Search
Media
Travel
Didactica
Money
Venture
eMarket
Chats
Mail
News
Schlagzeilen |
Freitag, 24. Mai 2013 00:00:00 Technik News
Aktualisiert: Vor 2 Min.
1|2|3|4|5  

With an update to its namesake configuration tool, Puppet Labs has introduced a programming language designed to give administrators more flexibility in scripting their deployment routines. Puppet 3.2.1, the first public release in the Puppet 3.2 series, can now accept external certificate authorities (CAs), allowing organizations to use their in-house authorization systems with their Puppet deployments. Puppet is open-source software that system administrators can use to help manage systems. It can be used to automate repetitive tasks, deploy applications and manage the process of adding servers to scale systems. “Puppet’s configuration language has always been focused on the best combination of simplicity and power, and my goal was always to have it be more like a configuration file than a programming language,” wrote Luke Kanies, founder and CEO of Puppet Labs, in an email interview. “However, as our community has built more sophisticated infrastructures with Puppet Enterprise ... people have needed more power in the language.”

'Tis the season for college graduations, and that means there are countless fresh grads out there looking for their first real, professional jobs. Those in IT would be hard-pressed to come up with a better area to focus on than Linux, which is consistently shown to offer today, so those who possess them are in a nice position as they enter the job market. But how to begin? I had a chance recently to speak with Jim Zemlin, executive director at the Linux Foundation, for some suggestions. Zemlin recently gave a talk at TEDx (embedded below) focused on lessons he thinks the tech industry has learned from Linux and its creator Linus Torvalds, and he thinks those lessons can be applied equally well to college grads starting out in a .

The amount of cybercriminal activity associated with the Zeus family of financial Trojan programs has increased during the past few months, according to security researchers from antivirus vendor Trend Micro. “The notorious info-stealing ZeuS/ZBOT variants are re-emerging with a vengeance, with increased activity and a different version of the malware seen this year,” the Trend Micro researchers said Thursday in a . Zeus, also known as Zbot, is one of the oldest families of financial malware that is still active today. Its main use is online banking fraud, but it can also steal various types of log-in credentials and personal information. Zeus is no longer actively developed by its original creator. However, its source code was leaked on the Internet in 2011 which resulted in customized versions being created, including Zeus-based Trojan programs like Citadel and GameOver.

This week Twitter announced a bold expansion of its year-old program, giving marketers a new way to directly obtain interested business leads via the social media service. The new , the promotional punch of the Lead Generation Card could be impressive. The Lead Generation Card is currently in beta and launched this week to Twitter's managed clients. The company says it will be made available to small- and medium-sized businesses soon.

The Federal Trade Commission has reportedly launched an investigation into Google’s display ad business amid complaints from rivals that the company is abusing its power in how it sells online-graphical and video ads. The examination, which has been reported in The and other news outlets, concerns a process of grouping ad-related services together known as “tying” or “bundling.” Some of Google’s advertising-technology rivals have complained to antitrust authorities that the company has been bundling those ad services for website publishers so that the publishers would have to use them all rather than just one Google service, reports say. The FTC and Google both declined to comment on the reports. The FTC examination is still in its early stages, the reports say, and may not ultimately result in a formal probe.

Security researchers from antivirus vendor ESET discovered a piece of cyberespionage malware targeting Tibetan activists that uses unusual techniques to evade detection and achieve persistency on infected systems. The malware, which was dubbed Win32/Syndicasec.A, bypasses the UAC (User Account Control) mechanism in Windows to run arbitrary commands with elevated privileges without prompting users for confirmation. It exploits a design flaw in the Windows UAC whitelist functionality that was documents back in 2009 by a developer named Leo Davidson. In fact, the malware uses Davidson’s proof-of-concept code with almost no modifications, said Alexis Dorais-Joncas, Security Intelligence Team Lead at ESET, Thursday in a . This technique is used to execute a second malicious component that registers a piece of Javascript code in the Windows Management Instrumentation (WMI) subsystem. WMI is a default Windows service that can execute scripts written by system administrators to automate administrative tasks.

Writing a book, a research paper, or a script may seem intimidating when sitting in front of a blank word-processor window, trying to figure out where to start. Yarny is a cloud-based, distraction-free editor that can help writers stay organized and focused on their work.

