Apr 27 2009

Universal Design for Web Applications

Michael J. Ross writes “Two decades ago, Web usage was limited to a single individual (Sir Tim Berners-Lee) using the only browser in existence (WorldWideWeb) running on a single platform (a NeXT Computer). Nowadays, billions of people access the Web daily, with the ability to choose from over a dozen browsers running on desktop computers, laptops, and a variety of mobile devices, such as cell phones. The number of possible combinations is growing rapidly, and makes it increasingly difficult for Web designers and developers to craft their sites so as to be universally accessible. This is particularly true when accounting for Web users with physical and cognitive disabilities — especially if they do not have access to assistive technologies. The challenges and solutions for anyone creating an accessible website are addressed in Universal Design for Web Applications, authored by Wendy Chisholm and Matt May.” Keep reading for the rest of Michael and Laura’s review.

Read more of this story at Slashdot.

Share

Apr 26 2009

Conficker Virus Begins To Attack Computers

Conficker, also known as Downadup or Kido, was expected to wreak havoc on April 1 when it was due to be activated, but it failed to cause many problems. Internet virus experts, however, claim it is now quietly turning thousands of personal computers into servers of e-mail spam and installing spyware.

Share

Apr 25 2009

First taste: Sugar on a Stick learning platform

Sugar Labs has announced the first beta release of Sugar on a Stick, a self-contained Sugar environment that is distributed as a live USB image. It can boot on conventional desktop computers from a 1GB thumb drive.

Share

Apr 24 2009

Tomorrow’s Computers Might Talk In Their Sleep

With the increased focus on managing energy costs and reducing human impact on the environment in the form of carbon emissions, we’re being encouraged now more than ever to turn our PCs off or let them sleep when they are not in use. But our digital lives are increasingly dependent on maintaining active network connections for communications…

Share

Apr 24 2009

Dell Sues Tiger Direct For Misleading Customers

An anonymous reader writes “Dell is apparently suing popular online retailer Tiger Direct, claiming that Tiger violated the resale contract it had with Dell, which included false advertising, misleading representation and unfair competition. Dell has accused Tiger Direct of selling old and out-dated Dell computers that Tiger Direct purchased from other resellers and then saying they were brand new directly from Dell. They also passed the computers off as still having a full warranty, but the warranties had expired long ago.”

Read more of this story at Slashdot.

Share

Apr 23 2009

The End of Innocence at Apple: After Jobs Was Fired

It seems unthinkable today — but more than two decades ago, when personal computers were still new and everybody listened to music on a Walkman, Steve Jobs was cast out of Apple. The year was 1985. IBM and Microsoft dominated the world of computing. The revolutionary Macintosh, launched with such fanfare just a year earlier, appeared to be…

Share

Apr 23 2009

Chinese Hackers Targetting NYPD Computers

Mike writes “A network of hackers, most based in China, have been making up to 70,000 attempts a day to break into the NYPD’s computer system, the city’s Commissioner, Raymond Kelly, revealed Wednesday. Kelly suggested that ‘perhaps it is because of the NYPD’s reach into the international arena’ that they are being targeted for computer hacking ‘in much the way the Pentagon has been.’ The hackers are apparently using a botnet to make up to 5,000 attempts a day at various unsecured portals into the NYPD’s files. China’s foreign ministry spokesman Qin Gang denied involvement in computer espionage. ‘Some people outside of China are bent on fabricating lies of so-called Chinese computer spies,’ he said last month. The obvious question is, why are the Chinese so interested in the NYPD computer network?”

Read more of this story at Slashdot.

Share

Apr 23 2009

How Tor Helps Both Dissidents and the Police

Al writes “Technology Review has a in-depth article about the anonymous networking software Tor and how it is helping dissidents spread information in oppressive regimes such as Syria, Zimbabwe and Mauritania, and opening up the unfiltered web for users in many more countries. In China, for instance, the computers found in some web cafes are configured to use Tor automatically. Interestingly, some police agencies even use the software to hide their activity from suspects. As filtering becomes ever more common in democratic countries such as the US, perhaps Tor (and similar tools such as I2P), will become even more valuable.”

Read more of this story at Slashdot.

Share

Apr 23 2009

Lab Breakthrough Brings Instant-On Computers Closer

Frustrated with how long it takes for your computer to boot up? That could change, say researchers who have made a breakthrough that could take the PC industry closer to truly instant-on capability for computer systems.

Share

Apr 22 2009

"Good Enough" Computers Are the Future

An anonymous reader writes “Over on the PC World blog, Keir Thomas engages in some speculative thinking. Pretending to be writing from the year 2025, he describes a world of ‘Good Enough computing,’ wherein ultra-cheap PCs and notebooks (created to help end-users weather the ‘Great Recession’ of the early 21st century) are coupled to open source operating systems. This is possible because even the cheapest chips have all the power most people need nowadays. In what is effectively the present situation with netbooks writ large, he sees a future where Microsoft is priced out of the entire desktop operating system market and can’t compete. It’s a fun read that raises some interesting points.”

Read more of this story at Slashdot.

Share