It\u2019s not necessarily easy to pick the coolest and wackiest tech stories of the year, especially when you have so much to choose from. Rather than trying to be all- inclusive as we have done in the past, see ( and and ) we have tried to more \u201cexclusive.\u201d Have fun!\n1. Coffee drones\n Getty Images\nFirst up is a cool story about IBM and coffee-delivering drones. Big Blue has filed a patent for a coffee-delivery drone with intricate sensors. IBM in the patent says they system works like this: A cup of coffee hangs from a small flying unmanned vehicle, and the drone flies to an area with people in it and can be flagged down by someone who desires the beverage.\n\nThe drone system isn\u2019t dumb. Rather it can collect data about your location and time of day. If it notices a trend, say you get tired at 3 p.m., it could do a fly-by-coffee at that time every day without you asking for it. Will it make it to the market? Don\u2019t bet against it.\n2. Really bad airport security\n Getty Images\nOur next story falls into the wacky category and comes from London. The story goes that a man on his way to a library found a random USB stick lying on the sidewalk. Upon booting it up he found that in contained all manner of security information about London Heathrow Airport, including security procedures for the Queen and other important travelers, the location of all closed circuit television camera at the airport, and maps of the Heathrow's tunnels and escape shafts for the Heathrow Express train station.\nEngland\u2019s Information Commissioners Office ended up fining Heathrow Airport Limited approximately $154,000 for \u201cfailing to ensure that the personal data held on its network was properly secured. The Register reported that the ICO discovered that just 2 percent of the 6,500 workers at HAL had been trained in data protection.\nThe ICO also noted "widespread" use of removable storage media that flouted HAL's internal policies and guidance, and sloppy controls over preventing staff downloading personal data onto unauthorized or unencrypted media. Needless to say there have been security changes at Heathrow.\n3. Fly-by attack risk\n Darin Russell \nSticking with security, there were multiple reports of potential vulnerabilities about the networks involved with supporting the Lockheed Martin F-35 Lightning II, the next-generation joint strike fighter to the U.S. military.\n\u201cIt\u2019s a software-based aircraft, and any software-based platform is going to be susceptible to hacking,\u201d Brig. Gen. Stephen Jost, director of the Air Force F-35 Integration Office, told Defense News.\nThe problem isn\u2019t with the aircraft support networks. As Popular Mechanics puts it: Every F-35 squadron, no matter the country, has a 13-server Autonomic Logistics Information System\u00a0(ATIS) that is connected to the worldwide ALIS network. Individual jets send logistical data back to their nation\u2019s Central Point of Entry, which then passes it on to Lockheed's central server hub in Fort Worth, Texas. In fact, ALIS sends back so much data that some countries are worried it could give away too much information about their F-35 operations.\nAnother networked system is the Joint Reprogramming Enterprise, or JRE. The JRE maintains a shared library of potential adversary sensors and weapon systems that is distributed to the worldwide F-35 fleet, Popular Mechanics wrote. The services that use the F-35 are now trying to tighten the bolts around any potential vulnerabilities.\n4. $12B email scam\n ivke32\/Pixabay \nThis scam is just crazy, especially since it has been going on so long.\nIt's the business email compromise (BEC) scam that the FBI says has garnered over $12 billion in ill-gotten booty and netted nearly 80,000 victims between 2016 and now. The BEC scam continues to grow and evolve, targeting small, medium and large business and personal transactions.\nBetween December 2016 and May 2018, there was a 136 percent increase in identified global exposed losses, the FBI wrote. The scam has been reported in all 50 U.S. states and in 150 countries. Victim complaints filed with the Internet Crime Complaint Center, and financial sources indicate fraudulent transfers have been sent to 115 countries.\nThe FBI says the scam has evolved over the years but is frequently carried out when an attacker compromises legitimate business email accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds. A variation of the scam involves compromising legitimate business email accounts and requesting personally identifiable information (PII) or Wage and W-2 income tax forms for employees.\n5. Quantum coolness\n Microsoft\nIt\u2019s still a few years away but it was interesting to hear Gartner espouse the coming power of quantum computers at its Symposium\/IT Expo this fall.\nOne of the top potential disruptive technologies in the next five years or so will be the use of quantum computing or quantum computing services to solve difficult problems and offer new applications, Gartner analysts said. The parallel execution and exponential scalability of quantum computers means they excel solving problems too complex for traditional approaches or where a traditional algorithms would take too long to find a solution.\nAutomotive, financial, insurance, pharmaceuticals, military and research industries have the most to gain from the advancements in quantum computing. Most organizations should learn about and monitor QC through 2022 and perhaps exploit it from 2023 or 2025,\u201d Gartner said. Gartner recommends getting ahead of the curve by leveraging QCaaS, GitHub tools and SDKs.