Oracle and managed services provider ServiceKey have come to a proposed settlement of an intellectual-property lawsuit Oracle filed against the company last year. Oracle sued ServiceKey in February 2012, alleging that it and another company, Federal Business Systems Corporation, were that unlawfully used Oracle’s software code and log-in credentials with the goal of selling “support on Oracle hardware to customers with no active support contract with Oracle.” ServiceKey had been paying Oracle for technical support on a small number of computers it owned, but then used its log-in credentials to provide hardware support to third parties, Oracle alleged. But now Oracle and ServiceKey are poised to settle the suit in a deal that would see ServiceKey pay no monetary damages but face a number of conditions and restrictions, according to a court filing Thursday in U.S. District Court for the Northern District of California.

This might sound a bit creepy, but Google will now let you search through your own photos on Google+ via the main Google Search bar. The feature helps you find photos you uploaded on Google+ by typing the “my photos” prefix followed by your search term in the Google Search box. What’s interesting about this feature is that thanks to a hefty dose of maching learning, Google can recognize general concepts in your photos, so you can search for specific terms such as food, flowers, or sunsets rather than relying on file or album names. For example, you can search for “my photos from San Francisco last year” or “my photos of food” and Google Search will display a set of results from your uploads. Google says this feature works only when you are signed into your Google+ enabled Google account, and the results are only visible to you, although they are displayed from the main Google Search page. The custom search terms for your photos are currently available only in English on Google.com. You can also use the semantic photo search in the photos module on Google+.

Recently I splurged on a new laptop, a 13.3-inch Samsung Series 9 Ultrabook. Incredibly thin, light, and fast, it overjoyed me from the moment I unpacked it. It wasn't long, though, before my joy turned to frustration. Although it booted with lightning speed, Internet access seemed slow. In fact, sometimes I couldn't load Web pages at all. . Sure enough, the Samsung was having intermittent connectivity slowdowns and outages. My router wasn't to blame, and for once neither was Comcast. But what exactly was going on? Surely a brand new computer—especially one as advanced and expensive as this—could reliably connect to the Internet.

SAP has abruptly reorganized its development strategy, with SuccessFactors CEO and cloud strategy chief Lars Dalgaard leaving the company and executive board member Vishal Sikka now tapped to lead a single software development unit. Sikka has been a champion of SAP’s HANA in-memory database platform, which has been positioned as the future convergence point for all of SAP’s technologies. After Friday’s announcement, those plans may speed up. All SAP development staffers will report to Sikka as of June 1. As for Dalgaard, he will leave SAP as of June 1 “to become an investor,” and will “continue to play an active role as an advisor to the SAP cloud business,” SAP said. Dalgaard’s exit comes less than two years after SAP purchased SuccessFactors for $3.4 billion. Dalgaard was scheduled to appear earlier this month at SAP’s Sapphire conference but ended up canceling due to a death in the family. He also has a child who has been battling leukemia.

to keep servers running. Well, take note: It looks like we’re in for another bad hurricane season. Federal officials said today that the East Coast could easily see a repeat of last year. that helps them track Atlantic storms is offline and officials haven’t been able to get it operating properly since yesterday. The Atlantic hurricane season, which begins June 1, will be an “above normal and possibly extremely active hurricane season,” Kathryn Sullivan, an ex-astronaut and acting administrator of the National Oceanic and Atmospheric Administration (NOAA), said at a briefing Thursday.

Google plans to upgrade the security of its SSL (Secure Sockets Layer) certificates, an important component of secure communications. SSL certificates are used to encrypt communication and verify the integrity of another party with which a user is interacting. Its strength lies in the length of the private signing keys used for the certificates. Stephen McHenry, Google's director of information security engineering, in a blog post Thursday. "We will begin switching to the new 2048-bit certificates on August 1st, to ensure adequate time for a careful rollout before the end of the year," he wrote. "We're also going to change the root certificate that signs all of our SSL certificates because it has a 1024-bit key."

