Search
Media
Travel
Didactica
Money
Venture
eMarket
Chats
Mail
News
Schlagzeilen |
Montag, 12. August 2013 00:00:00 Technik News
Aktualisiert: Vor 2 Min.
1|2|3|4|5  

Lenovo opens its Reach consumer cloud service for public preview. Reach is a "cloud-desktop" service through which applications can be launched without downloading and installing them locally on mobile devices and PCs.

Facebook adds OpenTable integration, movie times, and TV listings to mobile pages.

Oracle has revamped the user interface for its MySQL Workbench administration software, streamlining a number of routine operations and adding some new time-saving features as well. . Overall, Oracle made over 200 changes to the community edition to the software, based on user feedback, according to the company. , which is a separate application, provides a GUI administration interface that provides point-and-click operations to many MySQL administration tasks, as well as visual tools for SQL development and data modeling.

Path, the social network designed to better connect people who are already well-acquainted, is opening up its API to 13 outside developers to give its users more ways to share content.

On Monday, Microsoft updated a pair of its apps, adding important capabilities to two different platforms. If you find yourself preferring Skype over Apple’s own FaceTime on the iPhone 5 and fourth-generation iPad, good news: With Skype 4.1, Microsoft’s Voice over IP app for mobile now supports HD video calls. Separately, Microsoft also added a “PowerBI for Office 365” app for both Windows 8 and Windows RT tablets, indicating that the launch of its “live data” service is imminent. Neither app directly influences the other, but both offer something important. Skype added video calls for the iOS version when version 3.0 of its mobile app arrived in 2010, periodically updating the app with support for Apple’s latest phones and mobile devices. This is the first time that Skype has added , though. In this case, “HD” equals 720p resolution.

A new generation of faster, cheaper flash storage is hitting the business market and will be in the spotlight this week at a major flash memory conference. At least three makers of all-flash storage arrays plan to show off products based on the most dense NAND flash components yet, with cells smaller than 20 nanometers across. These will fit more data into the same space, reducing power consumption and per-gigabyte cost. The catch: Flash gets slower and more error-prone when it gets that dense, so the new products required even more advanced software to make up for this, the vendors say. Because reliably writing data to flash gets harder as the cells get smaller, conventional flash technology may be nearing the end of the road. Cells less than 10nm across may be too small for the size of the electrons needed to charge them, said Jim Bagley, an analyst at Storage Strategies Now. As a result, major flash manufacturers may go straight to alternatives such as vertical NAND, which stacks multiple cell layers on top of each other, he said. , should offer higher performance along with cost, energy, and space savings. Storage arrays populated entirely with flash are starting to compete on cost with the most expensive HDD (hard disk drive) systems with 15,000 rpm drives, analysts say.

Salesforce.com has rolled out a new product bundle that includes even more applications than its high-end Unlimited Edition, albeit at a higher price. The new Performance Edition provides access to Salesforce.com’s sales, service and development platform software, as well as customer-lead information from Data.com, Work.com performance management software and identity management functionality. It will be available starting Nov. 4 for $300 per user per month, compared to $250 per month for the Unlimited Edition, which will still be available. Unlimited Edition customers can also upgrade to Performance Edition. , another product bundle aimed at making sales representatives more productive.

The human body is fascinating and complex. Students puzzle over those different bones, blood vessels, muscles, and nerves...and that's without getting into the different parts of the brain, heart, and other internal organs. Zygote Body is an amazing 3D simulation of the human body, complete with every layer, organ, and vessel. Using your keyboard or mouse, you can slowly peel away or add the different parts of the human body, and learn more about them by searching for an organ or clicking the one you're interested in. Even if you don't study science, Zygote Body is an excellent way to get the bigger picture of the human body. The Download button takes you to to the vendor's website, where you can use this Web-based software.

