May 30, 2018

Streem and Porch put AR to work on your next home improvement project

Home improvement projects can quickly become overwhelming. Streem‘s augmented reality-enhanced video communications platform now connects customers directly to Porch‘s network of home service professionals nationwide. The goal is greater convenience and efficiency for both homeowners and service providers. In the last 12 months, Porch’s more than 250,000 professional members completed more than 2 million home improvement […]
May 24, 2018

Researchers develop self-driving boats that can double as bridges

Thanks to 3D printing, the fabrication of prosthetic arms, lightweight EV parts and even space travel have benefited from lower costs of production. Eager to build on that is a team of researchers from MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL). They’ve built a fleet of self-driving boats that could provide a tantalizing glimpse […]
May 23, 2018

The new AirTV wirelessly beams broadcast channels to your streaming device

It was only a few weeks ago that we reviewed the AirTV Player, which aimed to integrate the features you would normally find in a streaming box like the Roku, Apple TV, or Amazon Fire TV with the ability to pull in over-the-air (OTA) broadcast channels. That turned out to be a problem, as it […]
May 21, 2018

Microsoft Bought an AI Startup to Help Cortana Sound Less Robotic

At Google I/O 2018, Google announced that its digital assistant was getting upgraded with more natural-sounding speech in addition to six new alternate voices. Then, Google promptly scared the hell out of everyone by using the Google Assistant’s new skills to mimic a real voice so well, people on the other end of a phone […]
May 17, 2018

New malware will crash your PC if you try to thwart its digital coin mining

An aggressive form of malware designed to mine cryptocurrency is now crashing PCs when you try to remove it from the system. Dubbed “WinstarNssmMiner” by the 360 Total Security team, the malware essentially hijacks the target PC by consuming loads of processing power to mine the digital coins and attaching itself to the critical system […]