Tech News Feed

Silicon-laced diamonds could lead to practical quantum computers

Engadget - Mon, 2017-05-29 04:52
Scientists already believe that diamonds could be a solid foundation for practical quantum computers. You can use atom-scale defects in diamond to store quantum bits that hold contradictory data (say, both on and off) in a way that lets you read the...

Asus ZenBook Pro has plenty of inner pieces - CNET

CNET News - Mon, 2017-05-29 04:43
Fitting a spec list like this in 18.9mm is basically a magic trick.

Thin is in with the Asus ZenBook Flip S - CNET

CNET News - Mon, 2017-05-29 04:28
Say hello to the thinnest convertible laptop ever made.

Asus VivoBook Pro is all in on 'profordability' - CNET

CNET News - Mon, 2017-05-29 04:27
Asus goes pro with a very MacBookish laptop.

Asus VivoBook S does cheap right - CNET

CNET News - Mon, 2017-05-29 04:05
Unveiled at Computex 2017, the Asus VivoBook S proves "budget" is not a dirty word.

Asus goes big on slim laptops at Computex - CNET

CNET News - Mon, 2017-05-29 03:37
The Taiwanese electronics maker goes back to its PC roots at the annual event with nary a new phone in sight.

ESR Announces The Open Sourcing Of The World's First Text Adventure

SlashDot - Mon, 2017-05-29 03:30
An anonymous reader writes: Open source guru Eric S. Raymond added something special to his GitHub page: an open source version of the world's first text adventure. "Colossal Cave Adventure" was first written in 1977, and Raymond remembers it as "the origin of many things; the text adventure game, the dungeon-crawling D&D (computer) game, the MOO, the roguelike genre. Computer gaming as we know it would not exist without ADVENT (as it was known in its original PDP-10 incarnation...because PDP-10 filenames were limited to six characters of uppercase)... "Though there's a C port of the original 1977 game in the BSD game package, and the original FORTRAN sources could be found if you knew where to dig, Crowther & Woods's final version -- Adventure 2.5 from 1995 -- has never been packaged for modern systems and distributed under an open-source license. Until now, that is. With the approval of its authors, I bring you Open Adventure." Calling it one of the great artifacts of hacker history, ESR writes about "what it means to be respectful of an important historical artifact when it happens to be software," ultimately concluding version control lets you preserve the original and continue improving it "as a living and functional artifact. We respect our history and the hackers of the past best by carrying on their work and their playfulness." "Despite all the energy Crowther and Woods had to spend fighting ancient constraints, ADVENT was a tremendous imaginative leap; there had been nothing like it before, and no text adventure that followed it would be innovative to quite the same degree."

Share on Google+

Read more of this story at Slashdot.

ASUS blew a hole in its newest wireless router

Engadget - Mon, 2017-05-29 02:30
Wireless routers have been, for years, ugly black rectangles that we've habitually tried to bury behind our TVs and bookshelves. ASUS is hoping that you'll think differently about the Blue Cave, its new WiFi router that looks like an electric pencil...

ASUS ZenBook Pro UX550 is a powerhouse with a 4K touchscreen

Engadget - Mon, 2017-05-29 02:20
It's been well over two years since ASUS announced its original ZenBook Pro, and while it received a spec bump late last year, it's about time for the company to revamp its premium desktop replacement line. Announced at the "Edge of Beyond" event ahe...

Mind-controlled glove teaches stroke patients to move again - CNET

CNET News - Mon, 2017-05-29 02:18
A wearable robotic glove makes use of brain signals to help stroke patients restore the use of their hands.

ASUS' ZenBook Flip S is the thinnest convertible yet

Engadget - Mon, 2017-05-29 02:15
If you're shopping for a new laptop for the back-to-school season, get ready to be spoiled for choice. At its event in Taiwan today, ASUS showed off a slew of new laptops and convertibles, leading with the ZenBook Flip S, which the company says is th...

Computex 2017 is set to push the PC envelope - CNET

CNET News - Mon, 2017-05-29 00:46
Who said anything about a PC slump? The giants of the computing industry are in Taipei this week, hoping to bring the enthusiast scene to the mainstream.

WannaCry creators could be native Chinese speakers - CNET

CNET News - Mon, 2017-05-29 00:36
New analysis from Flashpoint churns up evidence that WannaCry ransom notes were written by native Chinese speakers.

