Toggle light / dark theme

NASA will host a media teleconference at 1 p.m. EST Thursday, Dec. 14, to announce the latest discovery made by its planet-hunting Kepler space telescope. The discovery was made by researchers using machine learning from Google. Machine learning is an approach to artificial intelligence, and demonstrates new ways of analyzing Kepler data.

The briefing participants are:

Read more

But the best science and tech writing goes one step further. With delight and mystery—and sans unnecessary jargon and technical details—this genre can help us better understand some of the world’s most complex and abstract concepts, from gravitational waves (Gravity’s Kiss) to Darwinian evolution (The Evolution of Beauty) to antibiotic resistance (Big Chicken). Each of these remarkable tomes from 2017 does just that, shining a light on the hidden connections and invisible forces that shape the world around us. In doing so, they make our experience of that world that much richer.


Get the best of Smithsonian.com by email. Keep up-to-date on:

Read more

IN AN AGE of nonstop breaches and hacks, getting a handle on your own digital security matters more than ever. But everyone has their own threat model—a set of concerns unique to themselves. The average smartphone user doesn’t need to know what a Faraday cage is; an NSA contractor probably already has a good grasp of security basics. (Or … do they?) In this guide, we’ve included a few ways to improve your online security posture based on those different levels of risk. These won’t prevent the next megabreach or banish ransomware from the earth. They’re not all-encompassing. But they’ll help get you in the mindset of the types of steps you should be taking based on your particular situation. And they’ll help ensure that the next time you read one of those paralyzing headlines, it doesn’t apply to you.


In an age of nonstop breaches and hacks, getting a handle on your own digital security matters more than ever. But everyone has their own threat model—a set of concerns unique to themselves. The average smartphone user doesn’t need to know what a Faraday cage is; an NSA contractor probably already has a good grasp of security basics. (Or … do they?) In this guide, we’ve included a few ways to improve your online security posture based on those different levels of risk. These won’t prevent the next megabreach or banish ransomware from the earth. They’re not all-encompassing. But they’ll help get you in the mindset of the types of steps you should be taking based on your particular situation. And they’ll help ensure that the next time you read one of those paralyzing headlines, it doesn’t apply to you.

Read more

That might not be a bad thing.

V isitors to Henn-na, a restaurant outside Nagasaki, Japan, are greeted by a peculiar sight: their food being prepared by a row of humanoid robots that bear a passing resemblance to the Terminator. The “head chef,” incongruously named Andrew, specializes in okonomiyaki, a Japanese pancake. Using his two long arms, he stirs batter in a metal bowl, then pours it onto a hot grill. While he waits for the batter to cook, he talks cheerily in Japanese about how much he enjoys his job. His robot colleagues, meanwhile, fry donuts, layer soft-serve ice cream into cones, and mix drinks. One made me a gin and tonic.

H.I.S., the company that runs the restaurant, as well as a nearby hotel where robots check guests into their rooms and help with their luggage, turned to automation partly out of necessity. Japan’s population is shrinking, and its economy is booming; the unemployment rate is currently an unprecedented 2.8 percent. “Using robots makes a lot of sense in a country like Japan, where it’s hard to find employees,” CEO Hideo Sawada told me.

Read more