Search
Media
Travel
Didactica
Money
Venture
eMarket
Chats
Mail
News
Schlagzeilen |
Samstag, 05. Oktober 2013 00:00:00 Technik News
Aktualisiert: Vor 2 Min.
1|2|3|4|5  

Many new tablets, including the new are marketed as ways to create documents and other content for work-related tasks, instead of purely for home consumption of video and games. Even with the focus on The same survey by IDC found that 58.5 percent of respondents bought a tablet to use in addition to a laptop, and not as a replacement. The online survey was conducted in April and included 299 U.S. consumers. All of them were 18 or older. The results might have been different if the survey included younger tablet users, ages 17 and under, since that group has grown up with tablets since the first iPad went on sale in 2010, said Tom Mainelli, an IDC analyst and author of a report on the survey.

The number of 3D printers being sold is set to double by 2015 despite hype outpacing technical realities, according to analysts at Gartner. The firm predicts that worldwide shipments of 3D printers will grow 49 percent in 2013, bringing the total number to 56,507 units. "The 3D printer market has reached its inflection point," said Pete Basiliere, research director at Gartner in a statement. "While still a nascent market, with hype outpacing the technical realities, the speed of development and rise in buyer interest are pressing hardware, software and service providers to offer easier-to-use tools and materials that produce consistently high-quality results." In 2013, Gartner predicts, combined end-user spending on 3D printers will climb to $412 million, up 43 percent from spending of $288 million in 2012. More than three-quarters of the spending, $325 million, will come from the enterprise market, while the consumer segment will reach nearly $87 million.

Women are coming online later and at a slower rate than men around the world, according to a new report released today by the Broadband Commission Working Group on broadband and gender. Of the world's 2.8 billion Internet users, 1.3 billion are women, compared with 1.5 billion men, and between male and female users widens rapidly in the developing world. This gap is relatively small in Organization for Economic Cooperation and Development (OECD) nations. However, globally this gap will grow over the next three years if governments of nations don't take steps to correct this issue. Using computers is associated with status in developing nations, and thus men are more often "allowed" to use these products as compared to women in these regions.

McAfee research indicates that a steep rise in the amount of malware signed with legitimate digital certificates—not —is a growing threat that raises the question whether there should be some kind of "certificate reputation services" or other method to stop certificate abuse. Malware signed with legitimate certificates has soared since 2010 when roughly 1.3 percent of a sample set was found signed that way, according to McAfee. This roughly doubled to 2.9 percent in 2011, then rose to 6.6 percent in 2012. Though the rate is slightly lower so far this year, the total amount of certificate abuse continues to grow because the amount of new malware roughly doubles every year. Speaking at the company's annual user conference in Las Vegas last week, David Marcus, director of advanced research and threat intelligence, said McAfee Labs also found that legitimately signed Android malware, almost nonexistent in 2010, grew to be about 7 percent of all Android malware in 2012 and today constitutes 24 percent. "The certificates aren't actually malicious—they're not forged or stolen, they're abused," said Marcus. This means the attacker has gone out and gotten a legitimate certificate typically from a company associated with a top-root Certificate Authority such as Comodo, Thawte, or VeriSign. The attacker uses this legitimate certificate to sign malware code in order to be able to fool security defenses such as whitelisting or sandboxing, he said.

Like Yahoo, Microsoft is recycling email accounts, and apparently doing so without mentioning it in service agreements for Hotmail, Live, and Outlook.com. Yahoo that proper measures where implemented to prevent privacy disasters like identity theft through data obtained from old e-mail. Microsoft, however, for years has had a similar policy for reuse of Hotmail accounts. The policy has been extended to other , a Dutch IDG publication. The mentions that users are required to log in to their Microsoft accounts "periodically, at a minimum of every 270 days, to keep the Microsoft branded services portion of the services active." Otherwise "we may cancel your access" and "your data may be permanently deleted from our servers."

With its acquisition of gesture-recognition company Flutter, Google may be looking to beef up Google Glass and its Android products while also looking to win over the hearts and minds of Apple iPhone users.

Police secretly arrested a London-based teen last April in connection with the on anti-spam organization Spamhaus, it has been confirmed. The unnamed 16-year-old youth was picked up during "Operation Rashlike" after police connected his Internet activity to certain forums, according to The Evening Standard, the first outlet to be told about the story. During the arrest, "the suspect was found with his computer systems open and logged on to various virtual systems and forums. The subject has a significant amount of money flowing through his bank account. Financial investigators are in the process of restraining monies," the briefing notes on the Operation said. The same document agreed with assessments at the time that the had been the "largest DDoS attack ever seen" which caused worldwide impact including on the servers of the U.K.'s main Internet hub, the London Internet Exchange.

