theodp writes "Wired's Cade Metz has the scoop on the move away from U.S. network equipment stalwarts, calling it of the best-kept secrets in Silicon Valley. 'Cloud computing is an arms race,' writes Metz. 'The biggest web companies on earth are competing to see who can deliver their services to the most people in the shortest amount of time at the lowest cost. And the cheapest arms come straight from Asia.' Or, as Joyent's Howard Wu puts it, 'It's kind of like buying couches. If you buy one, you go to a retail store. If you buy 10,000 couches, you go straight to the factory.'"
Fluffeh writes "The EFF has filed a brief in Federal Court on behalf of Kyle Goodwin (and potentially millions of other users) so that he can access his legally sound backup files. 'Goodwin is a local high school sports reporter and the sole proprietor of the company OhioSportsNet, who stored his video footage on Megaupload.com as a backup to his video library on his hard drive. He had paid €79.99 (about $107) for a two-year premium membership. Just days before the government seized the site, Goodwin's hard drive crashed. The brief states that his lost videos include footage to make highlight reels for parents to send to their children's prospective colleges, and an unfinished full-length documentary about the Strongsville girls soccer team's season.' According to the EFF, authorities told Carpathia (the hosting company that MegaUpload was using to host their content to the tune of $9,000 a day) that after it was done examining the servers and had copied portions of the data, the hosting company could delete the files and re-purpose its servers. Carpathia noted in a statement last week that it would like to allow Megaupload users to recover their data, but has struggled to find a way to do so."
guttentag writes "The New York Times has published a large collection of law enforcement training documents obtained by the ACLU. The documents describe in detail what kind of information can be obtained from cell phones and cell phone carriers, and how to obtain it. The 189-page PDF also contains dozens of invoices from the major carriers for their services to law enforcement that describe the fees for those services."
Hugh Pickens writes "As the Trayvon Martin controversy splinters into a debate about self-defense, a central question remains: Who was heard crying for help on a 911 call in the moments before the teen was shot? Now the Orlando Sentinel reports that Tom Owen, a leading expert in the field of forensic voice identification sought to answer that question by analyzing the recordings. His result: It was not George Zimmerman who called for help. Owen, forensic consultant for Owen Forensic Services LLC and chair emeritus for the American Board of Recorded Evidence, used voice identification software to rule out Zimmerman. Another expert contacted by the Sentinel, utilizing different techniques, came to the same conclusion. Owen used software called Easy Voice Biometrics to compare Zimmerman's voice to the 911 call screams. 'I took all of the screams and put those together, and cut out everything else,' says Owen. The software compared that audio to Zimmerman's voice and returned a 48 percent match. Owen says to reach a positive match with audio of this quality, he'd expect higher than 90 percent. Owen cannot confirm the voice as Trayvon's, because he didn't have a sample of the teen's voice to compare however 'you can say with reasonable scientific certainty that it's not Zimmerman.'"
gManZboy writes "Six years and $450 million into the project, the FBI's Sentinel case-management system appears to be almost ready for deployment. Sentinel aims to replace a hodge-podge of digital and paper processes with purely digital workflows, helping FBI agents collaborate and "connect the dots" on investigations. The question now is how well the problem-plagued system will live up to those expectations. FBI CIO Chad Fulgham demonstrated Sentinel for InformationWeek on March 28, the first time the agency has shown its new case-management system to an outsider. 'This isn't just a case-management system. It's a great platform to grow on,' Fulgham said during the demo at FBI headquarters. The agency's IT team plans to move other apps over to Sentinel, giving them a similar look and feel on the same underlying hardware."
CowboyRobot writes "The US Navy is months away from requesting bids from contractors to construct a laser weapon for its ships, now that the technology is feasible. 'The key point came last April, when the Navy put a test laser firing a (relatively weak) 15-kilowatt beam aboard a decommissioned destroyer... the Martime Laser Demonstrator cut through choppy California waters, an overcast sky and salty sea air to burn through the outboard engine of a moving motorboat a mile away.'"
An anonymous reader writes "You can add this one to the short but growing list of employers demanding access to Facebook accounts. After refusing to give her Facebook password to her supervisors, Kimberly Hester was fired by Lewis Cass Intermediate School District from her job as an aide to Frank Squires Elementary in Cassopolis, Michigan. She is now fighting a legal battle with the school district."
First time accepted submitter cardpuncher writes "Having opposed the previous government's attempts to introduce mass surveillance of Internet communications, the Conservatives are planning to introduce the very same policy they previously described as a 'culture of surveillance which goes far beyond counter terrorism and serious crime.' The plan is essentially to allow stored communication data to be trawled without the inconvenience of needing a warrant or even any reasonable suspicion."
