stupendou writes "Australian and American physicists have built a working transistor from a single phosphorus atom embedded in a silicon crystal. The group of physicists, based at the University of New South Wales and Purdue University, said they had laid the groundwork for a futuristic quantum computer that might one day function in a nanoscale world and would be orders of magnitude smaller and quicker than today's silicon-based machines."
snydeq writes "The Chrome dev team is working toward a vision of Web apps that offers a clean break from traditional websites, writes Fatal Exception's Neil McAllister, in response to Google's new Field Guide for Web Applications. 'When you add it up, it starts to look as though, for all the noise Google makes about Web standards, Chrome is moving further and further apart from competing browsers, just by virtue of its technological advantages. In that sense, maybe Chrome isn't just a Web browser; maybe Chrome itself is the platform — or is becoming one.'"
Saint Aardvark writes "Canada's proposed online surveillance bill looked bad enough when it was introduced, but it gets worse: Section 34 allows access to any telco place or equipment, and to any information contained there — with no restrictions, no warrants, and no review. From the article: 'Note that such all-encompassing searches require no warrant, and don't even have to be in the context of a criminal investigation. Ostensibly, the purpose is to ensure that the ISP is complying with the requirements of the act — but nothing in the section restricts the inspector to examining or seizing only information bearing upon that issue. It's still "any" information whatsoever.'"
Hugh Pickens writes "An era begins to pass as only about 25 percent of today's American population were at least 5 years old when John Glenn climbed into the Friendship 7 Mercury capsule on Feb. 20, 1962 and became the first American to orbit the earth. This weekend John Glenn joined the proud, surviving veterans of NASA's Project Mercury to celebrate the 50th anniversary of his historic orbital flight as Glenn and Scott Carpenter, the two surviving members of the original astronaut corps, thanked the retired Mercury workers, now in their 70s and 80s, who gathered with their spouses at the Kennedy Space Center to swap stories, pose for pictures and take a bow. 'There are a lot more bald heads and gray heads in that group than others, but those are the people who did lay the foundation,' said 90-year-old Glenn. Norm Beckel Jr., a retired engineer who also was in the blockhouse that historic morning, said almost all the workers back then were in their 20s and fresh out of college. The managers were in their 30s. 'I don't know if I'd trust a 20-year-old today.' Bob Schepp, 77, was reminded by the old launch equipment of how rudimentary everything was back then. 'I wonder how we ever managed to launch anything in space with that kind of stuff,' said Schepp. 'Everything is so digital now. But we were pioneers, and we made it all work.'"
wiredmikey writes "The popular free security tool HijackThis has been open sourced by its owner, Trend Micro. The tool scans systems to find settings that may have been modified by spyware, malware or other programs that have wiggled their way onto a system and caused problems. Downloaded over 10 million times, HijackThis generates reports to help users analyze and fix an infected or problem computer. But the tool is not designed for novices – and doesn't actually determine what's good or bad. That's up to you, but it is a good way to keep an eye on things and possibly locate anomalies that may have been missed by other security products. Trend Micro warns that if you don't know what you're doing, it's probably not a good idea to make any changes to your computer settings and system files. Trend Micro acquired the tool from creator Merijn Bellekom in 2007, and has offered it for free ever since, but now is making the code available to the public. The code, originally written in Visual Basic, is now officially available at Sourceforge here."
Layzej writes "Bloggers around the world have been commenting on recently leaked Heartland Institute documents that reveal their internal strategies to discredit climate science. These posters are now under threat of legal action. According to the Heartland Institute 'the individuals who have commented so far on these documents did not wait for Heartland to confirm or deny the authenticity of the documents. We believe their actions constitute civil and possibly criminal offenses for which we plan to pursue charges and collect payment for damages'"
mikejuk writes "Is it possible to write a JavaScript program in no more than a tweet's length? A website called 140byt.es says it is and has an implementation of Tetris to prove it. Ok, it only has two types of block — hence its title "Binary Tetris" — and there's no rotate, but it works. The blocks fall down the screen and you steer them into place. You can try it out by playing the demo. Of course the real fun is in figuring out how it works and there is lots of help on the site — so if your bored how about the 140 character challenge?"
First time accepted submitter debiangruven writes "Human rights Groups are making one final plea to save the life of Canadian programmer, Saeed Malekpour, who was sentenced to death for writing a program to upload photos to the Internet. From the article: 'Malekpour's supporters have created Facebook pages and websites in his support dating to at least 2009. Amnesty International has requested on its website that concerned individuals write Iranian authorities inside and outside the country to demand that Malekpour not be executed."
theodp writes "Microsoft is working on a touch-friendly version of Office for Windows 8, writes GeekWire's Todd Bishop. But what about Microsoft Office on the iPad? 'The decision,' Bishop says, 'will say a lot about Microsoft's priorities in this new era. The company can give Windows 8 a boost if it makes Office exclusive to Windows-based tablets. But that's also a risk. The iPad's momentum not only in the home but in the workplace opens the door for Office alternatives to take hold on the Apple tablet, posing a challenge to Microsoft Office.' Over at Minimal Mac, Patrick Rhone feels Microsoft has bigger problems than the lack of Office apps for iOS and Android. 'Like the curtain finally falling from the Wizard of Oz to find just a small, frail, man pretending to be far more powerful and relevant than he really was,' writes Rhone, 'Microsoft's biggest miss was allowing the world to finally see the truth behind the big lie — they were not needed to get real work done. Or anything done, really. And that will be what ultimately kills them.' Perhaps, but BusinessInsider — which finds it just can't quit Excel — also makes a case for why Microsoft should put Office on every platform. Speaking of the future of Office, did you ever notice how people use MS-Word to convince people to use Google Docs?"
