Keyword: computer
-
The actual problem that computer scientists threw at the D-Wave Two is pretty esoteric. To oversimplify it, they asked the machine to pick the optimum choice out of a large jumble of information with nearly 1,000 variables. Such optimization problems, which involve weighing multiple choices against each other, should be far, far easier for quantum computers to crunch. That's because the basis of quantum computation, the qubit, uses the odd physics of quantum mechanic to hold information as a zero, one, or a superposition of both. Again, to over-simplify things, this allows quantum computers to consider a vast number of...
-
... Fabian Wosar of Emisoft has created a tool capable of decoding files encrypted by the DecryptorMax ransomware, also known as CryptInfinite. The ransomware gets its name from the fact that the "DecryptorMax" string is found in multiple places inside its source code. Additionally, the CryptInfinite moniker is also used by some researchers because the ransomware adds the CryptInfinite key to the Windows registry, using it to store a list of all encrypted files and their location on disk. According to Bleeping Computer's Lawrence Abrams, the ransomware is spread via Word documents attached to spam email. These files pose as...
-
Duo Security researchers found a second weak digital certificate on a new Dell Inspiron laptop The fallout from a serious security mistake made by Dell is widening, as security experts find more issues of concern. Researchers with Duo Security have found a second weak digital certificate in a new Dell laptop and evidence of another problematic one circulating. The issue started after it was discovered Dell shipped devices with a self-signed root digital certificate, eDellRoot, which is used to encrypt data traffic. But it installed the root certificate with the private encryption key included, a critical error that left many...
-
Researchers have written quantum code on a silicon chip for the first time And so it begins... FIONA MACDONALD 17 NOV 2015 For the first time, Australian engineers have demonstrated that they can write and manipulate the quantum version of computer code on a silicon microchip. This was done by entangling two quantum bits with the highest accuracy ever recorded, and it means that we can now start to program for the super-powerful quantum computers of the future.Engineers code regular computers using traditional bits, which can be in one of two states: 1 or 0. Together, two bits...
-
So I have been having some issues with video playback on my laptop. It doesn't happen often, but every once in awhile, I'll try to play a YouTube video or Windows Media Player vid, and the video is green. Audio still plays, but the screen is green. In some cases, WMV's are just a black screen, with audio playing. Any help/suggestions are appreciated. Running Windows 8, BTW. I have 10 downloaded, just haven't upgraded yet
-
I am looking for a freeware program that will take .iso files and burn them to disk.
-
A security researcher in the US has said his Netgear router was hacked after attackers exploited a flaw in the machine. Joe Giron told the BBC that he discovered altered admin settings on his personal router on 28 September. The compromised router was hacked to send web browsing data to a malicious internet address. Netgear says the vulnerability is "serious" but affects fewer than 5,000 devices. Mr Giron found that the Domain Name System (DNS) settings on his router had been changed to a suspicious IP address. "Normally I set mine to Google's [IP address] and it wasn't that, it...
-
I just clicked on a thread titled 'Steve King Endorses Daniel Webster for Speaker of the House' posted by E. Pluribus Unum from Breitbart, and both times, my Avast virus protection popped up with 'threat detected'. Anyone else get this when clicking on this title? First time I've EVER gotten this while browsing FR.
-
Across the country, many employees are seated at desks for the majority of an eight-hour workday. As technology creates an increase in sedentary lifestyles, the impact of sitting on vascular health is a rising concern. Now, researchers have found that when a person sits for six straight hours, vascular function is impaired -- but by walking for just 10 minutes after a prolonged period of sitting, vascular health can be restored.
-
Move over, microchip. A random assembly of gold nanoparticles can perform calculations normally reserved for neatly arranged patterns of silicon. Traditional computers rely on ordered circuits that follow preprogrammed rules, but this strategy limits how efficient they can be. “The best microprocessors you can buy in a store now can do 1011 operations per second and use a few hundred watts,” says Wilfred van der Wiel of the University of Twente in the Netherlands. “The human brain can do orders of magnitude more and uses only 10 to 20 watts. That’s a huge gap.” To close that gap, researchers have...
