Mit dem Bundesarchiv und der Wikimedia CH arbeiten neu zwei Organisationen zusammen, die sich beide den freien Zugang zu Wissen auf die Fahnen geheftet haben. Um frei verfügbare, sogenannt gemeinfreie Quellen aus den Beständen im Bundesarchiv über Wikimedia – zum Beispiel auf Wikipedia, Wikisource oder Wikiversity – online zu publizieren, werde in den kommenden Monaten ein Wikipedian in Residence im Bundesarchiv arbeiten, teilt das Bundesarchiv mit.
Das Finanzunternehmen CVC Capital Partners ist Medienberichten zufolge an der britischen Online-Wettbörse Betfair interessiert. Die Gesellschaft, zu deren Beteiligungen auch die Formel 1 gehört, habe bereits eine Investmentbank für ihre Übernahmepläne beauftragt, berichtete die „Sunday Times“ am Wochenende.
Bei einem aktuellen Projekt an der Universität Jena ist die Natur Lehrmeisterin der Wissenschaft: Forscher der Hochschule wollen die Mechanismen der Biomineralisation - eines Prozesses, mit dem Lebewesen etwa Knochen, Zähne oder Schalen bilden - nachstellen. Am Ende wollen die Wissenschaftler mithilfe dieser Technik unter anderem energieerzeugende Kleidungsstücke, etwa zum Aufladen von Smartphones, aber auch täuschend echten und äusserst haltbaren Zahnersatz herstellen können.
In einem Werbevideo für die unlängst vorgestellte Smartphone-Software Facebook Home nimmt sich Gründer Mark Zuckerberg selbst auf die Schaufel und lässt sich unter anderem von einer Ziege anmeckern.
Die Witwe von Apple-Mitbegründer Steve Jobs, Laurene Powell-Jobs, macht sich jetzt als politische Aktivistin einen Namen. Sie kämpft für eine Reform der US-Einwanderungsgesetze - insbesondere dafür, dass illegale Immigranten, die im Kindesalter von ihren Eltern in die USA gebracht wurden, amerikanische Staatsbürger werden können.
Die weltweiten IT-Ausgaben von Unternehmen steigen deutlich an, gleichzeitig legt allerdings auch der Anteil ungenutzter Software, auch "Shelfware" genannt, zu.
Der deutsche Einzelhandelskonzern Rewe will im lange vernachlässigten Online-Geschäft Boden gutmachen. "Wir wollen innerhalb der kommenden Monate eine Art Inkubator für Startup-Unternehmen aufbauen und werden uns dabei auch an jungen Online-Firmen beteiligen", sagte Rewe-Chef Alain Caparros gegenüber der "Wirtschaftswoche".
China will im Kampf gegen Cyberattacken mit den USA an einem Strang ziehen. Die Volksrepublik und die USA sollten im Bereich der Internetsicherheit die Kooperation ausbauen, sagte Aussenminister Wang Yi bei einem Gespräch mit seinem US-Kollegen John Kerry.
Google, Apple, Post, die deutsche Bundespolizei und die neuen deutschen Rundfunkgebühren haben in Deutschland den Negativ-Preis Big Brother Award bekommen. Der Datenschutzverein Digitalcourage verlieh die Preise für „Datenkraken“ am Freitagabend in Bielefeld.
Das kanadische Telekommunikationsunternehmen Telus Corporation plant den Drahtlos-Anbieter Mobilicity zu kaufen. Pressemitteilungen zufolge befinden sich die beiden Unternehmen bereits seit Februar in Übernahmegesprächen. Angeblich soll die potenzielle Kaufsumme zwischen 350 Millionen US-Dollar und 400 Millionen US-Dollar liegen.
The software industry's inability to reduce the number of security flaws in its code is fueling an age of the "everyday hacker," criminals who can exploit vulnerabilities with a minimum of technical skills, Security testing firm Vercode's latest suggests. Of the 22,430 applications submitted to the firm's code analysis service in an 18-month period ending June 2012, only 13 percent of web applications were able to pass the generic OWASP Top 10 list of security problems. When it came to standalone applications, only 31 percent complied with the separate CWE/SANS Top 25, a significant decrease on the compliance rate in the previous SoSS report caused, Veracode suggested, by a broader sample of companies using the service. Nevertheless, the percentage of applications containing common but serious flaws such as remained static at 32 percent, with cross-site scripting also stubbornly entrenched at 67 percent.