We got some up-close time to handle the upcoming Nintendo 2DS. It's got a new look and a primary audience

DRAM supplies from Hynix's fabrication (fab) plant in Wuxi, China, aren't expected to return to normal until next year after that facility, according to a new report. In the meantime, DRAM prices are up 35 percent since the fire, as looming supply constraints prevail and there appears to be no rush by DRAM makers to sign new contracts, according to the report from analysts at investment bank PiperJaffray. The fire that . Hynix by this November, a prediction PiperJaffray contested.

, informed some in the media (including PCWorld) that his company will no longer sell machines with AMD graphics cards inside. Given the timing, you have to wonder about Origin’s motivations. Indeed, it’s especially odd that a PC manufacturer would go out of its way to tell the press that it’s dropping support for a specific component manufacturer. This is not the kind of move that usually warrants a communication to journalists. Here’s an excerpt from Wasielewski’s statement, which bore the subject line of “Origin PC is going green!” ”This decision was based on a combination of many factors including customer experiences, GPU performance/drivers/stability, and requests from our support staff. Based on our 15+ years of experience building and selling award winning high-performance PCs, we strongly feel the best PC gaming experience is on Nvidia GPUs.”

Valve Software said Friday that it will ship its prototype Steam Machines to 300 lucky beta testers, ranging from premium boxes based on Nvidia Titan cards down to low-end Intel Core i3 machines. that it will shift entirely to Nvidia GPUs. Moreover, Valve said that it plans to make the Steam Machines open and user-upgradable. So if users want to upgrade their Steam Machines, they can, Valve said. . However, the company said it was not yet ready to publish pictures of the proposed box.

More than 75 percent of Twitter’s 218 million “monthly active users” reside outside the U.S., say IPO documents filed by the company and made public Thursday.

Facebook’s head of network operations has great expectations for software defined networking (SDN), though he may not be relying on commercial hardware vendors to bring SDN to the social networking giant’s own infrastructure. , who oversees Facebook’s production and corporate network. Prior to joining Facebook, Ahmad worked as general manager of global networking services at Microsoft. Ahmad was part of a panel about SDN at the New York Interop New York conference, held this week. He spoke with the IDG News Service afterward. , the future of networking.

This very special Nissan LEAF is a poster car for the company’s pledge to bring autonomous vehicles to market by 2020.

The CBS app, which launched on iOS in March, is now joined by new apps for Android and Windows 8.

The lines that seperate tablets, notebooks, and all-in-ones have increasingly blurred over the past few years—and prices have begun following that trend. , is priced at less than $400, although the company sacrificed some niceties to hit that mark. Thankfully, the $1,000 or so prices that PC vendors used to charge for an all-in-one machine have faded away, thanks to lower prices in the flat-panel market. Now, low-end AIO machines are pushing down below $500, as manufacturers try and drive sales by charging less. Nevertheless, if you’re in the market for an all-in-one PC, it pays to pay attention to what’s under the hood.

Campfire, HipChat and other are popular with distributed work teams because of the ability to communicate in real time via a web browser or mobile app. Cotap, a free iPhone app that launched Tuesday, takes a different tack by forgoing the browser element, opting instead to be a simple group texting app for work that you use primarily on your phone. “We want to be actually easier than texting,” says Cotap CEO Jim Patterson, a former Yammer executive with a background in mobile communication and enterprise software. Patteron notes that while other platforms have focused on creating rooms or groups as well as sharing files, most business communication platforms don’t focus first on mobile. Unlike consumer mobile messaging apps such as , that require you to manually create groups and add contacts, Cotap scans your phone’s address book for anyone with the same work email domain as you, using those addresses to automatically populate your company’s address book inside Cotap. As a result, the next person from yourcompanydomain.com to start using Cotap will have one-tap texting access to not only the company email domains in his own address book but also the ones imported into Cotap by anyone else who uses the same work domain, as well as anyone whose email address is associated with a meeting scheduled with Cotap.

, have been actively trying to defeat the encrypted protection provided by the popular Tor anonymity software. But amazingly, it appears the attempts have failed. The latest Snowden leak suggests that Tor has actually withstood the brunt of the NSA’s efforts thus far. “We will never be able to de-anonymize all Tor users all the time,” according to a leaked presentation titled ‘Tor Stinks,’ the Guardian reports. “With manual analysis, we can de-anonymize a very small fraction of Tor users.” That doesn’t mean Tor is a magic bullet for cloaking your online steps, however.

Here's your first dose of early Halloween fright, with 10 scary movies streaming on Hulu Plus.

As a tropical storm and possible hurricane bears down on the Gulf Coast of the U.S., the National Weather Service's website was churning out weather alerts Friday, despite a partial U.S. government shutdown that has affected citizens' access to other online resources. The National Weather Service's website, Weather.gov, was one officials deemed as essential after a budget fight in Congress led to a partial government shutdown Tuesday. The website for weather service parent agency, the National Oceanic and Atmospheric Administration, displayed a notice saying it was unavailable during the shutdown. "Only web sites necessary to protect lives and property will be maintained," said a message at NOAA.gov. But Weather.gov displayed a map of the U.S. with current weather alerts Friday, including a warning for tropical storm Karen, with a hurricane watch for the Gulf coasts of Louisiana, Alabama, Mississippi and Florida. The weather service expects landfall by Sunday morning.

