Free Republic 3rd Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $24,202
27%  
Woo hoo!! And the first 27% is in!! Thank you all very much!! God bless.

Keyword: computer

Brevity: Headers | « Text »
  • Why do People Want Guns so Much?

    07/16/2016 5:40:02 AM PDT · by marktwain · 83 replies
    Gun Watch ^ | 14 July, 2016 | Dean Weingarten
    Those who demand a disarmed population claim that it is the easy availability of guns that causes people to do bad things with guns. The core assumption is that guns have no useful function.  The people who wish to disarm the population constantly say that guns are only made and used for one thing - to kill people.  It is implied is that no person actually wants to kill people, and they would not, if there were no guns. From that follows the idea that people do not really want guns.  If only some barriers were put in place...
  • Laptop hijacked, need help. (Vanity)

    06/09/2016 5:44:36 PM PDT · by deoetdoctrinae · 61 replies
    my other computer | 6-9-16 | me
    I need some help from you computer gurus. Just powered up my Toshiba laptop a little while ago and began surfing. Suddenly a tone started beeping and a message filled the screen saying a malfunction had been detected and gave a toll-free number to call to get help from a technician (yeah, right). Underneath that message is a screen saying that Windows 8.1 64-bit Defender encountered an error code: 0x80016CFA. Can't close the windows, and powering down the laptop fails, it just powers back up. I sure could use some help FRiends.
  • My Pine64 Media Center

    05/25/2016 7:47:22 AM PDT · by zeugma · 21 replies
    ZPRC ^ | 5/24/2016 | Zeugma
    My Pine64 Media Center Several months back, I participated in a Kickstarter campaign for the PINE A64, First $15 64-Bit Single Board Super Computer. The campaign started in December of 2015, and was designed to fund the production of a 64-bit computer on a card for the masses priced at $15. Initial estimated delivery was January or February. Their initial estimates on shipping were somewhat optimistic, as I just received mine the other day (5/21/2016). Reading through some of the comments on the project, some people were rather bent out of shape about the shipping delays, which is something I...
  • VANITY: Need computer help with Outlook Express email

    05/15/2016 1:40:28 PM PDT · by V K Lee · 27 replies
    Need expert help from any who speak 'normal' English as we have no computer gifted language experts living under the roof here. Have been using Windows XP and Outlook Express (with which I am familiar and have had no problems using) Recently during a storm, the computer fried to crispy bacon and died. Guru able to save the hard drive from the old, puting same hard drive into a reconditioned make with Windows 7 operating system....making the puter available for wifi. Problem, windows 7 is not compatible with Outlook Express and unable to reconfigure the files from old programs. Now...
  • NSA Silent on Spies’ Child Porn Problem

    05/07/2016 4:05:29 PM PDT · by Theoria · 25 replies
    The Daily Beast ^ | 06 May 2016 | Shane Harris
    The government’s cyber spying outfit has an ‘unbelievable’ child porn problem. But the NSA can’t—or won’t—say how often it finds such criminal images on its workers’ computers. Two senior U.S. intelligence officials said recently that defense and intelligence employees have an “unbelievable” amount of child pornography on their work computers and devices, and that child porn has been found on the systems of the National Security Agency, the country’s biggest intelligence organization. But the NSA, which is responsible for keeping tabs on its own computers as well as military and intelligence agency networks, cannot say just how many times employees...
  • The 8 fastest growing tech skills worth over $110,000

    04/25/2016 1:35:57 PM PDT · by SeekAndFind · 43 replies
    Business Insider ^ | 04/25/2016 | Julie Bort
    In the tech industry, one day a skill is hot, the next it's not. IT professionals spend a lot of their career learning, training, and trying to keep up. Job hunting site Dice prides itself on helping IT pros navigate which skills to pursue. It just concluded an analysis of its database of 80,000+ tech jobs from April 2015 through April 2016 to determine the fastest-growing skills based on job openings. We then cross-checked those skills against Dice's annual salary survey, published in February, which offered the average salary for jobs using those particular skills in 2015. The good news?...
  • Help - Windows 7 starts on Chrome but freezes within 5 minutes

