Technology
-
Where Are the Drones?: How Red Tape is Slowing Down Drone Delivery
Avery Anapol | July 10, 2017Companies like Amazon are taking their fleet across the pond to test drone delivery
-
Behind the FCC’s New Plan to Peel Back the Net Neutrality Rules
Kevin Rizzo | May 24, 2017What's the future of net neutrality?
-
Doxxing and Swatting: New Frontiers in Online Harassment
Anneliese Mahoney | May 8, 2017Do you know what these are?
-
How Close are we to Driverless Cars?
Michael Sliwinski | August 14, 2016Where are we now and what's left to figure out?
-
FCC’s Spectrum Auction: What it is and Why it Matters
Mary Kate Leahy | May 16, 2016The FCC's bold plan to reallocate spectrum to wireless companies.
-
Breakthrough Starshot and the Acceleration of Space Travel
Jillian Sequeira | April 22, 2016What is breakthrough starshot?
-
Ransomware: Holding Our Digital Lives Hostage?
Michael Sliwinski | March 2, 2016Why is ransomware so effective?
-
Making Reality Virtual: The Rising Tide of Virtual Reality
Michael Sliwinski | August 16, 2015What's going on with virtual reality?
-
Combatting Cyber Attacks: Will Congress Adopt Obama’s Plans?
Jessica McLaughlin | July 31, 2015What can be done to stop hacking?
-
Protecting Email Communication: Is it Possible?
Southwestern Law School | July 28, 2015Email encryption in a post-Snowden world.
-
The Gaming Industry: Misogynistic and Living in the Past
Jessica McLaughlin | June 24, 2015Women make up nearly half of gamers, so why is the industry stuck in its misogynistic past?
-
Regulating the Innovative World of 3D Printing
Jessica McLaughlin | May 30, 20153D printing may innovate all of our lives--but are there limits to what can be printed?
-
Periscope & Meerkat: Live Streaming is the Latest Social Media Development
Valeriya Metla | April 14, 2015Will live streaming become the new big thing in social media?
-
Personal Records Online: Who’s Protecting Your Information?
Valeriya Metla | March 19, 2015Everyone's records can now be found online. Is that a good thing?
-
ISIS and the Terrorist Social Network
Michael Sliwinski | March 15, 2015How ISIS uses social media to gain supporters, spread its message, and solicit money.
-
What New Ethical Concerns Affect Online Journalism?
Noel Diem | February 5, 2015What new ethical concerns do writers have to be mindful of in the online journalism industry?
-
Cybersecurity: Will We Ever Be Safe?
Alexandra Stembaugh | January 20, 2015Will we ever be able to develop cybersecurity to protect ourselves from cyber attacks?
-
Hacking: The New Kind of Warfare
Michael Sliwinski | December 30, 2014Hacking is a new way for nations and non-state actors to fight wars and gain advantages.
-
The Instagram Nudity Problem: What’s the App to Do?
Kelsey Kennedy | November 28, 2014There's an Instagram nudity problem and it isn't what you think.
-
Internet Fast Lanes Will Change How You Use the Web
Eric Essagof | July 31, 2014The FCC is on the verge of allowing internet fast lanes that would allow content providers to pay for...
-
The Big Business of Big Data
Alexandra Stembaugh | July 18, 2014Data brokers know where you live, what you buy, what medical conditions you have, your background, interests, and even...
-
Technology and the Bullying Epidemic: The Case of Yik Yak
Alexandra Stembaugh | July 4, 2014Between laptops, cellphones, tablets, and iPads, students have more access to technology than ever before, and this comes with...
-
Hashtag Activism: Is it #Effective?
Alex Hill | June 19, 2014In an era engulfed by technology, previous ways of life have undergone a revamping. One aspect is the way...