Search
Media
Travel
Didactica
Money
Venture
eMarket
Chats
Mail
News
Schlagzeilen |
Montag, 11. Juni 2012 00:00:00 Technik News
Aktualisiert: Vor 2 Min.
1|2|3|4|5  

LOS ANGELES -- Disney's upcoming animated feature is a love letter to retro videogames, the story of an 80's arcade bad guy looking to redeem himself.

Many Linux lovers are worried that Microsoft's new Secure Boot technology will make it more difficult to get the open source operating system onto machines that originally ship with Windows 8. But Linux founder Linus Torvalds believes that the complaints are overblow. The bigger issue, he says, is that Secure Boot can be hacked.Microsoft has ...

At its WWDC keynote Monday, Apple unveiled a host of hardware and software updates that confirmed many pre-event reports and rumors. The MacBook line-up was revamped top to bottom, including the introduction of a new slimmer MacBook Pro with Retina display. We also saw new Mountain Lion OS X features, and the world's first public unveiling of iOS 6.

Federal authorities claim they may shutter cloud-storage services without having a duty to assist innocent customers in retrieving data lost in the process. The filing in the Megaupload prosecution comes as more and more cloud-based storage services are popping up nearly every day.

The Navy was all set to roll out its upgraded spy drone, a 44-foot behemoth. Then one of its Global Hawks crashed into an eastern Maryland marsh on Monday. It's the latest setback for the Navy's robotic aircraft.

In our TED-ified world there is no shortage of conferences offering exclusive, scintillating insights on the world. But such gatherings likely require you to abandon your work for a few days, hop a plane to some dismal convention center, and shell out the equivalent of a mortgage payment for tickets. Enter Tina Roth Eisenberg, the Brooklyn designer known for her sweetly minimalist blog?Swissmiss. Eisenberg wanted to create a conference that was more compact -- something that offered both inspirational speakers and serendipitous interactions without eating up an entire week.

During today's opening keynote at the World Wide Developers Conference, Apple listed nine automakers that are set to bring Siri into cars within the next year.

The sci-fi and historical-fiction scribe hits wants to make a motion-controlled videogame that will bring authentic with swords." See his entertaining Kickstarter pitch.

Apple laid out some more details on Monday at the Worldwide Developer's Conference of how Apple's iCloud will

Tune in to Wired's Gadget Lab for live coverage from Apple's WWDC keynote event in San Francisco. And keep refreshing your page once the keynote begins!

Gamers have long had two real choices if they wanted to go mobile: tote their monstrous desktop PC to the LAN party, or invest thousands in a beastly, oversized gaming notebook. AVADirect would like to offer you a third option: the W110ER, an 11.6-inch gaming notebook.

As the dust settles around the Facebook IPO, the important question becomes not what went wrong, but rather, how will Facebook create value to justify its lofty valuation?

The latest artist to generate buzz on reddit prides himself on being awful. The speedy painter, who goes by the handle "Shitty_Watercolour," has made an art out of depicting the action in the sprawling community site's many threads. And despite his self-deprecating opinion of the 2,000 or so paintings he's blasted onto reddit in the past three months, he's developed a unique style that's instantly recognizable amidst a sea of screengrabs and animated GIFs.

Behind the scenes, there?s a big change happening on internet, writes Wired Enterprise's Robert McMillan. It?s something that?s mostly hidden from web surfers, but it?s becoming critical to big internet companies such as Google and Netflix.They?re moving servers -- usually free of charge -- next to the service providers? networking gear so that people trying ...

A biochemist's homemade snowflake grower brings to life the fragile ambiance of an electronic song in a new music video.

What might be the final major US offensive of the Afghanistan war has begun, according to the war's day-to-day commander. Its purpose is a bit harder to grasp. "In some areas there in the east, south of Kabul, we needed to insert greater combat power, and we've needed to do that for quite some time," Lt. Gen. Curtis Scaparrotti told reporters on Monday.

The latest version of Adobe's ubiquitous Flash plugin now runs in a security "sandbox" for Firefox users. That means any Flash-based malware or other attacks won't spill over into the rest of your PC.

CloudLock will announce its pattern matching engine for Google Apps customers on Tuesday, bringing Payment Card Industry (PCI) and other compliance requirements to Google Drive. Available as a cloud service, the company's engine "identifies, classifies, and secures very sensitive information, including Personally Identifiable Information (PII), Payment Card Industry (PCI) data and custom regular expressions...," it ...

Putting in too many miles training for ultramarathons, triathlons and other endurance events can cause long-term damage to the heart.

LOS ANGELES -- I have seen the future of E3, and it is filled with Vitamin Water.

Large projects with many programmers contributing can result in tangled code, but style guides like Idiomatic CSS offer a way out of the confusion.

