Random Post

Showing posts with label testfinaltechnews. Show all posts
Showing posts with label testfinaltechnews. Show all posts
Monday, December 29, 2014
no image
Last week, we looked back at the largely untold, or under told, stories of 2014. This week, let's look ahead to some of the stories that are coming in 2015. We'll have robots, self-driving cars, armed autonomous drones, the professional proliferation of head mounted cameras, some scandals, and some interesting political implications. In 2015, we will begin to talk about the implementation of a number of technologies we saw previewed in 2014 and that will be introduced at CES next week.


7:52 AM

Last week, we looked back at the largely untold, or under told, stories of 2014. This week, let's look ahead to some of the stories th...

Read more »
Saturday, December 27, 2014
no image
Gather around, friends, for another edition of the column that holds up just-announced gadgets to scrutiny, Gadget Dreams and Nightmares. In the stocking for our pre-holidays edition are a smartphone-controlled lock, an inexpensive fitness tracker, a red-hot wearable and much more. While I've looked before at smartphone-enabled door locks, Sony's take on the idea, the Qrio, stands out. Instead of having to remove existing locks to fit these devices, one need only place it over a door's current lock and attach it to the door.


9:58 AM

Gather around, friends, for another edition of the column that holds up just-announced gadgets to scrutiny, Gadget Dreams and Nightmares. ...

Read more »
Friday, December 26, 2014
no image
Vulnerabilities in Signaling System 7, telephony signaling protocols used by carriers worldwide, allow third parties to listen to people's cellphone calls and intercept text messages despite encryption, The Washington Post reported last week. German cybersecurity researchers Tobias Engel of Sternraute and Karsten Nohl of Security Research Labs separately discovered these vulnerabilities. Both will present their findings at the 25th Chaos Communication Congress hacker conference in Hamburg, tentatively scheduled for Dec. 27-30.


6:30 PM

Vulnerabilities in Signaling System 7, telephony signaling protocols used by carriers worldwide, allow third parties to listen to people...

Read more »
no image
Researchers at the University of Twente and the Eindhoven University of Technology have come up with what they claim is an unprecedentedly secure way to authenticate credit cards, IDs, biometrics, and parties involved in quantum cryptography. The method -- quantum-secure authentication of optical keys -- basically consists of sending a beam of light at cards treated with a special paint and using the reflection as the authentication mechanism. It employes coherent states of light with a low mean photon number.


6:39 AM

Researchers at the University of Twente and the Eindhoven University of Technology have come up with what they claim is an unprecedentedly...

Read more »
Wednesday, December 24, 2014
no image
Well the holidays are pretty much upon us at last here in the Linux blogosphere, and there's nowhere left to hide. The next two weeks or so promise little more than a blur of forced social occasions and too-large meals, punctuated only -- for the luckier ones among us -- by occasional respite down at the Broken Windows Lounge. Perhaps that's why Linux bloggers seized with such glee upon the good old-fashioned mystery that came up recently -- delivered in the nick of time, as if on cue.


11:46 AM

Well the holidays are pretty much upon us at last here in the Linux blogosphere, and there's nowhere left to hide. The next two weeks ...

Read more »
Tuesday, December 23, 2014
no image
Gather around, friends, for another edition of the column that holds up just-announced gadgets to scrutiny, Gadget Dreams and Nightmares. In the stocking for our pre-holidays edition are a smartphone-controlled lock, an inexpensive fitness tracker, a red-hot wearable and much more. While I've looked before at smartphone-enabled door locks, Sony's take on the idea, the Qrio, stands out. Instead of having to remove existing locks to fit these devices, one need only place it over a door's current lock and attach it to the door.


9:09 PM

Gather around, friends, for another edition of the column that holds up just-announced gadgets to scrutiny, Gadget Dreams and Nightmares. ...