    04/19/2016 10:27:40 AM PDT · by bgill · 66 replies
    April 18, 2016 | vanity
    Windows 7 will start but when it goes to Google Chrome, it will freeze up within 5 on any and everything. On Internet Explorer, it doesn't freeze but graphics don't work properly. Example, go to any site with a moving weather radar and it won't load. Or any site where you have a box to search within the site, you can't type or click in the box. Also, say on yahoo.com homepage, the ads and other junk on the left and right sides don't show up but the headlines do and you can click them and to the sites.
  • Backing Up Computer.

    04/10/2016 5:25:28 PM PDT · by don-o · 60 replies
    April 10, 2016 | don-o
    My Sony Vaio laptop came with Windows 7 preloaded and no physical disks. I read that there was supposed to be a recovery partition on the hard drive and figured that would be all I needed. To this point, I never had to use it. I do regular backups of my data (documents, music,etc) to an external HD. Yesterday, I was looking at Task Manager and saw a bunch of processes running. I looked at the descriptions of what they were supposed to do and stopped a bunch I thought I did not need. Computer continued to run fine. Long...
  • Congress to federal agencies: You have two weeks to tally your backdoored Juniper kit

    01/27/2016 7:23:22 PM PST · by Utilizer
    Computerworld ^ | Jan 26, 2016 8:51 AM PT | Lucian Constantin
    Congress plans to question about two dozen federal agencies on whether they were using backdoored Juniper network security appliances. In December, Juniper Networks said it had discovered unauthorized code added to ScreenOS, the operating system that runs on its NetScreen network firewalls. The rogue code, which remained undetected for two years or more, could have allowed remote attackers to gain administrative access to vulnerable devices or to decrypt VPN connections. The U.S. House Committee on Oversight and Government Reform wants to determine the impact that this issue had on government organizations and how those organizations responded to the incident. The...
  • Repost: Question about Madden 16 for Xbox(glitch in last post)

    01/25/2016 7:07:23 AM PST · by TheRobb7 · 6 replies
    Self ^ | TheRobb7
    There was a glitch that wouldn't let anyone post a response the last time I did this, so I'm going to try it again. TheRobb7 My son and I were interested in watching the Xbox play the NFL season against itself in Franchise Mode. We would watch 1 game a week and simulate the rest. PROBLEM : we can't get the Xbox to do it. It will only play against itself in Exhibition Mode, which means that we couldn't compile stats and standings. Does anyone out there know of a work-around?
  • Question about Madden 16 for Xbox 360

    01/24/2016 6:19:10 AM PST · by TheRobb7
    Self ^ | TheRobb7
    A little over three months ago, National Review endorsed Rep. Paul Ryan (R-WI) for Speaker of the House. In doing so, National Review helped place a man with a two-decade history of pushing open borders immigration policies in charge of the Republican Party’s entire legislative agenda. Ten weeks after that endorsement helped Paul Ryan secure the Speakership, Ryan proceeded to swiftly pass an omnibus spending bill that funded and expanded President Obama’s immigration agenda.
  • Need Mac Expert Help

    01/09/2016 4:31:59 PM PST · by MeshugeMikey · 101 replies
    MeshugeMikey | January 9, 2015 | Self
    My copy of google chrome is not running as it dont fully finish launching on my launch attempt . I can not force quit it from the force quit applications window.. because its nt running. I can not launch it as the Icon in my dock seems inert. there are a couple of forums I NEED my password for and they were available immediately using chrome. At Wits End, M.M.
  • Mysterious Sleep Activity in computer Tower

