Apr 21 2009

Bohemian Rhapsody On Old Hardware

eldavojohn writes “The sweet sweet melodies of Queen and the late Freddie Mercury are reproduced by hardware almost as old as the song is. ‘There are millions of computers sitting idle at home consuming fantom electricity. Let’s see where all that power is going. This is dedicated to all fans of Queen and hey let’s not forget about Mike Myers and Dana Carvey of Wayne’s World. Please note no effects or sampling was used. What you see is what you hear (does that even make sense?) Atari 800XL was used for the lead piano/organ sound, Texas Instruments TI-99/4a as lead guitar, 8 Inch Floppy Disk as Bass, 3.5 inch Hard drive as the gong, HP ScanJet 3C was used for all vocals. Please note I had to record the HP scanner 4 separate times for each voice. I tried to buy 4 HP scanners but for some reason sellers on E-Bay expect you to pay -0, I got mine for .'”

Read more of this story at Slashdot.

Share

Apr 19 2009

Anonymous Network I2P 0.7.2 Released

Mathiasdm writes “The Invisible Internet Project, also known as I2P, has seen its 0.7.2 release (download). I2P uses multiple encryption layers, and routing through several other computers to hide both sender and receiver of messages. On top of the network, regular services such as mail, browsing, file sharing and chatting are supported. This release (and all of the releases since 0.7) is at the start of a new development period, in which the I2P developers wish to spread the word about the secure network. This new release includes performance improvements, a first edition of an experimental new desktop interface and security improvements (by limiting the number of tunnels a single peer can participate in).”

Read more of this story at Slashdot.

Share

Apr 19 2009

Telepresence — Our Best Bet For Exploring Space

Seth Shostak of the SETI Institute recently wrote an opinion piece for the NY Times discussing the limitations of our space technology. He makes the harsh point that transporting human beings to other star systems isn’t a reasonable goal even on a multi-generational time frame. However, advances in robotics and data gathering could instead bring the planets and stars to us, and do it far sooner. Quoting: “Sending humans to the stars is simply not in the offing. But this is how we could survey other worlds, around other suns. We fling data-collecting, robotic craft to the stars. These proxy explorers can be very small, and consequently can be shot spaceward at tremendous speed even with the types of rockets now available. Robot probes don’t require life support systems, don’t get sick or claustrophobic and don’t insist on round-trip tickets. … These microbots would supply the information that, fed to computers, would allow us to explore alien planets in the same way that we navigate the virtual spaces of video games or wander through online environments like Second Life. High-tech masks and data gloves, sartorial accessories considerably more comfortable than a spacesuit, would permit you to see the landscape, touch objects and even smell the air.”

Read more of this story at Slashdot.

Share

Apr 19 2009

New Technology May Allow Instant On Computers: No Booting

Researchers have added ferroelectric capability to material used in common computer transistors. The result could mean no more waiting for the operating system to come online or to access memory slowly from the hard drive.

Share

Apr 18 2009

Dell hides Ubuntu-powered computers for sale in Europe

In its Spanish, French, British and German sites, Dell lists the Ubuntu-preloaded computers it offers. But not all of them! It shows only Ubuntu netbooks and hides the others. For example, the hidden trick to get a Dell XPS laptop with Ubuntu preinstalled is to get in touch with sales representatives and they’ll give you a link to purchase it.

Share

Apr 17 2009

The Secret History of the FBI’s Classified Spyware

An anonymous reader writes “A sophisticated FBI-produced spyware program has played a crucial behind-the-scenes role in federal investigations into extortion plots, terrorist threats and hacker attacks in cases stretching back at least seven years, according to newly declassified documents obtained by Wired.com. The so-called ‘computer and internet protocol address verifier,’ or CIPAV, is delivered through links to websites controlled by the FBI, and it silently reports back to a government server in Virginia. Among other cases, the FBI used it to track a Swedish hacker responsible for cracking thousands of computers at national labs and NASA’s JPL in 2005.”

Read more of this story at Slashdot.

Share

Apr 15 2009

Obama Builds Tech Bridge to Cuba

President Obama on Monday unveiled a plan that will allow U.S. residents to send cell phones, computers, satellite receivers, and more to friends and family in Cuba, and also allow U.S. telecom companies to do business in the country.

Share

Apr 15 2009

12 Wacky USB Devices that Suck

USB was actually designed to allow many peripherals to be connected to computer using a single standardized interface socket but in the recent years, a lot of things have been manufatured to be connected to computers via USB. We see a lot of unusual and weird USB devices every now and then. Some of them are just pointless and some just suck.

Share

Apr 14 2009

MS preps auto IE8 update to get hesitant users to install it

As IE8’s adoption rates lag far behind initial expectations, Microsoft prepares its most powerful tool to push the browser out to user computers. The company said that it is preparing an Automatic Update/Windows Update targeting IE6 and IE7 users, which currently makes up about 93% of the IE user base.

Share

Apr 13 2009

Supercomputer As a Service

gubm writes “Nearly one and a half years after making a stunning entry into the global supercomputer list with Eka, ranked as the fourth-fastest supercomputer in the world, Computational Research Laboratories (CRL), a Tata Sons’ subsidiary, has succeeded in creating a new market for supercomputers — that of offering supercomputing power on rent to enterprises in India. For now, for want of a better word, let us call it ‘Supercomputer as a Service.'”

Read more of this story at Slashdot.

Share