Europe speaks of technological independence in the face of U.S. and Chinese dominance – but is this a realistic goal?
Traditional businesses, because of the legacy they have in terms of business models and technologies, have struggled with their digital transformation when compared with born-digital comp...
Here are five things to know about the economics of the steadily growing superhero industry.
Data from Tencent shows that recognition accuracy reaches 90% for esophageal cancer, 97% for diabetic retinopathy, and 97.2% for colorectal cancer.
Regulators dealing with the thorny issue of consumer data control and privacy may overlook that the vast majority of digital content is ad-funded.
From TV to sport, these transgender people have been making waves this year.
Nearly half of video games include in-game purchase options, fuelling a spending spree on virtual goods and a debate on what property rights are held over the digital assets
The ability to exercise many of our most basic rights and privileges – from voting to travelling – requires standardized information to determine who is eligible for what. But, in the age...
Two business experts have ranked 42 countries by how easy it is for the most significant digital platforms to operate and thrive.
Interpol is the latest law enforcement agency to demand tech firms provide access to encrypted communications - but doing so could be a gift to cybercriminals. We look at the arguments.
From liking a post of your friend's dog, to seeing injustice videos that rile you, social media is full of quick gratification. But it could be undermining our ability to engage with info...
How can children be safer online without losing access to the benefits of the digital world?
When Tim Berners-Lee invented the world wide web in 1989, he envisioned it as an information management system for CERN, the European Organization for Nuclear Research.
Iceland was named as the most tolerant country towards LGBT+ people, while Tajikistan was in last place.
Hackers are capitalizing on the convenience of public USB charging points to introduce malware to mobile phones.