Free Republic 4th Quarter Fundraising Target: $85,000 Receipts & Pledges to-date: $69,292
81%  
Woo hoo!! And now less than $16k to go!! We can do this. Thank you all very much!!

Keyword: computers

Brevity: Headers | « Text »
  • Intel to merge struggling mobile chip unit into its PC chip business

    11/22/2014 11:44:17 AM PST · by Ernest_at_the_Beach · 14 replies
    hexus.net ^ | 18 November 2014, 11:05 | by Mark Tyson
    Intel CEO Brain Krzanich has announced, in an email sent to employees on Monday, new company plans to merge its loss-making mobile chip unit with its profitable PC business early next year, writes the Wall Street Journal. "The market continues to evolve rapidly, and we must change even faster to stay ahead," Krzanich asserted in the email. It is well known that Intel has struggled to gain a foothold in mobile computing, but even worse for the business its tablet and smartphone chip-making division has lost billions in the recent months. Intel's mobile communication group posted a $1 billion operating...
  • Now e-cigarettes can give you malware

    11/21/2014 3:40:53 PM PST · by upchuck · 20 replies
    Guardian ^ | Nov 21, 2014 | Alex Hern
    E-cigarettes may be better for your health than normal ones, but spare a thought for your poor computer – electronic cigarettes have become the latest vector for malicious software, according to online reports. Many e-cigarettes can be charged over USB, either with a special cable, or by plugging the cigarette itself directly into a USB port. That might be a USB port plugged into a wall socket or the port on a computer – but, if so, that means that a cheap e-cigarette from an untrustworthy supplier gains physical access to a device. A report on social news site Reddit...
  • State Dept computers hacked, email shut down

    11/16/2014 8:37:34 PM PST · by Ernest_at_the_Beach · 15 replies
    AP ^ | Nov 16, 3:40 PM EST | By MATTHEW LEE AP Diplomatic Writer
    WASHINGTON (AP) -- The State Department has taken the unprecedented step of shutting down its entire unclassified email system as technicians repair possible damage from a suspected hacker attack.
  • The man who can hear Wi-Fi wherever he walks [hearing aids]

    11/14/2014 11:01:04 AM PST · by BenLurkin · 17 replies
    newscientist.com ^ | 12 November 2014 | by Frank Swain
    I am walking through my north London neighbourhood on an unseasonably warm day in late autumn. I can hear birds tweeting in the trees, traffic prowling the back roads, children playing in gardens and Wi-Fi leaching from their homes. Against the familiar sounds of suburban life, it is somehow incongruous and appropriate at the same time. As I approach Turnpike Lane tube station and descend to the underground platform, I catch the now familiar gurgle of the public Wi-Fi hub, as well as the staff network beside it. On board the train, these sounds fade into silence as we burrow...
  • Can someone explain, in plain English, what 'NET NEUTRALITY' means?

    11/13/2014 6:04:17 AM PST · by maineman · 93 replies
    11/13/2014 | maineman
    I've researched the heck out of this BUT still don't get it. Just looking for a simple explanation for a simple man.
  • Man embeds computer chips in hands to store Bitcoin [Mark of the Beast?]

    11/11/2014 6:44:51 AM PST · by Red Badger · 31 replies
    www.telegraph.co.uk ^ | 3:41PM GMT 10 Nov 2014 | By Matthew Sparkes, Deputy Head of Technology
    By implanting 12mm glass computer chips in his flesh Martijn Wismeijer has been able to store Bitcoins inside his body, create a personalised alarm clock and will even be able to install keyless doors in his home. But how painful is the injection? A Dutch entrepreneur has had two wireless computer chips implanted under the skin in his hands to allow him to store digital currencies like Bitcoin inside his body. Martijn Wismeijer is the founder of Mr Bitcoin, a company which installs and operates crypto-currency cash machines in and around his native Amsterdam and across Europe. This month he...
  • Microsoft's CEO Gave Us The Clearest Vision For The Company We've Had In Years

