Skip to main content

Home/ Digit_al Society/ Group items tagged hardware

Rss Feed Group items tagged

dr tech

The Fresh Smell of ransomed coffee - Avast Threat Labs - 0 views

  •  
    "Let's say you have an IoT device that is well protected with functions that can be accessed through a well-defined API; even if you can control the device through the API, you probably can't do too much harm. Firmware, the programming inside the device has logical constraints that don't allow you, for example, to close garage doors while someone is in the way of them or overheat a device so that it combusts.  We used to trust that hardware, such as a common kitchen appliance, could be trusted and could not be easily altered without physically dismounting the device. But with today's "smart" appliances, this is no longer the case."
anonymous

Hardware and software approaches to improve virtual server reliability - 1 views

  • Hardware and software approaches to improve virtual server reliability
melodyyy

Zoom is coming to your living room | TechRadar - 0 views

  • After launching Zoom for Home last year, Zoom has been working with its hardware partners to develop solutions to ensure that users have the best video conferencing experience wherever they find themselves working.
  • Being cramped inside a small home office while working remotely can get tiresome which is why Zoom has worked with its hardware partners to bring its video conferencing software to the larger screens found on some of the best TVs.
dr tech

$10 router blamed in Bangladesh bank hack - BBC News - 0 views

  •  
    "The bank had no firewall and used second-hand routers that cost $10 to connect to global financial networks. Better security and hardware would have hampered the attackers, Reuters said, quoting an official investigator."
dr tech

A $7 PC: Keepod Launches Project To Give African Slums Computer Access | Social Awareness - 0 views

  •  
    "Since Keepod's technology enables the computer to boot from the USB device and use the Keepod OS, old computers can be reused, since hardware requirements are not an issue. This way, each person can be given their "own" computer by using an old computer as a "shell." The cost of each system is a mere $7 - a fraction of the cost of an actual PC"
dr tech

The US fears back-door routes into the net because it's building them too | Technology ... - 0 views

  •  
    "In a discussion of how to secure the "critical infrastructure" of the United States he described the phenomenon of compromised computer hardware - namely, chips that have hidden "back doors" inserted into them at the design or manufacturing stage - as "the problem from hell". And, he went on, "frankly, it's not a problem that can be solved"."
blackthunder175

Product Technology Partners for Bespoke Software and Hardware Solutions! - 1 views

  •  
    "Cambridge, Cambridgeshire (fenews) August 18, 2016 - Known for Software development in Cambridge, Product Technology Partners has been catering the Software Development needs of its clients in a wide range of languages since 2000."
dr tech

Gadgets have stopped working together, and it's becoming an issue | Smartphones | The G... - 0 views

  •  
    "Interoperability is the technical term for what we've lost as tech has matured. Software can be interoperable, either through common, open file formats, or through different programs speaking directly to one another, and so too can hardware: open standards are what allow you to use any headphones with any music player, for instance, or buy a TV without worrying if it will work with your streaming set-up."
immapotaeto

The different strategies of Microsoft and Sony's next-generation consoles - The Verge - 0 views

  •  
    "Picking between the next Xbox or PlayStation will be less about hardware and more about Microsoft's and Sony's philosophies about this generation of console games"
immapotaeto

How low-cost computing gets kids into tech - 1 views

  •  
    "The Raspberry Pi opened the doors to low-cost devices that could be used to introduce kids to programming and hardware development. "
dr tech

Why Do I Think There Will be Hundreds of Billions of TinyML Devices Within a ... - 0 views

  •  
    "I gave a talk on "What TinyML Needs from Hardware", and afterwards one of the attendees emailed to ask where some of my numbers came from. In particular, he was intrigued by my note on slide 6 that "Expectations are for tens or hundreds of billions of devices over the next few years""
aren01

The future of cybersecurity: Your body as a hacker-proof network | ZDNet - 1 views

  •  
    "The Purdue researchers have created Electro-Quasistatic Human Body Communication (EQS-HBC) which uses low-frequency, carrier-less broadband transmission, and so keeps the signal almost entirely within the human body. That means data from pacemakers and other implantable medical devices would only be readable a handful of centimetres outside the wearer."
  •  
    "Increasing numbers of implantable medical devices are now gaining internet connectivity, giving doctors the ability to monitor patients health remotely, and even update the devices to tweak a treatment plan. Unfortunately, that flexibility offers a way for hackers to hijack that hardware, and even potentially make changes to the way the devices work. While so far no attacks have been successful, proof-of-concept attacks have been available for years"
neoooo

Top four highlights of Elon Musk's Tesla AI Day | TechCrunch - 0 views

  •  
    "Elon Musk wants Tesla to be seen as "much more than an electric car company." On Thursday's Tesla AI Day, the CEO described Tesla as a company with "deep AI activity in hardware on the inference level and on the training level" that can be used down the line for applications beyond self-driving cars, including a humanoid robot that Tesla is apparently building."
dr tech

Will 'connected cars' persuade drivers to pay for a high-spec ride? | Automotive indust... - 0 views

  •  
    "Nor are car owners the only consumers learning that software can be tricksy in a way hardware cannot. In 2017, Apple admitted that its software was slowing down the performance of older iPhones. It said that the design was aimed at saving battery life, but critics said it was an example of "planned obsolescence" - artificially shortening the life of a device to make buyers upgrade sooner. In 2009, Amazon provided a perfect metaphor for the potentially dystopian implications of the subscription economy when, without warning, it revoked copies of George Orwell's novel Nineteen Eighty-Four from all its Kindle e-readers."
dr tech

Amazon and the Rise of 'Luxury Surveillance' - The Atlantic - 0 views

  •  
    "It would be a bit glib-and more than a little clichéd-to call this some kind of technological dystopia. Actually, dystopia wouldn't be right, exactly: Dystopian fiction is generally speculative, whereas all of these items and services are real. At the end of September, Amazon announced a suite of tech products in its move toward "ambient intelligence," which Amazon's hardware chief, Dave Limp, described as technology and devices that slip into the background but are "always there," collecting information and taking action against it. This intense devotion to tracking and quantifying all aspects of our waking and non-waking hours is nothing new-see the Apple Watch, the Fitbit, social media writ large, and the smartphone in your pocket-but Amazon has been unusually explicit about its plans. The Everything Store is becoming an Everything Tracker, collecting and leveraging large amounts of personal data related to entertainment, fitness, health, and, it claims, security. It's surveillance that millions of customers are opting in to."
dr tech

What is HTTP/2 and is it going to speed up the web? | Technology | The Guardian - 0 views

  •  
    "HTTP/2 is a more modern protocol that essentially speeds web browsing up using new ways of transporting data between the browser and server across the internet. It is backwards compatible with HTTP1.1 and uses most of the same technologies, but it is more efficient and allows servers to respond with more content than was originally requested, removing the need for the user's computer to continually send requests for more information until a website is fully loaded."
dr tech

The Downfall of Computers - David Koff - Medium - 0 views

  •  
    "These exploits are based on chip engineering flaws, not on software flaws. Apple, Google, Abode, Microsoft, and other software companies didn't write poor software or bad Operating Systems to cause these problems to occur. Rather, the chip manufacturers - Intel, AMD and ARM - designed and then engineered computer chips with flaws built into them. Once discovered, those flaws allow the Meltdown and Spectre exploits to be run. Worse, these chips have been sold with consumer computers, servers and mobile devices since 1995. so the impact is, potentially, both personal and global in scope."
1 - 20 of 32 Next ›
Showing 20 items per page