Search
Media
Travel
Didactica
Money
Venture
eMarket
Chats
Mail
News
Schlagzeilen |
Samstag, 28. Dezember 2013 00:00:00 Technik News
Aktualisiert: Vor 2 Min.
1|2|3|4|5  

Die rechtswissenschaftliche Fakultät der Uni Zürich wagt ein Experiment: Erstsemestrige dürfen ihre Multiple-Choice-Tests am Computer lösen – Zuhause. Selbst Zürcher Professoren halten dies für «absurd».

Im 16. und 17. Jahrhundert begannen Ärzte, den menschlichen Körper mit wissenschaftlichen Methoden zu begreifen. Ihre Briefe beförderten den Eintritt der Medizin in das Zeitalter der Aufklärung.

Seit der Internetriese eine Roboter-Firma gekauft hat, sind die Blechmaschinen mit Innenleben wieder ein heiss diskutiertes Thema. Was ist dran?

Ausbrüche der beiden Weltkriege und der Fall der Berliner Mauer: Im Jahr 2014 Jahr stehen einige wichtige Jahrestage an. Deutschland als einer der Hauptbeteiligten tut sich damit noch schwer.

In der Schweiz haben 100'000 Menschen einen entstellten Körper. Auch Sarah ist betroffen. Ihr Körper ist mit Muttermalen übersät.

Kommt ein Baby mit einem entstellenden Muttermal zur Welt, möchte Kinderchirurg Clemens Schiestl helfen – aber manchmal sind selbst ihm die Hände gebunden.

Michail Kalaschnikow, der Erfinder des legendären Sturmgewehrs, ist tot. Dass seine Schöpfung ein Synonym für Angst, Tod und Schrecken geworden war, störte Kalaschnikow nie.

Sein Gewehr wurde hundert Millionen Mal hergestellt, in der UdSSR galt er als Nationalheld. Nun ist Michail Kalaschnikow, Erfinder der AK-47, im Alter von 94 Jahren gestorben.

Der Basler Jurist Xavier Mertz verlor 1913 bei einer Expedition zum gefrorenen Kontinent sein Leben. Im Vorfeld der waghalsigen Tour haben die Teilnehmer einige fatale Fehler gemacht.

468 Megawatt Leistung werden die 101 Offshore-Windturbinen an der US-Nordostküste bringen. Für Siemens eine Anlage mit «bedeutendem Potenzial».

Eine Studie zeigt, dass Schweizer deutlich weniger schlafen als noch vor 30 Jahren. Das hat gesundheitliche, aber auch finanzielle Konsequenzen.

Für die Berner Forscherin Kathrin Altwegg ist die geplante Kometenlandung der Sonde Rosetta ein grosser Moment. Ein von ihr entwickeltes Messgerät untersucht das Objekt aus Eis und Staub.

Auf der ganzen Länge des Rheins wurden für viel Geld Fischtreppen gebaut. Die nützen allerdings nur in eine Richtung. Auf dem Rückweg werden die Lachse zu Tode gehäckselt.

Tunnelgänge, U-Bahn-Schächte, Abwasserkanäle: Die chaotische Infrastruktur im Untergrund Londons fordert die Ingenieure beim Bau der Bahnlinie Crossrail vom Osten in den Westen heraus.

Der Flug auf den Erdtrabanten ist mit grossen Kosten verbunden. Wie für die Chinesen die Rechnung trotzdem aufgehen soll.

Die europäische Raumfahrtagentur will die Umgebung unseres Sonnensystems präzise Kartografieren und schoss deshalb einen Satelliten ins All. An dem Hochleistungs-Teleskop ist auch die Schweiz beteiligt.

China verweigert die Annahme von 545'000 Tonnen Mais aus den USA. Grund ist der Fund einer gentechnisch veränderten Sorte in der Lieferung.

Die Entdeckung eines erdähnlichen Planeten bringt dem Schweizer Astronomen Michel Mayor grosse Ehre. Die angesehene Fachzeitschrift «Nature» zählt ihn zu den wichtigsten Wissenschaftlern des Jahres 2013.

