Tom Merritt, Sarah Lane and the team help you stay up to date with independent, authoritative a
Can putting data centers in space provide much needed benefits and what are the challenges? Hoping t
On this episode. Is the web browser extension coupon code tool, Honey, running a scam using influenc
It’s our 2025 Tech Predictions Show! Tom and Sarah along with Robb Dunewood, Justin Robert Young and
It’s the 2024 DTNS Predictions Results episode. This is where we look back on the predictions we mad
We’d thought it be fun to include a repost of last year’s 2024 tech predictions before we bring you
2024 saw plenty of big tech stories take the headlines for DTNS and GDI. From continued rise of gene
Welcome to our end of year Listener Hangout Show. This is the annual episode where we invite several
Brian Brushwood explains how he uses AI models in his personal and work life. Plus a Canadian startu
Dr. Niki reveals the big 2024 winners of this year’s Ig Nobel Prizes and why you shouldn’t take it t
YouTube announced a number of new AI focused policies. How will these help creators? Plus product le
Who’s Hunter DeButts, why did President Wilson pardon him, and how did generative AI get all of this
Why is Netflix making its battle-royale style Squid Game video game available to non-subscribers? Pl
Is Apple Intelligence as good as Apple says it is? Emily Forlini from PC Magazine shares her experie
Political polarization feels like it's at historic high, but what does the data actually tell us? Pl
Waymo’s robotaxis passes an independent first responder test. Plus Google’s NotebookLM AI podcast ho
Jason Howell has first impressions of Android XR, Google’s new mixed reality platform. And is Epic’s
What happens when Moxie the AI powered emotional support companion loses access to its cloud servers
How an AR program may be the key to helping people with Parkinson’s disease manage symptoms. Plus Am
Merriam-Webster made “blog” the word of the year in 2004. Twenty years later how has blogging evolve
As the US government invests in technology to extra data from encrypted communications what should t