Schlagzeilen |
Freitag, 23. Dezember 2011 00:00:00 Technik News
Aktualisiert: Vor 2 Min.
1|2|3|4|5  

bonch writes "Samsung has announced that the Galaxy S smartphone, which sold 10 million last year, and the Galaxy Tab tablet won't be receiving the Android 4.0 update, known as 'Ice Cream Sandwich.' Samsung claims the devices lack enough RAM and ROM to run Android 4.0 alongside TouchWiz and other custom 'experience-enhancing' software. Note that the Galaxy S runs the same hardware as the Nexus S, which is already receiving the Android 4.0 update."

An anonymous reader writes "The Large Hadron Collider has many fans, and one of its biggest is Sasha Mehlhase, a physicist from the Niels Bohr Institute at the University of Copenhagen. Mehlhase has decided to help promote the LHC to students by taking the time to recreate a 1:50 scale model of it using Lego bricks. In total he spent 81 hours creating it, which was split between 48 hours of designing the model on his laptop, and a further 33 hours putting it together."

astroengine writes "Three hours before a new crew arrived at the International Space Station on Friday, bringing the outpost back up to full staff for the first time in months, Russia racked up its fifth launch accident within a year. A Soyuz-2 rocket carrying a military communications satellite failed to reach orbit after blastoff from the Plesetsk space center in northern Russia. The botched launch is again due to an upper-stage engine problem."

smitty777 writes "Congress has recently authorized the use of offensive military action in cyberspace. From the December 12th conference on the National Defense Authorization Act, it states, 'Congress affirms that the Department of Defense has the capability, and upon direction by the President may conduct offensive operations in cyberspace to defend our Nation, Allies and interests, subject to: (1) the policy principles and legal regimes that the Department follows for kinetic capabilities, including the law of armed conflict; and (2) the War Powers Resolution.' According to the FAS, 'Debate continues on whether using the War Powers Resolution is effective as a means of assuring congressional participation in decisions that might get the United States involved in a significant military conflict.'"

bdking writes "If you purchased something online from a mobile device in December, there's a 92% chance you used an iPad or iPhone. And if so, you probably spent more money than someone making an online purchase with an Android or a desktop computer."

Hugh Pickens writes "Brandon Rittiman reports that White House officials launched a Twitter campaign Tuesday to put pressure on Congress to reach a deal extending the payroll-tax cut. Using the Twitter hashtag #40dollars, the White House successfully got thousands of people to respond and explain what a $40 cut to each paycheck would mean to them personally. By Wednesday morning, the #40dollars hashtag started 'trending,' which is what happens when Twitter's algorithms see a topic suddenly surge. It's not easy to create that kind of surge, but the White House has 2.5 million Twitter followers to call upon. Macon Phillips, the President's Director of Digital Strategy, says his team has managed to get a few Twitter topics to rise to the level of 'trending' before — most notably when they began tweeting about the death of Osama bin Laden. 'What's very important about a social-media campaign like this is that regular people are making the point about how this would affect them. It's not us here in Washington trying to argue on their behalf.' says Phillips. 'The #40dollars campaign puts a face on that amount to demonstrate the payroll tax cut's real-world impact on middle-class families.'"

New submitter Etrahkad writes "Trion Worlds, publisher of MMORPG Rift, has announced that somebody broke into one of their databases and gained access to user information. First Sony and now Rift... my identity has probably been stolen several times over, now. From the e-mail: 'We recently discovered that unauthorized intruders gained access to a Trion Worlds account database. The database in question contained information including user names, encrypted passwords, dates of birth, email addresses, billing addresses, and the first and last four digits and expiration dates of customer credit cards. ... there is no evidence, and we have no reason to believe, that full credit card information was accessed or compromised in any way." Are game companies not concerned with preventing these attacks?"

An anonymous reader writes "Bloomberg reports that the U.S. Federal Communications Commission has granted approval for AT&T to buy Qualcomm's wireless spectrum licenses for $1.925 billion. The FCC admitted to having some 'competitive concerns' about letting AT&T snap up such a large swath of spectrum licenses, but were satisfied by simply imposing a number of conditions to prohibit interference on neighboring bands. They also said the deal facilitates their goal of 'expanding mobile broadband deployment throughout the country.'"

