systems

Thu
08
Apr
Dennis Faas's picture

Decentralized Computing

Decentralized computing is a trend in modern day business environments. This is the opposite of centralized computing, which was prevalent during the early days of computers. Decentralized computing is the allocation of resources, both hardware and ... software, to each individual workstation, or office location. In contrast, centralized computing exists when the majority of functions are carried out, or obtained from a remote centralized location. Benefits of Decentralized Computing A decentralized computer system has many benefits over a conventional centralized network. For example, desktop ... (view more)

Fri
13
Nov
Dennis Faas's picture

Microsoft Bans Thousands of Pirated Xbox 360s from Xbox Live

In an attempt to curb the rising number of pirated or 'modded' Xbox 360s, Microsoft has unleashed a torrent of attacks upon these hacked systems. According to reports, in the last little while the software company has banned an astounding 600,000 ... Xbox 360 users from its Xbox Live online gaming community. Modding involves customizing the Xbox 360, Microsoft's popular video game console. Those who buy the system can, if they know how, change the operating system, hard drive and other components so that a console is capable of running unofficial copies of games. The allure of modding a system is ... (view more)

Fri
10
Jul
Dennis Faas's picture

NSA to Monitor Private-Sector Networks

Under the questionable guise of cyber security, the National Security Agency (NSA), in partnership with The Department of Homeland Security (DHS) and AT&T, will be monitoring private-sector networks. The surveillance will continue despite the ... government's allegations that the NSA will only be scrutinizing data going to or from government systems. Whenever a person visits a 'dot-gov' (.gov) web site or sends an email to a government employee, their actions will be screened for potential harm to the network. NSA's History of Illegal Surveillance It's unclear exactly who is in charge of the ... (view more)

Wed
20
May
Dennis Faas's picture

FAA's Air Traffic Control Apps Highly Vulnerable

A government audit has found more than 3,800 vulnerabilities were reportedly found in the Federal Aviation Administration's (FAA's) web-based air traffic control system applications. 763 of the vulnerabilities are high-risk and some could put air ... travelers at risk. Congress requested the audit of air traffic control (ATC) computer systems in order to ensure air travelers were safe. (Source: cgisecurity.com ) The FAA has been using commercial software and Internet Protocol-based technologies in order to modernize ATC systems, moving away from the proprietary software the systems were ... (view more)

Wed
06
May
Dennis Faas's picture

Hackers 'Tap In' to Improve Radio Frequency (RFID) Systems

Radio frequency identification (RFID) is behind new-age systems the Highway E-Z Pass and the MasterCard PayPass bank card. Unfortunately, it now seems hackers are trying to take advantage of this convenient technology, and security experts are ... facing a serious challenge in keeping people safe. To participate in the Highway E-Z Pass, a person must first install a RFID tag in their windshield prior to traveling on a toll highway. When the driver approaches the stretch of the road that requires payment, their account is electronically debited. MasterCard PayPass bank cards work in a similar ... (view more)

Wed
18
Feb
Dennis Faas's picture

Microsoft to Acquire Virtual Reality Company for $35M, Rumors Suggest

Rumors this week suggest that software giant Microsoft has acquired an Israeli virtual reality company. Although the acquisition could present any number of uses, insiders are speculating that the move has been made to improve the Redmond-based ... company's second-place position in the video game industry. While much of the technology world buzzes about its upcoming Windows 7 , Microsoft has made an important move in its attempt to halt Nintendo's steady advance in the gaming industry. As the Wii continues to run away with the gaming crown by employing motion-sensitive technology and accessible ... (view more)

Wed
22
Oct
Dennis Faas's picture

IRS Slammed For Security Flaws

An official report says two IRS computer systems have serious security weaknesses. It also warns information about taxpayers is at risk of falling into the wrong hands. The report, by the Treasury Inspector General for Tax Administration, a federal ... agency which monitors IRS performance, details problems with a new billion dollar system which will eventually manage the data for all taxpayers. The Customer Account Data Engine (CADE) already handles 28 million tax returns, around a fifth of the total. The report also covers the Account Management Services (AMS) system, which provides quicker ... (view more)

Wed
02
Jan
Dennis Faas's picture

Analog Satellite Technology Goes the Way of the Dodo

Do you subscribe to OnStar or use an old analog-based cellular phone? This next story might have you fuming. For those of us old enough to remember the coming of the Motorola Flip phone and its predecessors, analog satellite technology was the ... original network that made the cellular phone possible. In fact, some people argue that an analog phone is superior because it gets better reception and clarity than current digital technologies. Nevertheless -- if you are the owner of one of these devices, the end is near. As of February 2008, the analog phone network is scheduled to be shutdown per U. ... (view more)

Fri
01
Jun
Dennis Faas's picture

Vista Only Marginally More Secure Than XP, Research Suggests

Independent security tests performed by CRN.com suggests that Windows Vista is only marginally more secure than Windows XP. CRN spent a week testing both operating systems against various Trojans, viruses and various exploits. The tests were ... performed with Windows Vista Business on an HP Compaq 6515b notebook with Internet Explorer 7 (IE7) and an HP Compaq nc6400 with Windows XP with Internet Explorer 6 (IE6), both using the default security features and settings. Finjan's RUSafe sniffer tool (a security tool that sniffs live traffic and generates logs that can be analyzed to help protect you ... (view more)

Thu
24
Aug
Dennis Faas's picture

32-bit Vs. 64-bit Systems: What's The Difference?

Not so long ago, we received a query concerning buying a computer and what all the hype was about concerning 32-bit vs. 64-bit, and so on. Since the gift giving season is rolling around and prices for computer equipment is going down, I decided to ... try and give you all some help. 32-bit vs 64-bit Computing To start, let me explain the difference between 32 and 64-bit systems, and the 'why' behind it. In your computer, you have several 'items' that, normally, you don't concern yourself about. One of those is the 'data buss'. It doesn't go across town or anything like that, but it does provide ... (view more)

Pages

Subscribe to RSS - systems