Read more »
no image
Vulnerabilities in Signaling System 7, telephony signaling protocols used by carriers worldwide, allow third parties to listen to people's cellphone calls and intercept text messages despite encryption, The Washington Post reported last week. German cybersecurity researchers Tobias Engel of Sternraute and Karsten Nohl of Security Research Labs separately discovered these vulnerabilities. Both will present their findings at the 25th Chaos Communication Congress hacker conference in Hamburg, tentatively scheduled for Dec. 27-30.


3:06 PM

Vulnerabilities in Signaling System 7, telephony signaling protocols used by carriers worldwide, allow third parties to listen to people...

Read more »
no image
It is time to look back at 2014, so I'll focus here on a series of stories I thought were interesting but didn't seem to catch much or any real air. Some, like what is really behind Sony's decision to pull The Interview still might take off. Hadoop analytics is one of the most powerful platforms to come to market, and a variety of vendors are providing solutions. However, over the year only one vendor was showcased at event after event, and with major vendor after major vendor, and that was Cloudera.


1:05 PM

It is time to look back at 2014, so I'll focus here on a series of stories I thought were interesting but didn't seem to catch muc...

Read more »
Monday, December 22, 2014
no image
Well the holidays are pretty much upon us at last here in the Linux blogosphere, and there's nowhere left to hide. The next two weeks or so promise little more than a blur of forced social occasions and too-large meals, punctuated only -- for the luckier ones among us -- by occasional respite down at the Broken Windows Lounge. Perhaps that's why Linux bloggers seized with such glee upon the good old-fashioned mystery that came up recently -- delivered in the nick of time, as if on cue.


7:08 PM

Well the holidays are pretty much upon us at last here in the Linux blogosphere, and there's nowhere left to hide. The next two weeks ...

Read more »
no image
The end of the year is a natural time to look back -- and then forward to the year to come. Apple started 2014 slowly but more than made up for it in the long haul, introducing the Apple Watch, Apple Pay, Mac OS X Yosemite, iOS 8, an iPad Air 2 with a super-fast processor, the massively selling iPhone 6, the iPhone 6 Plus, and a luscious iMac with a 5K Retina screen, which, it turns out, is priced less than some 4K monitors. Gushing adjectives aside, what is truly interesting or groundbreaking? What is going to be meaningful in 2015 and beyond?


3:14 PM

The end of the year is a natural time to look back -- and then forward to the year to come. Apple started 2014 slowly but more than made u...

Read more »
no image
Gather around, friends, for another edition of the column that holds up just-announced gadgets to scrutiny, Gadget Dreams and Nightmares. In the stocking for our pre-holidays edition are a smartphone-controlled lock, an inexpensive fitness tracker, a red-hot wearable and much more. While I've looked before at smartphone-enabled door locks, Sony's take on the idea, the Qrio, stands out. Instead of having to remove existing locks to fit these devices, one need only place it over a door's current lock and attach it to the door.


1:08 PM

Gather around, friends, for another edition of the column that holds up just-announced gadgets to scrutiny, Gadget Dreams and Nightmares. ...

Read more »
no image
It is time to look back at 2014, so I'll focus here on a series of stories I thought were interesting but didn't seem to catch much or any real air. Some, like what is really behind Sony's decision to pull The Interview still might take off. Hadoop analytics is one of the most powerful platforms to come to market, and a variety of vendors are providing solutions. However, over the year only one vendor was showcased at event after event, and with major vendor after major vendor, and that was Cloudera.


7:48 AM

It is time to look back at 2014, so I'll focus here on a series of stories I thought were interesting but didn't seem to catch muc...

Read more »
Sunday, December 21, 2014
no image
Department of Homeland Security Secretary Jeh Johnson on Thursday said the United States "is actively considering a range of options" to take in response to the Sony hack. The hack is "very serious," Johnson said, though he refused to label it as a terrorist attack. Although there has been widespread suspicion that North Korea engineered the hack, Johnson said the U.S. is "at this point ... not prepared to officially say who we believe was behind this attack." The FBI is investigating.