US Senators Propose Bug Bounties For Hacking Homeland Security

SlashDot - Mon, 2017-05-29 00:30
An anonymous reader quotes CNN: U.S. senators want people to hack the Department of Homeland Security. On Thursday, Senators Maggie Hassan, a Democrat and Republican Rob Portman introduced the Hack DHS Act to establish a federal bug bounty program in the DHS... It would be modeled off the Department of Defense efforts, including Hack the Pentagon, the first program of its kind in the federal government. Launched a year ago, Hack the Pentagon paved the way for more recent bug bounty events including Hack the Army and Hack the Air Force... The Hack the DHS Act establishes a framework for bug bounties, including establishing "mission-critical" systems that aren't allowed to be hacked, and making sure researchers who find bugs in DHS don't get prosecuted under the Computer Fraud and Abuse Act. "It's better to find vulnerabilities through someone you have engaged with and vetted," said Jeff Greene, the director of government affairs and policy at security firm Symantec. "In an era of constrained budgets, it's a cost-effective way of identifying vulnerabilities"... If passed, it would be among the first non-military bug bounty programs in the public sector.

Share on Google+

Read more of this story at Slashdot.

ARM's new mobile processors are built for AI on the go

Engadget - Mon, 2017-05-29 00:00
When ARM showed up at Computex last year, it brought a bundle of smartphone processors that pushed for better mobile VR. As you might've noticed, though, AI is one of the big new trends in mobile this year — is it any surprise that the ARM's pu...

Zepp phone apps use AI to study your basketball shots

Engadget - Sun, 2017-05-28 22:45
You may know Zepp for sports tracking sensors you can slap on your baseball bat or soccer ball, but its latest tracking involves little more than your phone and a good view of the action. Its game recording and training apps (Android, iOS) are adding...

Walt Mossberg's Last Column Calls For Privacy and Security Laws

SlashDot - Sun, 2017-05-28 21:30
70-year-old Walt Mossberg wrote his last weekly column Thursday, looking back on how "we've all had a hell of a ride for the last few decades" and revisiting his famous 1991 pronouncement that "Personal computers are just too hard to use, and it isn't your fault." Not only were the interfaces confusing, but most tech products demanded frequent tweaking and fixing of a type that required more technical skill than most people had, or cared to acquire. The whole field was new, and engineers weren't designing products for normal people who had other talents and interests. But, over time, the products have gotten more reliable and easier to use, and the users more sophisticated... So, now, I'd say: "Personal technology is usually pretty easy to use, and, if it's not, it's not your fault." The devices we've come to rely on, like PCs and phones, aren't new anymore. They're refined, built with regular users in mind, and they get better each year. Anything really new is still too close to the engineers to be simple or reliable. He argues we're now in a strange lull before entering an unrecognizable world where major new breakthroughs in areas like A.I., robotics, smart homes, and augmented reality lead to "ambient computing", where technology itself fades into the background. And he uses his final weekly column to warn that "if we are really going to turn over our homes, our cars, our health and more to private tech companies, on a scale never imagined, we need much, much stronger standards for security and privacy than now exist. Especially in the U.S., it's time to stop dancing around the privacy and security issues and pass real, binding laws."

Share on Google+

Read more of this story at Slashdot.

'Rime' creators will remove anti-tampering code if it's cracked

Engadget - Sun, 2017-05-28 21:17
Game studios that use digital rights management (DRM) tools tend to defend it to the death, even after it's been cracked. It prevents 'casual' piracy and cheating, they sometimes argue. However, Rime developer Tequila Works is taking a decidedly diff...

Leaked 'Standing Rock' Documents Reveal Invasive Counterterrorism Measures

SlashDot - Sun, 2017-05-28 19:30
An anonymous reader writes: "A shadowy international mercenary and security firm known as TigerSwan targeted the movement opposed to the Dakota Access Pipeline with military-style counterterrorism measures," reports The Intercept, decrying "the fusion of public and private intelligence operations." Saying the private firm started as a war-on-terror contractor for the U.S. military and State Department, the site details "sweeping and invasive" surveillance of protesters, citing over 100 documents leaked by one of the firm's contractors. The documents show TigerSwan even havested information about the protesters from social media, and "provide extensive evidence of aerial surveillance and radio eavesdropping, as well as infiltration of camps and activist circles... The leaked materials not only highlight TigerSwan's militaristic approach to protecting its client's interests but also the company's profit-driven imperative to portray the nonviolent water protector movement as unpredictable and menacing enough to justify the continued need for extraordinary security measures... Internal TigerSwan communications describe the movement as 'an ideologically driven insurgency with a strong religious component' and compare the anti-pipeline water protectors to jihadist fighters." The Intercept reports that recently "the company's role has expanded to include the surveillance of activist networks marginally related to the pipeline, with TigerSwan agents monitoring 'anti-Trump' protests from Chicago to Washington, D.C., as well as warning its client of growing dissent around other pipelines across the country." They also report that TigerSwan "has operated without a license in North Dakota for the entirety of the pipeline security operation."

Share on Google+

Read more of this story at Slashdot.

Stars can turn into black holes without a supernova

Engadget - Sun, 2017-05-28 19:26
As a rule, astronomers believe that stars have to explode in a supernova before they collapse into black holes. That violent death is always the cue, right? Not necessarily. Researchers have spotted a massive star 22 million light years away, N69...

Pages