    12/31/2015 10:42:45 AM PST · by Bob434 · 102 replies
    Myself | 12/31/2015 | Me
    Ok got something weird happening, and I'm at a loss what it could be- been researching for days now- thought I had the answer, but today the problem came back again I use windows 7 Hybrid Sleep, instead of shutting down- and for years it's worked fine- no issues- As of recently, I'll put the computer into sleep mode, everything does what it's supposed to- computer powers down- tower power button light goes to yellow like it's supposed to and the light on the front of the tower goes out (The HP symbol lights up when tower is working- then...
  • More than 3,000 Washington prisoners mistakenly freed early (computer glitch)

    12/23/2015 2:53:26 PM PST · by Libloather · 24 replies
    AP via MSN ^ | 12/23/15 | RACHEL LA CORTE
    OLYMPIA, Wash. - More than 3,000 prisoners in Washington have been mistakenly released early since 2002 because of an error by the state's Department of Corrections that resulted in wrongly calculated sentences for about 3 percent of the prison population. At a news conference announcing the error Tuesday, Gov. Jay Inslee said he has ordered immediate steps to correct the longstanding computer glitch. "Frankly, it is maddening," Inslee said. Authorities say a July 2002 state Supreme Court ruling required the Corrections Department to apply good-behavior credits earned in county jail to state prison sentences. However, the programming fix ended up...
  • Google says they have a quantum computer 100 million times faster than anything on the market

    12/11/2015 8:48:12 AM PST · by SeekAndFind · 40 replies
    Business Insider ^ | 12/11/2015 | Sophie Bushwick, Popular Science
    This week, Google announced a breakthrough that could prove its quantum computer is actually using quantum mechanics. When researchers gave the D-Wave 2X a carefully crafted test problem, the 1,000-qubit computer solved it 100,000,000 times faster than a classical computer could. Quite a few tech giants and government organizations are investing in quantum computing. And many of them, including Google, NASA, and Lockheed Martin, are working with the commercial quantum computers built by D-Wave. The idea is that these devices can harness the counterintuitive effects of quantum mechanics to solve problems faster than conventional computers, which could potentially improve artificial...
  • Google and NASA Say Their Quantum Computer Finally Works

    12/09/2015 3:33:55 PM PST · by BenLurkin · 32 replies
    Popular Mechanics ^ | WIlliam Herkewitz
    The actual problem that computer scientists threw at the D-Wave Two is pretty esoteric. To oversimplify it, they asked the machine to pick the optimum choice out of a large jumble of information with nearly 1,000 variables. Such optimization problems, which involve weighing multiple choices against each other, should be far, far easier for quantum computers to crunch. That's because the basis of quantum computation, the qubit, uses the odd physics of quantum mechanic to hold information as a zero, one, or a superposition of both. Again, to over-simplify things, this allows quantum computers to consider a vast number of...
  • DecryptorMax Ransomware Decrypted, No Need to Pay the Ransom

    11/28/2015 6:55:45 PM PST · by Utilizer · 9 replies
    Softpedia ^ | 28 Nov 2015, 10:31 GMT | Catalin Cimpanu
    ... Fabian Wosar of Emisoft has created a tool capable of decoding files encrypted by the DecryptorMax ransomware, also known as CryptInfinite. The ransomware gets its name from the fact that the "DecryptorMax" string is found in multiple places inside its source code. Additionally, the CryptInfinite moniker is also used by some researchers because the ransomware adds the CryptInfinite key to the Windows registry, using it to store a list of all encrypted files and their location on disk. According to Bleeping Computer's Lawrence Abrams, the ransomware is spread via Word documents attached to spam email. These files pose as...
  • Dell security error widens as researchers dig deeper (Earlier problem is worse than was thought)

    11/23/2015 9:56:26 PM PST · by dayglored · 11 replies
    PCWorld ^ | Nov 23, 2015 | Jeremy Kirk
    Duo Security researchers found a second weak digital certificate on a new Dell Inspiron laptop The fallout from a serious security mistake made by Dell is widening, as security experts find more issues of concern. Researchers with Duo Security have found a second weak digital certificate in a new Dell laptop and evidence of another problematic one circulating. The issue started after it was discovered Dell shipped devices with a self-signed root digital certificate, eDellRoot, which is used to encrypt data traffic. But it installed the root certificate with the private encryption key included, a critical error that left many...
  • Researchers have written quantum code on a silicon chip for the first time

