The leaders who run the internet’s technical global infrastructure say the time has come to end U.S. dominance over it.In response to leaks by NSA whistleblower Edward Snowden, Fadi Chehadé, who heads the Internet Corporation for Assigned Names and Numbers, and others have called for “an environment, in which all stakeholders, including all governments, participate on equal footing.”Among other things, they were concerned “over the undermining of the trust and confidence of internet users globally due to recent revelations of pervasive monitoring and surveillance.”
Have you ever felt that sinking feeling as you dropped you smart phone, then watched in horror as its sleek glass screen shattered on the pavement?Never fear, as across the globe, researchers are racing to develop a phone that is virtually unsmashable. This hardy device could also bend, roll and even be transparent. More remarkable still, the next generation phone could be printed, making it potentially very cheap.
Google has shared some of its best practices over the years, but other parts of its data center operations have remained under wraps. One of the best-kept secrets has been the details of its cooling system, which allows Google to pack tens of thousands of servers into racks.
Google Senior Director of Data Centers Joe Kava discussed the design of its cooling system with Data Center Knowledge in connection with the company’s publication of a photo gallery and a StreetView app that provide Google’s millions of users with a look inside its data centers. If you’re one of those data center managers who worries about having water in close proximity to the IT equipment, what you’re about to read might make you nervous.
Not having a smartphone or access to a high-speed mobile network doesn’t mean you don’t still want your phone to act brainy and speedy. That’s the premise behind Australian startup biNu, whose free Java app can be downloaded onto most basic phones and used over 2G wireless networks—which remain common in many developing countries—to update Facebook and Twitter, read news, search the Web, and more.
You could use a mobile browser to do the same thing, but biNu cofounder Gour Lentell says biNu’s software is much faster and more data-efficient because it shifts most of the data processing away from the phone and onto distant servers.
Building an amazing desktop computer is easy, but even after you stuff your new system with the latest hardware, hook up your cabling, and make room for your giant monitor, you’re not quite done. Make it easy on the eyes with this handy guide.
By David Murphy, PCWorld Jul 6, 2012 11:00 am
Building a desktop computer that’s amazing is easy, if a little time-consuming. But even after you’ve stuffed your new system with all the latest hardware, hooked up your cabling, and cleaned off your desk for a giant monitor, you’re not quite done.
Your new desktop masterpiece is going to do you little good if you can use it for only a few hours each day. And you have the failure of your own biology to thank for that: Humans were made to be hunters, gatherers, and thinkers, not desk jockeys.
The world wide web went live, on my physical desktop in Geneva, Switzerland, in December 1990. It consisted of one Web site and one browser, which happened to be on the same computer. The simple setup demonstrated a profound concept: that any person could share information with anyone else, anywhere.
Artwork by a NSW youngster will be transmitted to the world on Australia Day by one of the internet’s most viewed websites, Google.
The ‘doodle’ by Jessie Du, an 11-year-old girl from Sydney’s west, will be displayed on Google Australia’s homepage on Australia Day next year
The annual summer bug parades at Black Hat and Defcon always leave me questioning motives. This year, as in the past, we witnessed a deluge of vulnerability disclosures, and many of them seemed to me to be beyond irresponsible. They were attempts at naked glory mongering, and that just plain stinks.
Before I defend my claims, I’ll say that I am a huge fan of freedom of speech. I don’t begrudge anyone the right to publish the results of their work. That’s not my point. My point is that it isn’t always responsible to exercise one’s rights.
I’ll use two of the vulnerabilities disclosed last week to illustrate what I’m talking about: the Apple iPhone SMS vulnerability and the Computrace LoJack laptop firmware vulnerability. Please note that I’m basing my statements on published reports of these vulnerabilities. I have no inside knowledge of how these issues were handled either by the product vendors or by the analysts who discovered and reported them.
According to the published reports, both of these vulnerabilities were reported to the respective vendors a fairly short time prior to Defcon and Black Hat, which were held at the end of July, and neither vendor had repaired its respective security defect by the time it was unveiled at the security conferences. There are
This is so true – my browser was stuffed with things I never or hardly ever used…..