The Worldwide Web Consortium (W3C) formally accepted a big change recently that could affect future Web standards—a decision that will either change nothing or destroy the Web forever. It all depends on your point of view. for possible inclusion in the upcoming HTML 5.1 standard. The W3C is the group charged with defining guidelines for Web technologies. (EME). For users, it means no more needing to download a special plugin to view video content. Just fire up your browser, log in to your favorite online streaming video provider, and go. (Assuming providers embrace EME, naturally.)

Microsoft is trying to head off any concerns that the Xbox One's powerful Kinect camera might become a mass surveillance device or a source or privacy headaches. . Most notably, he insisted that users' facial data is locked to the console, and that Skype video chat is programmed not to run in the background. that certain personal data, such as facial expressions and heart rate, will not leave the console “without your explicit permission,” Penello said that actual face data does not leave the console at all. “There could be some cool features we could enable if we stored that data in the cloud, like being able to be auto-recognized at a friend's. I get asked for that feature a lot,” Penello wrote. “But, for privacy reasons, your facial data doesn't leave the console.”

Microsoft's left many pondering the future of third-party Windows Phone devices, but a new report suggests the company is peering over its walls to transform Android into a Trojan horse of sorts. Terry Myerson, Microsoft's newly crowned OS chief, has asked HTC to include Windows Phone as a "second option" on its Android handsets, . To sweeten the pot, Microsoft allegedly offered to "cut or eliminate" its usual licensing fee. Could you dual-boot between the two? Would you have to pick a primary OS up front? The report says the technical details aren't concrete given the preliminary nature of the talks, but one thing's for certain: The tag-team would definitely be an unprecedented move. And if any companies need to shake up the status quo, it's HTC and Microsoft. After rising rapidly during Android's early days, HTC has since been steamrolled by the Samsung-Apple tandem, hemorrhaging money, market share, and executives alike despite , shipping just 6.63 million phones in the second quarter.

The developers of WHMCS, a popular client management, billing and support application for Web hosting providers, released emergency security updates Thursday to patch a critical vulnerability that was publicly disclosed. The vulnerability enables attackers to execute SQL injection attacks against WHMCS deployments in order to extract or modify sensitive information from their databases. U.K.-based WHMCS, released versions 5.2.8 and 5.1.10 of the software to fix the flaw, as well as incremental patches that can be applied manually to older versions without performing a full upgrade. The SQL injection vulnerability was disclosed Thursday on a blog by an anonymous user who also released proof-of-concept exploit code for it.

It's the user experience that matters, not charts and graphs.

Chip makers like Broadcom and Renesas Electronics are ramping up in-car entertainment with faster processors and networks for wireless HD movies and navigation, aiming to keep drivers informed and passengers entertained.

The U.S. has brought criminal charges against 13 persons, said to be members of the hacker group Anonymous, for their alleged participation in cyberattacks as part of a campaign called Operation Payback. The defendants and other members of Anonymous allegedly launched or attempted to launch cyberattacks against government entities, trade associations, individuals, law firms and financial institutions, according to a federal grand jury indictment released Thursday in the U.S. District Court for the Eastern District of Virginia, Alexandria division. Among the organizations targeted were the Recording Industry Association of America, the Motion Picture Association of America, the United States Copyright Office of the Library of Congress, Visa, MasterCard, and Bank of America. The method of attack was DDoS (distributed denial of service) which floods web sites with spurious Internet traffic so that they become unavailable, and the weapon of choice was the freely-available and downloadable network stress testing program known as the Low Orbit Ion Cannon or LOIC, according to the indictment.

Twitter made its IPO documents Thursday and in the process revealed some juicy information about the company, like how much money it makes (or loses) and how much its executives get paid. Here are a few of the details we learned about Twitter today. Dick Costolo, Twitter's CEO and a member of its board, received total compensation of $11.5 million last year, including $200,000 in salary and $8.4 million in stock. That was a little more than the company's head of engineering, Chris Fry, whose total compensation was $10.3 million, including $10.1 million in stock. Twitter's revenue ballooned in the past few years. Last year it was $317 million, three times what it was in 2011 ($106.3 million) and more than 10 times what it was three years ago ($28.3 million). But the growth has been slowing and it's still a minnow compared with Facebook, whose revenue last year was $5.1 billion. Twitter lost money in each of the last three years -- $79 million last year, $128 million in 2011, and $67 million in 2010. Things might not get better any time soon: it lost $69 million in the first six months this year, and the "restricted stock units" it has granted will have "a significant negative impact on our ability to achieve profitability on a GAAP basis in 2013 and 2014," the company said.

The battle for your living room could become even more crowded if Amazon rolls out a set-top TV box this holiday season.