Microsoft’s bet that touch would propel Windows 8 has run into a major snag, an industry analyst said Friday: Consumers see little reason to pay premium prices for touch-enabled laptops. According to IDC, touch-ready laptop shipments are significantly lower than optimistic forecasts by computer makers such as Acer, whose president, Jim Wong, said in May that by the end of the year 30% to 35% of his company’s notebooks would sport touchscreens. “We forecast that 17% to 18% of all notebooks would have touch this year,” Bob O’Donnell, an analyst with IDC, said in an interview Friday, referring to the research firm’s own estimates earlier this year. “But that now looks to be too high, to be honest.” He said IDC would probably drop its touch estimates to between 10% and 15% of all laptops. Others have already pegged touch to that range for the year. In April, NPD DisplaySearch said that about 12% of notebooks sold in 2013 would be equipped with touch.

Who knew the free flow of information could sound so beautiful? Listen to Wikipeida turns the collaborative trade of crowdsourced information into a symphony of data.

IFTTT.com announces the addition of an official New York Times channel to its news and event alert service.

Some note-taking techniques are kludgey: printing out slide decks and writing on them, for instance, or copying and pasting images into a word processor. Notable.ac is another take on the note-taking problem, this time in the form of a free-to-use Web app. Notable.ac is more than a note-taking app. It's a complete course platform for both students and lecturers. Once a course is created in the system, anyone can upload the course's slides, and the entire class can join in and either collaborate on notes or write their own private ones on slides. No highlighting features are currently available, but you can tie slide notes to certain points on the slide for easier reference. The lecturer panel, currently available only by request, also provides some trends and insights into the class's behavior. Notable is a great alternative to university-provided platforms—and with some added features, it can really give classes a boost.

were announced in June, Microsoft is making a few more adjustments before shipping the update to users. of Windows 8. that a related build, Build 9478, has now reached the Release to Manufacturing (RTM) branch, which could indicate that Windows 8.1 will soon be on its way to OEMs. Within Build 9471, Microsoft’s built-in apps such as Mail and Calendar now display a narrow bar along the top or bottom of the screen, with three dots on the right side. These dots signify additional menu options, which you can view by swiping from the top or bottom of the display, or by right-clicking on the screen.

The Chinese hacker group that broke into the computer network of The New York Times and other high-profile organizations, including defense contractors, has launched new attacks following a few months of inactivity, according to researchers from security vendor FireEye. The cyberespionage group is known as APT 12 (Advanced Persistent Threat number 12) and is believed to have ties to China’s People’s Liberation Army (PLA). APT 12 is back after a period of silence that followed widespread media coverage in January of . “We observed new activity from this group in early May 2013,” said Ned Moran, senior malware researcher at FireEye, via email. “We are almost certain that these new attacks were conducted by the same group.”

Kim Dotcom's Mega organization vows to create a new encrypted email system that would include functionality such as email search.

of password creation, then manually recorded each new one in a management utility. Obviously I'm aware of solutions like Keepass, LastPass, and Roboform, and I've tried them sporadically over the years. But for various reasons I never really took to any of them. , and at the risk of gushing, I'm a convert. This Windows-based password manager offers a gorgeous interface, seamless integration with my Web browser, and storage for other data I like to keep accessible and protected: credit card numbers, software registration codes, and so on. for a full overview of the program. But I want to share the key reasons I'm making a switch after so many years of doing things differently.

That's a pretty old game. Realistically, there are limits on how long you can keep using old software. Eventually, operating system designers have to choose between backward compatibility and future capabilities. And yet, if your program was created with Windows 98 primarily in mind, it has a reasonable chance of working in Windows 7 or 8. But if it was already old in 1998, or was written to be backward compatible back then, it will have problems with most current computers.

