Das N-TEC rapidNAS 524-G4 ist ein Enterprise-Netzwerkspeicher im Rack-Formfaktor. Wahlweise wird das Speichersystem mit Windows Storage Server 2008 R2 Edition oder OPEN-E DSS V6 ausgestattet.
Verzeichnismanager, Texteditor, DVD-Brennmodul - das sind nur drei der zahlreichen Bordwerkzeuge, die Microsoft in Windows 7 nachlässig ausgestattet hat. Mit leistungsfähigen Gratis-Utilities lassen sich ...
Diese Tools haben die TecChannel-Leser im Jahr 2011 am meisten interessiert! Die Hilfsprogramme erleichtern die Arbeit im Netzwerk, sorgen für mehr Sicherheit und helfen beim Umgang Daten sowie Speichermedien. ...
Das TecChannel-Team wünscht allen Lesern ein friedvolles und glückliches Weihnachtsfest.
Viele Anwender reservieren bei VMware Workstation und Player für das Gast-Betriebssystem anfangs nur wenig Festplattenplatz. Das rächt sich später. Denn mit steigender Anzahl, der in einer virtuellen ...
Die Entwickler der beliebten Browser-basierten Verwaltungs-Software für MySQL-Datenbanken phpMyAdmin haben ein Sicherheits-Update zur Verfügung gestellt.
Eine Schwachstelle im mobilen Betriebssystem Android lässt sich für Spoofing ausnutzen.
Die Everything Search Engine spürt auf dem PC abgelegte Dateien in Sekundenbruchteilen auf. Dazu legt das Tool keine eigene Datenbank an, sondern greift direkt auf den NTFS-Index zu. Entfernte Computer ...
Testen Sie Ihr IT-Wissen! Jeden Tag finden Sie bei TecChannel eine Frage aus dem IT-Bereich, deren richtige Antwort Sie als IT-Experte kennen sollten. Machen Sie kostenlos mit und erweitern Sie Ihre IT-Kenntnisse!
ASTRO File Manager ergänzt Google Android um einen leistungsfähigen Datei-Explorer, mit dem auch Apps installiert werden können. Bereits installierte Anwendungen lassen sich auf eine Speicherkarte sichern ...
Das Forefront TMG 2010 von Microsoft ist ein umfängliches Sicherheitssystem mit HTTPS-Untersuchung, URL-Filter und Schutz vor Malware. Bei der Integration in Exchange Server oder SharePoint Server sind ...
Manche Aufgaben lassen sich unter Windows einfach und schnell per Kommandozeile erledigen. Die Befehle versprechen nicht nur prompte Erledigung, sondern lassen sich auch hervorragend in Skripts einbinden.
Eine Sicherheitslücke im Linux-Kernel könnte DoS-Angriffe zulassen. Die virtuelle Maschine KVVM ist betroffen.
Als kleines Extra-Geschenk erhalten alle Leser von TecChannel-Premium das über 240 Seiten starke eBook "IPv6 - Das Praxisbuch" vom MITP-Verlag als kostenlosen Download.
Komponenten, für die kein passender Treiber installiert ist, versieht der Windows-Gerätemanager mit einem gelben Fragezeichen. Mehr Informationen, um die Hardware doch noch zu aktivieren, verrät das Gratis-Tool ...
Durch eine Schwachstelle in älteren Ausgaben von Mozilla Firefox oder Thunderbird lässt sich unter Umständen Systemzugriff ergaunern.
Ultimate RAM-Disk von ArchiCrypt reserviert einen Teilbereich des Arbeitsspeichers, sodass er sich für die Installation von Anwendungen nutzen lässt - ganz wie eine normale Partition. Der Vorteil: Programme ...
Der DB Navigator für iPad ist vor allem ein sehr guter Routenplaner - und zwar nicht nur für die Zugverbindungen der Deutschen Bahn. Auch auf die Fahrpläne anderer öffentlicher Verkehrsmittel hat die ...
Riverbed Technology hat RiOS 7.0 vorgestellt. Die neue Version des Riverbed Optimization Systems (RiOS) unterstützt nun mehr Anwendungen und Protokolle wie zum Beispiel HTTP-Videos, das User Datagram ...
In einem Praxistest untersuchen wir, wie der Microsoft MultiPoint Server 2011 mit den virtuellen Desktops L300 von NComputing zusammenarbeitet. Das System erlaubt Benutzern, von einem zentralen Host aus ...
