linuxwrangler writes "After mowing down a motorcycling couple while distracted by texting, Kyle Best received a slap on the wrist. The couple's attorney then sued Best's girlfriend, Shannon Colonna, for exchanging messages with him when he was driving. They argued that while she was not physically present, she was 'electronically present.' In good news for anyone who sends server-status, account-alerts or originates a call, text or email of any type that could be received by a mobile device, the judge dismissed the plantiff's claims against the woman."
Koreantoast writes "Warren Buffett, whose Berkshire Hathaway recently purchased 63 newspapers and plans to purchase more over the next few years, noted during an interview that the current free content model is unsustainable and will likely continue pushing toward more electronic subscription models. This coincides with moves by other newspaper companies like Gannett and the New York Times, which are also erecting paywall systems. Buffett notes that newspapers focusing on local content will have a unique product, which would succeed even if they lose subscribers, because their services are irreplaceable. Is this the beginning of the end of 'free content' for local news?"
cylonlover writes "Last year, NASA revealed it was evaluating three potential 'tractor beam' technologies to deliver planetary or atmospheric particles to a robotic rover or orbiting spacecraft. At the time, the third of these, which involved the use of a Bessel beam, only existed on paper. Researchers at Singapore's Agency for Science, Technology and Research (A*STAR) have now proven the theory behind the concept, demonstrating how a tractor beam can be realized in the real world – albeit on a very small scale (abstract)."
silentbrad writes "An editorial published at CNN is titled 'The Demise of Guys: How Videogames and Porn are Ruining a Generation.' It makes the sensationalized case that not only do game addiction and porn addiction share similar characteristics, but they're also both damaging to young men, destroying their ability to connect with women, and therefore threatening the future of our entire species. A response by IGN dissects the idea that pornography and videogames are pretty much the same thing. 'The article, by psychologist Philip G. Zimbardo and Nikita Duncan argues that young men are "hooked on arousal, sacrificing their schoolwork and relationships in the pursuit of getting a tech-based buzz."' Zimbardo, has danced this jig before. At the Long Beach TED conference last year he told a delighted audience that "guys are wiping out socially with girls and sexually with women." He added that young men have been so zombiefied by games and porn that they are unable to function in basic human interactions. "It's a social awkwardness like a stranger in a foreign land", he said. "They don't know what to say. They don't know what to do."'"
joshgnosis writes "In the wake of an Australian Federal Court ruling last month that free-to-air TV recording app Optus TV Now was infringing on the copyright of some of the country's biggest sports broadcasts, two other services — Beem and MyTVR have also been forced to suspend their services. Beem lashed out at the ruling, telling customers that their rights had been 'diminished' by the judgment and rights owners were 'scared' of cloud-based TV recording services in the same way they once were of VCRs."
An anonymous reader writes "With entrants to this year's Loebner Prize, the annual Turing Test designed to identify a thinking machine, demonstrating that chatbots are still a long way from passing as convincing humans, this article asks: what happened to the quest to develop a strong AI? 'The problem Loebner has is that computer scientists in universities and large tech firms, the people with the skills and resources best-suited to building a machine capable of acting like a human, are generally not focused on passing the Turing Test. ... And while passing the Turing Test would be a landmark achievement in the field of AI, the test’s focus on having the computer have to fool a human is a distraction. Prominent AI researchers, like Google’s head of R&D Peter Norvig, have compared the Turing Test’s requirement that a machine fools a judge into thinking they are talking to a human as akin to demanding an aircraft maker constructs a plane that is indistinguishable from a bird."
New submitter JamieKitson writes "Photographer Jay Lee got more than he bargained for after sending some DMCA takedown notifications out to hosts of sites using one of his pictures. One Candice Shwagger accused him of everything from conspiracy over local sheriff elections to child abuse. Since Candice is now threatening legal action, Jay has said he'll take down the post, so here's a snap shot. After reading the story, I checked for use of my own pictures and found one of them being used on a review site without even a credit."
IBM has forbidden its employees from using cloud-based services such as Siri, Dropbox and iCloud, according to reports. These products (along with many others) are presenting a challenge to IT administrators who want to keep their organizations secure, as well as to consumer-software developers who suddenly need to build features with both consumers and businesses in mind.