Der Solarflug-Pionier Bertrand Piccard hat seinen neuesten Test gestartet. Er sitzt nun im Simulator und «fliegt» ohne Pause drei Tage und drei Nächte.

When International CES opens in Las Vegas in early January, a flood of wearable computing devices, including smartwatches, will be on display. The fledgling is tiny compared to that for smartphones, or even wearable devices like Google Glass or smart bands that cater to fitness and health-monitoring needs. Still, the smartwatch phenomenon promises to blossom in 2014 as experts sometime in the fall. Even Microsoft is reportedly working on one. To achieve any degree of greatness, though, these major tech innovators and their smaller competitors must overcome some significant hurdles.

Police in San Francisco have arrested a 16-year old resident of the city on suspicion of murder and attempted robbery after a cellphone theft apparently went wrong earlier this month. The suspect, who was not named because he is a juvenile, was one of a group who approached someone using a cellphone in the street at around 11pm on Saturday, December 14, according to the San Francisco Police Department. One of the suspects demanded the cellphone and another suspect produced a handgun while others were going through the victim’s possessions, the police said. ”The victim offered no resistance and was complying with the robbery suspects demands when the armed suspect shot the robbery victim,” San Francisco police said in a statement. “The shot glanced off the victims face and struck one of the robbery suspects, killing him.”

The techniques used by hackers to shoppers suggests that the cyber crooks have found a troubling new way to stay ahead of the latest fraud detection processes. Security blogger , who first reported the Target data breach news earlier this month, said that compromised cards are being marketed online with information on the state, city, and ZIP code of the Target store where they were used. Fraud experts say the location information will likely allow buyers of the stolen data to use spoofed versions of cards issued to people in their immediate vicinity, Krebs wrote. “This lets crooks who want to use the cards for in-store fraud avoid any knee-jerk fraud defenses in which a financial institution might block transactions that occur outside the legitimate cardholder’s immediate geographic region,” he said. This is believed to be the first time that security experts have observed hyper-localized selling of stolen credit and debit card information following a retail breach.

From an inside look at the technology used at a Major League Baseball game to a detailed breakdown of how you’re likely upsetting your Facebook friends, we put together a lot of videos in 2013. Here are some of our favorite videos to appear on the site. Our . But our favorite part of that video series was easily this look at how technology is used to maintain security inside the ballpark.

It’s a pretty fair bet that, today, many of you are playing with (wearing, riding, or at least enjoying) some toy you got earlier this week. Since I know a few people for whom those toys are video games, this seems like a good time to suggest that—though those games have over the years for being addictive, teaching violence, and leading to a nation of layabouts—they also teach skills necessary to working in high tech. I’m not just making this up as an excuse to Science supports the idea that not only do video games teach worthwhile skills but that they do it as well as other ways of learning things. And, when I say video games, I’m not talking about only learning or “sandbox” games. First-person shooters teach good stuff, too. Studies support gaming skills According to , video games strengthen cognitive skills such as spatial navigation, reasoning, memory, and perception. And this is particularly true for first-person shooters. According to the study's authors, a 2013 meta-analysis found that playing commercially available shooter video games improved a player’s capacity to think about objects in three dimensions better than other kinds of games and just as well as academic courses to enhance these same skills. “Previous research has established the power of spatial skills for achievement in science, technology, engineering, and mathematics,” says Isabela Granic, one of the study’s authors and PhD, of Radboud University Nijmegen in The Netherlands.

Trust in the security industry has taken a blow with that RSA was paid by the U.S. National Security Agency to provide a way to crack its encryption. RSA denies the Reuters published Friday that said the NSA paid RSA $10 million to use a flawed encryption formula. The agency-developed Dual Elliptic Curve Deterministic Random Bit Generator (Dual EC DRBG) was used in RSA’s BSAFE product. The report shook up the security industry, because of RSA’s influence. The company’s annual user conference in San Francisco is one of the largest security events of the year. On Monday, Mikko Hypponen, a widely know security expert, sent a letter to RSA for the 2014 RSA Conference, because of RSA’s dealings with the NSA. In a statement released last week, RSA said, “We categorically deny this allegation.”