    11/10/2014 8:50:35 AM PST · by SeekAndFind · 3 replies
    Business Insider ^ | 11/10/2014 | Steve Kovach
    Over the last few years, it’s been tough to pinpoint what Microsoft’s focus is. In 2012, then-CEO Steve Ballmer wrote an open letter to shareholders labeling Microsoft as a “devices and services” company. It was a signal that Microsoft would not only make the software that people use, but the devices that software runs on. That’s a very Apple-like philosophy, but one that hasn’t paid off for Microsoft as we’ve seen with its Surface line of tablets and acquisition of Nokia. The narrative shifted when Satya Nadella took over as CEO in April. Hardware took a backseat to what he...
  • This 3D Printer Is Made Out of a Floppy Disk Drive and Other E-Waste

    11/06/2014 12:57:12 PM PST · by 2ndDivisionVet · 5 replies
    Kinja's Gizmodo ^ | November 5, 2014 | Kelsey Campbell-Dollaghan
    When was the last time you used your computer's disc drive? What about your DVD player? E-waste is all around us, but as the brilliant Instructables user behind this $60 3D printer proves, there's plenty to be done with it—if you've got some engineering chops. Last week we wrote about the world's smallest 3D printer, which costs less than $300 and prints resin. But an Instructables user named Mikelllc has gone way further, uploading his designs for a 3D printer made from 80 percent recycled e-waste and costing roughly $60. Part of the idea, he writes, is to "help us...
  • What will life be like in 2064?

    11/03/2014 10:12:27 PM PST · by 2ndDivisionVet · 44 replies
    World Economic Forum ^ | October 8, 2014 | Martin Sorrell
    That an octopus called Paul had a better success rate than Goldman Sachs when predicting World Cup results (credit to the Wall Street Journal for the headline “Octopus Beats Vampire Squid”) tells you something about the wisdom of guessing the future in public. Guessing what the world will look like in 50 years’ time, however, is pretty safe, as I won’t be here to see myself proved wrong. Or will I? If Google’s director of engineering has his way, we’ll all be around indefinitely – in the cloud at least. AI (artificial intelligence) guru Ray Kurzweil is one of a...
  • The highly sophisticated hacking of Sharyl Attkisson's computers

    10/28/2014 6:06:07 AM PDT · by Former Proud Canadian · 62 replies
    Fox News ^ | October 28, 2014 | Howard Kurtz
    From the moment that Sharyl Attkisson met a shadowy source I’ll call Big Mac, she was plunged into a nightmare involving mysterious surveillance of her computers. They met at a McDonald’s in Northern Virginia at the beginning of 2013, and the source (she dubs him Number One) warned her about the threat of government spying. During their next hamburger rendezvous, Big Mac told Attkisson, then a CBS News reporter constantly at odds with the Obama administration, that he was “shocked” and “flabbergasted” by his examination of her computer and that this was “worse than anything Nixon ever did.” Attkisson’s forthcoming...
  • Retailers are disabling NFC readers to shut out Apple Pay

    10/26/2014 3:20:18 PM PDT · by ImJustAnotherOkie · 85 replies
    The Verge ^ | October 25, 2014 01:09 pm | By Dante D'Orazio
    There's a lot of hype around Apple Pay right now, but not everyone is on board with the new mobile payments system. In fact, a significant number of merchants, including heavyweights like Walmart, Kmart, 7-Eleven, and Best Buy, are in outright competition with Apple Pay. The retailers, through a joint venture formed in 2012, are building their own mobile payment app, called CurrentC. It's expected to launch next year. In the meantime, these retailers have no intention to support Apple Pay. Following Apple's announcement last month, both Wal-Mart and Best Buy confirmed to The Wall Street Journal that customers would...
  • Any Freeper IT independent consultants?

    10/25/2014 4:58:03 PM PDT · by taxcontrol · 30 replies
    None ^ | 25 Oct 2014 | Self
    So my company had a downsize / RIF / layoff and my group got hit. Sad news but hey, it happens. Now I am looking at being an independent IT consultant. Since I have always been an employee, I was wondering if there were any words of wisdom from the Freeper community.
  • Undetectable, Unpatchable USB-infecting malware is now publically available for anyone to use

