It's business failure, not the products.
Anyhow, I believe all of them are just evolve way too fast to let public accept it exist. Their business strategy directly attack the culture and political difference around the world. To me, I can see those potential. When the time is right, I bet they will get greater adoption with better business strategy and hardware integration in the future.
Product research means to invent or create something to improve our life. It's nothing to do with business. In the other hand, they will have more experiences than any other who is laughing at them when the time is right, and to make it right.
This challenge, launched this week by researchers at the Citizen Cyberlab project and the Citizen Cyberscience Centre, tests a new approach to browser-based public computing using virtual machines, read more: http://cern.ch/go/X7Jr
To join the challenge visit: http://cern.ch/go/KRR7
"Beware of Regin, the master! His heart is poisoned. He would be thy bane..." 
Symantec Security Response: " Regin is a highly-complex threat which has been used in systematic data collection or intelligence gathering campaigns. The development and operation of this malware would have required a significant investment of time and resources, indicating that a nation state is responsible. Its design makes it highly suited for persistent, long term surveillance operations against targets."
Kaspersky Labs' Global Research & Analysis Team: "For more than a decade, a sophisticated group known as Regin has targeted high-profile entities around the world with an advanced malware platform. As far as we can tell, the operation is still active, although the malware may have been upgraded to more sophisticated versions. The most recent sample we've seen was from a 64-bit infection. This infection was still active in the spring of 2014.
From some points of view, the platform reminds us of another sophisticated malware: Turla. Some similarities include the use of virtual file systems and the deployment of communication drones to bridge networks together. Yet through their implementation, coding methods, plugins, hiding techniques and flexibility, Regin surpasses Turla as one of the most sophisticated attack platforms we have ever analysed."
Some technical reports:
More detailed technical papers:
 James Baldwin, The Story of Siegfried, 1882
Injecting Malicious Code Into HTML5-Based Apps
Scanning 2D barcodes, finding free Wi-Fi access points, sending SMS messages, listening to music, and watching MP4 videos: these are very common activities that we do using our smartphones. Can you imagine that simply doing these things can get your smarphones infected with "worms" that can not only steal personal information from your phone, but also infect your friends's phones.
What platforms are affected?
All major mobile systems will be affected, including Android, iOS, Blackberry, Windows Phone, etc., because they all support HTML5-based mobile apps.
You can also read "The attack paper":
wavedrom - Digital timing diagram in your browser - Google Project ...
Project Information. Activity High; Project feeds; Code license; MIT License; Content license; Creative Commons 3.0 BY-SA; Labels waveform,
You are NOT a Software Engineer! - chrisaitchison.com
You are NOT a Software Engineer! You are not a Software Engineer. You do not build skyscrapers. You do not build bridges. You grow gardens.
ISO/IEC 14882:2011 - Information technology -- Programming languages -- C++
International Standards for Business, Government and Society. Home; Products; Standards development; News and media; About ISO. For ISO Memb
Intro to AI - Introduction to Artificial Intelligence - Oct-Dec 2011
Stanford School of Engineering - Stanford Engineering Everywhere
courses. SEE programming includes one of Stanford's most popular engineering sequences: the three-course Introduction to Computer Scienc