Despite predictions that the PC is on a path toward extinction, the folks at Rockmelt, makers of a "social browser" of the same name, are betting those forecasts are overblown. . The move suggests that Rockmelt sees plenty of life left in the PC market and is staking its future on that notion. , its founders believed the software would ride the social networking wave to success. Social apps were changing people's online behavior, they reasoned, and folks needed a new kind of browser to meet the needs of that behavior.
YouTube videos that appeal to pre-adolescents can be a stroke of genius, and perhaps no one knows that better than South Korean singer Psy. Already credited with the most viral video on YouTube ever, Psy this weekend posted to the video-sharing platform the sequel to “Gangnam Style,” an entertainment phenomenon that has registered more than 1.5 billion views. The new video for his song called “Gentleman M/V” already has received millions of views. If you’re 13, you’ll love the way Psy pulls chairs out from behind beautiful women so they fall down. Other naughty things he does include cranking up a treadmill so a women falls off it, swatting the coffee cup of another lady so that she spills her drink on herself and pressing all the buttons in an elevator to delay a guy who looks like he needs to use a restroom.
pervading the industry. to interconnect data center over a WAN. And startup Glue Networks is targeting 's installed base of WAN routers as a sweet spot for its SDN WAN offerings. ]
The Internal Revenue Service has taken the position it does not need a search warrant to gather email in criminal investigations, despite opposition from lawmakers and privacy advocates and a ruling by a federal appellate court. in an attempt to find out whether the agency had ever used only a subpoena to obtain emails. Unlike a warrant, a subpoena does not require law enforcement to show "probable cause" in front of a judge. Probable cause refers to having enough evidence to show that a crime has likely been committed. . "Through their documents, [the IRS seems] to take the position that the Fourth Amendment has nothing to say about their access to people's emails," Nathan Wessler, a staff attorney for the ACLU in Washington, D.C., said on Thursday.
Cloud service providers have previously drawn ire from environmentalists for not being transparent when it comes to the of their data centres. However, a new report from the University of Melbourne in Australia says that the real sustainability threat comes not from the growing demand for data centers to house cloud-ready infrastructure, but from the rising use of cellular and Wi-Fi networks to access cloud services. A 2012 report produced by Greenpeace titled "How Clean is Your Cloud?" argues that three of the biggest businesses delivering cloud-based offerings—Amazon, Apple, and Microsoft—are "rapidly expanding without adequate regard to source of electricity, and rely heavily on dirty energy to power their clouds."
The problem with Windows 8 sales isn't it's Windows Phone 8, says a Gartner analyst. As consumers move from PCs to tablets they are more likely to buy tablets with a familiar touch interface, says Gartner principal analyst Mikako Kitagawa. So users of phones are more likely to choose an Android tablet, Kitagawa says, and users of Windows Phone 8 devices are more likely to choose a Windows 8 tablet. But Windows Phone 8 lags far behind Androids and iPhones, so the coattail effect has less impact on Windows 8 tablet and PC sales than it would if Windows Phone 8 were more popular.
Unidentified hackers are said to have have launched a large-scale attack against WordPress blogs, and any hosts using weak passwords are urged to update them immediately. Security firms have been tracking an escalating number of "brute force" attacks against WordPress installations, which have been trying out logins such as "admin" and then running through thousands of commonly-used passwords to try to break in. "One of the concerns of an attack like this is that the attacker is using a relatively weak botnet of home PCs in order to build a much larger botnet of beefy servers in preparation for a future attack," security and website performance firm CloudFlare said in a Friday. Security firm Incapsula that infected sites are seeded with a backdoor that gives the attackers remote control of the site. "The infected sites then are conscripted into the attacking server botnet, and forced to launch password-guessing attacks against other sites running WordPress," the site reported.
. and accessories in our pockets and on our person everywhere we go. We "wear" them in our clothes. ScottEVest's Fleece 7.0, shown in a faux "X-ray view" makes it looks like you're carrying nothing, when you've really got everything. Although we carry the gadgets of 2013, our clothes are designed for the gadgets of 1913. For example, that tiny pocket in jeans above the right front pocket? That's for a .