OverTheGeicoE writes "Perhaps it's now officially cool to criticize the TSA. Vanity Fair has a story questioning the true value of TSA security. The story features Bruce Schneier, inventor of the term 'security theater' and contender for the Most Interesting Man in the World title, it would seem. With Schneier's mentoring, the author allegedly doctors a boarding pass to breach security at Reagan National Airport to do an interview with Schneier. 'To walk through an airport with Bruce Schneier is to see how much change a trillion dollars can wreak. So much inconvenience for so little benefit at such a staggering cost.'"

wired_parrot writes "Responding to complaints from employees that email outside of working hours was disrupting their lives, Volkswagen has taken the step of shutting their email servers outside work-hours. Other companies have taken similar steps, with at least one taking the extraordinary step of banning internal e-mail altogether. Is this new awareness of the disruption work email brings on employee's personal life a trend?"

New submitter SciComGeek writes "Few laypeople think of computing innovation in connection with the Tevatron particle accelerator, which shut down earlier this year. Mention of the Tevatron inspires images of majestic machinery, or thoughts of immense energies and groundbreaking physics research, not circuit boards, hardware, networks, and software. Yet over the course of more than three decades of planning and operation, a tremendous amount of computing innovation was necessary to keep the data flowing and physics results coming. Those innovations will continue to influence scientific computing and data analysis for years to come."

New submitter ChromeAeonium writes "Much like vaccines and evolution, there exists a great disparity between the scientific consensus and the public perceptions of the safety of genetically engineered crops. A previous study from France, which was later dismissed by the EFSA, FSANZ, and the French High Council of Biotechnologies, claiming to have found abnormalities in the organs of animals fed GM diets by analyzing three previous studies was discussed on Slashdot. However, a new study, also out of France, claims the opposite is true, that GM crops are unlikely to pose health risks (translation of original in French). Looking at 24 long-term and multi-generational studies on insect resistant and herbicide tolerant plants, the study states, 'The studies reviewed present evidence to show that GM plants are nutritionally equivalent to their non-GM counterparts and can be safely used in food and feed.' Although it is impossible to prove a negative, and while every GM crop must be individually evaluated as genetic engineering is a process not a product, perhaps this study will help to ease the fears of genetically engineered food and foster a more scientific discussion on the role of agricultural biotechnology."

lseltzer writes "The iPad has dominated the high-end tablet market so far, but that is about to change. At CES in Las Vegas in a couple weeks you will see tablets running Android 4.0 (Ice Cream Sandwich) everywhere and at prices that will make an iPad a lot harder to justify. The competition from the OEM model in the Android markets will massively shift market share away from Apple, just as it has done in the smart phone market."

MrSeb writes "At this point we have a fairly good idea of what Carrier IQ is, and which manufacturers and carriers see fit to install it on their phones, but the Electronic Frontier Foundation — the preeminent protector of your digital rights — has taken it one step further and reverse engineered some of the program's code to work out what's actually going on. There are three parts to a Carrier IQ installation on your phone: The program itself, which captures your keystrokes and other 'metrics'; a configuration file, which varies from handset to handset and carrier to carrier; and a database that stores your actions until it can be transmitted to the carrier. It turns out that that the config profiles are completely unencrypted, and thus very easy to crack."

Das Forefront TMG 2010 von Microsoft ist ein umfängliches Sicherheitssystem mit HTTPS-Untersuchung, URL-Filter und Schutz vor Malware. Bei der Integration in Exchange Server oder SharePoint Server sind ...

Manche Aufgaben lassen sich unter Windows einfach und schnell per Kommandozeile erledigen. Die Befehle versprechen nicht nur prompte Erledigung, sondern lassen sich auch hervorragend in Skripts einbinden.

Eine Sicherheitslücke im Linux-Kernel könnte DoS-Angriffe zulassen. Die virtuelle Maschine KVVM ist betroffen.

Als kleines Extra-Geschenk erhalten alle Leser von TecChannel-Premium das über 240 Seiten starke eBook "IPv6 - Das Praxisbuch" vom MITP-Verlag als kostenlosen Download.

Komponenten, für die kein passender Treiber installiert ist, versieht der Windows-Gerätemanager mit einem gelben Fragezeichen. Mehr Informationen, um die Hardware doch noch zu aktivieren, verrät das Gratis-Tool ...

Durch eine Schwachstelle in älteren Ausgaben von Mozilla Firefox oder Thunderbird lässt sich unter Umständen Systemzugriff ergaunern.

