Bell Labs may have been absorbed into Alcatel-Lucent and ditched basic physics research, but it's still producing breakthroughs in optics, quantum computing and social computing.
The Full Tilt
Stilgherrian delivers an undiluted dose of criticism and analysis of the ways digital technology is changing our world and the spin that goes with it.
Stilgherrian is a freelance journalist, commentator and podcaster interested in big-picture internet issues, especially security, cybercrime and hoovering up bulldust. He studied computing science and linguistics before a wide-ranging media career and a stint at running an IT business. He can write iptables firewall rules, set a rabbit trap, clear a jam in an IBM model 026 card punch and mix a mean whiskey sour.
Jon Callas has been at the centre of computer security since the olden days of the 1990s. On today's Patch Monday podcast he talks about the future. Cloud, smartphones, Android, the lot.
In just five years, malware construction kits will be so easy to use, and embedded processors will provide such easy targets, that a disgruntled paper boy might hack your refrigerator.
Identity theft is easy to commit, as Welsh comedian Bennett Arron discovered. He explains just how easy on this week's Patch Monday podcast.
Steve Jobs might now be known for such mainstream technology as the iPhone, iPad and Macintosh, but his first creation with hardware genius Steve Wozniak was illegal.
Adobe has taken a few security hits lately, from the Flashback Mac Trojan and another zero-day exploit in Flash Player to malware-laden PDF files being the hacker's weapon of choice. So what gives?
Cyberwar has been big news this year, from Stuxnet to claims that China has a massive cyber warfare capability. But what is it, exactly?
For a organisation that analyses 180,000 new malware samples every day, SophosLabs is a remarkably peaceful place. The fight against cybercrime is a well-rehearsed routine.
Five years ago, cyber criminals were generally individual IT experts who had turned to crime. Today, they're professional criminals turning to the internet, hiring the IT talent that they need.
When it comes to online security, can we ever overcome basic human nature? It seems that people are always too trusting, and the bad guys are always getting better at taking advantage of that trust.
Google demands that users of its Google+ social network be identified by their real names. It's a bad policy that's been badly implemented, but is it proof that Google just doesn't get people?
Hacking for political and economic purposes isn't getting the attention it deserves, says McAfee's vice president of threat research Dmitri Alperovitch, who uncovered the Operation Shady RAT hacks.
Shadow Communications Minister Malcolm Turnbull has been spruiking coalition broadband policy this month. A core point, he says, is that there are no applications for National Broadband Network (NBN) speeds of 100 megabits per second (Mbps). Is he right?
"An insider who's gone bad can do more damage to your network than almost any hacker can do from the outside," says Dr Paul Nielsen, director and chief executive officer of the Software Engineering Institute (SEI).
It's the consumerisation of the enterprise; employees expect to use Facebook, Twitter and applications beyond the standard operating environment (SOE). How do you manage that securely?