\nMeanwhile towards the end of the year Harvard announced its Harvard Quantum Initiative (HQI) which is intended to bring together a new scientific community, in concert with national efforts to accelerate progress in quantum technology. Thing are indeed heating up.\n6. Mirror, mirror on the wall\n Getty Images\nAm I pretty or am I pretty intelligent?\nUniversity of Melbourne researchers said they have built what they called a biometric mirror that uses artificial intelligence to detect and display people's personality traits and physical attractiveness based a photo of their face.\nThe mirror displays 14 characteristics, from gender, age and ethnicity to attractiveness, weirdness and emotional stability. The longer a person stands there, the more personal the traits become, researchers said.\n"Our study aims to provoke challenging questions about the boundaries of AI. It shows users how easy it is to implement AI that discriminates in unethical or problematic ways which could have societal consequences. By encouraging debate on privacy and mass-surveillance, we hope to contribute to a better understanding of the ethics behind AI," said Dr Niels Wouters from the Centre for Social Natural User Interfaces (SocialNUI) and Science Gallery Melbourne.\n7. Bluetooth commode\n Charles & Hudson (CC BY-SA 2.0)\nOne rarely gets to combine the words toilet and Bluetooth or wireless, but this is 2018 after all.\nShown at CES early in the year, the Kohler Numi porcelain convenience \u201coffers personalized settings that let you fine-tune every option to your exact preferences, from ambient colored lighting to wireless Bluetooth music sync capability to the heated seat and foot warmer. Play your favorite music and podcasts \u2014\u200a simply stream wirelessly with any device enabled with Bluetooth technology, store MP3 files to the SD card or plug in your device using the auxiliary cable."\nOther upgrades include power-save mode for energy efficiency, emergency flush for power outages, and an intuitive touch-screen remote. From its striking form to its exceptional water efficiency, the Numi toilet marks a new standard of excellence in the bathroom. Enough said.\n8. Artificial plus real intelligence\n Getty Images\nWhen it comes to protecting network security it would be advantageous to somehow meld the expertise of human intelligence with the artificial intelligence of an advanced computer system.\nThat\u2019s the notion at least behind a research project announced this year by the Defense Advanced Research Projects Agency (DARPA). DARPA\u2019s Computers and Humans Exploring Software Security (CHESS) program aims to move beyond the manual, human-driven security protection process to one that is based on advanced computer-human collaboration to fight emerging threats, DARPA says.\nThe basic idea is to infuse computer tools with the intelligence or as DARPA puts it, to create \u201ctechniques for addressing classes of vulnerability that are currently hampered by information gaps and require human insight and\/or contextually sensitive reasoning.\n9. Elon Musk's broadband satellite constellation\n geralt (CC0)\n has no shortage of cool, ambitious projects \u2014\u200a from putting humans on Mars to building a hyperspeed train, among other endeavors \u2014\u200a and recently got the green light for another grand plan: a low-cost satellite based broadband service called StarLink.\nSpecifically, in November he got the FCC\u2019s OK to put an additional 7,518 satellites into space to form a StarLink constellation of nearly 12,000 satellites he needs to launch into orbit over the next six years (4,425 satellites have already been authorized).\nSpaceX intends the satellites to fly in low Earth orbit, about 215 miles high. SpaceX's interest in such a low orbit is to shorten the delay between the satellites and internet users on Earth and therefore speed up surfing speeds, according to a release. None of the satellites have launched yet.\n10. Berners-Lee wants privacy on the Web he created\n Paul Clarke (CC BY-SA 4.0) (CC BY-SA 4.0)\nIt\u2019s not every day that a start-up gets to have the inventor of the World Wide Web as its co-founder, but Inrupt debuted this fall with Sir Tim Berners-Lee as its chief technology officer. (John Bruce, previously of IBM\u2019s Resilient security firm, is the other co-founder and CEO.)\nInrupt\u2019s goal is to give users the power to control their data and more importantly their own information. At the heart of Inrupt is Solid, an open-source software project that Berners-Lee has been working on.\n\u201cSolid changes the current model where users have to hand over personal data to digital giants in exchange for perceived value. As we\u2019ve all discovered, this hasn\u2019t been in our best interests,\u201d Berners-Lee wrote in the blog detailing his Inrupt plans. \u201cSolid is how we evolve the web in order to restore balance\u200a \u2014\u200a by giving every one of us complete control over data, personal or not, in a revolutionary way.\u201d\nThe idea is that users would place all of their data from photos to phone numbers and music in a single personal online data store (POD). Berners-Lee says that from there \u201cSolid gives every user a choice about where data is stored, which specific people and groups can access select elements, and which apps you use. It allows you, your family and colleagues, to link and share data with anyone. It allows people to look at the same data with different apps at the same time.\u201d\nObviously, it\u2019s going to take a lot of work \u2014\u200a and making converts of customers of Google, Facebook and many other web-based services \u2014\u200a to make Solid a broad success, but Berners-Lee says, "I think we have enough energy to take the world to a new tipping point."