Hugh Pickens writes "AP reports that a fire that swept through a nuclear-powered submarine in dry dock at Portsmouth Naval Shipyard has caused such extensive damage to its forward compartments that the 22-year-old Los Angeles-class attack submarine might have to be scrapped. 'These submarines were designed decades ago. So they're no longer state of the art,' says analyst Loren Thompson. 'If this vessel returns to service, I will be amazed.' The fire broke out while the Miami was on a 20-month stay at the shipyard for an overhaul, and it took firefighters from more than a dozen agencies twelve hours to put out the fire, described as intense, smoky, and a 'hot scary mess.' 'It takes a lot of guts to go into a burning building. But the idea of going into a submarine full of hot toxic smoke — that's real courage,' said U.S. Rep. Chellie Pingree after meeting with the shipyard commander. Firefighters isolated the flames so they would not spread to nuclear propulsion spaces at the rear of the submarine. There was nuclear fuel on board the sub, but the reactor has been shut down for two months and was unaffected. Rear Admiral Rick Breckenridge says an investigation has been launched into what caused the fire, but he expects that investigation to take a long time to complete and wouldn't say if human error has been ruled out as a cause of the fire, or if the focus is on mechanical issues."
benfrog writes "The core of HP's Enyo team (responsible for webOS's HTML5-based app framework) is heading to Google. What they will be doing at Google is unclear right now, but everyone is speculating that they might be active in developing something webOS-based for Android."
Today at 9:56AM EDT (13:56 GMT) the robotic arm on the International Space Station successfully captured SpaceX's Dragon capsule. It's the first time a commercial craft has connected with the ISS, and the first time a spacecraft made in the U.S. has gone to the station since the retirement of the shuttle. The approach was delayed temporarily as engineers worked out bad sensor readings due to light reflected off the ISS's Kibo laboratory. "To work around the problem, SpaceX narrowed the field of view for the laser sensor so that it wouldn't pick up light from the offending reflector. Dragon then returned to the 30-meter checkpoint and moved in for the final approach." If all goes well today, the capsule will most likely be opened tomorrow. Video of the operation is being broadcast live on NASA TV.
ananyo writes "The battle for the world's largest radio telescope has ended in a draw. As an earlier Slashdot story suggested, South Africa and Australia are to split the Square Kilometre Array, a €1.5 billion (US$1.9 billion) project made up of 3,000 15-meter-wide dishes and an even larger number of simple antennas. The decision was announced at a meeting outside of Amsterdam in the Netherlands, following a vote by SKA's international board."
Marian the Librarian writes "UCSF is among the first public institutions to adopt an open access policy, and is the largest scientific institution to have such a policy. The policy, voted unanimously by the faculty, will allow UCSF authors to put electronic versions of their published scientific articles on an open access repository making their research findings freely available to the public. Dr. Richard A. Schneider, who led the initiative, said, 'Our primary motivation is to make our research available to anyone who is interested in it, whether they are members of the general public or scientists without costly subscriptions to journals. The decision is a huge step forward in eliminating barriers to scientific research.'"
Mit LinuxLive USB Creator können Sie auf einfachste Weise bootfähige USB-Sticks mit einem Linux-System erstellen. Da diese beschreibbar sind, stehen Ihnen im Vergleich zu einer Live-CD deutlich mehr Funktionen ...
Private Telefonnummern, Bankdaten oder Login-Informationen: Auf Arbeits- und Privat-PCs schlummern häufig eine Vielzahl persönlicher Daten, die nicht in die falschen Hände geraten sollen. Das Tool Identity ...
Für Mindmaps gibt es viele Anwendungsmöglichkeiten. Allerdings ist entsprechende PC-Software oftmals kostspielig. Nicht so FreeMind. Hierbei handelt es sich um eine Open-Source-Lösung zum Erstellen der ...
Mit dem Tool DSL-Manager von T-Online können Sie DSL-Anschlüsse sämtlicher Hersteller überwachen. Das Tool zeigt nicht nur die aktuelle Verbindungsgeschwindigkeit an, sondern schlüsselt diese nach Zielsystemen ...
Das kostenlose Tool doPDF agiert als virtueller Druckertreiber und schreibt aus allen Anwendungen heraus PDF-Dateien. Alle wichtigen Informationen rund um das Tool finden Sie in unserer Produktdatenbank.
Mit Windows Server 2008 R2 hat Microsoft die DHCP-Funktion um zusätzliche Möglichkeiten erweitert. Mit der richtigen DHCP-Konfiguration können sich Administratoren die Arbeit deutlich erleichtern, wie ...