Manuel Araoz, a 23-year-old developer in Argentina, has an idea for Bitcoin that doesn't focus on money. Araoz, who works in game development, launched a service this week called . It's essentially a notary public service on the Internet, an inexpensive way of using Bitcoin's distributed computing power to allow people to verify that a document existed at a certain point in time. Araoz envisions it as a way to fight efforts to distort or lie about data. "My idea was to give journalists or private statistical agencies the ability to certify data at a certain point in time. If someone denies the data, you have something that proves the data existed," he said. The Bitcoin system uses a distributed computing network to transfer the virtual currency from computer to computer. Part of the system involves "miners," or computers that cryptographically verify those transactions, which are entered into a public ledger called the "."

Commuting is tough. Working out of your all day is tougher. From traveling salesmen to offsite service professionals to couriers, millions of people worldwide spend their nine-to-five hours behind the wheel. And they need to stay in touch—online, dialed in, and powered up—all day. That’s not easy to do when you’re constantly on the move. Allow us to show you how to remain a useful member of the information age even when your workdays can take you on trips of dozens or hundreds of miles. Few cell phones and far fewer laptops will get you through an entire day of serious work without being plugged in and recharged at some point along the way. Fortunately, your car is a mobile electricity generator. How best to get power out of your vehicle and into the gadgets that need it? Many of today’s automobiles feature USB ports, which are fine for recharging your phone. But if you want to charge your notebook (or even most tablets) you’ll need something with more juice. Here are two options that give you a standard A/C adapter via your 12-volt cigarette lighter socket.

My, how quickly the tables can turn in the fickle world of consumer technology. When Microsoft’s designers and engineers took to the drawing board to dream up Windows 8, the 9.7-inch iPad was the 800-pound gorilla of the tablet market, gobbling an insane amount of market share and laughing at Android’s attempts to break Apple’s stranglehold on slates. The future, it seemed, lay in big screens. Then the Kindle Fire, the Nook tablet, and Google’s Nexus 7 appeared. Consumers fell in love with smaller, cheaper tablets overnight, and on October 23, 2012, Apple capitulated to popular demand and released an iPad mini of its own. Three days later, Microsoft released Windows 8 to the public. With a design optimized for 10-inch-plus displays, it was already behind the times.

Yahoo has acquired PlayerScale, a startup developer of infrastructure software for cross-platform gaming, adding to its string of recent acquisitions. Thursday that it would continue to support the gaming development platform, which PlayerScale claims powers games played by over 150 million people worldwide and is adding over 400,000 new users every day. The financial terms of the deal were not disclosed. .

Google has released a beta version of Chrome that introduces what the company describes as “richer” notifications from the browser’s apps and extensions. The Chrome browser has been able to display this type of notification for more than two years, but Google has now revamped the interface and functionality for these alerts, the company on Thursday. The purpose of the enhancements is to boost the effectiveness of these notifications, which remind users of meetings logged in Google Calendar, alert them about incoming Gmail or IM chat messages and display urgent headlines from news applications.

For all the controversy surrounding Windows 8, it's a solid OS under the hood. And based on a list of API clues discovered by a former Nokia and Silverlight developer, it should only get better with the . Based on an extensive examination of the software APIs found within Windows Blue (now offically called Windows 8.1 by Microsoft), developer Justin Angel compiled a Microsoft representatives declined to comment on what they called rumors and speculation. Angel is no stranger to diving deep into Microsoft products. Last December, he made news when he to pirate Windows Store downloads by turning trial versions into full-version apps.

Intel’s upcoming family of Core processors, code-named Haswell, will offer 50 percent more battery life in laptops than did their “Ivy Bridge” predecessors, Intel said on Thursday. Haswell chips were designed with laptops and tablets in mind, and the main focus was on lowering power consumption, said Rani Borkar, corporate vice president and general manager of the Intel Architecture Group, in a media briefing. The longer battery life won’t come with a cost to performance, according to Borkar. And in idle or standby mode the chips will do even better, extending battery life by up to 20 times, she said. The improvements are vital for Intel and its PC-making partners. , with users snapping up tablets and smartphones instead for mobile computing. Any improvements Intel can offer will help keep the PC market alive.