Stringwire lets you take multiple live smartphone video feeds and turn them into an online news broadcast.

mates. It’s not a ground-up overhaul, and it doesn't incorporate hot new technologies. But these tweaks indicate that Premiere Pro has taken on some of the characteristics of a cloud application, adding features as they are developed, rather than making customers wait for monolithic annual releases. , a sophisticated GPU-accelerated color-grading/correction application that debuted in Creative Suite 6. In Premiere Pro CC’s effects browser, you’ll see four sets of Lumetri "looks" (Cinematic, Desaturation, Style, and Temperature), and as with any video effect, you can drag a look onto a clip in the timeline, or onto an adjustment layer that covers multiple clips. , then the Lumetri looks are just a few more effects added to the vast selection that Premiere Pro provides. But if you do use SpeedGrade, you can use that application to create and save new looks, which you can then import into Premiere Pro CC and apply over and over again, perhaps as part of implementing a consistent brand identity. However, the path to Lumetri is one-way—you cannot create or modify looks from within Premiere Pro. You must use SpeedGrade and then import into Premiere Pro. , which mandates limits on differences in volume. If you enable the Loudness Radar and then play your timeline, the Loudness Radar will show you a visual representation of its loudness over time, with peaks and valleys on a circular graph. You can then use other controls to keep your volume within legally acceptable limits. Your used-car dealer clients may squawk, but, hey, that's the law.

Bitcoin wallets on Android are vulnerable to theft because of problems in a component that generates secure random numbers, developers said. The problem is said to be in the Android operating system and will affect bitcoin wallets generated by an Android app. Apps for which the user does not control the private keys are not affected, developers at Bitcoin.org wrote on Sunday. Exchange front-ends like Coinbase or Mt. Gox apps are, for example, unaffected by the issue as the private keys are not generated on the user’s Android phone. Bitcoin public-key cryptography so that each address is associated with a pair of mathematically linked public and private keys that are held in the wallet. The user signs a transaction to transfer bitcoins to somebody else with the private key, and the signature is validated using the public key.

Blackberry’s board of directors has formed a committee to explore strategic alternatives for the future of the company that could include joint ventures or a sale of the company, as it struggles to turn its new BlackBerry 10 operating system into a success. The news comes after the company announced that it had shipped 6.8 million smartphones and recorded a $84 million loss during the three months to June 1. Only 2.7 million phones running the new OS were sold, a figure that disappointed analysts. The soft sales led analysts to question the future of BlackBerry 10 and the company during a conference call on the results. At the time, BlackBerry CEO Thorsten Heins offered various themes on the same reply as a defense: “BlackBerry 10 is still in the early stages on its transition. In fact, we are only five months in to what is the launch of an entirely new mobile computing platform,” he said. IDC research director Francisco Jeronimo paints a darker picture of BlackBerry's current situation.

The Firefox OS used in the ZTE Open Firefox OS phone, is touted as a better alternative for low-end smartphones.

Desktop PCs come in all shapes and sizes these days, but Acer’s Gateway DX4870-UB2C is pretty old-school: A midsize desktop tower, it delivers solid—but not spectacular—productivity performance and 1TB of hard disk storage for a modest $550; however, you must provide a monitor, and headphones or speakers for audio. That profile makes it a good candidate for a student (it’s no coincidence that it appears during back-to-school season) or anyone on a budget who might have a display and audio gear from a previous system. In fact, the Gateway DX4870-UB2C (who comes up with these names, anyhow?) has an analog VGA port to accommodate the older LCD or (gasp!) CRT, as well as an HDMI port to accommodate a newer digital display (but there’s no DVI or DisplayPort). Outfitted with an Intel Core i5-3330 quad-core CPU, 8GB of RAM (expandable to 32GB), integrated Intel graphics, a 1TB (7200-rpm) hard disk, and Windows 8, the DX4870-UB2C scored 153 on PC WorldBench—well above the 100 score for our reference system ( all-in-one), but hardly stellar compared to scores in the 200s, 300s, and even 400s racked up by recent high-performance systems. The lack of a discrete graphics card and a solid-state drive probably account for the poorest test results—in file compression, storage, and GPU-accelerated image editing, and—most tellingly—gaming. The DX4870-UB2C otherwise hovers in the middle of the pack on almost all benchmarks, and should capably handle any routine student or small-business tasks. Its power consumption was modest, another plus for cash-strapped and/or eco-minded buyers.

