Random Post

Monday, December 29, 2014
no image
Last week, we looked back at the largely untold, or under told, stories of 2014. This week, let's look ahead to some of the stories that are coming in 2015. We'll have robots, self-driving cars, armed autonomous drones, the professional proliferation of head mounted cameras, some scandals, and some interesting political implications. In 2015, we will begin to talk about the implementation of a number of technologies we saw previewed in 2014 and that will be introduced at CES next week.


7:52 AM

Last week, we looked back at the largely untold, or under told, stories of 2014. This week, let's look ahead to some of the stories th...

Read more »
Saturday, December 27, 2014
no image
Gather around, friends, for another edition of the column that holds up just-announced gadgets to scrutiny, Gadget Dreams and Nightmares. In the stocking for our pre-holidays edition are a smartphone-controlled lock, an inexpensive fitness tracker, a red-hot wearable and much more. While I've looked before at smartphone-enabled door locks, Sony's take on the idea, the Qrio, stands out. Instead of having to remove existing locks to fit these devices, one need only place it over a door's current lock and attach it to the door.


9:58 AM

Gather around, friends, for another edition of the column that holds up just-announced gadgets to scrutiny, Gadget Dreams and Nightmares. ...

Read more »
Friday, December 26, 2014
no image
Vulnerabilities in Signaling System 7, telephony signaling protocols used by carriers worldwide, allow third parties to listen to people's cellphone calls and intercept text messages despite encryption, The Washington Post reported last week. German cybersecurity researchers Tobias Engel of Sternraute and Karsten Nohl of Security Research Labs separately discovered these vulnerabilities. Both will present their findings at the 25th Chaos Communication Congress hacker conference in Hamburg, tentatively scheduled for Dec. 27-30.


6:30 PM

Vulnerabilities in Signaling System 7, telephony signaling protocols used by carriers worldwide, allow third parties to listen to people&#...

Read more »
no image
Researchers at the University of Twente and the Eindhoven University of Technology have come up with what they claim is an unprecedentedly secure way to authenticate credit cards, IDs, biometrics, and parties involved in quantum cryptography. The method -- quantum-secure authentication of optical keys -- basically consists of sending a beam of light at cards treated with a special paint and using the reflection as the authentication mechanism. It employes coherent states of light with a low mean photon number.


6:39 AM

Researchers at the University of Twente and the Eindhoven University of Technology have come up with what they claim is an unprecedentedly...

Read more »
Wednesday, December 24, 2014
no image
Well the holidays are pretty much upon us at last here in the Linux blogosphere, and there's nowhere left to hide. The next two weeks or so promise little more than a blur of forced social occasions and too-large meals, punctuated only -- for the luckier ones among us -- by occasional respite down at the Broken Windows Lounge. Perhaps that's why Linux bloggers seized with such glee upon the good old-fashioned mystery that came up recently -- delivered in the nick of time, as if on cue.


11:46 AM

Well the holidays are pretty much upon us at last here in the Linux blogosphere, and there's nowhere left to hide. The next two weeks ...

Read more »
Tuesday, December 23, 2014
no image
Gather around, friends, for another edition of the column that holds up just-announced gadgets to scrutiny, Gadget Dreams and Nightmares. In the stocking for our pre-holidays edition are a smartphone-controlled lock, an inexpensive fitness tracker, a red-hot wearable and much more. While I've looked before at smartphone-enabled door locks, Sony's take on the idea, the Qrio, stands out. Instead of having to remove existing locks to fit these devices, one need only place it over a door's current lock and attach it to the door.


9:09 PM

Gather around, friends, for another edition of the column that holds up just-announced gadgets to scrutiny, Gadget Dreams and Nightmares. ...

Read more »
no image
Vulnerabilities in Signaling System 7, telephony signaling protocols used by carriers worldwide, allow third parties to listen to people's cellphone calls and intercept text messages despite encryption, The Washington Post reported last week. German cybersecurity researchers Tobias Engel of Sternraute and Karsten Nohl of Security Research Labs separately discovered these vulnerabilities. Both will present their findings at the 25th Chaos Communication Congress hacker conference in Hamburg, tentatively scheduled for Dec. 27-30.


3:06 PM

Vulnerabilities in Signaling System 7, telephony signaling protocols used by carriers worldwide, allow third parties to listen to people&#...

Read more »
 
Google Analytics Alternative