An anonymous reader sends word that Masten Space Systems' Xombie rocket has successfully demonstrated vertical takeoff and landing for NASA's Flight Opportunities Program. It was guided autonomously by the GENIE system from Draper Laboratory. "The rocket rose 164 feet, moved laterally 164 feet, and then landed on another pad after a 67-second flight. The flight represents the first step in developing a test bed capability that will allow for landing demonstrations that start at much higher altitudes-several miles above the ground." This navigation technology is laying the groundwork for future exploration of planets, moons, and asteroids.
Wowsers writes "In vogue with other countries cracking down on freedom and democracy on the internet as discussed in Slashdot recently, the UK is joining in with plans to track all phone calls, text messages, email traffic and websites visited online, all to be stored in vast databases under new government anti-terror plans. As reported in The Telegraph, security services will have access to information about who has been communicating with each other on social networking sites such as Facebook, direct messages between subscribers on Twitter would also be stored, as well as communications between players in online video games. The scheme is a revised version of a plan drawn up by the ex-Labour government which would have created a central database of all the information. The idea was later dropped in favor of requiring communications providers to store the details at the taxpayers' expense."
Trailrunner7 writes "Google is in the process of developing a tool to help users generate strong passwords for the various and sundry Web sites for which they need to register and authenticate. The password-generator is meant to serve as an interim solution for users while Google and other companies continue to work on widespread deployment of the OpenID standard. The tool Google engineers are working on is a fairly simple one. For people who are using the Chrome browser, whenever a site presents them with a field that requires creating a password, Chrome will display a small key icon, letting the users know that they could allow Chrome to generate a password for them."
Titus Andronicus writes "Years in the making, the major new release of VideoLAN's media player has better support for multicore processors, GPUs, and much, much more. From the announcement: 'Twoflower has a new rendering pipeline for video, with higher quality subtitles, and new video filters to enhance your videos. It supports many new devices and BluRay Discs (experimental). Completely reworked Mac and Web interfaces and improvements in the other interfaces make VLC easier than ever to use. Twoflower fixes several hundreds of bugs, in more than 7000 commits from 160 volunteers.'"
Lucas123 writes "New research shows that far more than wireless network or CPUs, the NAND flash memory in cell phones, and in particular smartphones, affects the device's performance when it comes to loading apps, surfing the web and loading and reading documents. In tests with top-selling 16GB smartphones, NAND flash memory slowed mobile app performance from two to three times with one exception, Kingston's embedded memory card; that card slowed app performance 20X. At the bottom of the bottleneck is the fact that while network and CPUs speeds have kept pace with mobile app development, flash throughput hasn't. The researchers from Georgia Tech and NEC Corp. are working on methods to improve flash performance (PDF), including using a PRAM buffer to stage writes or be used as the final location for the SQLite databases."
RedEaredSlider writes "Peter Stone, associate professor of computer science at the University of Texas at Austin, has presented an idea at the AAAS meeting today for managing intersections: a computer in a car calls ahead to the nearest intersection it is headed towards, and says it will arrive at a given time. The intersection checks to see if anyone else is arriving then, and if the slot is open, it tells the car to proceed. If it isn't, it tells the car that the car remains responsible for slowing down or stopping. He says that even with only a few connected cars, the system still works, even if the benefits are still only to those who have the connected vehicles."
Das HTC Titan besticht besonders durch sein schickes 4,7-Zoll großes Display. Der 1,5 GHz starke Prozessor sorgt für stets flüssig laufende Apps. Das Gerät nutzt Windows Phone 7 inklusive Mango-Update ...
Die Summe aller aus dem Festnetz abgehenden Gespräche sei 2011 um 2 Prozent gesunken, so der Branchenverband BITKOM. Damit hätte jeder Deutsche rund 39 Stunden im Jahr per Festnetz telefoniert. Der Anteil, ...
Klein, leicht, leistungsstark: Das ThinkPad X220 ist ein potentes Sub-Notebook für mobile Arbeiter. Wir haben aktuelle Tests, Bilder und technische Daten für Sie zusammengetragen. Alles Wichtige finden ...
IrfanView ist eine leichtgewichtige Software zur Bildbetrachtung. Das Tool taugt allerdings auch für einfache Bildbearbeitung und Dateikonvertierung. Besonders praktisch ist die Batch-Verarbeitung, mit ...
Tools unterstützen den Anwender bei seiner täglichen Arbeit. Die Auswahl an Utilities ist riesengroß, die Qualitätsunterschiede auch. Wir haben die beliebtesten Hilfsprogramme für Sie zusammengestellt.
