Tag: information technology

Chestnuts roasting by an open source distro: options for making bootable ISOs

Chestnuts roasting by an open source distro: options for making bootable ISOs

There has been some buzz about a Kickstarter project called Isostick, an expensive option for those who want to boot from multiple ISOs without lugging around a bunch of DVDs. There are, however, ways that already exist, some of which are “DIY.” Here are a few options: USB multiboot ISO options Boot from a USB […]

Read the full article.

Ready for the Next Dimension? Storage in 5D

Ready for the Next Dimension? Storage in 5D

Using nanotechnology, researchers have created a 5D storage device using silica glass and a process called femtoprinting. The femtoprinting process uses a laser that can pulse for a mere femtosecond—just several quadillionths of second. The laser can shape the silica to create a polarization effect; this effect can later be read or erased by the […]

Read the full article.

IE9 Best at Catching Malware?

IE9 Best at Catching Malware?

A recent study by NSS Labs suggests that Internet Explorer 9 trumps competing browsers when it comes to preventing web-based malware attacks. The study, which you can read in full here, also looked into the blocking abilities of Firefox, Safari, Opera, and Chrome. The report, which tested browsers against socially engineered threats such as fake […]

Read the full article.

Punch cards, transistors, and B code: paying homage to computer lab forefathers

Punch cards, transistors, and B code: paying homage to computer lab forefathers

We’ve come a long way from room-sized computers and binary punch cards, but the concepts developed in early- and mid-20th century labs are the foundation for how we innovate today. An article on Extreme Tech gives the lowdown on the top seven computer labs that contributed to the development of the digital age. While many […]

Read the full article.

Green screens: energy-collecting LCDs coming soon

Green screens: energy-collecting LCDs coming soon

Your smart phone, iPad, or other LCD device may soon be able to recharge using solar energy. The colorful, high resolution LCDs on smart phones and other devices consume a lot of energy and quickly drain battery life; however, engineers at UCLA are developing one alternative. The engineers have created photovoltaic polarizers that sit over […]

Read the full article.

Web malware detection increasingly difficult

Web malware detection increasingly difficult

Google recently published a report based on its research into identifying malicious websites. The company routinely flags malicious websites as part of its attempts to warn search engine users of potential dangers, but this report suggests that hackers are using new methods to avoid flagging. Many methods exist to discover malware, and the report dissects […]

Read the full article.

Windows 8 Cloud Strategy – Will it prevent piracy or alienate users?

Windows 8 Cloud Strategy – Will it prevent piracy or alienate users?

In its next OS launch, Microsoft is likely taking advantage of cloud technology to stymie attempts at piracy. Windows 8 will not only change from product keys checked against a simple .txt file on the install disk; online authentication will be mandatory. Part of the operating system might not even be available until the OS […]

Read the full article.

Mozilla joins the mobile OS party

Amidst competitors such as Google’s Chrome OS, Apple’s iOS, Microsoft’s Windows Phone 7, and various flavors of Linux, Mozilla is diving into the mobile OS market with its Boot to Gecko or “B2G” operating system.  Designed for quick booting, ease of taking your settings with you across devices, and optimized for web browsing, mobile operating […]

Read the full article.

Migration from Exchange to Google Apps Frustrating, Satisfying

Migration from Exchange to Google Apps Frustrating, Satisfying

Paul Venezia, writing in Network World, details some of the decision making issues, human factors, and potential outcomes of a corporate switch from an Exchange-based solution to Google’s cloud-based system.  Financially, the process was a success; however, it was not an easy transfer due to Google’s lack of support and need for an in-depth understanding of […]

Read the full article.

Security is not an option

Security is not an option

In light of a recent multitude of security failures, service provider security is a hot topic.  While many companies purport to have excellent security features, many of these features are hidden behind “opt-in” dialogues and fees.  HTTPS encryption is an oft-used method of protecting network data, but many websites do not encrypt data.  Encryption is […]

Read the full article.