Random Post

Saturday, December 27, 2014
no image
Gather around, friends, for another edition of the column that holds up just-announced gadgets to scrutiny, Gadget Dreams and Nightmares. In the stocking for our pre-holidays edition are a smartphone-controlled lock, an inexpensive fitness tracker, a red-hot wearable and much more. While I've looked before at smartphone-enabled door locks, Sony's take on the idea, the Qrio, stands out. Instead of having to remove existing locks to fit these devices, one need only place it over a door's current lock and attach it to the door.


9:58 AM

Gather around, friends, for another edition of the column that holds up just-announced gadgets to scrutiny, Gadget Dreams and Nightmares. ...

Read more »
Friday, December 26, 2014
no image
Vulnerabilities in Signaling System 7, telephony signaling protocols used by carriers worldwide, allow third parties to listen to people's cellphone calls and intercept text messages despite encryption, The Washington Post reported last week. German cybersecurity researchers Tobias Engel of Sternraute and Karsten Nohl of Security Research Labs separately discovered these vulnerabilities. Both will present their findings at the 25th Chaos Communication Congress hacker conference in Hamburg, tentatively scheduled for Dec. 27-30.


6:30 PM

Vulnerabilities in Signaling System 7, telephony signaling protocols used by carriers worldwide, allow third parties to listen to people...

Read more »
no image
Researchers at the University of Twente and the Eindhoven University of Technology have come up with what they claim is an unprecedentedly secure way to authenticate credit cards, IDs, biometrics, and parties involved in quantum cryptography. The method -- quantum-secure authentication of optical keys -- basically consists of sending a beam of light at cards treated with a special paint and using the reflection as the authentication mechanism. It employes coherent states of light with a low mean photon number.


6:39 AM

Researchers at the University of Twente and the Eindhoven University of Technology have come up with what they claim is an unprecedentedly...

Read more »
Wednesday, December 24, 2014
no image
Well the holidays are pretty much upon us at last here in the Linux blogosphere, and there's nowhere left to hide. The next two weeks or so promise little more than a blur of forced social occasions and too-large meals, punctuated only -- for the luckier ones among us -- by occasional respite down at the Broken Windows Lounge. Perhaps that's why Linux bloggers seized with such glee upon the good old-fashioned mystery that came up recently -- delivered in the nick of time, as if on cue.


11:46 AM

Well the holidays are pretty much upon us at last here in the Linux blogosphere, and there's nowhere left to hide. The next two weeks ...

Read more »
Tuesday, December 23, 2014
no image
Gather around, friends, for another edition of the column that holds up just-announced gadgets to scrutiny, Gadget Dreams and Nightmares. In the stocking for our pre-holidays edition are a smartphone-controlled lock, an inexpensive fitness tracker, a red-hot wearable and much more. While I've looked before at smartphone-enabled door locks, Sony's take on the idea, the Qrio, stands out. Instead of having to remove existing locks to fit these devices, one need only place it over a door's current lock and attach it to the door.


9:09 PM

Gather around, friends, for another edition of the column that holds up just-announced gadgets to scrutiny, Gadget Dreams and Nightmares. ...

Read more »
no image
Vulnerabilities in Signaling System 7, telephony signaling protocols used by carriers worldwide, allow third parties to listen to people's cellphone calls and intercept text messages despite encryption, The Washington Post reported last week. German cybersecurity researchers Tobias Engel of Sternraute and Karsten Nohl of Security Research Labs separately discovered these vulnerabilities. Both will present their findings at the 25th Chaos Communication Congress hacker conference in Hamburg, tentatively scheduled for Dec. 27-30.


3:06 PM

Vulnerabilities in Signaling System 7, telephony signaling protocols used by carriers worldwide, allow third parties to listen to people...

Read more »
no image
It is time to look back at 2014, so I'll focus here on a series of stories I thought were interesting but didn't seem to catch much or any real air. Some, like what is really behind Sony's decision to pull The Interview still might take off. Hadoop analytics is one of the most powerful platforms to come to market, and a variety of vendors are providing solutions. However, over the year only one vendor was showcased at event after event, and with major vendor after major vendor, and that was Cloudera.


1:05 PM

It is time to look back at 2014, so I'll focus here on a series of stories I thought were interesting but didn't seem to catch muc...

Read more »
 
Google Analytics Alternative