When Pamela (not her real name) sat down at her desk one recent weekday morning, online security was the furthest thing from her mind. Sure, she had a basic knowledge of common-sense security practices. She wasn’t the type to use insecure passwords or download dubious content from the Web. As chief financial officer for a small Chicago-based manufacturing company, she regarded her PC as a no-nonsense work tool. Still, somewhere along the way, a little snippet of malware slipped onto her PC, and it would soon threaten her company’s survival. According to Brian Yelm, CEO of Chicago tech services provider . When Pamela logged in to the look-alike site, a message prompted her to call customer service about a problem with her company’s account. She dialed the number on the screen, and after a few simple questions from the agent on the line, every single penny in her company’s account disappeared. More than $300,000, gone in minutes. Pamela and the company were lucky. They immediately discovered the missing funds and pulled out all the stops to recover the money from their bank. And with Technologyville’s help, they traced the IP addresses and phone calls back to a hacker group in Eastern Europe. Justice was served. The money was recovered. Pamela’s company survived. Not every company that gets hacked is so lucky. According to the , one in five small businesses falls victim to cybercrime each year. And of those, some 60 percent go out of business within six months after an attack.

There’s a place lurking beneath the Internet you use every day. It’s a hidden underbelly, home to both rogues and political activists, and accessed only with the help of specially designed anonymizing software. It’s a secretive place, where Arab Spring dissidents can hide their digital tracks, a place where whistleblowers can reach out safely to scoop-seeking media outlets. And, yes, it’s also a dangerous place, where a lot of illicit, underground nastiness occurs. following the arrest of an alleged pornographer. Like a demilitarized zone or a lawless land, it’s not a place most people visit—nor should they. But by the time you’re done reading this article, you’ll know more about this shadowy, parallel online universe than Bing or Yahoo ever will. has a stellar Deep Web primer.)

The Pirate Bay has introduced its own browser, which can be used to circumvent censorship and blockades. The PirateBrowser is a simple, one-click, pre-configured Firefox browser that makes The Pirate Bay and other blocked sites instantly available and accessible in countries where the site is blocked, the torrent search website said in over the weekend. PirateBrowser uses Vidalia, a cross-platform graphical controller for the Tor software that allows users to start and stop the Tor anonymizing network. This client is bundled with Mozilla’s Firefox portable browser with the , a set of proxy management tools for Firefox, Google Chrome and Internet Explorer that bypass content-filtering in certain countries.

An investigation by mobile security vendor Lookout warns that malware is being transformed into a large-scale, sophisticated software business, complete with customer support.

Brute force attacks to pry login credentials from content management sites like blogs have been growing as more data robbers use a short-term gain for a bigger payoff later on. Such sites are attractive targets because they tend to be less secure than other environments—such as financial services—and since they're interactive by design, "drive-by" malware planted on them can infect a lot of users quickly, said David Britton, vice president of industry solutions at 41st Parameter. "With these types of interactive sites being compromised, we see more evidence of the developing attack trend that is focusing less on direct financial gain and more on gathering more detailed personal data, allowing fraudsters to build much more complex social engineering attacks that result in an eventual larger payoff," he said via email. More and more attackers are realizing that websites built on CMS platforms, like WordPress, . "This marks a sea change in attackers targeting the low-hanging fruit of these blog systems," Matt Bing, a research analyst with Arbor Networks, said in an interview.

Windows' share of grew slightly in the second quarter, as shipments also ticked up in the face of a slow-down by tablets overall, researcher IDC said last week. But the company's innovative Surface line contributed just a fraction of that tally, showing just how difficult a task Microsoft has set for itself in transforming into a device builder and seller. "The [hardware] partners who have been supporting Windows 8 continue to do so, which is good, and they're starting to make some traction," said Ryan Reith, an IDC analyst on the team that tracks tablet shipments. "But I would not call Surface a success by any means." While all tablet shipments in the second quarter compared to the first, those powered by Windows grew by 11 percent over the same stretch, according to IDC estimates released last week.