Deploying an update of its DB2 database, IBM is pitching its SmartCloud infrastructure as a service (IaaS) for use in data reporting and analysis. “We’re the only player in the marketplace that has [a cloud service] for data-in-motion—being able to analyze data in real time,” said Bob Picciano, IBM’s general manager for Information Management. Starting in the second half of this year, the IBM IaaS will start using version 10.5 of IBM’s DB2 database, which should be generally available by early June. One new set of technologies that will come with this database, collectively called BLU Acceleration, can speed data analysis by 25 times or more, IBM claimed. IBM also announced that SmartCloud can now run copies of SAP’s in-memory database, initially for test and development jobs.

SoftBank has received all the necessary state approvals for the Japanese mobile carrier to acquire a majority stake in Sprint Nextel for US$20 billion, the companies announced. On Thursday, California Public Utilities Commission voted to approve the transaction, giving the companies the final state approval needed for the transaction. The two companies filed applications in 23 states and the District of Columbia. to negotiate with Dish. Still, Sprint and SoftBank appear to be moving forward with their deal. The companies continue to work with the U.S. Federal Communications Commission and other agencies on approval of the deal, they said in a press release. The two companies anticipate closing the deal by July 1, they said.

U.S. companies should be allowed to take aggressive countermeasures against hackers seeking to steal their intellectual property, contends the private Commission on the Theft of American Intellectual Property. The 100-page report, released this week, stops just short of recommending that the U.S. allow businesses to actively retrieve stolen information from within an intruder’s network, and to disable or destroy it without any limitations. However, the report does make clear that some so-called hack-back options be available if simpler attempts to deter IP theft fail, which will likely gain the attention of rights advocacy groups. The commission is co-chaired by Dennis Blair, former U.S. Director of National Intelligence and Jon Huntsman, former U.S. Ambassador to China.

. I'm a big fan myself, but I want to share a cautionary tale. About six months ago, an acquaintance of mine installed an SSD in his laptop. Initially, he was delighted: the drive helped his system boot faster and run longer between trips to the wall socket. Then, one day, out of the blue, the drive died. No clicking, no "imminent failure" message, no warning of any kind--just a dead drive. It's under warranty, but so what? He has a laptop that won't boot and data he can't access.

Thin clients introduced this week by Dell and Hewlett-Packard have faster processor than existing thin clients as well as high-definition graphics capabilities, so they could be alternatives to traditional PCs as computing continues moving to the cloud. The desk-side thin clients also have advanced virtualization features for virtual desktops to host multiple applications in one session. They were announced at the Citrix Synergy conference in Los Angeles. Dell introduced its first quad-core thin clients called the Wyse D90Q7 and Z90Q7, and also its first dual-core thin client, the Xenith Pro 2. HP upgraded its TM40 thin client to run Advanced Micro Devices’ A-series processors code-named Richland, which are an upgrade from Intel’s third-generation Celeron processors. The thin clients are optimized to work with Citrix’s virtualization stack, which includes Xen hypervisors and server and client software. The latest thin clients are PCs with network connectivity but no local storage. Virtual desktops on thin clients typically run applications stored in remote servers, using virtualization technologies from Microsoft, Citrix and VMware. The new thin clients have the ability to run high-definition games delivered over the cloud or full instances of Windows 8 complete with touch interaction.

BMW's bikes have always been an amalgamation of form and function, which makes them more purposeful than pretty. The Concept Ninety finally manages to balance the two.

Tomorrow sees the 30th anniversary of the release of Return of The Jedi. To celebrate, here are 30 things you might not have known about the movie.

We're only days away from the new Netflix-only season of

Everybody remembers Apple's remarkable George Orwell-inspired 1984 Super Bowl ad. It's still talked about as one of the greatest Super Bowl ads of all time. But buried in the company's marketing vault is another landmark video from the same year. It wasn't inspired by Orwell. It was inspired by Dan Aykroyd.

We look at a possible future for Xbox One that's not a box at all.

Scientists have built a remote-controlled electronic device that is absorbable by the human body.

Attorney General Eric Holder signed off on the controversial warrant application that the Justice Department used to obtain the personal emails of a Fox News reporter.

This weekend, three planets will nestle together in the western sky at twilight to form a rarely seen glowing triangle. With good timing and a bit of luck you should be able to see it without a telescope.