-
My brother just acquired a MS Surface 3 tablet. He wanted to know how to connect it to a TV and "mirror" the table image on to the TV (not wireless but with wires). Any advice?
-
Both Russian and Chinese government security agencies have compiled data obtained from hackers who breached security protecting U.S. computer databases containing security clearance applications, airline records, and medical insurance forms, and then used the data to identify U.S. intelligence officers and agents. As a result of cyberattacks, at least one clandestine network of American engineers and scientists who provide technical assistance to U.S. undercover operatives and agents overseas has been compromised, according to two U.S. officials. The officials, speaking on condition of anonymity, revealed the security breach to the Los Angeles Times, which broke the story on August 31. The...
-
(Phys.org)—Due to quantum effects, it's possible to build a quantum computer that computes without running—or as the scientists explain, "the result of a computation may be learned without actually running the computer." So far, however, the efficiency of this process, which is called counterfactual computation (CFC), has had an upper limit of 50%, limiting its practical applications. Now in a new paper, scientists have experimentally demonstrated a slightly different version called a "generalized CFC" that has an efficiency of 85% with the potential to reach 100%. This improvement opens the doors to realizing a much greater variety of applications, such...
-
When I compose a comment here or on Facebook, the spelling check function underlines every single word in red. Problem began about 1 week ago and occurs only when I am using Opera. I went to the Opera settings, but I could not find a way to correct this. Sorry, I am not tech savvy, and I would appreciate advice from someone who is.
-
The iconic image of the American farmer is the man or woman who works the land, milks cows and is self-reliant enough to fix the tractor. But like a lot of mechanical items, tractors are increasingly run by computer software. Now, farmers are hitting up against an obscure provision of copyright law that makes it illegal to repair machinery run by software. Take Dave Alford. He fits that image of the iconic farmer. "I do farming on the family ranch," says Alford, standing on a piece of grassy earth with a white barn behind him. "I've been farming for the...
-
Last weekend I loaded Windows 10 on an old laptop I rarely use. I immediately noticed several privacy issues with new open windows (pun intended) for spying on what I do, where I go and what I say online. After reading some to the reviews and discussions I think it's time to revert back to Windows 7 ASAP. Thanks, but no thanks Microsoft! The police state is doing a fine job without any additional help from you and me. I haven't turned the laptop on since I loaded Windows 10, but the next time I do, it will be for...
-
A neighbor's estranged Ex has possibly installed spyware and a key logger onto a new notebook given as a 'gift' to both neighbor and teenage daughter. The neighbor is the custodial parent of the one teenage daughter who recently received the new 'spy loaded' notebook computer from her estranged parent. The notebook runs Win 8.1 and is to be eventually upgraded to Windows 10. The teenager was told directly by the estranged parent that everything the custodial parent does could be seen and recorded and then messaged out clandestinely. The neighbor would like to know the following: 1. How to...
-
OS X Yosemite vs Windows 10 It's been a rough few years for Microsoft.  Sure, it still makes more money than several European countries but the issue has been one of relevance. It missed the boat when it came to mobile and their efforts to repair the situation with Windows 8 were met with laughter at best, but sometimes even hatred. The all-new Windows 10, which was released on 29 July, is designed to stem the blood loss. We took a look at the latest preview (Microsoft took the wraps off the new operating system at a developer event in...
-
-
Dear Valued WOW! Customer, Please accept my sincere apology for any problems you may have recently experienced with your WOW! Internet service. On Sunday, 07/12, 2015, there was a malicious and coordinated action from an external party or parties that disrupted Internet service for our Michigan customers. What happened is known in technical circles as a Denial of Service or DOS attack. Essentially, these external sources intentionally overloaded the servers we use to route Internet traffic and created the access problems you may have experienced. As soon as the issue was detected, our engineers and technicians were immediately dispatched to...
|
|
|