hackers could intercept data or take control of devices. Often this sort of critical infrastructu... Read More about Traffic light hacking shows the Internet of Things must come with better security..
The Homing Bird (2014)
Newspaper / Magazine
Fraser, B. (2014). The Homing Bird
What a Hitchhiking Robot Can Teach Us About Automated Coworkers (2014)
Newspaper / Magazine
Zeller, F., & Smith, D. H. (2014). What a Hitchhiking Robot Can Teach Us About Automated Coworkers
New William Gibson novel revives his 1980s cyberpunk vision (2014)
Newspaper / Magazine
Artt, S. (2014). New William Gibson novel revives his 1980s cyberpunk vision
Codebreaking has moved on since Turing’s day, with dangerous implications. (2014)
Newspaper / Magazine
Buchanan, W. J. (2014). Codebreaking has moved on since Turing’s day, with dangerous implicationsWe have always been been intrigued by keeping secrets and uncovering the secrets of others, whether that’s childhood secret messages, or secrets and codebreaking of national importance. With a film, The Imitation Game, reprising the life of Alan Turi... Read More about Codebreaking has moved on since Turing’s day, with dangerous implications..
What We Do in the Shadows in unmissable - whether you like vampires or not (2014)
Newspaper / Magazine
Artt, S. (2014). What We Do in the Shadows in unmissable - whether you like vampires or not
Scotland v England will be anything but friendly so soon after independence referendum (2014)
Newspaper / Magazine
Westbury, T. (2014). Scotland v England will be anything but friendly so soon after independence referendumNo abstract available.
Better locks to secure our data are the inevitable result of too many prying eyes (2014)
Newspaper / Magazine
Buchanan, W. J. (2014). Better locks to secure our data are the inevitable result of too many prying eyesRobert Hannigan, the new head of British signals intelligence agency GCHQ, has accused technology companies of aiding terrorists and criminals by providing them secure communications through their products and networks. Far from adopting a conciliato... Read More about Better locks to secure our data are the inevitable result of too many prying eyes.
In cybersecurity, the weakest link is … you (2014)
Newspaper / Magazine
Buchanan, W. J. (2014). In cybersecurity, the weakest link is … youA chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat to information security is actually people. Why strive to defeat encrypted... Read More about In cybersecurity, the weakest link is … you.