Trailrunner7 writes "Yahoo has decided that it's now time to start implementing a Do Not Track system across its various Web properties. The company is one of the last large Web content providers to officially commit to using a DNT technology, and Yahoo said that it plans to have the system implemented by early summer. Yahoo officials said that their Do Not Track implementation has been in development since 2011 and that it will be a simple way for consumers to turn on the DNT option."
AbsoluteXyro writes "Today users of Google Maps will notice a new mapping option — 'Quest' — alongside the usual 'Map' and 'Satellite' views. Quest view renders the planet in a retro 8-bit fantasy video game style, including renders of famous landmarks such as the White House and the Eiffel Tower. Even Pegman gets in on the game, now taking on the appearance of a sword wielding 8-bit adventurer, allowing you to witness Street View through 8-bit eyes. Basically, imagine a fully functioning Google Maps on an NES."
First time accepted submitter phaedrus9779 writes "I'm a recently married man about to take on the next big adventure: home ownership! I came across a great house in a great community but I need a little bit extra: a high tech house. The problem: money, I'm on a budget. I'd love to have home theaters, super high tech weather stations and iPads seamlessly installed in all the walls — but this just isn't possible. So my question to the Slashdot community is: how can I build a high tech house that will be the envy of my friends, provide lots of useful gadgets, and not break the bank? Also, as always, the cooler the better!"
Hugh Pickens writes writes "Michael Scherer writes that the Obama fundraising machine has deployed a new cellular campaign weapon designed 'to trigger the campaign finance equivalent of an impulse buy' during key political moments in the campaign. The tool links two familiar technologies, SMS and one-click purchasing, by sending out an SMS message to cell phones and smart phones of tens of thousands of previous campaign donors giving them a one-click option to give more money. 'Campaign officials hope to be able to return to donors in key moments of emotional excitement,' writes Scherer. One person familiar with the ask says that the response rate has been more than 20 times greater than any text message solicitation Obama has sent out before and and the reason is simple: Even with an iPhone, it remains an arduous hassle to enter all the information that is typically required to buy anything online with a credit card. The trick is that anyone who gives even a few dollars to the Obama campaign is asked if they want to keep their credit cards on file to participate in what the campaign calls 'Quick Donate.' Now donors just need to write '25,' or '10,' and that amount of dollars is immediately drawn from their credit cards. One of the Obama campaign's best fundraising days in 2008, for instance, came right after Sarah Palin's convention speech. Now partisans can 'vent their outrage or enthusiasm by simply typing one number into their phone.'"
00_NOP writes "Everybody (or almost everybody) in England agrees that computing teaching to kids in high school is broken. In response the government promised a radical overhaul and a new curriculum. But then last week it was discovered the government had scrapped the bit of the education department that would develop any such curriculum. Not to be deterred, John Naughton, the Cambridge University academic who wrote the Short History of the Future, has now published his own 'radical' manifesto on how computing should be taught."
An anonymous reader writes "It is no secret that the MPAA was a main facilitator of the criminal investigation against Megaupload. While the movie studios have praised the actions of the U.S. Government, they are not satisfied yet. Paramount Pictures' vice president for worldwide content protection identified Fileserve, MediaFire, Wupload, Putlocker and Depositfiles as prime targets that should be shuttered next."
Die Notebook Serie 5 Ultra stellt die Ultrabook-Interpretation von Samsung dar. Die Notebooks der Serie 5 Ultra kommen im 13-Zoll-Format und sind Ultrabook typisch äußerst flach. Verfügbar sind die Geräte ...
Der TP-Link TL-MR3020 ist ein kleiner, schick designter 3G-Wireless-Router. Die kompakten Abmessungen von 74 x 67 x 22 mm machen das Gerät für Vielreisende durchaus interessant. Ein eigener SIM-Karten-Slot ...
NetCounter hilft Ihnen, Ihr monatliches Datenvolumen nicht mehr zu überschreiten. Die Android-App dokumentiert im Hintergrund den angefallenen Traffic und unterscheidet sogar zwischen WLAN- und 3G-Datenverkehr. ...
Der kostenlose RootkitBuster von Trend Micro untersucht den Windows-PC nach auffälligen Spuren im System und beseitigt einen eventuellen Malware-Befall. Zu den analysierten Systembereichen zählen unter ...
Auf einem USB-Stick lassen sich Daten zusammen mit den passenden Anwendungen transportieren. Einstecken und loslegen - und alles ist dabei, was Windows-Nutzer unterwegs zum Arbeiten in vertrauter Umgebung ...
Mit Notepad++ gibt es einen kostenlosen Editor, der verschiedene Zeichensätze unterstützt und automatisch Programmiersprachen erkennt und optisch strukturiert. Aber auch für die schnelle und einfache ...