    10/25/2014 10:35:47 AM PDT · by null and void · 11 replies
    Electronic Products ^ | Max Teodorescu
    Security experts prove it’s possible to infect USB sticks’ MCU Next time you find a foreign USB lying around, think twice before plugging it into your computer. A pair of security researchers named Karsten Nohl and Jakob Lell demonstrated before an audience at Black hat security conference in Las Vegas a fundamental flaw in USB firmware could be exploited to create an undetected malware that cannot be patched. Realizing the kind of power they were dealing with, the pair opted to keep the code secret – until fellow colleagues decided to post it publically on Github. Two other researchers –...
  • China-backed hackers may have infiltrated Apple's iCloud

    10/20/2014 7:36:36 PM PDT · by Citizen Zed · 17 replies
    Yahoo / Reuters ^ | 10-21-2014
    Apple Inc's iCloud storage and backup service in China was attacked by hackers trying to steal user credentials, a Chinese web monitoring group said, adding that it believes the country's government is behind the campaign. Using a method called a "man-in-the-middle" (MITM) attack, unknown hackers interposed their own website between users and Apple's iCloud server, intercepting data and potentially gaining access to passwords, iMessages, photos and contacts, Greatfire.org wrote in its blog post. Greatfire.org, a group that conducts research on Chinese Internet censorship, alleged government involvement in the attack, saying it resembled previous attacks on Google Inc, Yahoo Inc and...
  • The beginning of the people's Web: 20 years of Netscape

    10/17/2014 5:03:18 PM PDT · by sopwith · 31 replies
    ZDNET ^ | October 14, 2014 | By Steven J. Vaughan-Nichols
    I was the first writer to cover the Web for a popular audience, and it did prove popular. I mean, it must have had hundreds of thousands of users in 1993! Today, Facebook alone has over a billion users. What's Hot on ZDNet Apple releases OS X Yosemite for Mac for free; iWork updated iOS 8.1 available October 20 for iPhones, iPads Apple Pay ready for lift-off and Google 'trying to get it right' Microsoft to 'Connect' with developers at November event in New York You see the problem was that it was really, really hard to use the Web...
  • Sears says Kmart stores targeted in malware attack

    10/10/2014 5:13:21 PM PDT · by John W · 28 replies
    cnbc.com ^ | October 10, 2014 | rma Allen
    Sears Holdings Corp. said Friday that its Kmart stores were hit with a data breach that compromised some shoppers' debit and credit card information. The company is working with federal authorities and security experts to investigate the matter. The Secret Service confirmed Friday evening that it is investigating the data breach. The investigation indicates that the breach occurred in early September and did not affect kmart.com customers, the statement said.
  • Hackers Have Found A Flaw In Macs And Are Using It To Control 17,000 Apple Computers ... Via Reddit

    10/03/2014 8:06:46 AM PDT · by SeekAndFind · 57 replies
    Business Insider ^ | 10/03/2014 | James Cook
    Criminals have discovered a flaw in OS X, the Mac operating system, and are using it to control thousands of Apple computers around the world. The Russian security company Dr. Web first discovered the software, known as "Mac.BackDoor.iWorm." We don't yet know how the software spreads, but Dr. Web has released information on the clever way it connects to the criminals who control the program. When a Mac is infected with Mac.BackDoor.iWorm, the program tries to make a connection to a command server. The iWorm reportedly uses Reddit's search function to find comments left by the criminals in a Minecraft...
  • Microsoft event to talk about fresh-start Windows 9

    09/26/2014 1:20:14 PM PDT · by Red Badger · 81 replies
    PHYS.ORG ^ | 09-26-2014 | by Nancy Owano
    Microsoft is about to introduce Windows 9 next week at an event, ahead of its widespread release in 2015. The project for the next Windows operating system has been given the internal code name as Threshold. Microsoft watchers have noted that the next OS could indeed be a needed threshold move to win back business users who were put off by Windows 8 because of its tiles-based interface instead of the start menu they had relied on in Windows 7 and older Windows versions. The frustration was palpable last year, and one example was a posting in Micro Doctor, a...
  • The Bash Bug Could be a “Joe Biden-sized” Problem – Part 1

