Ben Dickson

Ben Dickson is a software engineer and the founder of TechTalks.

Ben Dickson

What exactly do you earn from monetizing your resources on the internet, and how accessible and reliable are your earnings? Here’s what you need to know.

Monetizing computing resources on the blockchain

The concept of measuring and responding to human eye motion, or eye tracking, isn’t new, but the past year saw a rising interest in the technology. There have been a…

Unlocking the potential of eye tracking technology
Fintech

Can you trust crypto-token crowdfunding?

10:00 am PST • February 12, 2017

In 2016, blockchain startups raised some $200 million in Initial Coin Offerings, a new form of crowdfunding based on cryptocurrency tokens. Some of the startups have raked in millions of…

Can you trust crypto-token crowdfunding?

As our desktop computers, laptops, mobile devices, etc. stand idly by for a huge portion of the day, the need for computing resources is growing at a fast pace. So…

How blockchain can create the world’s biggest supercomputer

According to scientists, the answer to an impending food shortage might be found in a new age of digital technologies that have proven their worth in different fields and have…

Will technology prevent the next food shortage crisis?

Imagine a computing platform that would have no single point of failure and would be resilient to the cyberattacks that are making the headlines these days. This is the promise…

How blockchain can help fight cyberattacks

At the time of its inception some two centuries ago, the supply chain was a revolutionary idea that would improve visibility and control on goods and products as they moved…

Blockchain has the potential to revolutionize the supply chain

As AI and machine learning mature and manifest their potential to take on complicated tasks, we’ve become somewhat expectant that robots can succeed where humans have failed — namely, in…

Why it’s so hard to create unbiased artificial intelligence

As the Internet of Things evolves toward becoming one of the fastest expanding sectors in the tech industry, a lot of focus is being given to greenfield development, the process…

How to facilitate the path to brownfield IoT development
AI

The darker side of machine learning

11:00 am PDT • October 26, 2016

While machine learning is introducing innovation and change to many sectors, it also is bringing trouble and worries to others. One of the most worrying aspects of emerging machine learning…

The darker side of machine learning

What it takes to secure the elections

6:00 pm PDT • October 12, 2016

While virtually every industry and domain is flourishing and being revolutionized by technological advances, more than three-quarters of U.S. citizens will vote for their next president on paper ballots this…

What it takes to secure the elections

Since the 1999 launch of Napster’s music-sharing platform, the music industry has been in near-constant turmoil, with dipping revenues, lack of transparency, piracy problems and feuds over the fair distribution…

How blockchain can change the music industry

Ransomware has already managed to carve itself a niche as one of the main cybersecurity threats of 2016. As individuals, organizations and government agencies, we’re taking precautionary steps to protect…

What makes IoT ransomware a different and more dangerous threat?

The adoption of IoT technology can provide companies with unprecedented opportunities to reduce operating costs, increase productivity and tap into new markets previously inaccessible. But that won’t happen when IoT…

How IoT adopters can make efficient use of their data
Fintech

How blockchain will grow beyond bitcoin

7:00 pm PDT • September 19, 2016

Since its advent in 2009, bitcoin’s decentralized, broker-less and secure mechanism to send money across the world has steadily risen in popularity and adoption. Of equal — if not greater…

How blockchain will grow beyond bitcoin

After a failed stint in the 1990s, virtual reality made its reappearance last year with headsets such as Samsung Gear VR, Google Cardboard and Oculus Rift. But this time, it’s…

How virtual reality is transforming the sports industry

Insider threats are the biggest cybersecurity threats to firms, organizations and government agencies. This is something you hear a lot at security conference keynotes and read about in data breach…

How data science fights modern insider threats

With more and more unguarded IoT devices becoming connected to the internet every day, malicious bot lords are having an easier time conscripting new recruits into their undyingly loyal armies…

How to prevent your IoT devices from being forced into botnet bondage

As the Internet of Things evolves into the Internet of Everything and expands its reach into virtually every domain, high-speed data processing, analytics and shorter response times are becoming more…

How fog computing pushes IoT intelligence to the edge

Cybersecurity experts are constantly trying to keep pace with changes in the volatile landscape of IT security. Despite sophisticated tools and solutions, every IT security officer knows that data breaches…

How predictive analytics discovers a data breach before it happens

Most of us think of website hacks as illicit activities aimed at siphoning critical information or disrupting the business of website owners. But what happens when your site becomes hacked,…

Your website may be engaged in secret criminal activity

The transportation industry is associated with high maintenance costs, disasters, accidents, injuries and loss of life. Hundreds of thousands of people across the world are losing their lives to car…

How IoT and machine learning can make our roads safer

While more and more jobs are being forfeited to robots and artificial intelligence, is it conceivable to convey to machines a responsibility as complicated as cybersecurity? The topic is being…

Exploiting machine learning in cybersecurity

Imagine a washer that autonomously contacts suppliers and places orders when it’s low on detergent, performs self-service and maintenance, and schedules its cycles to take advantage of electricity prices; a…

Decentralizing IoT networks through blockchain

The Internet of Things genie is out of the bottle and growing at an accelerating pace. According to Gartner, 6.4 billion connected things will be in use worldwide in 2016,…

The implications of large IoT ecosystems

Video-game-related crime is almost as old as the industry itself. But while illegal copies and pirated versions of games were the previous dominant form of illicit activities, recent developments and…

The gaming industry can become the next big target of cybercrime
Security

How do you outsmart malware?

5:00 pm PDT • May 25, 2016

The growth of data breaches in recent months and years is in large part because of the new generation of smart malware being developed on a daily basis. Malicious actors…

How do you outsmart malware?

In the ever-shifting landscape of cyberthreats and attacks, having access to timely information and intelligence is vital and can make a big difference in protecting organizations and firms against data…

How threat intelligence sharing can help deal with cybersecurity challenges

The fact that plain passwords are no longer safe to protect our digital identities is no secret. For years, the use of two-factor authentication (2FA) and multi-factor authentication (MFA) as…

Strengthening authentication through big data

Computers and mobile devices running rich operating systems have a plethora of security solutions and encryption protocols from which to choose that can protect them against the multitude of threats…

How IoT security can benefit from machine learning