Manche Druckjobs unter Windows zeigen sich extrem widerspenstig und bleiben in der Warteschlange hängen. Sie lassen sich weder anhalten noch neu starten oder abbrechen. Ein erneutes Booten des Computers ...
Das kostenlose Tool DSL-Manager von der Telekom kontrolliert die Up- und Downloadgeschwindigkeiten des DSL/LAN-Zugangs. Dabei muss das nicht zwangsläufig ein Anschluss der Telekom sein. Auch anderen DSL- ...
Die Entwickler des Netzwerk-Analyseprogramms Wireshark haben neue Versionen zur Verfügung gestellt. In beiden Versionen wurde drei Sicherheitslücken ausgebessert.
Testen Sie Ihr IT-Wissen! Jeden Tag finden Sie bei TecChannel eine Frage aus dem IT-Bereich, deren richtige Antwort Sie als IT-Experte kennen sollten. Machen Sie kostenlos mit und erweitern Sie Ihre IT-Kenntnisse!
In Windows-Netzwerken können Administratoren per Gruppenrichtlinie den Zugriff auf Drucker oder Multifunktionsgeräte einrichten. Die Geräte verbinden sich dann bei der nächsten Anmeldung des Benutzers ...
Der LRDIMM-Serverspeicher soll die herkömmlichen Registered-DIMMs ablösen. Die Load-Reduced-Speichertechnologie erlaubt gegenüber den RDIMMs deutlich mehr Speicherkapazität im Server. Wir erläutern detailliert ...
Xenu´s Link Sleuth durchsucht eine gesamte Webseite innerhalb kurzer Zeit und spürt dort sämtliche toten Links auf. Dabei ist es egal, ob es sich um Bilder, Plugins oder einfache Skripte handelt - das ...
WolframAlpha ist eine etwas andere Suchmaschine als man es von Google oder Bing gewohnt ist. Die "Computational Knowledge Engine" interpretiert die Sucheingaben und liefert dann relevante Daten zur Eingabe. ...
Für den PC gibt es Netstumbler und inSSIDer, unter Android den kostenlosen Wifi Analyzer. Das WLAN-Analysetool gibt einen guten Überblick über die Verteilung von unmittelbaren Drahtlosnetzwerken in der ...
Browser und andere Anwendungen bergen Sicherheitsrisiken, die sich mit Sandboxie in Grenzen halten lassen. Das für den Privatgebrauch kostenlose Tool sperrt Programme in der Sandbox ein und minimiert ...
Der Microsoft Baseline Security Analyzer fühlt PCs im Netzwerk auf den Zahn und weist den Administrator auf fehlende Updates oder Sicherheitslücken hin. Werden Probleme gefunden, so lassen sich diese ...
Die Kaspersky Rescue Disk 10 ist eine Live-CD, basierend auf Gentoo-Linux. Mit Hilfe der Kaspersky Rescue Disk 10 säubern Sie sicher und effizient, infizierte Rechner von Schadsoftware.
droplat ist ein interessanter Dienst, der stationäre, lokal begrenzte "Fogs" erzeugt. In diesen lassen sich kostenlos 250 MByte Daten ablegen und von allen anderen Besuchern dieses Ortes betrachten. Auch ...
Rack-Server vereinen hohe Performance auf kleinen Raum. Sie sind flexibel einsetzbar und daher erste Wahl, wenn es darum geht, skalierbare und universelle IT-Infrastrukturen aufzubauen. Wir haben die ...
Obwohl Microsoft Office installiert ist, zeigt der Datei-Explorer von Windows in der Symbolansicht keine stilisierte Vorschau der jeweiligen Dokumente an. Stattdessen erscheint nur das bekannte Icon der ...
HTC rundet mit dem One V seine Smartphone-Serie der teureren Modelle One S und One X nach unten ab. Das günstige Einsteiger-Smartphone nutzt ebenfalls Android 4.0 und besitzt ein 3,7-Zoll-Display. Im ...
Auf vielen PCs finden sich sensible Daten wie Kreditkartennummern oder Adressen, die nicht für die Öffentlichkeit bestimmt sind. Das Tool Identity Finder ermittelt diese elektronischen Informationen und ...
Immer wieder kommt es vor, dass Office-Dokumente plötzlich scheinbar zu Zip-Dateien werden. Diese enthalten dann zahlreiche XML-Dateien, sind aber unbrauchbar. Sie lassen sich aber dennoch mit Office ...