The Twitter's new login verification feature will likely make it useful only to actors, politicians, and other high-profile users willing to go through the hassle for tighter security. Twitter, like Google and Facebook, is experimenting with as a back up to the traditional user name and password that most experts agree is no longer sufficient to protect user accounts. In its latest attempt to bolster security, Twitter has focused on the mobile phone as the keeper of the crown jewels for protection. In general, called asymetric cryptography in which an iOS or Android device is used to generate a private and a public key. While the former stays in the phone, the latter is stored on a Twitter server. Together, the keys keep track of clients trying to log into a Twitter account. If someone tries to log in from a Web browser, then a notification is sent to the phone, asking the user to OK the request for entry.

Die Stadtverwaltung von London hat das Unternehmen Renew aufgefordert, die Mülleimer mit Smartphone-Trackingfunktion nicht mehr einzusetzen, die die WLAN-Geräte der Passanten für zielgerichtete Werbung verfolgten.

Zur Ifa 2013 bekommt die Blu-ray Pure Audio einen mächtigen Konkurrenten. Universal will sein eigenes Pure-Audio-Logo ohne blauen Hintergrund etablieren. Im Bereich der Mehrkanalmusikscheiben auf Blu-ray-Basis zeichnet sich damit ein unnötiger Formatkrieg ab.

Omnicam ist ein Kamerasystem, das aus zehn Einzelkameras und zehn Spiegeln besteht. Die Kamera liefert einen Rundumblick, etwa von einem Fußballfeld.

Epische Musik im Trailer und eine Handlung mit Zwischentönen: Am Rollenspiel Project Phoenix arbeiten unter anderem Entwickler von Final Fantasy. Es soll das erste unabhängig über Kickstarter finanzierte japanische Rollenspiel werden.

Die entscheidende Adresse hat wohl edsnowden@lavabit.com gelautet. Der Gründer des Webmail-Dienstes Lavabit legte nach zehn Jahren lieber sein Unternehmen still, als den US-Geheimdiensten zu helfen. Jetzt hat Ladar Levison erst einmal genug von E-Mail-Diensten.

Meisterdieb Garrett darf im nächsten Thief nicht frei springen, sondern nur an vorgegebenen Stellen. In der US-Presse ist eine Diskussion über die Vor- und Nachteile dieser Gameplay-Entscheidung entbrannt.

Die NSA nutzt die Überwachungsdaten aus Deutschland, um Anonymous-Aktivisten aufzuspüren. Das sei kein Problem, solange es keine US-Bürger seien.

Als Resultat aus den Vorwürfen gegen deutsche und US-Geheimdienste soll es ein Abkommen der Dienste geben. Das hält der Vorsitzende des Parlamentarischen Kontrollgremiums für nicht ausreichend. Die bisherigen Verträge sollen nun begrenzt öffentlich zugänglich gemacht werden.

Samsung verteilt derzeit das Update auf Android 4.2.2 für das Galaxy Note 8.0. Das Update gibt es für die Variante mit 3G-Modem, Besitzer eines Nur-WLAN-Modells müssen sich noch gedulden. Seit Anfang des Monats gibt es Android 4.2.2 für das Galaxy S2 Plus.

Rollenspiele benötigen eine Vielzahl an glaubhaften Figuren, deren Erstellung sehr aufwendig ist. CD Projekt Red hat darüber einen Vortrag auf der Siggraph 2013 gehalten, der erläutert, wie Charaktere in The Witcher 3 zum Leben erweckt werden.

Auf Druck der US-Regierung im NSA-Skandal haben Lavabit und Silent Circle ihre verschlüsselten E-Mail-Dienste eingestellt. Nun will Mega Ende-zu-Ende-Verschlüsselung anbieten und die Nachrichten trotzdem durchsuchbar machen.

