Search
Media
Travel
Didactica
Money
Venture
eMarket
Chats
Mail
News
Schlagzeilen |
Sonntag, 12. Februar 2012 00:00:00 Technik News
Aktualisiert: Vor 2 Min.
1|2|3|4|5  

snydeq writes "What your interface communicates to users can be just as important as what your software does, writes Fatal Exception's Neil McAllister in discussing the latest edition of the 'Microsoft Manual of Style', a style guide aimed at designers and developers who create Microsoft software, as well as those who write about it. 'The gist of much of Microsoft's advice is that a user's relationship with computer software is a unique one, and it's important to craft the language of software UIs accordingly,' McAllister writes. 'Occasionally, Microsoft's recommendations verge on the absurd. For example, you might not think it necessary to admonish developers to "not use slang that may be considered profane or derogatory, such as 'pimp' or 'bitch,'" but apparently it is.'"

An anonymous reader writes "I am very happy with my current job, but there have always been a few ideas for things I've wanted to develop on the side. Ideally I'd keep my day job, reserving mornings, evenings and weekends to see if the side-projects could become viable. The problem is: my employer has an IP policy that states that anything I do while under their employ is theirs, even when I'm off the clock. Does anyone have suggestions about workarounds, magic loopholes, false identity for the side projects? Anything?"

An anonymous reader writes "Michael Wesch has been on the lecture circuit for years touting new models of active teaching with technology. The associate professor of cultural anthropology at Kansas State University has given TED talks. Wired magazine gave him a Rave Award. The Carnegie Foundation for the Advancement of Teaching once named him a national professor of the year. But now Mr. Wesch finds himself rethinking the fundamentals of teaching after hearing that other professors can't get his experiments with Twitter and YouTube to work in their classes. Is the lecture best after all?"

coondoggie writes "It's somewhat hard to imagine that NASA doesn't need the computing power of an IBM mainframe any more, but NASA's CIO posted on her blog today that at the end of the month, the Big Iron will be no more at the space agency. NASA CIO Linda Cureton wrote: 'This month marks the end of an era in NASA computing. Marshall Space Flight Center powered down NASA's last mainframe, the IBM Z9 Mainframe.'"

New submitter cosmicaug writes with an update to yesterday's report that journalist Hamza Kashgari had been arrested by Malaysian police acting on a request conveyed from the Saudi government via Interpol. Now, says the BBC, "Police confirmed to the BBC that Hamza Kashgari was sent back to Saudi Arabia on Sunday despite protests from human rights groups. Mr Kashgari's controversial tweet last week sparked more than 30,000 responses and several death threats. Insulting the prophet is considered blasphemous in Islam and is punishable by death in Saudi Arabia. Mr Kashgari, 23, fled Saudi Arabia last week and was detained upon his arrival in the Malaysian capital Kuala Lumpur on Thursday." Writes cosmicaug: "Sadly, the most likely outcome is that they are going to execute this man for three tweets."

An anonymous reader writes "Last weekend, during the Nuremberg Toy Fair 2012, I spotted a really cool new system for 'professional' RC models based on Embedded Linux. The WiRC allows you to control an RC car (or any other RC vehicle) with an iOS/Android device using WiFi. The core of this system is a 240 MHz ARM9 processor, with 16 MB SDRAM and 4 MB FLASH (with 2 USB ports and 802.11b/g WiFi, a microphone input and a Speaker output). It features 8+4 channels of output. A free software SDK is now in development to code your own transmitter applications."

New submitter davidstites writes "I am a masters computer science student at University of Colorado at Colorado Springs, and in November I performed a security audit of 230+ popular iOS applications because I wanted to know how secure apps on smartphones and tablets really are. I made a shocking discovery. The largest single potential security breach was with the Southwest Airlines application. Southwest Airlines' iPhone app leaves a user's information vulnerable to hackers. When you login to the application on your phone using your Rapid Rewards account, the app submits your username and password information as plain-text (unencrypted) to a Southwest remote server (mobile.southwest.com). A potential attacker can simply sniff for the data on the network and steal it. This situation is a hackers dream! If a victims credentials were captured, a hacker could use those credentials to login to that particular account and they would have access to anything the victim would have access to, such as addresses, birthdays, e-mail, phone and credit cards. They could even book a flight in the victims name." (Read on below for more details.)

