Search
Patexia Edward Tessen Tanaka’s

Edward Tessen Tanaka > News

There are a number of fundamental principles used by software engineers when creating new technologies for end consumers.  One of the more popular design... Read More »
There is often considerable overlap between the needs of companies that create military systems and those that focus on commercial or “civilian”... Read More »
"Invention, strictly speaking, is little more than a new combination of those images which have been previously gathered and deposited in the memory; nothing can ... Read More »
In mythology, trolls are often portrayed as large brutes with little creativity and even worse manners who enjoy devouring innocent people.  In stories and songs ... Read More »
What does the largest search engine in the world have in common with the largest casino in the world? Surprisingly, both of these corporate organizations, Google ... Read More »
Microsoft, best known for software and the Xbox gaming system, recently worked with West Coast Customs, best known for 'pimping' cars, to create a... Read More »
Identity theft. Financial fraud. Cybercrime. These words have been integrated into our daily jargon seemingly overnight. It has become nearly impossible to turn on... Read More »
With the ever-growing overlap between our personal and professional lives, keeping business separate has become a high priority. In order to do so, many of us have... Read More »
The United States and the People’s Republic of China (PRC) have a vested interest in fostering research with both military and commercial applications. In the... Read More »
For months you have been watching your friends and co-workers -- sometimes with a little envy -- as they enjoyed using their iPads, Kindles or Nooks. You finally have ... Read More »
Business models are the underlying and sometimes hidden rationales that describe how an organization creates, delivers and captures value. Start-up companies often... Read More »
The Super Bowl is one of the most watched television events nearly every year, often viewed in more than 40 million households. This year was no exception, breaking... Read More »
Comments
Feb 13, 2012
Most of us spend our entire lives building our own personal brand.  We work long hours so to reflect our inner character and establish a reputation of worth. ... Read More »
18 minutes isn't a very long time for most of us who operate in the civilian world. However, in April of 2010, the Chinese government took control of 15% of the... Read More »
Data mining, the hidden seamless process in which algorithms present us with relevant search results based on the input of keywords, is reaching a critical juncture... Read More »
An unclassified Department of Defense (DOD) document produced by the Joint Non-Lethal Weapons Directorate (JNLWD) was recently leaked onto the Internet. This... Read More »
Imagine an iPad application that allows a soldier to pilot an unmanned aerial vehicle (UAV) fitted with an inexpensive metal detector several inches off the ground... Read More »
The Chinese government has clandestinely supported the largest theft of intellectual property in the history of the United States.  U.S. cybersecurity... Read More »
Menu