Die meisten DSL-Router bringen bereits einige Bordmittel zur Verwaltung des Geräts und der Verbindungen mit. Doch erst mit den richtigen Tools lassen sich Komfort und Funktionalität deutlich erhöhen. ...
In bestimmten Fällen ist es notwendig, direkt als Administrator unter Windows 7 zu arbeiten. Doch der Account ist standardmäßig deaktiviert. Während in der Version Professional und Ultimate ein paar Mausklicks ...
Mittels TOR - The Onion Router - können Sie Zensur und Ausspähung im Internet umgehen. Das Tool Vidalia ist ein grafisches Werkzeug, um TOR zu steuern. Mit einfachen Mausklicks können Sie sich neue Identitäten ...
Testen Sie Ihr IT-Wissen! Jeden Tag finden Sie bei TecChannel eine Frage aus dem IT-Bereich, deren richtige Antwort Sie als IT-Experte kennen sollten. Machen Sie kostenlos mit und erweitern Sie Ihre IT-Kenntnisse!
Der Mac mini besitzt serienmäßig eine 2,5-Zoll-Festplatte. Wer die optionale SSD will, muss bei Apple tief in die Tasche greifen. Wir zeigen, wie Sie die Umrüstung auf eine Solid State Disk selbst erledigen. ...
Mit iThoughtsHD erstellen Sie auf dem iPad in kurzer Zeit ansehnliche Mindmaps. Alle Grafiken lassen sich zum PC exportieren und dort weiter bearbeiten. Auch die Bildausgabe per VGA-Adapter wird unterstützt. ...
Sind Sie auch am Telefon für Ihre Kunden erreichbar, können Sie ihnen die aufgewandte Zeit eventuell sogar in Rechnung stellen. Hierfür eignet sich der Call Time Tracker. Am Ende jedes Gesprächs wird ...
DEFT Linux 7 ist eine umfangeiche und mächtige Sicherheits-Distribution in Form einer Live-DVD. Das besondere: DEFT Linux 7 bringt viele bekannte Windows-Tools mit und führt diese per WINE aus.
Mit der Comodo Firewall verbessern Sie die Sicherheit Ihres Windows-PC. Die Software blockiert ein- und ausgehende Verbindungen, sofern sie den selbst definierten Sicherheitsrichtlinien widersprechen. ...
Für Windows Phone 7 bietet Microsoft die "Group Policy Search"-App an, in der Informationen über alle Gruppenrichtlinienobjekte von Windows zusammengefasst sind. Die App eignet sich als Nachschlagewerk ...
Die Everything Search Engine spürt auf dem PC abgelegte Dateien in Sekundenbruchteilen auf. Dazu legt das Tool keine eigene Datenbank an, sondern greift direkt auf den NTFS-Index zu. Entfernte Computer ...
Storage-Tools sind unentbehrliche Helfer für die Festplatten- und Datenverwaltung. Sie übernehmen lästige Standardaufgaben und ergänzen die Bordmittel des Betriebssystems. Wir haben die zehn beliebtesten ...
Das Wiederherstellen gelöschter Konten im Active Directory ist aufwendig und kostet viel Zeit. ADRestore hilft hier und beschleunigt den Vorgang immens. Das Tool ist nur wenige KByte groß. Wir haben die ...
Viele IT-Freelancer sehen sich als Berater, Coach und Trainer. Auftraggeber nehmen sie allerdings nicht so wahr, wie eine Studie der Bundeswehr-Uni zeigt. Zwar herrscht Einigkeit über die Erfolgsfaktoren ...
Phishing-Angriffe, Bespitzelung und Spam können jeden treffen. Deshalb tut Selbstschutz Not. Ein wichtiges Hilfsmittel dazu sind Security-Tools. Wir stellen Programme vor, die Windows-PCs im Netz sicherer ...
Die kostenlose Betaversion von Norton Mobile Security für Android bietet unter anderem einen Virenscanner, der zeitgesteuert den Telefonspeicher nach Malware durchsucht, Remote Wipe sowie eine Filter ...
Snort ist ein plattformunabhängiges Intrusion Detection System, mit nahezu einer halben Million Nutzern. Das Tool bietet umfangreiche Regelsätze die regelmäßig erweitert werden. Eine Enterprise Variante ...
In manchen Fällen reizen moderne SSDs die verfügbare Bandbreite von SATA II bereits aus. Die Crucial RealSSD C300 besitzt daher eine aktuelle SATA-III-Schnittstelle die bis zu 6 GBit/s leistet - mit messbarem ...
RegenRadar zeigt Ihnen auf einer sehr übersichtlich Deutschlandkarte, wie sich aktuelle Regenfelder bewegen. So können Sie leicht abschätzen ob Sie einen Regenschirm mitnehmen sollten oder ob Gewitter ...
Mit dem Virtual Router Manager lässt sich jede Windows-7-Installation als WiFi-Hotspot nutzen. Hierzu greift das Tool auf systemeigene Funktionen des Betriebssystems zurück und bietet für diese eine Verwaltungsoberfläche ...