An anonymous reader writes "In light of the ruling against the University of California patent trolls seeking to claim ownership of the 'Interactive Web,' founding attorney of Beacon Hill Law Joe Stanganelli, has written an article defending process patents. In it, he refers to technology pundits as 'bizarro' and argues that it's a misconception that patents stifle innovation. As he writes, 'What I do not understand is — had the jury determined Eolas's patents valid — why it would be A-OK for dozens of already megarich corporations to get even richer adopting technology they did not invent or have legal permission to use, but somehow immoral for the actual creators of the technology to likewise profit[?]"" I am not a patent lawyer, but I doubt I'm the only one who thinks it's possible to support a patent on an industrial potash processing technique, but not software patents — or at least to distinguish them from each other.

retroworks writes "Today's Science Daily reports on 5 new UN studies of used computer and electronics management in Africa. The studies find that about 85% of surplus electronics imports are reused, not discarded. Most of the goods pictured in 'primitive e-waste' articles were domestically generated and have been in use, or reused, for years. Africa's technology lifecycle for displays is 2-3 times the productive use cycle in OECD nations. Still, EU bans the trade of used technology to Africa, Interpol has describes 'most' African computer importers as 'criminals,' and U.S. bill HR2284 would do the same. Can Africa 'leapfrog' to newer and better tech? Or are geeks and fixers the appropriate technology for 83% of the world (non-OECD's population)? "

Hugh Pickens writes "Daniel Berniger writes that one of the unexpected consequences of AT&T's transition to HD voice and all-IP networks is that the footprint of required network equipment will shrink by as much as 90 percent, translating into a $100 billion windfall as the global telecom giant starts emptying buildings and selling off the resulting real estate surplus. Since IP connections utilize logical address assignments, a single fiber can support an almost arbitrary number of end-user connections — so half a rack of VoIP network equipment replaces a room full of Class 4 and Class 5 circuit switching equipment, and equipment sheds replace the contents of entire buildings. AT&T's portfolio goes back more than 100 years, even as commercial real estate appreciated five fold since the 1970s, so growth of telephone service during the 20th century leaves the company with 250 million sq ft of floor space real estate in prime locations across America. 'The scale of the real estate divestiture challenge may justify creating a separate business unit to deal with the all-IP network transition,' writes Berniger, who adds that ATT isn't the only one who will benefit. 'The transition to all-IP networks allows carriers to sell-off a vast majority of the 100,000 or so central offices (PDF) currently occupying prime real estate around the globe.'"

aarondubrow writes "Researchers used the Ranger supercomputer to test a new, high-resolution hurricane forecasting system that incorporates Doppler radar data from planes flying into the storm. The forecasts were shown to improve intensity predictions by an average of 20 to 40 percent over the official forecasts of the National Hurricane Center (NHC). The prediction system is being hailed as a breakthrough and is one of a handful being assessed by the NHC to become part of the operational forecasting system used in emergency situations."

Shipud writes "A recent article in Journal of Biomolecular structure and Dynamics proposes to define life by semantic voting [Note: open-access article]: 'The definitions of life are more than often in conflict with one another. Undeniably, however, most of them do have a point, one or another or several, and common sense suggests that, probably, one could arrive to a consensus, if only the authors, some two centuries apart from one another, could be brought together. One thing, however, can be done – short of voting in absentia – asking which terms in the definitions are the most frequent and, thus, perhaps, reflecting the most important points shared by many.' The author arrives at a six-word definition, as explained here."

An anonymous reader writes "Details of the tools, techniques and procedures used by the hackers behind the RSA security breach have been revealed in a research paper (PDF) published by Australian IT security company Command Five. The paper also, for the first time, explains links between the RSA hack and other major targeted attacks. This paper is a vendor-neutral must-read for any network defenders concerned by the hype surrounding 'Advanced Persistent Threats.'"

itwbennett writes "When you sign up for online dating, there's a certain amount of information you expect to give up, like whether or not your weight is proportional to your height. But you probably don't expect that your profile will remain online long after you stop subscribing to the service. In some cases your photo can be found even after being deleted from the index, according to the electronic frontier foundation (EFF), which identified six major security weaknesses in online dating sites."

An anonymous reader writes "Facebook has detailed the pay of 27-year-old Facebook co-founder and CEO Mark Zuckerberg as well as four other executives. These are people who are set to be billionaires at least on paper when the company goes public as part of its $5 billion initial public offering (IPO). All five individuals are in line for annual target bonuses of 45 percent of their salary plus other base wages. For Zuckerberg, the bonus could amount to roughly $225,000 this year, based on his annual salary of $500,000."

Die Modelle der Intel SSD 520 Series setzen auf einen SandForce Controller und haben sich in unseren Benchmarks als fixe Vertreter ihrer Zunft bewiesen.

Der ViewSonic VX2336s-LED ist ein günstiger 23-Zoll Monitor mir IPS-Panel. Dadurch ist er besonders blickwinkelstabil. Moderne Schnittstellen wie DisplayPort fehlen dem Monitor jedoch.

Mit der App group sms email & template verschicken Sie ganz einfach Kurznachrichten oder E-Mails an vorher definierte Kontaktgruppen. So halten Sie alle Kontakte schnell auf dem laufenden, beispielsweise ...

Click.to ist keine Webseite, sondern ein praktisches Tool für Mac OS X un Windows. Kontextsensitiv hilft das Tool beim Kopieren und Einfügen von Inhalten. Click.to funktioniert mit vielen Anwendungen ...

Nach Angaben des Branchenverband BITKOM verbringen Internet-Nutzer inzwischen 23 Prozent ihrer Online-Zeit in sozialen Netzwerken wie Facebook, Google+ oder Xing. Vor einem Jahr seien es erst 14 Prozent ...