    09/26/2014 12:01:55 PM PDT · by lifeofgrace · 11 replies
    Charting Course ^ | 8/26/14 | Steve Berman
    Unless you’re a real-life version of Sheldon Cooper, a computer security professional, or, like me, work in the online payment industry, you probably don’t keep up with the latest computer vulnerabilities.  A new one that’s hit the web news like a tsunami in the last 72 hours is simply called “the bash bug” (sometimes called “shellshock”).  Everyone from Time, to Vox*, to tech site C|Net has covered this story. I am not going to get technical here.  You can read any of the above-mentioned articles which provide plenty of detail on that.  To summarize the problem:  a 25-year-old program that’s...
  • Remote exploit vulnerability in bash CVE-2014-6271

    09/25/2014 10:47:12 AM PDT · by zeugma · 26 replies
    CSOonline ^ | Sep 24, 2014 | Dave Lewis
    A remotely exploitable vulnerability has been discovered by Stephane Chazelas in bash on Linux and it is unpleasant. The vulnerability has the CVE identifier CVE-2014-6271 and has been given the name Shellshock by some. This affects Debian as well as other Linux distributions. You will need to patch ASAP. Bash supports exporting shell variables as well as shell functions to other bash instances. This is accomplished through the process environment to a child process.  The major attack vectors that have been identified in this case are HTTP requests and CGI scripts.  From Akamai:  Akamai has validated the existence of the vulnerability...
  • How to choose the right Linux distro

    09/25/2014 8:14:50 AM PDT · by ShadowAce · 21 replies
    Network World ^ | 24 September 2014 | Paul Venezia
    Credit: Thinkstock RHEL/CentOS, Fedora, Ubuntu, Debian, and OpenSuse have far more similarities than differences, but choosing the wrong one for the job can make life much harder Unlike most other desktop and server operating systems, Linux comes in a wide variety of flavors, each based on a common core of the Linux kernel and various GNU user space utilities. If you're running Linux servers -- or Linux desktops, for that matter -- you should understand the important differences and be discerning about which flavor of Linux is best suited to any given situation. This article will help you do...
  • Okay, Bloomberg is a big fat socialist RINO. What is Bloomberg Media?

    09/22/2014 7:17:32 PM PDT · by HiTech RedNeck · 25 replies
    Sept 22, 2014 | HiTech RedNeck
    Well, the HiTech RedNeck is looking for a job... AGAIN. This job hopping is getting old, but the boss of the group, at a major freight railroad, for which I'm a contractor has an integrity problem, to put it delicately. For some reason, I don't get along very well with liars and phonies. Well, I refreshed my resumes on Dice and Monster this past weekend and crossed my fingers. Well this morning what do I behold, but someone wants to know if I am interested in working for a company that turns out to be BLOOMBERG MEDIA. They are quoting...
  • Waiting on 20nm graphics cards from Nvidia and AMD? Don’t bother.

    09/21/2014 12:12:52 PM PDT · by Ernest_at_the_Beach · 11 replies
    techsoda.com ^ | March 8, 2014 | Jim Dotcom
    Billions of dollars are spent every year on shrinking the size of transistors, for good reason.Smaller transistors have superior performance characteristics but the main reason for the shrink is because the smaller the transistors are, the more you can squeeze into a chip.  That means you can get better performance from smaller chips, allowing you to squeeze more chips on to the same wafer – and the more chips on a wafer, the more money you make per wafer.Take this example of a 40nm wafer and a (more advanced) 28nm wafer:The left wafer (40nm transistors) has chips of 150mm^2,...
  • GamerGate And Why It Matters To Conservatives

    09/10/2014 1:53:53 PM PDT · by 2ndDivisionVet · 67 replies
    The Other McCain ^ | September 10, 2014 | Robert Stacy McCain
    <p>I don’t think it’s an exaggeration to say that with regard to entertainment, conservatives and libertarians find science fiction and videogaming to be the most attractive options offered by pop culture these days, mainly because there’s a lot of SF that doesn’t try and stuff political correctness and half-baked socialist egalitarianism up our snouts. The same goes for videogames, which are mostly about killing bad guys and/or solving puzzles.</p>
  • Non-volatile memory improves energy efficiency by two orders of magnitude

