public

Fri
16
Sep
Dennis Faas's picture

Windows 8 Gets 500,000 Downloads

It's likely to be months, if not more than a year, before Windows 8 goes on sale to the general public. But according to Microsoft, a preview copy of the system has already had more than 500,000 downloads. Microsoft CEO Steve Ballmer has been making ... several public appearances this week to coincide with the formal public unveiling of the new system at BUILD, Microsoft's conference for hardware and software developers. Ballmer said that although there's a lot of work to do, the core of the system is finished. He said one of the main goals was to make sure that Microsoft's other services -- such ... (view more)

Fri
23
Jul
Dennis Faas's picture

Beta Software

When software is developed, it goes through a number of stages before it is officially released to the public. This document briefly explains this process. Software Release Development Life Cycles Pre-Alpha (Development) Pre-alpha refers to all ... activities performed during the software project prior to testing. These activities can include requirements analysis, software design, software development and unit testing. Pre-alpha software is rarely ever released to the public. Alpha (Developer Testing) The alpha phase of the release life cycle is the first phase to begin Software testing. In this ... (view more)

Fri
25
Jun
Dennis Faas's picture

FCC to Hold Secret Meetings on Net Neutrality

A recent Wall Street Journal article reported that the Federal Communications Commission (FCC) is holding 'closed-door meetings' with industry insiders to broker a deal on Net Neutrality -- controlling the Internet over the people that use it. ... Included in the meeting were a small group of industry lobbyists from AT ... (view more)

Tue
18
May
Dennis Faas's picture

Lax Facebook Privacy Makes Pages Open to Public Search

A new site aims to demonstrate Facebook's lax security and privacy by exposing some of the more embarrassing messages which users have posted. However, Facebook users appear to have undermined the site by posting intentionally bogus messages. The ... new site is known as Openbook and is intended to highlight changes made last month which made the search facility on Facebook much more public, even to non-users. It's even possible for status updates and other user info to appear on public search engines. This was particularly problematic as there have been several changes to Facebook's privacy ... (view more)

Fri
12
Mar
Dennis Faas's picture

ACTA Treaty: Can Seize, Destroy Your PC, Electronics

The Anti-Counterfeiting Trade Agreement (ACTA) is a far-reaching proposal that the U.S. government has insisted was too sensitive to be exposed to the public. Now that the 44-page document (PDF) has been leaked, it's easy to see why the U.S. wanted ... to keep it a secret. (Source: die-linke.de ) ACTA, in its present form, is heralded by the Film and Music industries and their fight against piracy. However, if upheld, citizens will pay a heavy price for their privacy. Gov't Can Search, Seize and Destroy Electronics Former President George W. Bush and current President Barack Obama both favor ACTA ... (view more)

Fri
11
Dec
Dennis Faas's picture

'Google Public DNS', and 'SpeedFan'

Google Public DNS Google Public DNS is a free, global Domain Name System (DNS) resolution service, that you can use as an alternative to your current DNS provider. If you decide to try Google Public DNS, your client programs will perform all DNS ... lookups using Google Public DNS. http://www.code.google.com SpeedFan SpeedFan is a program that monitors voltages, fan speeds and temperatures in computers with hardware monitor chips. SpeedFan can even access harddrive S.M.A.R.T. information and show hard disk temperatures. http://www.almico.org Today's fresh software picks were provided courtesy of ... (view more)

Fri
01
May
Dennis Faas's picture

Release Candidate

Release Candidate (RC) The term release candidate (RC) refers to a software version with the potential to be a final product, ready to be released to the public for final testing. In this stage of product stabilization, all product features have ... been designed, coded and tested through one or more Beta cycles with no known software bugs (defects). During the 1990s, Apple Inc. used the term "golden master" for its release candidates, and the final golden master was the general availability release. Gamma, Delta, Omega, Zenith Release Candidates Other terms include gamma (and occasionally also ... (view more)

Mon
06
Apr
Dennis Faas's picture

UK Big Brother Data Retention Law Effective Today

Despite the fact that the UK parliament network was vulnerable to the Conficker virus just last week, reports suggest that the UK Government is forging ahead with their dubious plans to harvest all the personal electronic data of every citizen and ... storing it for one year, opening the door to the Big Brother super database . Mobile phone calls, emails and Internet activities of every Briton will be stored for a year, placing legal duties on Internet companies to store everyone's private information, including email traffic and Internet browsing histories effective Monday, April 6, 2009. The ... (view more)

Fri
20
Feb
Dennis Faas's picture

Paranoid Britain Tops US To Become #1 Police State

Britain and the U.S. use similar tactics fighting 'terrorism,' but Britain has taken the delusions to a new level: it now appears that the British have surpassed U.S. in becoming a police state. Like the U.S. version of George Orwell's book "1984," ... Britain's descent into a full-fledged police state has been building for a long time. We've reported on Britain's super database , remote PC searching and the warnings issued over the egregious surveillance techniques , but there are still other facts to be examined. Spying On Domestic Extremists and Political Dissenters The British have ... (view more)

Wed
19
Mar
Dennis Faas's picture

Public Wireless, or its Evil Twin?

The next time you're in an airport, train station, bus station, coffee house, or other public place and decide to "jack in" to the Internet, you might well be exposing yourself to identity thieves -- or worse. Here's how it works: the girl across ... from you in the airport coffee shop has a laptop in her briefcase that's set as an 'access point', or a 'WiFi hotspot'. She's even given the access point a legitimate-sounding ID, say, something like "Free Airport WiFi". You power up your own laptop, quickly browse for available networks, see "Free Airport WiFi", note that it's unsecured but ignoring ... (view more)

Pages

Subscribe to RSS - public