Wussten Sie schon, dass Microsoft nicht nur Software verkauft, sondern auch sehr gute Programme verschenkt? Das Angebot ist leider auf den Webseiten gut versteckt. Wir haben nützliche Tools mit Fundort ...

Insgesamt 20 Sicherheitslücken haben die Chrome-Entwickler in Version 17.0.963.46 ausgebessert. Die gemeldeten Sicherheits-Lücken waren dem Suchmaschinen-Giganten insgesamt 10.500 US-Dollar Kopfgeld wert.

Viele Anwender stört es, das sie mit der Maus an den rechten Rand der Taskleiste fahren müssen, um den Desktop anzuzeigen. Sie können auch auf einfachem Weg ein eigenes Icon erstellen und an beliebiger ...

Sind LAN- und WLAN-Verbindungen im Gebäude nicht möglich, ist Powerline-Technologie eine Alternative. Das TP-Link AV500 Gigabit Powerline Kit besteht aus zwei Adaptern, die je einen Gigabit-LAN-Port und ...

Virtual Wi-Fi Router ermöglicht es Ihnen Ihren W-LAN fähigen PC als Hotspot einzusetzen. Das Tool fungiert dabei als virtueller Router. So teilen Sie Ihren W-LAN mit anderen Geräten in Reichweite.

Testen Sie Ihr IT-Wissen! Jeden Tag finden Sie bei TecChannel eine Frage aus dem IT-Bereich, deren richtige Antwort Sie als IT-Experte kennen sollten. Machen Sie kostenlos mit und erweitern Sie Ihre IT-Kenntnisse!

BeBuzz Free erweitert die Funktionalität der BlackBerry-LED um zusätzliche Leuchtsignale, die abhängig von einzelnen Kontakten, eingegangenen Messenger-Nachrichten oder verpassten Anrufen individuell ...

Die Geräte der HP LaserJet Pro Color MFP 475 Modellreihe richten sich hauptsächlich an kleinere und mittlere Arbeitsgruppen mit einem Druckvolumen von 1000 bis 2500 Seiten im Monat.

Internet Explorer 9 unterstützt die Integration von Webseiten auf Computern unter Windows 7 durch das Anheften an der Taskleiste, auf den Desktop oder in das Startmenü. Damit sind auch neue Funktionen ...

Das Netgear UTM9S ist eine Unified-Threat-Management-Lösung, die speziell für kleine Unternehmen entwickelt wurde. Der integrierte VPN-Server sowie das optionale VDSL-Modem machen das Netgear UTM9S zu ...

SecurID Token von RSA werden in vielen Unternehmen als Option zur sicheren Benutzerauthentifizierung eingesetzt. Der Anwender muss dazu jedoch immer seinen Hardware-Token bei sich tragen. Mit der iPhone-App ...

Das Freeware-Tool KeePass erstellt und verwaltet Passwörter sicher auf dem PC. Der Passwort-Manager speichert alle Zugangsdaten in einer verschlüsselten Datenbank und gewährt erst nach der Eingabe des ...

Apples Smartphone ist auch in der aktuellen Variante iPhone 4S sehr beliebt. Über 500.000 Apps wollen aus dem App Store installiert werden und erweitern das iPhone um nützliche Funktionen. Wir zeigen ...

Viren, Spyware, Hacker und Phishing: Mit diesen Gefahren werden Windows-Nutzer bei der Suche und Nutzung von Websites konfrontiert. Einen soliden Rundumschutz für Windows-Systeme bieten kostenlose Hilfsprogramme.

Die Freeware Virtual WiFi Router verwandelt einen PC oder Notebook mit Windows 7 und WLAN-Funktionalität in einen WiFi-Hotspot. So lässt sich das beispielsweise via DSL angebundene Internet des Rechners ...

Einmal in der Hektik nicht aufgepasst und schon ist das Smartphone weg - und mit ihm alle persönlichen Daten. Für solche Fälle gibt es Ortungsdienste wie Seek Droid. Ist die App installiert, informiert ...

TAILS steht für The Amnesic Incognito Live System. Das Live-Betriebssystem basiert auf Debian und ist auf anonymes surfen über das TOR-Netzwerk ausgelegt. So hinterlassen Sie keine Spuren bei Ihren Streifzügen ...

Die Jetico Personal Firewall richtet sich mit ihren weitreichenden Einstellungsmöglichkeiten an Experten im Umgang mit derart Sicherheitssystemen. Durch die 64-Bit-Kompatibilität lässt sich die Software ...

Microsoft hat für den nächsten Patch-Day am 14. Februar, den kommenden Dienstag, insgesamt neun Sicherheitsupdates angekündigt. Mit den Patches werden unter anderem vier kritische Sicherheitslücken geschlossen.

Die zwei neue Netzwerkadapter Oce11102-NT und Oce11102-IT iSCSI von Emulex bauen auf die 10-Gbit-Technologie. Dabei setzen sie nach wie vor auf Twisted-Pair-Kabel.