9:32 PM

Department of Homeland Security Secretary Jeh Johnson on Thursday said the United States "is actively considering a range of options...

Read more »
Friday, December 19, 2014
no image
The end of the year is a natural time to look back -- and then forward to the year to come. Apple started 2014 slowly but more than made up for it in the long haul, introducing the Apple Watch, Apple Pay, Mac OS X Yosemite, iOS 8, an iPad Air 2 with a super-fast processor, the massively selling iPhone 6, the iPhone 6 Plus, and a luscious iMac with a 5K Retina screen, which, it turns out, is priced less than some 4K monitors. Gushing adjectives aside, what is truly interesting or groundbreaking? What is going to be meaningful in 2015 and beyond?


5:55 PM

The end of the year is a natural time to look back -- and then forward to the year to come. Apple started 2014 slowly but more than made u...

Read more »
no image
The Open Invention Network, or OIN, is waging a global campaign to keep Linux out of harm's way in patent litigation. Its efforts have resulted in more than 1,000 companies joining forces to become the largest defense patent management organization in history. The Open Invention Network was created in 2005 as a white hat organization to protect Linux from license assaults. It has considerable financial backing from original board members that include Google, IBM, NEC, Novell, Philips, Red Hat and Sony.


3:50 PM

The Open Invention Network, or OIN, is waging a global campaign to keep Linux out of harm's way in patent litigation. Its efforts have...

Read more »
no image
Department of Homeland Security Secretary Jeh Johnson on Thursday said the United States "is actively considering a range of options" to take in response to the Sony hack. The hack is "very serious," Johnson said, though he refused to label it as a terrorist attack. Although there has been widespread suspicion that North Korea engineered the hack, Johnson said the U.S. is "at this point ... not prepared to officially say who we believe was behind this attack." The FBI is investigating.


7:43 AM

Department of Homeland Security Secretary Jeh Johnson on Thursday said the United States "is actively considering a range of options...

Read more »
Thursday, December 18, 2014
no image
Docker has moved from an obscure Linux project to one of the most popular open source technologies in cloud computing. Project developers have witnessed millions of Docker Engine downloads. Hundreds of Docker groups have formed in 40 countries. Many more companies are announcing Docker integration. Even Microsoft will ship Windows 10 with Docker preinstalled. "That caught a lot of people by surprise," said Docker founder and CTO Solomon Hykes. Docker is an open platform for building, shipping and running distributed applications.


8:06 PM

Docker has moved from an obscure Linux project to one of the most popular open source technologies in cloud computing. Project developers ...

Read more »
no image

4:52 PM

Corruption in the American Hollywood style is something to behold. Today, Google published a short blog post alleging that the Motion Pictur...

Read more »
no image
Mojang has partnered with Telltale Games to create a brand new Minecraft game that will be narrative-driven. Dubbed "Minecraft: Story Mode," the series will be set in the world of Minecraft, but it will feature an original story that combines new characters with familiar themes and is driven by player choice. It will be a separate standalone product. "We're not intending on creating an 'official' story for Steve, or explaining the world of Minecraft in detail," said Mojang spokesperson Owen Hill. "It will be a cool game."


4:51 PM

Mojang has partnered with Telltale Games to create a brand new Minecraft game that will be narrative-driven. Dubbed "Minecraft: Story...

Read more »
no image
Privacy's future appears muddy at best, judging from a survey released Thursday by the Pew Research Center and Elon University's Imagining the Internet Center. More than 2,500 Internet experts and analysts were narrowly divided on whether policy makers and technology innovators would create a secure, popularly accepted and trusted privacy-rights infrastructure by 2025. Fifty-five percent didn't believe a structure to protect privacy would be in place; 45 percent believed such a structure would be created.


2:14 PM

Privacy's future appears muddy at best, judging from a survey released Thursday by the Pew Research Center and Elon University's I...

Read more »
 
Google Analytics Alternative