    11/17/2015 6:53:19 PM PST · by LibWhacker · 28 replies
    Science alert ^ | 11/17/15 | FIONA MACDONALD
    Researchers have written quantum code on a silicon chip for the first time And so it begins... FIONA MACDONALD 17 NOV 2015           For the first time, Australian engineers have demonstrated that they can write and manipulate the quantum version of computer code on a silicon microchip. This was done by entangling two quantum bits with the highest accuracy ever recorded, and it means that we can now start to program for the super-powerful quantum computers of the future.Engineers code regular computers using traditional bits, which can be in one of two states: 1 or 0. Together, two bits...
  • Computer question: Green screen

    11/08/2015 10:20:41 PM PST · by An American in Turkiye · 22 replies
    Self | An American In Turkiye
    So I have been having some issues with video playback on my laptop. It doesn't happen often, but every once in awhile, I'll try to play a YouTube video or Windows Media Player vid, and the video is green. Audio still plays, but the screen is green. In some cases, WMV's are just a black screen, with audio playing. Any help/suggestions are appreciated. Running Windows 8, BTW. I have 10 downloaded, just haven't upgraded yet
  • Computer Question - Iso File Burner

    11/08/2015 6:11:21 PM PST · by 50sDad · 28 replies
    Self | 11/08/15 | 50sDad
    I am looking for a freeware program that will take .iso files and burn them to disk.
  • Netgear router exploit detected

    10/09/2015 10:56:42 PM PDT · by WhiskeyX · 17 replies
    BBC ^ | 9 October 2015 | Chris Baraniuk, Technology reporter
    A security researcher in the US has said his Netgear router was hacked after attackers exploited a flaw in the machine. Joe Giron told the BBC that he discovered altered admin settings on his personal router on 28 September. The compromised router was hacked to send web browsing data to a malicious internet address. Netgear says the vulnerability is "serious" but affects fewer than 5,000 devices. Mr Giron found that the Domain Name System (DNS) settings on his router had been changed to a suspicious IP address. "Normally I set mine to Google's [IP address] and it wasn't that, it...
  • Vanity: Threat detected by Avast

    10/07/2015 8:26:09 PM PDT · by Mama Shawna · 18 replies
    Breitbart
    I just clicked on a thread titled 'Steve King Endorses Daniel Webster for Speaker of the House' posted by E. Pluribus Unum from Breitbart, and both times, my Avast virus protection popped up with 'threat detected'. Anyone else get this when clicking on this title? First time I've EVER gotten this while browsing FR.
  • A walk around the office can reverse vascular dysfunction caused by hours at a computer

    09/29/2015 4:09:51 AM PDT · by WhiskeyX · 44 replies
    ScienceDaily ^ | September 28, 2015 | University of Missouri-Columbia
    Across the country, many employees are seated at desks for the majority of an eight-hour workday. As technology creates an increase in sedentary lifestyles, the impact of sitting on vascular health is a rising concern. Now, researchers have found that when a person sits for six straight hours, vascular function is impaired -- but by walking for just 10 minutes after a prolonged period of sitting, vascular health can be restored.
  • Clumps of gold nanoparticles can evolve to carry out computing

    09/22/2015 2:10:36 PM PDT · by BenLurkin · 9 replies
    Move over, microchip. A random assembly of gold nanoparticles can perform calculations normally reserved for neatly arranged patterns of silicon. Traditional computers rely on ordered circuits that follow preprogrammed rules, but this strategy limits how efficient they can be. “The best microprocessors you can buy in a store now can do 1011 operations per second and use a few hundred watts,” says Wilfred van der Wiel of the University of Twente in the Netherlands. “The human brain can do orders of magnitude more and uses only 10 to 20 watts. That’s a huge gap.” To close that gap, researchers have...
  • Need help with a Surface 3 Table (connect to TV)