The Supreme Court on Monday let stand a lower court decision that said federal officials cannot be sued for damages for the torture of Americans on U.S. soil.

A $2.2 billion international telescope project called the Square Kilometer Array hopes to bring an unprecedented view of the radio sky. But astrobiologist and Extremo Files blogger Jeffrey Marlow explains how the project's leaders also hope it translates into long-term South African interest in science and technology while making the country a premier research destination.

Diver, entrepreneur, investor, author, occasional DJ, and head of , Joi Ito is a man in constant motion around the world, spreading his ideas about the Internet and technology?and absorbing just as much in the process. Ito told WIRED what it's going to take to maneuver through the next phase of disruption brought by technology.

In the last six months, NATO planes have bombed Afghan homes 10 times, killing civilians on seven occasions. So now the war's top general has told his troops that airstrikes on residences are out -- even if the residences are being used by militants.

The sophisticated espionage toolkit known as Flame is directly tied to the Stuxnet superworm that attacked Iran's centrifuges in 2009 and 2010, according to researchers who recently found that the main module in Flame contains code that is nearly identical to a module that was used in an early version of Stuxnet.

The Dark Knight achieves his goal, proving the comic book movies can be serious art.

A video shows 100 tons of old munitions being blown up. Dot Physics blogger Rhett Allain uses the video -- and physics -- to estimate how far away the camera was from the colossal blast.

Workspaces have a lot of problems. And just as they seem to be fixed, new ones emerge with alacrity, ranging in severity from microwave popcorn smell sensitivity to the real challenge of how best to cultivate creative collaboration. The pace of technology threw a bigger wrench into all this of course, and it's turned the design and planning of offices into a constant game of catch-up. We now work in such a dizzying variety of contexts that space planners, architects, and furniture makers speak of "future-proofing" in two- to three-year increments, where they once aspired to relevance for a decade or more.

Ten years of war have given the U.S. military more than its share of frustrations. According to an internal Pentagon study, two of them were as fundamental as they were related: Troops had terrible intelligence about Iraq and Afghanistan, and they told their own stories just as badly.

itwbennett writes "A new report from Evidon, whose browser plug in Ghostery tracks Web trackers, makes it plain that 'if you want to worry about somebody tracking you across the Web, worry about Google,' writes blogger Dan Tynan. Google and Facebook, and their various services, occupy all of the top 5 slots on the Evidon Global Tracker Report's list of the most prolific trackers. 'And if you have any tracking anxiety left over, apply it to social networks like Facebook, G+, and Twitter,' adds Tynan."

alphadogg writes "Google's Vint Cerf and others are spearheading celebrations in Silicon Valley and the UK this month to celebrate the 100th anniversary of Alan Turing's birth. 'The man challenged everyone's thinking,' says Vint Cerf, Google's chief Internet evangelist, in an interview with Network World. 'He was so early in the history of computing, and yet so incredibly visionary about it.' Cerf — who is president-elect of the Association for Computing Machinery and general chair of that organization's effort to celebrate the upcoming 100th anniversary of Turing's birth on June 23 — says that it's tough to overstate the importance of Turing's role in shaping the world of modern computing. Turing's accomplishments included his breakthrough Turing machine, cracking German military codes during WWII and designing a digital multiplier called the Automated Computing Machine."

First time accepted submitter TWToxicity writes " NuSTAR is to be launched from a Pegasus XL rocket carried by an Orbital Science Corp. L-1011 "Stargazer" plane. It will orbit at 550 km above Earth's surface. A week after launch, NuSTAR will deploy its 10 meter boom, which allows the telescope to focus X-rays and capture images that will help scientists survey black holes in other galaxies, study the black hole at the heart of the Milky Way, and study supernovae to discover how atomic elements are formed."

snydeq writes "IT professionals jumping into the cloud with both feet beware: It's irresponsible to think that just because you push a problem outside your office, it ceases to be your problem. It's not just the possibility of empty promises and integration issues that dog the cloud decision; it's also the upgrade to the new devil, the one you don't know. You might be eager to relinquish responsibility of a cranky infrastructure component and push the headaches to a cloud vendor, but in reality you aren't doing that at all. Instead, you're adding another avenue for the blame to follow. The end result of a catastrophic failure or data loss event is exactly the same whether you own the service or contract it out.'"

First time accepted submitter zer0point writes "Apple has just announced the next-generation Macbook Pro with a retina display. Starting today you can also order a MacBook Pro upgraded with Ivy Bridge CPUs, and Nvidia graphics. Mountain Lion got some various updates, and as expected iOS 6 was announced. In rumor news, KGI Securities analyst Ming-Chi Kuo wrote in a note to investors, 'Based on the release schedule for iOS 6 GM, there is a very good chance iPhone 5 will start shipping also in early September.'"

