May 24, 2012 |
Could Apple's mobile assistant, Siri, be making the jump to the company's line of Mac computers? It could happen, reports suggested. Nine to 5 Mac reported signs indicating that while Siri might not join Apple's Macs soon its related feature, Dictation, might. Dictation, which debuted with this year's line of iPads, appears in apps that use a keyboard and enables users to speak rather than type to create text. Programming code inside the latest version of Safari on Apple's upcoming operating system, Mountain Lion, show evidence that Dictation could be added to Mac computers, 9 to 5 Mac reported.
April 17, 2013 |
If you've received an email about the Boston bombings, do not click on the link. A spam-monitoring lab at the University of Alabama at Birmingham says a new malware campaign targeting Windows computers is sending out an "unprecedented" amount of spam emails. If users open the email and click on the link inside, the malware will infect their computers. “The volumes are just astronomical,” said Gary Warner , a cyber researcher with UAB's Computer Research Forensics Lab. PHOTOS: The top smartphones of 2013 The lab looks for spam that can result in users' computers becoming infected, Warner said.
August 3, 2012 |
The Pentagon's Missile Defense Agency has told employees to stop using work computers to peruse pornograpy and visit porn sites -- just the latest example of public employees behaving badly. Bloomberg News service obtained a memo that agency Executive Director John James Jr. wrote on July 27 revealing that government employees and contractors had been detected in recent months "engaging in inappropriate use of the MDA network," including "accessing websites, or transmitting messages, containing pornographic or sexually explicit images.
December 17, 2012 |
IBM's 5 in 5 -- a list of five innovations that could change the world in five years -- focuses on how computers are developing the ability to taste, touch, hear, see and listen just like humans do, except way better. It is kind of exciting and kind of terrifying, but mostly just really cool. For example, Hendrik Hamann, a research manager of physical systems for IBM, describes a smartphone that could use a computerized nose to " smell " if we are sick. Forget the thermometer and the doctor's visit -- we will simply breathe into our cellphones to find out if we have the flu. Robyn Schwartz describes how smartphones of the future might use vibrations to allow us to virtually " touch " a piece of material and feel its texture.
April 28, 1985 |
Suburban high schools in Arlington County, Va., are using computers to record and try to remedy the problem of truancy. Unexplained absences are recorded in the machine, and each night the computer telephones the student's home and, using a human voice, demands a written excuse for the absence.
CALIFORNIA | LOCAL
August 16, 1997
Re "Unless Teachers Get Involved, Wiring Schools Just Enriches Computer Makers," Opinion, Aug. 10: Larry Cuban is correct that "anyone justifying the purchase and use of computers on grounds that all students will learn more, better and faster is lying." Computers are being used by corporations to influence school bureaucrats to spend on technology that is touted as having the answer to teaching kids. Through experience in the public school classroom, I know that computers are not the answer to literacy.
October 9, 2012 |
If someone on Skype asks you "lol is this your new profile pic?" don't click the link. A type of malware known as Dorkbot is going around the video-calling service tricking people into being scammed by asking that question, in both English and German. Once users click on it, they are redirected to download a file from hotfile.com that holds the malware. The worm was discovered by Trend Micro, a security firm that wrote about the malware Monday. Trend Micro says that once infected, computers become part of a botnet, or a network of computers controlled by hackers to execute denial of service attacks, in which attackers try to jam a website by getting large numbers of computers to contact it at the same time.
April 5, 2013 |
Dreams defy even the dreamer, slipping away as stealthily as they arrive in a mind made credulous by sleep. But what if scientists could read our dreams by using the most advanced medical imaging machines and employing the sophisticated algorithms that flag fraudulent transactions among millions of credit card purchases? Researchers in Japan have taken an early step toward this chimerical goal by training computers to recognize the images flitting through the minds of sleepers in the earliest stages of dreaming.