The president of the United States says he’s not “allowed” to own an iPhone, which is why he’s . It’s a politically sensitive subject because the founder and CEO Steve Jobs. He’d love to pander to buy-America voters. (Obama is also probably not “allowed” to have an Android phone.) Of course, neither the president nor the Secret Service is willing to say exactly is the unpredictable nature of both iPhone and Android apps. Sure, there’s a lot of flat-out malware flying around online, most of which looks like regular, legitimate apps but in fact are either malware or they compromise privacy or security in some way.

From .

No need to dig through that dusty closet and find your Atari 2600. Play Pacman, Space Invaders, Donkey Kong and more, all from the comfort of your browser.

A federal judge has ruled that the U.S. National Security Agency’s bulk phone record metadata collection efforts are legal, turning aside a lawsuit the American Civil Liberties Union brought against the agency. While the collection program “vacuums up information about virtually every call to, from, or within the United States,” it also allows the NSA to “detect relationship so attenuated and ephemeral they would otherwise escape notice,” Judge William Pauley III wrote in his 54-page decision filed Friday in U.S. District Court for the Southern District of New York. Overall, the metadata collection serves as the U.S. government’s “counter-punch: connecting fragmented and fleeting communications to re-construct and eliminate Al-Qaeda’s terror network,” Pauley wrote. There also is “no evidence that the Government has used any of the bulk telephony metadata it collected for any purpose other than investigating and disrupting terrorist attacks,” he added. “While there have been unintentional violations of guidelines, those appear to stem from human error and the incredibly complex computer programs that support this vital tool.”

Here's a little secret: I can't stand taking my hands off the keyboard. Mice and trackpads are great tools, but they aren't always an ideal (or speedy) solution for navigating the Web. That's where keyboard shortcuts come in. Of course, memorizing a list of keyboard commands can be just as painful as repeatedly shifting your hands from your keyboard to your mouse and back again. So what's a smart PC user to do? My suggestion: Use a small number of keyboard shortcuts and only those that make life easier. Two useful keyboard shortcuts can be yours courtesy of , a browser extension for Chrome that lets you control most of your web browsing from the keyboard. Vimium was inspired by 'vi,' an arcane text editor created at a time when the mouse didn't exist and the only way to navigate a document was with your keyboard. The first thing you'll need to do is download and install Vimium from the .) Once you're all set, open CNN.com or any other website and check out the following shortcuts:

With these games on your phone, you can easily ignore your obnoxious in-laws!

“Touch me,” Windows tablets whisper from the first boot, as gesture-control tutorials and a glittering weave of finger-friendly live tiles dance in front of your eyes. “ me.” While the apps baked into Windows are good starting points, you’ll need to leap head-first into the Windows Store to truly answer that alluring call. Microsoft’s app marketplace may not be quite as flush as its competitors, but still reside in the Windows Store. And frankly, as with any app store, a lot of them are junk. How does a Windows tablet owner know which apps are worth installing? Easy: Read on! Let’s start with apps that highlight the strengths of Windows 8 and Microsoft’s quest to deliver a singular, unified experience across a multitude of devices. Surprise! They all come straight from Microsoft.

Don’t judge D-Link’s DIR-868L by its surprisingly low price tag. At the time of my review, it was street-priced a full $70 lower than the , even though it outperformed its competitor in several of my benchmark tests. Asus has a number of features the D-Link can’t match—but still, that’s a lot of cash. Both routers are dual-band models that deliver throughput up to 450 mbps on their 2.4- and 5GHz 802.11n networks, and up to 1300 mbps on their 5GHz 802.11ac networks. Unlike Asus, D-Link hides the router antennas inside its cylindrical enclosure. D-Link allows you to create a guest networks on both the 2.4- and 5GHz frequency bands, and you may set these networks to be active only during a predetermined schedule. The D-Link DIR-868L is packaged in a visually interesting cylindrical enclosure.  The Asus is the better choice for small businesses, but consumers are unlikely to miss having dual WAN and 3G/4G connectivity options. But like most high-end routers, the DIR-868L does provide VPN, FTP, and SAMBA servers.