    09/20/2015 7:07:29 PM PDT · by ak267 · 27 replies
    ak267 | 9-20-2015 | ak267
    My brother just acquired a MS Surface 3 tablet. He wanted to know how to connect it to a TV and "mirror" the table image on to the TV (not wireless but with wires). Any advice?
  • Russia and China Use Data Received From Hackers to ID U.S. Spies

    09/02/2015 1:44:40 PM PDT · by detective · 9 replies
    The New American ^ | September 1, 2015 | Warren Mass
    Both Russian and Chinese government security agencies have compiled data obtained from hackers who breached security protecting U.S. computer databases containing security clearance applications, airline records, and medical insurance forms, and then used the data to identify U.S. intelligence officers and agents. As a result of cyberattacks, at least one clandestine network of American engineers and scientists who provide technical assistance to U.S. undercover operatives and agents overseas has been compromised, according to two U.S. officials. The officials, speaking on condition of anonymity, revealed the security breach to the Los Angeles Times, which broke the story on August 31. The...
  • Quantum computer that 'computes without running' sets efficiency record

    09/01/2015 10:33:43 PM PDT · by LibWhacker · 29 replies
    PhysOrg ^ | 8/31/15 | Lisa Zyga
    (Phys.org)—Due to quantum effects, it's possible to build a quantum computer that computes without running—or as the scientists explain, "the result of a computation may be learned without actually running the computer." So far, however, the efficiency of this process, which is called counterfactual computation (CFC), has had an upper limit of 50%, limiting its practical applications. Now in a new paper, scientists have experimentally demonstrated a slightly different version called a "generalized CFC" that has an efficiency of 85% with the potential to reach 100%. This improvement opens the doors to realizing a much greater variety of applications, such...
  • Need Help with Opera Spell Checking

    08/26/2015 5:39:35 PM PDT · by Bigg Red · 20 replies
    My lame abilities ^ | 26 August 2015 | self
    When I compose a comment here or on Facebook, the spelling check function underlines every single word in red. Problem began about 1 week ago and occurs only when I am using Opera. I went to the Opera settings, but I could not find a way to correct this. Sorry, I am not tech savvy, and I would appreciate advice from someone who is.
  • DIY Tractor Repair Runs Afoul Of Copyright Law

    08/18/2015 11:31:17 AM PDT · by Theoria · 35 replies
    NPR ^ | 18 Aug 2015 | Laura Sydell
    The iconic image of the American farmer is the man or woman who works the land, milks cows and is self-reliant enough to fix the tractor. But like a lot of mechanical items, tractors are increasingly run by computer software. Now, farmers are hitting up against an obscure provision of copyright law that makes it illegal to repair machinery run by software. Take Dave Alford. He fits that image of the iconic farmer. "I do farming on the family ranch," says Alford, standing on a piece of grassy earth with a white barn behind him. "I've been farming for the...
  • Windows 10 appears to be mainly spyware - I'm uninstalling Windows 10 and going back to Windows 7

    08/08/2015 8:29:27 AM PDT · by Perseverando · 92 replies
    August 8, 2015 | Vanity
    Last weekend I loaded Windows 10 on an old laptop I rarely use. I immediately noticed several privacy issues with new open windows (pun intended) for spying on what I do, where I go and what I say online. After reading some to the reviews and discussions I think it's time to revert back to Windows 7 ASAP. Thanks, but no thanks Microsoft! The police state is doing a fine job without any additional help from you and me. I haven't turned the laptop on since I loaded Windows 10, but the next time I do, it will be for...
  • Spyware, Key Logger: Exoprience, Expertise Requested

    07/31/2015 8:02:12 PM PDT · by Hostage · 32 replies
    Self ^ | July 31, 2015 | Histage
    A neighbor's estranged Ex has possibly installed spyware and a key logger onto a new notebook given as a 'gift' to both neighbor and teenage daughter. The neighbor is the custodial parent of the one teenage daughter who recently received the new 'spy loaded' notebook computer from her estranged parent. The notebook runs Win 8.1 and is to be eventually upgraded to Windows 10. The teenager was told directly by the estranged parent that everything the custodial parent does could be seen and recorded and then messaged out clandestinely. The neighbor would like to know the following: 1. How to...
  • OS X Yosemite vs Windows 10: The Mac and PC operating systems go head to head UPDATED

