Alina Selyukh

Alina Selyukh is a business correspondent at NPR, where she follows the path of the retail and tech industries, tracking how America's biggest companies are influencing the way we spend our time, money, and energy.

Before joining NPR in October 2015, Selyukh spent five years at Reuters, where she covered tech, telecom and cybersecurity policy, campaign finance during the 2012 election cycle, health care policy and the Food and Drug Administration, and a bit of financial markets and IPOs.

Selyukh began her career in journalism at age 13, freelancing for a local television station and several newspapers in her home town of Samara in Russia. She has since reported for CNN in Moscow, ABC News in Nebraska, and NationalJournal.com in Washington, D.C. At her alma mater, Selyukh also helped in the production of a documentary for NET Television, Nebraska's PBS station.

She received a bachelor's degree in broadcasting, news-editorial and political science from the University of Nebraska-Lincoln.

In a few days, Apple will formulate its formal response to the federal judge's order seeking the company's help for the FBI to get inside a phone used by Syed Farook, one of the attackers in the San Bernardino, Calif., shootings.

Remember the cryptex, the little handheld safe from The Da Vinci Code where entering the correct combination will reveal the secret message and entering the wrong one will destroy it?

Now replace the little safe with an iPhone, and instead of a secret message, it's holding evidence in a terrorism case. The critical combination? It's a passcode — one the FBI doesn't know, and one that Apple is reluctant to help the agency figure out.

Multitasking is a myth, says Daniel Levitin.

This was the premise underlying the first of the tasks posed by WNYC's Note to Self podcast. I had signed up for their five-day set of challenges in hopes of decluttering my brain of the uselessly consumed Internet detritus to get a boost of creative energy. And now my first elimination target was multitasking.

It was a rumor that had many Twitter old-timers up in arms: Twitter is changing its signature structure of real-time posts in reverse chronological order.

It's true. The company now says it's got a new algorithm to predict which tweets you might not want to miss. Those selected tweets, minutes or hours old, will display at the top when you log in after an absence. The rest of the tweets below will remain in real-time and reverse chronology.

Can a kid succeed in school with only a mobile device for Internet access at home?

Lorena Uribe doesn't have to think about that one:

"Absolutely not," she says.

When her old computer broke down several years ago, she and her teenage daughter found themselves in a bind for about five months: homework to do and no computer or broadband access at home.

"I would take her to the mall and have her sit in Panera so she could use the Wi-Fi on her iPad from school," Uribe says.

Tech companies and privacy advocates have been in a stalemate with government officials over how encrypted communication affects the ability of federal investigators to monitor terrorists and other criminals. A new study by Harvard's Berkman Center for Internet and Society convened experts from all sides to put the issue in context.

For more than a quarter of people around the world, for as long as they've been alive, there's always been Wikipedia. This week, the online crowd-sourced encyclopedia turns 15.

It's come a long way: With some 35 million articles, Wikipedia speaks hundreds of languages and cites 80,000 volunteers around the world as editors. Its goals are lofty: to become a better Encyclopedia Britannica, a freely accessible "sum of all human knowledge."

A few days back, All Tech got a question from an NPR listener that got us curious.

Tim Callahan from Seattle wrote:

"A friend asked how texting — in all its forms (admittedly a squishy thing to corral) — is contributing to global warming? After saying, 'minimally...', I thought about how to answer that question. Putting aside the sunk contribution caused by the manufacture and transport of the device you text with, how much does the battery emit / generate while a person does a typical or somehow average text? ... Can you help quantify?"

Twitter wasn't always the site where your posts were limited to 140 characters.

It added the restriction early on to make sure that people who used the website through their phones would only have to deal with tweets that can fit within the standard length of a text message, which is 160 characters. (Extra space for usernames.)

But over time, the character limit has become Twitter's undeniable signature element, even as many more features and capabilities have been added over the years.

The notion of a gun smart enough to tell who's holding it isn't new.

Since the 1990s, inventors have been developing firearms geared with technologies that can authenticate their users — for instance by recognizing the fingerprint, the grip or an RFID chip — and stop working if held by the wrong hands.

The year 2015 brought us the Apple Watch, the rise of the "hoverboard" (but it doesn't really hover, we know), lots of stories about virtual reality and self-driving cars and data breaches and encryption and copyright. ... Well, you get the point.

NPR delivered a few quirky stories, too, and we've selected a few of the ones with memorable informational tidbits (some of which were among All Tech's top read posts) and turned them into a quiz. Do you think you can figure out the answers?

Predictions are always a tricky thing — especially for a fast-moving world like technology.

Alina Selyukh and Aarti Shahani spoke with Robert Siegel on All Things Considered about some of the biggest themes in tech and tech policy. You can hear their quick recap on net neutrality, drone regulations, self-driving cars and data breaches in the audio above.

This post was updated on Dec. 19, 2016.

Bummer, you've missed the best time to order Christmas gifts online! And now you have these options: pay for same-day delivery or face the dreaded shopping mall (or resort to that end-of-the-line choice of a gift card, but you wouldn't go there, would you?).

After years of debate, cybersecurity legislation may pass this week, tucked inside the trillion-dollar federal spending bill.

The House and the Senate both have passed competing versions of cybersecurity legislation and pressed to negotiate a version they could pass before the end of the year. It's now part of the massive appropriations package, toward the end of the latest amended draft, which is expected to go up for vote later this week.

Is a drone a toy or a (tiny) airplane?

To the Department of Transportation, the question is far from complicated.

"Unmanned aircraft operators are aviators and with that title comes a great deal of responsibility," Transportation Secretary Anthony Foxx said on Monday while unveiling new drone registration rules.

Pages