Das Parlamentarische Kontrollgremium (PKGr) des Bundestages, das die Geheimdienste beaufsichtigen soll, hört den ehemaligen Kanzleramtsminister Frank-Walter Steinmeier nicht an. Der SPD-Abgeordnete bezeichnete das als "Unverschämtheit".

Unter seinem Open Patent Non-Assertion (OPN) Pledge hat Google weitere Patente freigegeben, die ohne Einschränkungen genutzt werden dürfen. Insgesamt sind es bereits 89 Patente, die teils in mehreren Ländern registriert sind.

Italienische Forscher entwickeln einen Roboter, der wie eine Pflanze Wurzeln bildet, die sich ins Erdreich bohren. Der Roboter soll eine Vielzahl von Einsatzmöglichkeiten haben - von der Umweltüberwachung bis hin zur Medizin.

Unbestätigten Angaben zufolge will AMD Ende September zwar eine ganze Serie neuer Grafikkarten vorstellen, aber nur eine davon soll die neue Architektur GCN2 mitbringen. Ungewöhnlich wäre das nicht, so ist der Chiphersteller bereits früher vorgegangen.

Zum zehnjährigen Bestehen hat Pirate Bay den Pirate Browser vorgestellt, der die Internetsperren gegen Filesharing in vielen Ländern umgehen soll. Die Firefox-Variante sei aber nur ein erster Schritt zu einem Bittorrent-Browser.

30 Fußballligen aus aller Welt, 600 Vereinsmannschaften, HD-Grafik und das aus Ultimate Team bekannte Spielprinzip: EA Sports will demnächst mit Fifa World eine interessante Fußballsimulation für PC veröffentlichen - allerdings nicht in Deutschland.

Asus zieht sich aus dem Segment der Windows-RT-Tablets zurück. Als Grund nennt der Asus-Chef, dass Geräte mit Windows RT keinen Erfolg gehabt hätten. Geräte mit Windows 8 und Intel-Chips will Asus hingegen weiterhin anbieten.

Die SATA-IO hat die Spezifikationen der SATA-3.2-Schnittstelle veröffentlicht. Eine davon ist SATA Express mit bis zu 16 GBit/s, zudem ermöglicht SATA 3.2 Optimierungen für SSHDs und eine verringerte Leistungsaufnahme bei SSDs.

Die Neuauflage der Nordlandtrilogie von Das Schwarze Auge sorgt für Ärger: bei Spielern wegen massiver Programmfehler, beim Lizenzgeber wegen eines befürchteten Imageschadens.

Auf Grund einer Schwachstelle in dem Zufallszahlengenerator in Android gelten sämtliche dort verwendeten virtuellen Geldbörsen als unsicher.

Aus guten Ideen werden längst nicht immer gute Spiele. Was künftigen, aber auch erfahrenen Entwicklern bei der Vorstellung von Projekten passiert und wie es besser geht, davon berichtet der in der Branche erfahrene Spieleentwickler Michael Hengst.

Der Kamerahersteller Lytro hat seit der Veröffentlichung seiner bislang einzigen Lichtfeldkamera außer einigen Firmware-Updates nichts Neues mehr vorgestellt, doch das soll sich 2014 ändern.

Die Beta von Firefox 24 bringt vor allem Neuerungen für die Android-Version mit, an der Desktopversion ändert sich nur wenig. Die mobile Version unterstützt nun auch WebRTC.

Forscher haben sich die menschliche Haut zum Vorbild genommen, um im Sommer Fensterscheiben zu kühlen. Dabei wird auf ein feines Kanalsystem zwischen den Scheiben gesetzt, durch das kaltes Wasser zirkuliert.

In der Innenstadt Londons stehen öffentliche Mülltonnen, die mit einem WLAN-Modul und einem Bildschirm ausgestattet sind. Die Renew Orbs tracken die WLAN-Geräte der Passanten, um ihnen darauf zielgenaue Werbung zu präsentieren.