    09/03/2014 11:38:25 AM PDT · by Red Badger · 16 replies
    Phys.Org ^ | 03 Sep 2014 | by Lisa Zyga
    (Phys.org) —By using voltage-generated stress to switch between two magnetic states, researchers have designed a new non-volatile memory with extremely high energy efficiency—about two orders of magnitude higher than that of the previous most efficient non-volatile memories. The engineers, Ayan K. Biswas, Professor Supriyo Bandyopadhyay, and Professor Jayasimha Atulasimha at Virginia Commonwealth University in Richmond, Virginia, have published their paper on the proposed non-volatile memory in a recent issue of Applied Physics Letters. "We are excited that we have been able to come up with the idea of a strain-switched memory element capable of 180° switching using a simple geometric...
  • Basic Mechanisms of a Fire Control Computer (1950's Navy Training Film)

    08/30/2014 8:53:14 PM PDT · by DemforBush · 41 replies
    youtube ^ | n/a | n/a
    A pretty neat little film about the various parts of the mechanical fire control computers of those days, and how they are applied to real-life gunnery issues.
  • Gov't warns US retailers about hacking software

    08/22/2014 7:32:21 PM PDT · by markomalley · 13 replies
    AP ^ | 8/22/2014 | ALICIA A. CALDWELL and JEFF HORWITZ
    More than 1,000 U.S. retailers could be infected with malicious software lurking in their cash register computers, allowing hackers to steal customer financial data, the Homeland Security Department said Friday. The government urged businesses of all sizes to scan their point-of-sale systems for software known as "Backoff," discovered last October. It previously explained in detail how the software operates and how retailers could find and remove it. Earlier this month, United Parcel Service said it found infected computers in 51 stores. UPS said it was not aware of any fraud that resulted from the infection but said hackers may have...
  • Apple begins storing users' personal data on servers in China

    08/16/2014 7:08:33 AM PDT · by Innovative · 60 replies
    Reuters ^ | Aug 16, 2014 | Gerry Shih and Paul Carsten
    Apple Inc (AAPL.O) has begun keeping the personal data of some Chinese users on servers in mainland China, marking the first time the tech giant is storing user data on Chinese soil. The storage of user data in China represents a departure from the policies of some technology companies, notably Google Inc (GOOGL.O), which has long refused to build data centers in China due to censorship and privacy concerns. Apple said the move was part of an effort to improve the speed and reliability of its iCloud service, which lets users store pictures, e-mail and other data. Positioning data centers...
  • Many home routers supplied by ISPs can be compromised en masse, researchers say

    08/11/2014 9:36:34 PM PDT · by Utilizer · 44 replies
    CSO ^ | 10 August, 2014 23:33 | Lucian Constantin (IDG News Service)
    Specialized servers used by many ISPs to manage routers and other gateway devices provisioned to their customers are accessible from the Internet and can easily be taken over by attackers, researchers warn. By gaining access to such servers, hackers or intelligence agencies could potentially compromise millions of routers and implicitly the home networks they serve, said Shahar Tal, a security researcher at Check Point Software Technologies. Tal gave a presentation Saturday at the DefCon security conference in Las Vegas. At the core of the problem is an increasingly used protocol known as TR-069 or CWMP (customer-premises equipment wide area network...
  • How to Use Your Cat to Hack Your Neighbor’s Wi-Fi

    08/10/2014 8:37:05 AM PDT · by Utilizer · 55 replies
    W I R E D ^ | 08.08.14 6:30 am | By Andy Greenberg
    How to Use Your Cat to Hack Your Neighbor’s Wi-Fi It appears that wired.com cannot be posted per their copyright complaint. Ignore the clickable link, it only points back to the FR index page... The link has more info... and a few pics. :) http://www.wired.com/2014/08/how-to-use-your-cat-to-hack-your-neighbors-wi-fi/
  • IBM develops a computer chip with one million 'neurons' that 'functions like a human brain'

    08/10/2014 1:36:31 AM PDT · by 2ndDivisionVet · 28 replies
    The London Daily Mail ^ | August 8, 2014 | Daniel Bates
    * TrueNorth is being hailed as the world’s first neurosynaptic computer chip because it can figure things out on its own * Modern processors have 1.4 bn transistors and consume up to 140 watts but the IBM chip contains 5.4 bn transistors and uses just 70 milliwatts * Richard Doherty, the research director of tech research firm Envisioneering Group, hailed IBM's chip as a ‘really big deal’IBM has developed a computer chip which it says will function like a human brain in a giant step forward for artificial intelligence. TrueNorth is being hailed as the world’s first neurosynaptic computer chip...
  • Man Posed as Microsoft Employee in Fraudulent Phone Call

