YOU ARE HERE: LAT HomeCollectionsComputers


March 27, 2013 | By Melissa Rohlin
On Thursday, when both Michigan and Michigan State played in the NCAA tournament, apparently a few too many students in one Michigan school district tried to watch the games on their schools' computers. The basketball craze in the Genesee Intermediate School District reportedly prevented some students from being able to access online instructional resources. Workers with Genesee Network for Education Telecommunication, or GenNET, were flooded with complaints, leading the school district to block access to college basketball games over its computers.
April 17, 2013 | By Salvador Rodriguez
If you've received an email about the Boston bombings, do not click on the link. A spam-monitoring lab at the University of Alabama at Birmingham says a new malware campaign targeting Windows computers is sending out an "unprecedented" amount of spam emails. If users open the email and click on the link inside, the malware will infect their computers. “The volumes are just astronomical,” said Gary Warner , a cyber researcher with UAB's Computer Research Forensics Lab. PHOTOS: The top smartphones of 2013 The lab looks for spam that can result in users' computers becoming infected, Warner said.
August 3, 2012 | By Rene Lynch
The Pentagon's Missile Defense Agency has told employees to stop using work computers to peruse pornograpy and visit porn sites -- just the latest example of public employees behaving badly. Bloomberg News service obtained a memo that agency Executive Director John James Jr. wrote on July 27 revealing that government employees and contractors had been detected in recent months "engaging in inappropriate use of the MDA network," including "accessing websites, or transmitting messages, containing pornographic or sexually explicit images.
December 17, 2012 | By Deborah Netburn
IBM's 5 in 5 -- a list of five innovations that could change the world in five years -- focuses on how computers are developing the ability to taste, touch, hear, see and listen just like humans do, except way better. It is kind of exciting and kind of terrifying, but mostly just really cool. For example, Hendrik Hamann, a research manager of physical systems for IBM, describes a smartphone that could use a computerized nose to " smell " if we are sick. Forget the thermometer and the doctor's visit -- we will simply breathe into our cellphones to find out if we have the flu. Robyn Schwartz describes how smartphones of the future might use vibrations to allow us to virtually " touch " a piece of material and feel its texture.
April 28, 1985 | Associated Press
Suburban high schools in Arlington County, Va., are using computers to record and try to remedy the problem of truancy. Unexplained absences are recorded in the machine, and each night the computer telephones the student's home and, using a human voice, demands a written excuse for the absence.
August 16, 1997
Re "Unless Teachers Get Involved, Wiring Schools Just Enriches Computer Makers," Opinion, Aug. 10: Larry Cuban is correct that "anyone justifying the purchase and use of computers on grounds that all students will learn more, better and faster is lying." Computers are being used by corporations to influence school bureaucrats to spend on technology that is touted as having the answer to teaching kids. Through experience in the public school classroom, I know that computers are not the answer to literacy.
October 9, 2012 | By Salvador Rodriguez
If someone on Skype asks you "lol is this your new profile pic?" don't click the link. A type of malware known as Dorkbot is going around the video-calling service tricking people into being scammed by asking that question, in both English and German. Once users click on it, they are redirected to download a file from that holds the malware. The worm was discovered by Trend Micro, a security firm that wrote about the malware Monday. Trend Micro says that once infected, computers become part of a botnet, or a network of computers controlled by hackers to execute denial of service attacks, in which attackers try to jam a website by getting large numbers of computers to contact it at the same time.
June 7, 2013 | By Jack Dolan
Since the Los Angeles Times posted a searchable database of Department of Water and Power employees' pay online late Tuesday night, visitors from the department's computer network have spent approximately 1,300 hours on the site. That's the equivalent of seven-and-a-half months of eight-hour work days. The database page is the first to allow the public -- and apparently DWP workers -- to search individual employees' base pay, overtime and other earnings at the city-owned utility.
Los Angeles Times Articles