Manage business database applications.
Ending the NSA's massive phone database is just one recommendation in a report from the White House's surveillance review panel.
The database contains stolen usernames and passwords associated with Facebook, Twitter, Google, Yahoo, and more.
After users' hashed passwords, e-mail addresses, and other information is exposed in a security breach, the cloud-based hosting service neutralizes the attack and works to prevent future incidents.
More than 2.6 million images from public domain e-books have been uploaded to Flickr as part of an Internet Archive project -- with 12 million more to come.
A team of international scientists has spent four years painstakingly cataloguing every known living organism in the Southern Ocean.
Project Hemisphere, which was detailed in slides supplied to The New York Times, included access to phone logs dating back 26 years.
If you're happy and you know it, your keystrokes will surely show it, say researchers who've developed a program that can recognize users' emotions with a high level of accuracy.
For eight years, A's coach Tye Waller has been collecting data on opposing players and methodically building an application that gives the team an advantage on defense and on the bases.
The fitness tracking app's community of runners can now track the wear of their most important gear -- their shoes -- and buy new ones directly from the online retailer within the app.
A cold case comes back to life after facial recognition software recognizes an alleged US outlaw who'd been hiding out in Nepal.