    08/03/2014 8:00:43 PM PDT · by nickcarraway · 34 replies
    NBC Bay Area ^ | Saturday, Aug 2, 2014
    a South San Francisco resident received a phone call from a man fraudulently posing as a Microsoft Windows employee and asking for personal information on Wednesday, according to police. The suspect, calling himself Mike Johnson, told the resident that her computer had been compromised by a hacker and that he needed access to her computer to conduct a diagnosis. The victim did not provide any personal information to the suspect, according to police. Microsoft said that they do not contact their customers over the phone, nor do they have any records of anyone from the company calling the victim. The...
  • Remote Desktop won't work on one computer

    07/28/2014 7:24:07 PM PDT · by chuckles · 48 replies
    vanity | 7/28/2014 | chuckles
    I'm trying to get Remote Desktop on my home network to work. I have 2 desktops and 2 laptops. One desktop is my main box and I have 4 screens and use it to serve media to my TV over a web box. I have 6 drives on it and it needs lots of maintenance. I can remote each laptop and the other desktop from each other, but I can't access my main box from anywhere. I've done all the help fixes, but no joy yet. I can even access the laptops and other box from my main desktop, but...
  • 11 sure signs you've been hacked

    07/27/2014 9:47:12 AM PDT · by TwelveOfTwenty · 9 replies
    CSO Online ^ | Nov 4, 2013 7:00 AM | Roger A. Grimes
    Here are 11 sure signs you've been hacked and what to do in the event of compromise. Note that in all cases, the No. 1 recommendation is to completely restore your system to a known good state before proceeding. In the early days, this meant formatting the computer and restoring all programs and data. Today, depending on your operating system, it might simply mean clicking on a Restore button. Either way, a compromised computer can never be fully trusted again. The recovery steps listed in each category below are the recommendations to follow if you don't want to do a...
  • Day 8: IRS still can't find Lerner's hard drive

    07/19/2014 2:33:06 PM PDT · by TWhiteBear · 49 replies
    wnd ^ | July 18, 2014 | Garth Kant
    The IRS can’t say with certainty what happened to the computer hard drive used by Lois Lerner, or exactly where it is now.. On July 11, Judge Reggie Walton ordered the agency to find out what had happened to the hard drive... Manning said Lerner’s hard drive was then “delivered to the IRS Criminal Investigation Division Electronic Crimes Forensic Laboratory for additional efforts to recover data from the malfunctioning hard drive.. testimony revealed another bizarre turn in the saga: The technician, or, specialist, who tried to recover the data from Lerner’s hard drive on that June day in 2011 may...
  • IRS gives full account of lost Lerner emails

    07/19/2014 10:41:07 AM PDT · by Innovative · 90 replies
    Politico ^ | July 18, 2014 | Rachael Bade
    The IRS declared under oath and penalty of perjury on Friday that Lois Lerner’s hard drive is irrecoverable after being wiped clean by tech staff and recycled with an outside contractor, according to a court filing.
  • The CHERI capability model: Revisiting RISC in an age of risk (ISCA 2014)

    07/16/2014 7:12:18 AM PDT · by zeugma · 4 replies
    Light Blue Touchpaper ^ | 7/3/14 | Robert N. M. Watson
    The CHERI capability model: Revisiting RISC in an age of risk (ISCA 2014) 2014-07-03 Academic papers, Open-source security, Operating systems, Processors, Programmable logicRobert N. M. Watson Last week, Jonathan Woodruff presented our joint paper on the CHERI memory model, The CHERI capability model: Revisiting RISC in an age of risk, at the 2014 International Symposium on Computer Architecture (ISCA) in Minneapolis (video, slides). This is our first full paper on Capability Hardware Enhanced RISC Instructions (CHERI), collaborative work between Simon Moore’s and my team composed of members of the Security, Computer Architecture, and Systems Research Groups at the University of Cambridge...
  • Pittsburgh FBI cyber expert is ex-discount furniture salesman

