| Thursday July 24th 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

Posts Tagged ‘computer’

Raspberry Pi purchase and setup guide for developers

Raspberry Pi purchase and setup guide for developers

The following are the steps I took to get my raspberry pi set up for development. I like to keep wires to a minimum, so by the end of this you should be able to plug your rPi into an outlet somewhere and connect to it remotely via ssh. (more…)

Microsoft Surface reviews are out

Microsoft Surface reviews are out

AnandTech brought up a point I hadn't considered. The Surface RT is theoretically capable of working with a wide array of peripherals, but they need special ARM drivers for it. Essentially, you'll be able to plug in anything to a Surface Pro though. (Printer, scanner, etc) Reviews after the jump... (more…)

DMX uses Google (and possibly a computer) for the first time

Not staged at all.

New 3D imagery for Google Earth for mobile

Since 2006, we've had textured 3D buildings in Google Earth, and we're excited to announce that we'll begin adding 3D models to entire metropolitan areas to Google Earth on mobile devices in the near future. Thanks to new imagery rendering techniques and computer vision, we're able to create 3D cityscapes, complete with buildings, terrain and [...]

Richard Stallman Weighs In On The Check Engine Light

Richard Stallman Weighs In On The Check Engine Light

My fight against the check engine light still goes on, though, like an uncle with an extensive collection of pornography, I'm sure many of you were hoping I'd just keep it to myself. Well, like your pervy uncle, I won't. I can't. And, I'm not alone. Among the many emails I received, most suggesting I speak with my clergyperson, I received an [...]

Tool for finding out what information your apps are leaking

Tool for finding out what information your apps are leaking

mitmproxy, "an SSL-capable man-in-the-middle proxy," is a useful little free software utility that can sniff the traffic between your computer or mobile device and its servers and determine what data the apps you're running are leaking to the mothership. mitmproxy is an SSL-capable man-in-the-middle HTTP proxy. It provides a console interface [...]

RIP Dennis Ritchie, 1941-2011: Computer scientist, Unix co-creator, C programming language designer

RIP Dennis Ritchie, 1941-2011: Computer scientist, Unix co-creator, C programming language designer

Computer scientist Dennis Ritchie is reported to have died at his home this past weekend, after a long battle against an unspecified illness. No further details are available at the time of this blog post. Wikipedia biography here. He was the designer and original developer of the C programming language, and a central figure in the [...]

Richard Stallman on Steve Jobs

Richard Stallman on Steve Jobs

Stallman is right in that Jobs was "the pioneer of the computer as a jail made cool" and unlike Gates (which at least played a huge role in first making computers available for businesses and then cheap PCs available for the masses - and without which the Open Source movement would have still been today a thing for a small group of academics), [...]

You are Here by Colin Ellard

You are Here by Colin Ellard

We live in a world crowded by street signs and arrows. With the click of a computer mouse we can find exact directions to just about anywhere on earth, and with a hand-held GPS we can find our precise latitude and longitude, even in the remotest of places. But despite all our advancements, we still get lost in the mall, can’t follow directions [...]

iOS devices secretly log and retain record of every place you go, transfer to your PC and subsequent devices

iOS devices secretly log and retain record of every place you go, transfer to your PC and subsequent devices

Security researchers presenting at the Where 2.0 conference have revealed a hidden, secret iOS file that keeps a record of everywhere you've been. The record is synched to your PC and subsequently resynched to your other mobile devices. The file is not transmitted to Apple, but constitutes a substantial privacy breach if your PC or mobile [...]

Marketplace for hijacked computers

Marketplace for hijacked computers

Brian Krebs went browsing in an underground proxy marketplace, where criminals rent time on hijacked computers to other criminals who want to use the compromised machines as launching-grounds for untraceable networked attacks. Krebs traced down some of the people whose computers were up for rent and let them know that they were being bought [...]

Encom uses a very high-tech operating system

Encom uses a very high-tech operating system

and so did Flynn when designing Tron... For a computer he had to wipe off, it sure is an unstable piece of crap (8 days uptime?). Also, it's running Xorg, which is only 6 years old.

BookArc laptop stand “speeds up” your computer

BookArc laptop stand “speeds up” your computer

Twelvesouth makes the $39.99 BookArc, a MacBook Air stand that helps you keep your desk tidy when you want to hook it up to a keyboard, external display and so forth. The marketing literature makes an interesting point about its product: Want to Speed Up Your MacBook Air? Try a BookArc. Really. BookArc for MacBook Air is more than a [...]

AI vs. IQ: IBM’s Watson takes on the meatbags on Jeopardy

This week on "Jeopardy!," various champions of the popular television game show face off against the new IBM computer, Watson, which was developed to compete in human brain games. It's not a supercomputer, per se--some TV show hosts and bloggers have misidentified it as such--but it is a very interesting application of AI. (more…)

Woz on Network Neutrality

Woz on Network Neutrality

Writing in the Atlantic, Apple co-founder and hardware wizard Steve Wozniak defends Network Neutrality, describing open, neutral networks as a boon to creators, innovators and entrepreneurs... Imagine that when we started Apple we set things up so that we could charge purchasers of our computers by the number of bits they use. The personal [...]

HOWTO: Avoid online tracking (Hint: you can’t)

HOWTO: Avoid online tracking (Hint: you can’t)

Christopher Maag, writing for credit.com, says that any attempt to maintain your privacy online is doomed. Deleting cookies won't work, banning cookies won't work, and using privacy tools won't work, either. Even after you set your browser to delete existing cookies and ban new ones, download super-cookies and use the tools created by [...]

What happens when you steal a hacker’s computer

Lessons learnt: When you steal a computer, first thing to do is reinstall OS and remove serial numbers.

Top 15 Surprising Facts About The Original TRON

Top 15 Surprising Facts About The Original TRON

Even though the original Tron (1982) is twenty-eight years old, there's sill a lot of things most people don't know about the film. In honor of the release of the sequel Tron: Legacy, tonight/tomorrow, here are the top 15 facts you don't know. (more…)

$2K bounty for free/open Kinect drivers (Microsoft thinks this is illegal!)

$2K bounty for free/open Kinect drivers (Microsoft thinks this is illegal!)

Microsoft has just released its Kinect camera, a USB device that allows you to control your computer with gestures. It incorporates a motorized pivot, an RGB camera, depth-sensor and multi-array microphone "which provides full-body 3D motion capture, facial recognition, and voice recognition capabilities." The Adafruit Industries people are [...]

Microsoft’s DRM makes your computer vulnerable to attack

Microsoft’s DRM makes your computer vulnerable to attack

The msnetobj.dll library is an ActiveX control used by Microsoft's DRM; it is intended to prevent the owner of a computer from saving or viewing certain files except under limited circumstances, and to prevent the computer's owner from disabling it or interfering with it. As if that wasn't bad enough, it is also vulnerable to three separate [...]

 Page 1 of 2  1  2 »