    07/30/2015 11:45:36 PM PDT · by Swordmaker · 39 replies
    Macworld UK ^ | July 30, 2015, 2015 | by Keir Thomas
    OS X Yosemite vs Windows 10 It's been a rough few years for Microsoft.  Sure, it still makes more money than several European countries but the issue has been one of relevance. It missed the boat when it came to mobile and their efforts to repair the situation with Windows 8 were met with laughter at best, but sometimes even hatred.  The all-new Windows 10, which was released on 29 July, is designed to stem the blood loss. We took a look at the latest preview (Microsoft took the wraps off the new operating system at a developer event in...
  • Problems With Drudge Report?

    07/21/2015 5:59:16 PM PDT · by hulagirl · 35 replies
    Self ^ | 7/21/2015 | Self
    My own experience
  • Wow! DOS attack this past weekend in Michigan

    07/14/2015 3:12:03 AM PDT · by taildragger · 11 replies
    Email | N/A
    Dear Valued WOW! Customer, Please accept my sincere apology for any problems you may have recently experienced with your WOW! Internet service. On Sunday, 07/12, 2015, there was a malicious and coordinated action from an external party or parties that disrupted Internet service for our Michigan customers. What happened is known in technical circles as a Denial of Service or DOS attack. Essentially, these external sources intentionally overloaded the servers we use to route Internet traffic and created the access problems you may have experienced. As soon as the issue was detected, our engineers and technicians were immediately dispatched to...
  • Computer hack reveals identity of Syrians in contact with Israel

    07/12/2015 10:16:23 PM PDT · by Nachum · 9 replies
    Times of Israel ^ | 7/12/15 | Elhanan Miller
    Computer hackers likely working for the Syrian regime and Hezbollah have managed to penetrate the computers of Israeli and American activists working with the Syrian opposition, exposing sensitive contacts between the sides. Al-Akhbar, a newspaper serving as Hezbollah’s mouthpiece in Lebanon, published a series of articles over the weekend purporting to divulge correspondence between Mendi Safadi, a Druze Israeli and former political adviser to Deputy Regional Cooperation Minister Ayoub Kara, with members of the Syrian opposition around the world, taken from taken from Safadi’s computer. The article also contains screenshots of word documents and text message exchanges saved on Safadi’s...
  • Why Google’s nightmare AI is putting demon puppies everywhere

    07/11/2015 11:38:58 AM PDT · by Lazamataz · 204 replies
    Washington Post ^ | Jul 8, 2015 | by Jeff Guo
    A few weeks ago, Google researchers announced that they had peered inside the mind of an artificial intelligence program. What they discovered was a demonic hellscape. You’ve seen the pictures. These are hallucinations produced by a cluster of simulated neurons trained to identify objects in a picture. The researchers wanted to better understand how the neural network operates, so they asked it to use its imagination. To daydream a little. At first, they gave the computer abstract images to interpret — like a field of clouds. It was a Rorschach test. The artificial neurons saw what they wanted to see,...
  • Animal brains connected up to make mind-melded computer

    07/09/2015 8:45:15 AM PDT · by Red Badger · 10 replies
    www.newscientist.com ^ | 14:38 09 July 2015 | by Jessica Hamzelou
    Two heads are better than one, and three monkey brains can control an avatar better than any single monkey. For the first time, a team has networked the brains of multiple animals to form a living computer that can perform tasks and solve problems. If human brains could be similarly connected, it might give us superhuman problem-solving abilities, and allow us to communicate abstract thoughts and experiences. "It is really exciting," says Iyad Rahwan at the Masdar Institute in Dubai, UAE, who was not involved in the work. "It will change the way humans cooperate." The work, published today, is...
  • No One Is Safe: $300 Gadget Steals Encryption Keys out of the Air, and It’s Nearly Unstoppable