Die Spitze des GSticks erinnert an einen Kugelschreiber in Übergröße - doch auf Papier hinterlässt das Gerät keine Spuren. Der Gstick ist vielmehr ein funkender Mausersatz, mit dem auch geschrieben und gemalt werden kann.

Wer eine kostenpflichtige Gold-Mitgliedschaft bei Xbox Live besitzt, soll daran mit dem Start der Xbox One den Rest der Familie teilhaben lassen - und auch bei Kumpels auf deren Konsolen einen Großteil der Funktionen nutzen können.

Die nächste Version seines iPhone 5 plus eine günstigere Variante will Apple angeblich am 10. September 2013 vorstellen - was ein perfekter Termin wäre, um mutmaßliche Ankündigungen unter anderem von Samsung zu kontern.

Egal ob Festnetz oder Mobilfunk: Mit computergesteuerten Überwachungssystemen wertet die Telekom alle Telefonate aus. Laut einem Bericht gibt es Überlegungen, künftig "unwirtschaftliche Kunden" mit Flatrate-Verträgen in teurere Tarife zu drängen. Die Telekom weist diese Darstellung zurück.

Deutschland ist für den US-Geheimdienst NSA als Ziel von Spionage nur von mittlerem Interesse. Das soll aus Unterlagen von US-Whistleblower Snowden hervorgehen, die der Spiegel eingesehen hat.

Seit den Enthüllungen von Edward Snowden gilt die Verschlüsselung von E-Mails plötzlich als angesagt. Doch von einem Boom kann trotz aller Kryptopartys noch lange keine Rede sein. Wie Teenagersex, sagen Netzpolitiker.

Im langjährigen Patentstreit mit seinem Konkurrenten Samsung hat Apple einen Sieg vor Gericht erzielt. Einige Samsung-Produkte dürfen daher nicht mehr in die USA importiert werden.

Der US-amerikanische Auslandsgeheimdienst NSA nimmt ausführlich Stellung zu den Spähvorwürfen. Zugleich verspricht US-Präsident Obama mehr Transparenz bei den Überwachungsprogrammen.

Die Datenbrille Space Glasses holt virtuelle Gegenstände in die reale Welt und ermöglicht es dem Nutzer, damit auf natürliche Weise zu interagieren. Das New Yorker Unternehmen bringt eine Entwicklerversion auf den Markt. Die Brille für Endkunden soll Anfang 2014 erhältlich sein.

Die Ankündigung von T-Online, GMX und Web.de zur E-Mail-Sicherheit ist laut CCC ein Sommermärchen. Den Nutzern der E-Mail-Dienste wird vorenthalten, dass eine Verschlüsselung der Verbindung zwischen den Anbietern noch nicht bedeutet, dass die E-Mails dort auch verschlüsselt abgelegt werden.

Als erster Hersteller beginnt Intel, eine Chipfabrik für Prozessoren auf 450-mm-Wafer umzurüsten. Die ersten Chips sollen 2015 gefertigt werden, bis dahin belaufen sich die Investitionen auf mehrere Milliarden US-Dollar.

Bei ihren Durchsuchungen von Internetdaten gehen die Mitarbeiter der NSA auch Informationen über Dritte nach, die bereits überwachte Personen erwähnen. Das kann auch US-Bürger betreffen. Einen Durchsuchungsbefehl benötigen sie dafür nicht.

Fernsehen über Satellit wird weniger linear. Die Inhalte lokaler Sender können nun als Livestream oder aus der Mediathek abgerufen werden. Möglich wird dies durch ein Streaming-Portal, das über den Sat-Receiver läuft.

Programmierer Koushik Dutta hat eine Erweiterung für die alternative Android-Distribution Cyanogenmod (CM) präsentiert, mit der Nutzer jeden Video- oder Musikinhalt an den Chromecast senden können. Dies funktioniert auch mit auf dem Android-Gerät gespeicherten Medien.