First time accepted submitter anaphora writes "In this TED Talk, Rory Sutherland discusses the need for every company to have a staff member with the power to do big things but no budget to spend: these are the kinds of individuals who are not afraid to recommend cheap and effective ways to solve big company problems. This article argues that, in the IT world, this person is none other than a highly-skilled hacker. From the article: 'To the media, the term “hacker” refers to a user who breaks into a computer system. To a programmer, “hacker” simply means a great programmer. In the corporate IT field, hackers are both revered as individuals who get a lot done without a lot of resources but feared as individuals who may be a little more “loose cannon” than your stock IT employee. Telling your CEO you want to hire a hacker may not be the best decision for an IT manager, but actually hiring one may be the best decision you can make.'"

MarkWhittington writes "A Spanish company has created a bed that will make itself. Ordinarily I am excited about just about any technological advance, but this one leaves me wondering what it's good for. It might be that as a rather slovenly housekeeper, I do not see the purpose of making a bed. The idea of being able to bounce a coin off of a sheet that has been stretched tight seems to have been an invention of moms and drill sergeants to torment people. Why make up a bed in the morning when it's just going to be unmade that evening (or sooner if one likes an afternoon nap?) When I was a lad, dreaming of the wonders that awaited in the 21st century, among the flying cars, colonies on the moon and jet packs, self-making beds somehow escaped by imagination, even as my sainted mom forced me to make mine before heading out to school."

JohnBert writes "A security bug in MariaDB and MySQL has been revealed, allowing a known username and password to access the master user table of a MySQL server and dump it into a locally-stored file. By using a tool like John the Ripper, this file can be easily cracked to reveal text passwords that can provide further access. By committing a threaded brute-force module that abuses the authentication bypass flaw to automatically dump the password database, you can access the database using the cracked password hashes even if the authentication bypass vulnerability is fixed."

jfruh writes "Here's a pressing mystery: despite users spending an increasing amount on their mobile phones, mobiile advertising only produces 20% of the revenues per page that web advertising does. This seems like a big opportunity for somebody, but a whole complex of reasons might mean that it isn't just a matter of someone being smart enough to do mobile ads right. The whole advertising industry, which in many ways still resembles the Mad Men-era old boy's network, simply may not be equipped to cope."

Trailrunner7 writes "Researchers digging through the code of the recently discovered Flame worm say they have come across a wealth of evidence that suggests Flame and the now-famous Stuxnet worm share a common origin. Researchers from Kaspersky Lab say that a critical module that the Flame worm used to spread is identical to a module used by Stuxnet.a, an early variant of the Stuxnet worm that began circulating in 2009, more than a year before a later variant of the worm was discovered by antivirus researchers at the Belarussian firm VirusBlokAda. The claims are the most direct, to date, that link the Flame malware, which attacked Iranian oil facilities, with Stuxnet, which is believed to have targeted Iran's uranium-enrichment facility at Natanz. If true, they suggest a widespread and multi-year campaign of offensive cyber attacks against multiple targets within that country."

First time accepted submitter mike_toscano writes "At least some of us have recently seen Linus' most recent comments on his experience with Gnome 3 — he didn't have many nice things to say about it and as you know, he's not the only one. On the other hand, there have been some great reviews and comparisons of KDE with the other options (like this one) lately. Sure, early releases of 4.x were painful but the desktop today is fully-functional and polished. So the question: To those who run *nix desktops and are frustrated by the latest Gnome variants, why aren't you running KDE? To clarify, I'm not asking which desktop is better. I'm really talking to the people who have already decided they don't like the new Gnome & Unity but aren't using KDE. If you don't like KDE or Gnome, why not?"

An anonymous reader writes "Qualys researcher Francois Pesce used open source password cracker John the Ripper to try to crack SHA-1 hashes of leaked LinkedIn passwords. He ran the John the Ripper default command on a small default password dictionary of less than 4,000 words. The program then switched to incremental mode based on statistical analysis of known password structures, which generated more probable passwords. The results? After 4 hours, approximately 900,000 passwords had been cracked. Francois then ran numerous iterations, incorporating older dictionaries to uncover less common passwords and ended up cracking a total of 2,000,000 passwords."

theodp writes "GeekWire reports on the techno-dance routine that preceded Microsoft's Windows Azure presentation at the Norwegian Developers Conference this week, which featured a group of women jumping around on stage to a song that included several drug references and the line: 'The words MICRO and SOFT don't apply to my penis.' In a strange effort to be inclusive, a monitor displaying the lyrics added, 'or vagina.' The official Windows Azure YouTube channel has posted an apology for 'a skit that involved inappropriate and offensive elements and vulgar language,' and said it's actively looking into the matter. Hey, could've been worse — at least @ASUS wasn't live-tweeting the event!"