    07/13/2014 10:07:18 PM PDT · by Citizen Zed · 13 replies
    trib live ^ | 7-13-2014
    “I was in private industry beforehand. But I've kind of always liked computers,” Mularski said during a recent interview. All 56 FBI field offices have cyber squads. Mularski chose Pittsburgh largely because of family considerations — he grew up in suburban White Oak, the son of a steelworker. “It kind of looked like cyber was the wave of the future,” Mularski said. “The majority of all my computer training was just on-the-job training at the bureau.” It has proved remarkably effective. Even before the Chinese and Russian cases made worldwide headlines, Mularski was making cyber waves. He infiltrated Dark Market...
  • The 10 Most In-Demand Software Skills

    07/02/2014 9:19:35 AM PDT · by SeekAndFind · 46 replies
    CIO Insight ^ | 07/02/2014 | By Karen A. Frenkel
    The current job market has been very good for software developers, especially those with experience in several programming languages. The unemployment rate for software developers was 2.8 percent in Q1 of 2014, according to the Bureau of Labor Statistics. This is a notable drop from the 5 percent unemployment rate in Q2 of 2009, the quarter when the economic recession ended, and 5.5 percent in Q1 2010. This quarter's report by Dice.com reveals the most-requested skills and platforms, and notes that those with expertise in clusters of language skills are in demand. Furthermore, the Dice report looks at what skills may...
  • Russian government dumps Intel and AMD in favor of homemade processors

    06/23/2014 8:38:15 PM PDT · by wetphoenix · 84 replies
    engadget ^ | Sharif Sakr
    Russia's policy on Western technology is clear: The country can live without it, especially if key issues like economic sanctions, NSA spying and GPS cooperation aren't resolved to its leader's satisfaction. It looks like this tough stance extends to US-designed computer chips too, as a Russian business newspaper is reporting that state departments and state-run companies will no longer purchase PCs built around Intel or AMD processors. Instead, starting in 2015, the government will order up to one million devices annually based on the "Baikal" processor, which is manufactured by a domestic company called T-Platforms.
  • The Ambitious Plan to Teach 100,000 Poor Kids to Code (Guess who's in charge of it?)

    06/19/2014 8:04:57 PM PDT · by 2ndDivisionVet · 79 replies
    Time ^ | June 19, 2014 | Denver Nicks
    #YesWeCode looks to close the coding inequality gap Shortly after Trayvon Martin was shot and killed in February 2012, liberal activist Van Jones was talking with his friend Prince—yes, that Prince—about the circumstances of the shooting. More “I think he made the observation,” Jones told TIME, “that when African-American young people wear hoodies people think they’re thugs, but when white kids wear hoodies you assume that they’re going to be dot-com billionaires,” a reference to the outerwear favored by Facebook founder Mark Zuckerberg and his ilk. “We just started thinking: ‘Well, how do we turn that around?’” Out of that...
  • Emails of six other prominent IRS officials have also gone missing

    06/17/2014 7:54:52 AM PDT · by ConservativeMan55 · 121 replies
    Shannon Bream (Fox) ^ | 6/17/14 | Shannon Bream
    URGENT per Fox's @ChadPergram - "Fox has also learned that the emails of six other prominent IRS officials have also gone missing."
  • This IT worker had to train an H-1B replacement (Bring back American jobs!)

    06/16/2014 7:06:58 AM PDT · by Cringing Negativism Network · 30 replies
    Computerworld ^ | June 10, 2014 03:10 PM ET | Patrick Thibodeau
    U.S. workers protested job losses to foreign workers by displaying American flags in their cubicles
  • HP Will Bet the Company on a Combination of Memristors and Silicon Photonics

    06/13/2014 2:28:36 PM PDT · by Red Badger · 24 replies
    nextbigfuture.com ^ | 06-12-2014 | Brian Wang
    Hewlett-Packard has kicked off an ambitious project that aims at nothing less than reinventing the basic architecture of computers. It looks like servers are its initial target, but HP is also working on an Android version that it says could lead to smartphones with 100TB of storage. HP said Wednesday it was working on a new computer architecture, dubbed The Machine, based on memristors and silicon photonics. Bloomberg Businessweek reports up to 75% of HP’s once fairly illustrious R&D division — HP Labs – are working on The Machine. In the words of HP Labs, The Machine will be a...
  • Quantum Computing's 'Weird Magical Ingredient' Revealed