Ultimate RAM-Disk von ArchiCrypt reserviert einen Teilbereich des Arbeitsspeichers, sodass er sich für die Installation von Anwendungen nutzen lässt - ganz wie eine normale Partition. Der Vorteil: Programme ...

Testen Sie Ihr IT-Wissen! Jeden Tag finden Sie bei TecChannel eine Frage aus dem IT-Bereich, deren richtige Antwort Sie als IT-Experte kennen sollten. Machen Sie kostenlos mit und erweitern Sie Ihre IT-Kenntnisse!

Der DB Navigator für iPad ist vor allem ein sehr guter Routenplaner - und zwar nicht nur für die Zugverbindungen der Deutschen Bahn. Auch auf die Fahrpläne anderer öffentlicher Verkehrsmittel hat die ...

Riverbed Technology hat RiOS 7.0 vorgestellt. Die neue Version des Riverbed Optimization Systems (RiOS) unterstützt nun mehr Anwendungen und Protokolle wie zum Beispiel HTTP-Videos, das User Datagram ...

In einem Praxistest untersuchen wir, wie der Microsoft MultiPoint Server 2011 mit den virtuellen Desktops L300 von NComputing zusammenarbeitet. Das System erlaubt Benutzern, von einem zentralen Host aus ...

Die NAS-Server der xs-Serie von Synology unterstützen nun vollständig vSphere 5 von VMware. Mit umfassendem iSCSI-Support sollen sich die Geräte besser in entsprechende virtuelle Umgebungen integrieren ...

Die neue Version 9.0 des Monitoring-Tools von Opmanager automatisiert den IT-Workflow und bietet erweiterte Überwachung virtualisierter Infrastrukturen.

HPs LaserJet M2727NF und M2727NFS arbeiten auf Laserbasis und bieten Netzwerkfähigkeit für Arbeitsgruppen. Das NFS-Modell ist mit einer zusätzlichen 250-Blatt-Papierzuführung sowie einer Heftereinheit ...

Bis Ende 2014 sollen weitere 185 ICE-Züge und die wichtigsten ICE-Strecken mit entsprechender Technik für den Internetzugang ausgerüstet werden. Das haben die Deutsche Bahn und die Deutsche Telekom mitgeteilt.

Obwohl Festplatten sich für die Datensicherung flächendeckend durchsetzen, haben Tape Libraries immer noch ihre Existenzberechtigung. Allerdings verlagern sich das Einsatzgebiet und die automatisierte ...

Mit einer neuen Storage Software Appliance bietet Red Hat Unternehmen mit steigendem Datenbestand einen virtualisierten Speicher an. Die Lösung soll helfen, unstrukturierte Daten zu verwalten.

Mit der sogenannten Enterprise Console in der Version 9.0 des PRTG Network Monitor will der Nürnberger Hersteller Paessler den Administratoren mehr Überblick verschaffen. Damit lassen sich Server und ...

Eine Schwachstelle im beliebten Media-Player VLC könnte sich für unerlaubte Systemzugriffe ausnutzen lassen.

Leiden Sie an Kopfschmerzen, sehen Sie verschwommen oder quälen Sie schmerzhafte Verspannungen im Rücken? Die häufigsten Krankmacher sind Maus, Tastatur, Bildschirm und schlechte Sitzhaltung. Wir zeigen, ...

Microsoft gibt Admins mit dem Windows Defender Offline ein neues Tool an die Hand, mit dem sich Viren, Spyware sowie Rootkits aufspüren und entfernen lassen. TecChannel stellt die Software im Detail vor ...

WirelessKeyView ist ein leichtgewichtiges Tool, mit dem sich WLAN-Passwörter im Klartext extrahieren lassen, solange sich der PC noch mit dem Drahtlosnetzwerk verbinden kann. Ab Version 1.36 sind auch ...

Pünktlich zum Fest beschert Mozilla neue Ausgaben von Firefox, Thunderbird und SeaMonkey. Es gibt nicht nur Geschwindigkeits-Zuwachs, sondern auch wichtige Flicken.

Diese Smartphones haben die TecChannel-Leser 2011 am meisten interessiert! In der Rangliste finden sich neben den üblichen Verdächtigen auch einige Überraschungen. Beliebt sind vor allem Geräte, die viel ...

Die dict.cc-App kann ein Wörterbuch ersetzen und eignet sich besonders für Reisen im Ausland. Die Entwickler bilden den gesamten Wortschatz von dict.cc ab, der sich mittlerweile auf über 700.000 Einträge ...