For two short years he was King of England, one of the most powerful men in the world. Then he was killed, desecrated, and dumped in a hastily dug grave, the location of which would be forgotten and rediscovered, centuries later, under a parking lot. So ends the tale of Richard III, which over the last several months has played out like a

Attorney General Eric Holder is on record the Department of Justice supports legislation that generally would require the government to get a probable-cause warrant to read your e-mail. That we're having this discussion is because federal law, dating to the President Ronald Reagan administration, allows the cops to access your e-mail without a warrant if it's been stored in the cloud at least six months. For years, Congress has been debating changing the law that we'd expect to be the norm in some third-world, despotic nation. Now its time for the United States, and Holder in particular, to show the world, and the American public, that he means what he says. It's time for the Justice Department to begin honoring the Fourth Amendment and start getting a warrant to access the public's e-mail and other stored content, civil rights groups say.

Obama wants to close Guantanamo and capture more terrorists than he kills. But unless Obama is about to get way radical, this is kind of an either/or situation.

Buyers hit the brakes on purchasing hobbyist 3-D printers in the past year, even as industrial-grade printers are playing a larger role in manufacturing finished parts rather than prototypes.

No longer satisfied with hiding in standard-issue tech-company hives, Apple, Facebook, and Google have embraced Architecture with a capital A.

A roundup of odd ways humans and wild animals crossed paths this week compiled by Jon Mooallem, author of the upcoming book

Each week, Wired Design presents one of our favorite buildings, showcasing boundary-pushing architecture and design involved in the unique structures that make the world's cityscapes interesting. Check back Fridays for the continuing series, and feel free to make recommendations in the comments, by Twitter, or by e-mail.

All this time, I've been thinking about Ouya the wrong way.

The CIA offers an electronic search engine that lets you mine about 11 million agency documents that have been declassified over the years. It's called CREST, short for CIA Records Search Tool. But this represents only a portoin of materials declassified by the CIA, and if you want unfettered access to the search engine, you'll have to physically visit the National Archives at College Park, Maryland.

A citizen science project called Calbug, which launched this week, hopes to recruit volunteers to help digitize field notes for more than a million insect and spider specimens held by nine natural history museums in California.

Canadian photojournalist Brett Gundlock traveled to Cher?n, Mexico last year to find out how things had changed for residents in that town after they confronted a violent Mexican cartel that had been illegally harvesting timber in the area.

When it came to developing a mobile app, Nextdoor took it slow - an approach that looks like it will pay off.

The folks at PlanetSolar have beat their own record for crossing the Atlantic in a solar-powered boat.

Yesterday, Amazon announced the launch of Kindle Worlds — a way for fanfic writers to publish. But does the fine print make it more trouble than its worth?

A prominent legislator thinks it's time for the broad post-9/11 law authorizing the war on terrorism to expire. And he's going to introduce a bill to repeal it.

Warner Bros. has tapped a new writer to pen a screenplay based on the book

TiVo has become the Kleenex of the TV world -- a once dominant brand that's become a generic commodity. Yes, we still call recording a TV show "TiVoing." But as cable and satellite companies started offering their own DVRs and cheap streaming boxes from Roku, Apple and others flooded the market, TiVO has been increasingly marginalized and risks irrelevancy. That's changing, though, as the company moves beyond hardware to the far more lucrative world of software and licensing.

Solar Impulse pilot Andr? Borschberg completed a record-setting flight in the wee hours this morning after flying more than 950 miles on solar power alone, even if he was, strictly speaking, going backward for part of the trip.His impressive flight from Phoenix to Dallas completed the second leg of the Solar Impulse team's "Across America" ...

Contrary to what many people believe, fluoride is not some evil scourge of industrial society. Wired Science blogger Deborah Blum debunks some anti-fluoride misinformation, and shares a natural history of the element.

The Swiss love adding functionality to existing products. But you can only tack on so many corkscrews and tweezers to a knife, so one company decided to make a twin-engine jet that can take off and land without the luxury of a runway.

The grudge match between Oracle CEO Larry Ellison and his former protege Marc Benioff, the CEO of Salesforce.com, has reached legendary proportions in recent years. Salesforce has now added more fuel to the fire, hiring Tom Lane, a core contributor to PostgreSQL, an open source database that provides an alternative to Oracle software.

Drone strikes will remain a fixture of U.S. counterterrorism. But President Obama, in a major speech, signaled that he's going to rein in their use.