Die NAS-Server der xs-Serie von Synology unterstützen nun vollständig vSphere 5 von VMware. Mit umfassendem iSCSI-Support sollen sich die Geräte besser in entsprechende virtuelle Umgebungen integrieren ...
Die neue Version 9.0 des Monitoring-Tools von Opmanager automatisiert den IT-Workflow und bietet erweiterte Überwachung virtualisierter Infrastrukturen.
HPs LaserJet M2727NF und M2727NFS arbeiten auf Laserbasis und bieten Netzwerkfähigkeit für Arbeitsgruppen. Das NFS-Modell ist mit einer zusätzlichen 250-Blatt-Papierzuführung sowie einer Heftereinheit ...
Bis Ende 2014 sollen weitere 185 ICE-Züge und die wichtigsten ICE-Strecken mit entsprechender Technik für den Internetzugang ausgerüstet werden. Das haben die Deutsche Bahn und die Deutsche Telekom mitgeteilt.
Obwohl Festplatten sich für die Datensicherung flächendeckend durchsetzen, haben Tape Libraries immer noch ihre Existenzberechtigung. Allerdings verlagern sich das Einsatzgebiet und die automatisierte ...
Freddybear writes "A study of online gamers in the Steam community finds that those who are friends with cheaters are more likely to begin cheating themselves. From the article: 'First up, cheats stick together. The data shows that cheaters are much more likely to be friends with other cheaters. Cheating also appears to be infectious. The likelihood of a fair player becoming labelled as a cheater in future is directly correlated with this person's number of friends who are cheaters. So if you know cheaters, you are more likely to become one yourself. Cheating spreads like flu through this community. Finally, being labelled as a cheat seems to significantly affect social standing. Once a person is labelled as a cheat, they tend to lose friends. Some even cut themselves off from friends by increasing their privacy settings.'"
oDDmON oUT writes "Pursuant to a FOIA request, Bloomberg has acquired numbers from the Fed on loans made to banks and businesses during the financial crisis between 2007 and 2009. They also posted a direct link to the spreadsheets in zipped format and updated their data visualization of the lending."
GMGruman writes "The BYOD (bring your own device) phenomenon hasn't been easy on IT, which has seen its control slip. But for these five technologies — mobile devices, cloud computing services, social technology, exploratory analytics, and specialty apps — it has already slipped, and Forrester and others argue IT needs to let go of them. That also means not investing time and money in all the management apps that vendors are happy to sell to IT shops afraid of BYOD — as this post shows, many just won't deliver what IT hopes."
New submitter cornicefire writes "By now most people have heard the news and seen the picture of the boy who was killed over the new Nike sneakers. There are Facebook pages devoted to fist-shaking protests about materialism and greed. Yada yada yada. But while the scuffles over the shoes were real, the death was not. The photo was just a stock photo of some kid in a lab. We know this because of some old school reporters — Steve Earley and Justin Fentin of the Baltimore Sun. In the rush to celebrate crowdsourcing, many of us pooh-pooh the old media as 'gatekeepers,' but there are times when keeping that gate locked is a good idea. After all, if one of the crowd discovered the error, the signal would barely rise above the noise. There are people claiming that anyone questioning the facts is being disrespectful. Is there something we can do about the mobocracy? How can we support the best traditions of journalism while fixing the worst? How can we nurture accuracy?"
An anonymous reader writes "The high profile hacks to Sony's systems this year were quite costly — Sony estimated losses at around $200 million. Their insurance company was quick to point out that they don't own a cyber insurance policy, so the losses won't be mitigated at all. Because of that and all the other notable hacking incidents recently, analysts expect the cyber insurance industry to take off in the coming year. 'Last October, the S.E.C. issued a new guidance requiring that companies disclose "material" cyber attacks and their costs to shareholders. The guidance specifically requires companies to disclose a "description of relevant insurance coverage." That one S.E.C. bullet point could be a boon to the cyber insurance industry. Cyber insurance has been around since the Clinton administration, but most companies tended to "self insure" against cyber attacks.'"
An anonymous reader writes "Eric Schmidt says what we all suspected: Silicon Valley has largely been immune to the Great Recession. He said, 'Occupy Wall Street isn’t really something that comes up in daily discussion, because their issues are not our daily reality. We live in a bubble, and I don’t mean a tech bubble or a valuation bubble. I mean a bubble as in our own little world.... Companies can’t hire people fast enough. Young people can work hard and make a fortune. Homes hold their value.'"
