The Homing Bird
(2014)
Newspaper / Magazine
Fraser, B. (2014). The Homing Bird. [The Statesman (Kolkata)]
All Outputs (26)
Traffic light hacking shows the Internet of Things must come with better security. (2014)
Newspaper / Magazine
Buchanan, W. J. (2014). Traffic light hacking shows the Internet of Things must come with better securityThe growing extent to which our day-to-day infrastructure is computer-controlled and internet-connected leaves it open to the possibility that malicious hackers could intercept data or take control of devices. Often this sort of critical infrastructu... Read More about Traffic light hacking shows the Internet of Things must come with better security..
How the love of one teenager brought Tweetdeck to its knees. (2014)
Newspaper / Magazine
Buchanan, W. J. (2014). How the love of one teenager brought Tweetdeck to its kneesTweetDeck, a Twitter app with millions of users, is back online after a rather surprising security scare. For several hours, the service was taken down all because a 19-year-old user tried to add a cute heart to his messages.
What a Hitchhiking Robot Can Teach Us About Automated Coworkers (2014)
Newspaper / Magazine
Zeller, F., & Smith, D. H. (2014). What a Hitchhiking Robot Can Teach Us About Automated Coworkers. [Online article]
New William Gibson novel revives his 1980s cyberpunk vision (2014)
Newspaper / Magazine
Artt, S. (2014). New William Gibson novel revives his 1980s cyberpunk vision
Codebreaking has moved on since Turing’s day, with dangerous implications. (2014)
Newspaper / Magazine
Buchanan, W. J. (2014). Codebreaking has moved on since Turing’s day, with dangerous implicationsWe have always been been intrigued by keeping secrets and uncovering the secrets of others, whether that’s childhood secret messages, or secrets and codebreaking of national importance. With a film, The Imitation Game, reprising the life of Alan Turi... Read More about Codebreaking has moved on since Turing’s day, with dangerous implications..
What We Do in the Shadows in unmissable - whether you like vampires or not (2014)
Newspaper / Magazine
Artt, S. (2014). What We Do in the Shadows in unmissable - whether you like vampires or not
Scotland v England will be anything but friendly so soon after independence referendum (2014)
Newspaper / Magazine
Westbury, T. (2014). Scotland v England will be anything but friendly so soon after independence referendumNo abstract available.
Better locks to secure our data are the inevitable result of too many prying eyes (2014)
Newspaper / Magazine
Buchanan, W. J. (2014). Better locks to secure our data are the inevitable result of too many prying eyesRobert Hannigan, the new head of British signals intelligence agency GCHQ, has accused technology companies of aiding terrorists and criminals by providing them secure communications through their products and networks. Far from adopting a conciliato... Read More about Better locks to secure our data are the inevitable result of too many prying eyes.
Chopping off the rhino’s horn and the war on wildlife crime (2014)
Newspaper / Magazine
Gilchrist, J. (2014). Chopping off the rhino’s horn and the war on wildlife crimeNo abstract available.
Absorption costing: Question and answer. (2014)
Newspaper / Magazine
Steven, G. (2014). Absorption costing: Question and answer
In cybersecurity, the weakest link is … you (2014)
Newspaper / Magazine
Buchanan, W. J. (2014). In cybersecurity, the weakest link is … youA chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat to information security is actually people. Why strive to defeat encrypted... Read More about In cybersecurity, the weakest link is … you.
When the ATM runs Windows, how safe is your money? (2014)
Newspaper / Magazine
Buchanan, W. J. (2014). When the ATM runs Windows, how safe is your money?How safe is Microsoft Windows? After all, the list of malware that has caused major headaches worldwide over the last 15 years is long – viruses, worms and Trojans have forced computers to shut down, knocked South Korea offline and even overloaded Go... Read More about When the ATM runs Windows, how safe is your money?.
iWorm hack shows Macs are vulnerable too (2014)
Newspaper / Magazine
Buchanan, W. J. (2014). iWorm hack shows Macs are vulnerable tooThe computer operating systems and applications we use today have often evolved over many years, decades even, and contain tens or hundreds of millions of lines of code. Flaws in that code – and there will always be some – give rise to security probl... Read More about iWorm hack shows Macs are vulnerable too.
The Hitchbot’s guide to travelling across a continent (2014)
Newspaper / Magazine
Zeller, F., & Smith, D. H. (2014). The Hitchbot’s guide to travelling across a continent. [Online article]
Team pressure, different rules, mental hell – why the Ryder Cup is not just another golf major (2014)
Newspaper / Magazine
Westbury, T. (2014). Team pressure, different rules, mental hell – why the Ryder Cup is not just another golf majorNo abstract available.
Confidence and empowerment against pessimism and cynicism in Scottish referendum (2014)
Newspaper / Magazine
Cimini, N. (2014). Confidence and empowerment against pessimism and cynicism in Scottish referendum
Ignore the scaremongers – banks will not be leaving Scotland if the Yes vote wins (2014)
Newspaper / Magazine
Holmes, R. (2014). Ignore the scaremongers – banks will not be leaving Scotland if the Yes vote winsWhy banks won't be leaving Scotland.
Pensions UK and Scotland. (2014)
Newspaper / Magazine
Holmes, R. (2014). Pensions UK and Scotland. [Sunday Post]Media article in national newspaper
Why Benjamin Britten’s War Requiem still resounds today (2014)
Newspaper / Magazine
Ashton, N. (2014). Why Benjamin Britten’s War Requiem still resounds today