    07/08/2015 6:56:44 PM PDT · by 2ndDivisionVet · 27 replies
    BGR ^ | July 8, 2015 | Zach Epstein
    Just when you thought you were safe, a new hacking toy comes along and rocks your world. Imagine a tool exists that lets hackers pluck encryption keys from your laptop right out of the air. You can’t stop it by connecting to protected Wi-Fi networks or even disabling Wi-Fi completely. Turning off Bluetooth also won’t help you protect yourself. Why? Because the tiny device that can easily be hidden in an object or taped to the underside of a table doesn’t use conventional communications to pull off capers. Instead it reads radio waves emitted by your computer’s processor, and there’s...
  • Artificial Intelligence Machine Gets Testy With Its Programmer

    06/29/2015 10:36:07 AM PDT · by Red Badger · 56 replies
    WSJ ^ | 1:56 pm ET Jun 26, 2015 | By Amir Mizroch
    Researchers have shown that machines are inching closer to self-learning, and perhaps even copping a little attitude. Over at Google, a computer program using a database of movie scripts was asked again and again by researchers to define morality. It struggles to do so, and in a conversation recorded by its human engineers, becomes exasperated and ends the conversation by lashing out at its human inquisitor. Here’s part of the exchange, as related in a paper presented this week: Human: Tell me the definition of morality. Machine: I don’t have ethics. Human: Look, I need help; I need to know...
  • Fed personnel agency admits history of security problems

    06/16/2015 9:52:46 AM PDT · by Enterprise · 2 replies
    juno-news.com ^ | 6/16/2015 | KEN DILANIAN
    An Office of Personnel Management investigative official said Tuesday the agency entrusted with millions of personnel records has a history of failing to meet basic computer network security requirements.Michael Esser, assistant inspector general for audit, said in testimony prepared for delivery that for years many of the people running the agency's information technology had no IT background.
  • Google Wants to Turn Your Clothes Into a Computer

    05/30/2015 6:15:31 AM PDT · by Enlightened1 · 11 replies
    NY Times ^ | 05/29/15 | Conor Dougherty
    On Friday, the second day of its annual developer conference, Google I/O, one of the search giant’s semi-secretive research divisions announced a project that aims to make conductive fabrics that can be weaved into everyday clothes. The effort, called Project Jacquard, is named for the French inventor of the Jacquard Loom, which revolutionized textile manufacturing and helped pave the way for modern computing. Much like the screens on mobile phones, these fabrics could register the user’s touch and transmit information elsewhere, like to a smartphone or tablet computer. They are made from conductive yarns that come in a rainbow of...
  • Police explode briefcase left for literary agent

    08/11/2011 3:07:03 PM PDT · by NormsRevenge · 12 replies
    Mercury news ^ | 8/11/11 | AP
    BEVERLY HILLS, Calif. — A writer desperate to get a movie script read suffered the ultimate rejection Thursday when police blew up a briefcase he said contained the screenplay after an agent refused to read it, police said. The bizarre story was set in Beverly Hills, where a man visited the office of a literary agent and left behind a briefcase that he said contained a computer, police Sgt. Brad Cornelius said. The man left instructions for it to be delivered to someone at the business, who told another person in the office, "This guy's been kind of pestering me...
  • New maze-like beamsplitter is world's smallest

    05/25/2015 4:57:28 PM PDT · by aimhigh · 50 replies
    Physics World ^ | 05/25/2015 | Ker Than
    An ultracompact beamsplitter – the smallest one in the world – has been designed and fabricated by researchers in the US. Using a newly developed algorithm, the team built the smallest integrated polarization beamsplitter to date, which could allow computers and mobile devices of the future to function millions of times faster than current machines.
  • Critical vulnerability in NetUSB driver exposes millions of routers to hacking