Fraser Cain writes "GoDaddy listened to reason, and reversed their position on SOPA. Here's a crowdsourced list of every other company supporting SOPA with web address, Twitter feed, contact emails and phone numbers. Perhaps they should be contacted to find out if they still fully support SOPA, or have changed their mind."
McGruber writes "The Wall Street Journal is reporting that tech interns are in high demand in the Bay area. According to the author, 'Technology giants like Google Inc. have been expanding their summer-intern programs, while smaller tech companies are ramping up theirs in response — sometimes even luring candidates away from college.' Meanwhile in NYC, CIOs lament that they are unable to retain 20-something techies according to a report in Network World. Says one CIO, 'It puts us in a really uncomfortable position to have this kind of turnover because knowledge keeps walking out the door. We invest in training people and bringing them up to speed to where they need to be, and boom they're gone. That has been my biggest struggle and concern.' It's the pay, stupid!"
smitty777 writes "What do you do when you spend over a billion dollars on products targeted specifically for adults? Simple, just put a device on your pudding dispensing vending machines that scans faces, and denies the delicious food to the kiddies. The Minority Report-like device will apparently judge the age of the individual based on the space between their eyes and ears. If the criteria is not met, the vending machine will shut down and ask the individual to step away from the machine. There are some vending machine combos that this makes sense for, but seriously — pudding?"
An anonymous reader writes "The International Organization for Standardization (ISO) has published the new specifications for the C programming language. The standard is known unofficially as C1X and was published officially as ISO/IEC 9899:2011. It provides greater compatibility with the C++ language and adds new features to C (as indicated in the draft)."
cortex writes "XDA developers is reporting on the release of a new smart phone which runs a forked version of Google's Android operating system: 'Dell and Baidu, the Chinese search giant with over 80% marketshare in its home-country, unveiled the Streak Pro on Tuesday (via Computerworld). The device has a 4.3 AMOLED screen with 960×540 resolution and packs a 1.5 GHz dual-core Qualcomm processor. Most notably, however, is the operating system it runs: a forked Android version dubbed Baidu Yi, which replaces Google's services with those of Baidu.' How will this impact Google's support for Android and open source in general?'
retroworks writes "As translated from Central Asia Online, Cellular News reports that militants from South Waziristan set ablaze about 300 cellular phones and a number of computers in Wana because the devices were allegedly used to spread obscene materials. Prior to taking the action, they gave everyone fair warning with 'leaflets.' 300 cell phones down, 5 or 6 billion to go.
David Greene writes "After many years of waiting for my provider to upgrade DSL service from the measly 1.5 Mbps I have now, I've decided to go another route. Unfortunately, no other provider in the area (Twin Cities) offers static IPs and permission to run servers. I am looking for a VPS solution to host the public parts of my personal site. What can the Slashdot community recommend as a good, inexpensive VPS provider for personal use? This will mainly be hosting a blog and a couple of Free Software projects (wikis, git repositories, etc.). I would prefer something with KVM so I can manage my own OS install but I am open to other options. Root shell access is essential."
An anonymous reader writes "The crowd-sourced nature of Wikipedia might imply that its content should be more 'correct' than other sources. As the saying goes, the more eyes the better. One particular student who was curious about this conducted rudimentary text mining on a sampling of the Wikipedia corpus to discover how misspelling rates on Wikipedia change through time. The results appear to indicate an increasing rate of misspellings through time. The author proposes that this consistent increase is the result of Wikipedia contributors using more complex language, which the test is unable to cope with. How do the results of this test compare to your own observations on the detail accuracy of massively crowd-sourced applications?"
donniebaseball23 writes "Amazon's entry into the tablets market has gone probably even better than they expected. And now the Kindle Fire is quickly becoming a viable games platform. Developers have come out in force to lavish praise on the Fire for its price and ease of use. 'People are fired up about Fire because they know it's part of a service they already use and trust,' said Josh Tsui, president of Robomodo. 'It becomes effortless to buy and use because it does not make them break their usual buying patterns. It enhances it.' Added Igor Pusenjak, president of Lima Sky: 'In many ways, the best thing about Fire is that you barely feel it's an Android device. Amazon built its own closed-system OS on top of Android.'"