YOU ARE HERE: LAT HomeCollectionsComputers


May 24, 2012 | By Salvador Rodriguez
Could Apple's mobile assistant, Siri, be making the jump to the company's line of Mac computers? It could happen, reports suggested. Nine to 5 Mac reported signs indicating that while Siri might not join Apple's Macs soon its related feature, Dictation, might. Dictation, which debuted with this year's line of iPads, appears in apps that use a keyboard and enables users to speak rather than type to create text. Programming code inside the latest version of Safari on Apple's upcoming operating system, Mountain Lion, show evidence that Dictation could be added to Mac computers, 9 to 5 Mac reported.
August 3, 2012 | By Rene Lynch
The Pentagon's Missile Defense Agency has told employees to stop using work computers to peruse pornograpy and visit porn sites -- just the latest example of public employees behaving badly. Bloomberg News service obtained a memo that agency Executive Director John James Jr. wrote on July 27 revealing that government employees and contractors had been detected in recent months "engaging in inappropriate use of the MDA network," including "accessing websites, or transmitting messages, containing pornographic or sexually explicit images.
April 17, 2013 | By Salvador Rodriguez
If you've received an email about the Boston bombings, do not click on the link. A spam-monitoring lab at the University of Alabama at Birmingham says a new malware campaign targeting Windows computers is sending out an "unprecedented" amount of spam emails. If users open the email and click on the link inside, the malware will infect their computers. “The volumes are just astronomical,” said Gary Warner , a cyber researcher with UAB's Computer Research Forensics Lab. PHOTOS: The top smartphones of 2013 The lab looks for spam that can result in users' computers becoming infected, Warner said.
December 17, 2012 | By Deborah Netburn
IBM's 5 in 5 -- a list of five innovations that could change the world in five years -- focuses on how computers are developing the ability to taste, touch, hear, see and listen just like humans do, except way better. It is kind of exciting and kind of terrifying, but mostly just really cool. For example, Hendrik Hamann, a research manager of physical systems for IBM, describes a smartphone that could use a computerized nose to " smell " if we are sick. Forget the thermometer and the doctor's visit -- we will simply breathe into our cellphones to find out if we have the flu. Robyn Schwartz describes how smartphones of the future might use vibrations to allow us to virtually " touch " a piece of material and feel its texture.
April 28, 1985 | Associated Press
Suburban high schools in Arlington County, Va., are using computers to record and try to remedy the problem of truancy. Unexplained absences are recorded in the machine, and each night the computer telephones the student's home and, using a human voice, demands a written excuse for the absence.
August 16, 1997
Re "Unless Teachers Get Involved, Wiring Schools Just Enriches Computer Makers," Opinion, Aug. 10: Larry Cuban is correct that "anyone justifying the purchase and use of computers on grounds that all students will learn more, better and faster is lying." Computers are being used by corporations to influence school bureaucrats to spend on technology that is touted as having the answer to teaching kids. Through experience in the public school classroom, I know that computers are not the answer to literacy.
October 9, 2012 | By Salvador Rodriguez
If someone on Skype asks you "lol is this your new profile pic?" don't click the link. A type of malware known as Dorkbot is going around the video-calling service tricking people into being scammed by asking that question, in both English and German. Once users click on it, they are redirected to download a file from that holds the malware. The worm was discovered by Trend Micro, a security firm that wrote about the malware Monday. Trend Micro says that once infected, computers become part of a botnet, or a network of computers controlled by hackers to execute denial of service attacks, in which attackers try to jam a website by getting large numbers of computers to contact it at the same time.
Los Angeles Times Articles