1 553 032
Johnny Lee demos Wii Remote hacks
Building sophisticated educational tools out of cheap parts, Johnny Lee demos his cool Wii Remote hacks, which turn the $40 video game controller into a digital whiteboard, a touchscreen and a head-mounted 3-D viewer.
The intelligence of crows
Hacker and writer Joshua Klein is fascinated by crows. (Notice the gleam of intelligence in their little black eyes?) After a long amateur study of corvid behavior, he's come up with an elegant machine that may form a new bond between animal and human.
Where is cybercrime really coming from?
Cybercrime netted a whopping $450 billion in profits last year, with 2 billion records lost or stolen worldwide. Security expert Caleb Barlow calls out the insufficiency of our current strategies to protect our data. His solution? We need to respond to cybercrime with the same collective effort as we apply to a health care crisis, sharing timely information on who is
[ . . . ]
This scientist makes ears out of apples
TED Fellow Andrew Pelling is a biohacker, and nature is his hardware. His favorite materials are the simplest ones (and oftentimes he finds them in the garbage). Building on the cellulose structure that gives an apple its shape, he "grows" lifelike human ears, pioneering a process that might someday be used to repair body parts safely and cheaply. And he has some even
[ . . . ]
We are makers
America was built by makers -- curious, enthusiastic amateur inventors whose tinkering habit sparked whole new industries. At TED@MotorCity, MAKE magazine publisher Dale Dougherty says we're all makers at heart, and shows cool new tools to tinker with, like Arduinos, affordable 3D printers, even DIY satellites.
Your smartphone is a civil rights issue
The smartphone you use reflects more than just personal taste ... it could determine how closely you can be tracked, too. Privacy expert and TED Fellow Christopher Soghoian details a glaring difference between the encryption used on Apple and Android devices and urges us to pay attention to a growing digital security divide. "If the only people who can protect
[ . . . ]
How to exploit democracy
Hacking, fake news, information bubbles ... all these and more have become part of the vernacular in recent years. But as cyberspace analyst Laura Galante describes in this alarming talk, the real target of anyone looking to influence geopolitics is dastardly simple: it's you.