    05/20/2015 9:48:26 PM PDT · by Utilizer · 13 replies
    ITworld.com ^ | May 19, 2015 | Lucian Constantin
    Millions of routers and other embedded devices are affected by a serious vulnerability that could allow hackers to compromise them. The vulnerability is located in a service called NetUSB, which lets devices connected over USB to a computer be shared with other machines on a local network or the Internet via IP (Internet Protocol). The shared devices can be printers, webcams, thumb drives, external hard disks and more. NetUSB is implemented in Linux-based embedded systems, such as routers, as a kernel driver. The driver is developed by Taiwan-based KCodes Technology. Once enabled, it opens a server that listens on TCP...
  • 10 Keyboard Hacks That Will Change Your Life

    05/20/2015 10:54:01 AM PDT · by lulu16 · 38 replies
    Refinery 29 ^ | 5/20/15 | Christina Bonnington
    Turns out, there are a few savvy (and super-easy) keyboard tricks that can do just that. Your desktop, browser, Gmail, and even Facebook all have simple keyboard-based shortcuts you can press to more quickly accomplish things you do all the time — things like creating a new tab in Chrome or favoriting a tweet. We’ve rounded up 10 super-handy keyboard hacks that will help you zip through your daily grind, so you can spend more time on things that matter — or at least save your index finger from repetitive stress syndrome. And, we've organized them from the most basic...
  • Funds sought for tiny £6 computer

    05/12/2015 4:13:25 AM PDT · by WhiskeyX · 9 replies
    BBC ^ | 11 May 2015 | BBC
    A Californian start-up is seeking funding to make a computer that will cost $9 (£6) in its most basic form. Next Thing wants $50,000 to finish development of the credit-card sized Chip computer. The first versions will have a 1Ghz processor, 512MB of Ram and 4GB of onboard storage. The gadget, due to go on general release in early 2016, could become yet another rival to the popular Raspberry Pi barebones computer.
  • The number glitch that can lead to catastrophe

    05/06/2015 7:28:17 AM PDT · by BenLurkin · 20 replies
    BBC ^ | Chris Baraniuk
    Such glitches emerge with surprising frequency. It’s suspected that the reason why Nasa lost contact with the Deep Impact space probe in 2013 was an integer limit being reached. And just last week it was reported that Boeing 787 aircraft may suffer from a similar issue. The control unit managing the delivery of power to the plane’s engines will automatically enter a failsafe mode – and shut down the engines – if it has been left on for over 248 days. Hypothetically, the engines could suddenly halt even in mid-flight. The Federal Aviation Administration’s directive on the matter states that...
  • Why Coding Is Your Child’s Key to Unlocking the Future

    04/29/2015 7:26:19 AM PDT · by Borges · 43 replies
    WSJ ^ | 4/29/2015 | CHRISTOPHER MIMS
    Racing across the U.S. in your taco truck, you must fight off animals mutated by fallout from a nuclear war, and you must also turn them into delicious filling for the tacos you sell inside fortified towns. Your mission: Make it to the Canadian city of Winnipeg. You are “Gunman Taco Truck.” “It’s pretty much only a game that a kid would come up with,” says Brenda Romero, a videogame designer for more than 30 years and the mother of Donovan Romero-Brathwaite, the 10-year-old inventor of the game. And yet GTT already has been licensed by a videogame publisher for...
  • Beyond the lithium ion—a significant step toward a better performing battery

    04/17/2015 2:27:18 PM PDT · by Red Badger · 14 replies
    Phys.Org ^ | 04-17-2015 | Provided by University of Illinois at Chicago
    The race is on around the world as scientists strive to develop a new generation of batteries that can perform beyond the limits of the current lithium-ion based battery. Researchers at the University of Illinois at Chicago have taken a significant step toward the development of a battery that could outperform the lithium-ion technology used in electric cars such as the Chevy Volt. They have shown they can replace the lithium ions, each of which carries a single positive charge, with magnesium ions, which have a plus-two charge, in battery-like chemical reactions, using an electrode with a structure like those...