PC Decrapifier entfernt überflüssige Test- und Demoprogramme, die PC-Hersteller auf neuen Rechnern vorinstallieren. Um die Details der betreffenden Software braucht sich der Anwender dabei nicht zu kümmern.
Devolo bietet mit dem Powerline-Kit dLAN 500 AVtriple+ eine Netzwerklösung an, die bis zu drei Netzwerkanschlüsse gleichzeitig unterstützt. Die Daten werden dabei über die herkömmlichen Hausstromleitungen ...
DEFT Linux 7 ist eine umfangeiche und mächtige Sicherheits-Distribution in Form einer Live-DVD. Das besondere: DEFT Linux 7 bringt viele bekannte Windows-Tools mit und führt diese per WINE aus. Wir haben ...
Testen Sie Ihr IT-Wissen! Jeden Tag finden Sie bei TecChannel eine Frage aus dem IT-Bereich, deren richtige Antwort Sie als IT-Experte kennen sollten. Machen Sie kostenlos mit und erweitern Sie Ihre IT-Kenntnisse!
Mit der Advanced Task Killer App beenden Sie im Hintergrund laufende Programme, die unnötig Systemressourcen belegen. Ungewünschte Apps beenden Sie entweder manuell oder automatisch nach von Ihnen festgelegten ...
Der Fujitsu ESPRIMO E900 hat ein Volumen von unter 13 Litern und ist damit selbst in den kleinsten Büros problemlos unterzubringen. Das Gehäuse ist zudem so designt, dass sowohl horizontaler als auch ...
Snort ist ein plattformunabhängiges Intrusion Detection System, mit nahezu einer halben Million Nutzern. Das Tool bietet umfangreiche Regelsätze die regelmäßig erweitert werden. Eine Enterprise Variante ...
Die App von RIM ist eine kostenloses Sicherheitslösung für BlackBerrys. Die können mit BlackBerry Protect die auf Ihrem Smartphone gespeicherten Daten sichern. Außerdem lassen sich die Informationen im ...
Das kostenlose Programm USB Image Tool kann die Daten auf einzelnen USB-Geräten komfortabel archivieren und per Favoritenlisten verwalten. Dabei legt das Tool entsprechende komprimierte Backups von den ...
Auf den meisten Windows-Rechnern gibt der Desktop ein schwaches Bild ab. Entweder er wird kaum für persönliche Verknüpfungen genutzt oder er ist mit Icons überfüllt. Nützliche Gratis-Tools für den Arbeitsplatz ...
Know-how für die Karriere fehlt selbst Führungskräften. Das beschreibt Psychologe Christoph Burger n seinem Buch "Karriere ohne Schleimspur". Die hierfür befragten Probanden schätzten die Voraussetzungen ...
Vor dem Einsatz im produktiven Umfeld ist ein Stabilitätstest des neuen Systems empfehlenswert. HeavyLoad führt einen Burn-in-Test auf dem PC oder Server durch und zeigt sofort jegliche Systeminstabilität ...
Bordmittel für sicheres Surfen, Verwalten von Passwörtern und geschütztes Datei-Handling sind in Windows und Linux bereits rudimentär vorhanden. Doch erst mit den richtigen Tools lassen sich Komfort und ...
Unter iOS gibt es mit dem Atomic Web Browser eine gute und günstige Alternative zum serienmäßigen Safari. Neben Tabbed Browsing, integriertem Adblocker und Download-Manager gehört auch die Multi-Gestensteuerung ...
Microsoft Security Essentials steht als grundlegende Sicherheitssoftware jedem Besitzer einer gültigen Windows-Lizenz zur Verfügung und kann kostenlos heruntergeladen werden. Die Anwendung bietet sich ...
Warum umständlich Programme starten, wenn sich die Aufgabe mit einem Klick der rechten Maustaste auch erledigen lässt! Die Kontextmenüs von Windows und in vielen Programmen werden häufig vernachlässigt, ...
Virtualisierungtechnologien auf dem eigenen PC zu nutzen birgt neben vielen Vorteilen auch eine Reihe von Risiken. Wir erläutern, welchen Sicherheitsgefahren Ihr Computer durch Virtualisierung ausgesetzt ...
Eine Speicherkapazität von 1 TByte im 2,5-Zoll-Formfaktor ist nichts Besonderes mehr. Samsungs SpintPoint M8 HN-M101MBB benötigt hierfür allerdings keine Bauchhöhe von 12,5 mm, ihr genügen die üblichen ...
Per WhatsApp Messenger verschicken iPhone-Benutzer Nachrichten, Bilder und Videos kostenlos von Gerät zu Gerät. Auch für Android, BlackBerry und Symbian ist der Client erhältlich. Seit März 2012 ist eine ...