    06/12/2014 6:24:21 PM PDT · by BenLurkin · 9 replies
    hngn.com ^ | Jun 12, 2014 01:40 PM EDT | Rebekah Marcarelli
    An aspect of quantum theory called contextuality is crucial for achieving universal quantum computation, a University of Waterloo Institute of Quantum Computing news release reported. ... Quantum devices are almost impossible to build because they need to operate in a noise-resistant environment. The "magic" is a new approach to building a noise-resistant quantum computer. The process is known as magic-state distillation. By identifying this "magic" state researchers could be closer to achieving a universal quantum computer. ... In the real world measurements look at the property of something but in quantum terms what is observed really depends on how the...
  • Open Source Crypto TrueCrypt Disappears With Suspicious Cloud Of Mystery

    05/29/2014 8:05:00 PM PDT · by TChad · 27 replies
    Forbes ^ | 5/29/2014 | James Lyne
    Over the past 24 hours the website for TrueCrypt (a very widely used encryption solution) was updated with a rather unusually styled message stating that TrueCrypt is “considered harmful” and should not be used.
  • Watch as Kids React to Apple's First Desktop Computer

    05/29/2014 6:45:54 AM PDT · by C19fan · 35 replies
    Yahoo ^ | May 27, 2014 | Ralphie Aversa
    A new video that shows kids reacting to old technology is stirring up memories of clunky monitors and large floppy disks. The Apple II, which was released in 1977, was the pioneer of desktop computers. The 8-bit Apple computer featured a green and black screen and a floppy disk drive for 3.5-by-5-inch media. Relative to today's technology, describing the Apple II as simply obsolete or primitive does not do the situation justice. When the computers first hit the marketplace, Apple sold them for about $1,300. Adjusted for inflation, that translates to $5,000 in today's world, and that amount of money...
  • China Slams 'Absurd' US Hacking Charges

    05/20/2014 2:51:42 AM PDT · by Enterprise · 25 replies
    Newser ^ | 5-20-14 | Rob Quinn
    "Eric Holder described the charging of five Chinese military officers with cybercrimes as a "wake-up call" and China is certainly paying attention: Government officials have summoned the US ambassador in Beijing, suspended a cybersecurity agreement made with the US last month, and denounced the charges as an "absurd" move that has "severely damaged mutual trust," reports the BBC, which notes that it is "extremely unlikely" that any of the accused will ever be sent to the US to face charges."
  • Microsoft is now irrelevant to computing, and they want you to know it

    05/16/2014 11:39:43 AM PDT · by Ernest_at_the_Beach · 50 replies
    semiaccurate.com ^ | May 15, 2014 | by Charlie Demerjian
    Opinion: Two recent cave-ins leave no doubt they are done for With two major cave-ins in the past few weeks, Microsoft is screaming at the top of its lungs about how irrelevant it is. If you didn’t understand the fall of Microsoft from powerful monopolist to computing afterthought, let SemiAccurate explain it to you. For the past few decades, Microsoft has been a monopoly with one game plan, leverage what they have to exclude competition. If someone had a good idea, Microsoft would come out with a barely functional copy, give it away, and shut out the income stream of...
  • DEFENSE PLANS TO REPLACE 19-YEAR-OLD RETIREE PAY SYSTEM

    05/14/2014 4:55:12 AM PDT · by markomalley · 12 replies
    Nextgov ^ | 5/15/2014 | Bob Brewin
    The Defense Department has decided to retire its 19-year-old retiree pay system written in “antiquated” computer code and replace it with a lower cost, easier to use application based on off-the-shelf technology. The Defense Retiree and Annuitant Pay System, or DRAS, maintains military pay accounts for more than 2.6 million military retirees, former spouses and survivor beneficiaries totaling $40 billion a year. The system was introduced in 1995 and is based on Common Business Oriented Language computer code of the time. DRAS uses “antiquated mainframe technology dating back to 1980 that has exceeded the end of its planned lifecycle,” the...