Air Force to Get “Cyber Sidearms”
Shouldn’t the Air Force have more than this already implemented? Hopefully this software doesn’t take lots of tax money and never go anywhere or even get implemented.
Read More
Featured Windows Download: Manage Multiple Remote Desktop Connections with mRemote
LifeHacker has a review up on their site about a little application called ‘mRemote’. This is quite a piece of software and you can tell that the developers have spent some time on it. I have always been an advocate of being more organized and efficient. With mRemote everything that you need is in one screen, and everything that was left out with Microsoft’s Remote Desktop Connection Client is in mRemote. Tabbed windows, supports RDP, VNC, SSH2 and telnet protocols. There is also a connection manager, so you can setup all your connections and then point and click to connect.
Read More
10 things that should be in Apple’s next Mac Pro
A lot of points they make do kinda conflict, asking for more for a lower price. However, there are a lot of good points. The points I agree on are ditching fireware for esata, and onboard raid controllers.
Read More
October 12, 2007 (Computerworld) — The recent word from The Inquirer that Apple may be hoarding all of Intel’s new 45nm Penryn processors — and possibly paying for the privilege — has prompted a lot of speculation about the future of Apple’s Mac Pro desktop lineup. Apple’s professional machines, which now use Intel Xeon Cloverton chips topping out at 3 GHz, are called workstations by Apple and offer quad- and eight-core configurations. They’re fast, and they sport professional prices to match, with top-of-the-line eight-core units starting at $3,997. Read More
Inside Nvidia’s Testing Facilities
Here’s an article from FiringSquad about their trip inside NVIDIA’s Santa Clara campus, which houses many labs and their massive group of grid computers. Good read, images included!
Read More
NVIDIA releases a new product, on average, every 6 months. Sometimes sooner, sometimes later. But what goes on behind the scenes to make this happen? Earlier this week, we had the opportunity to find out exactly what happens behind NVIDIA’s closed doors. We were given almost unrestricted access to NVIDIA’s many labs and their high-performance computing center; what we saw was impressive. We were essentially given unfiltered access to see and talk with the people at NVIDIA. The engineers did not have to turn off their monitors when we walked into their labs. We were simply asked to black out any parts of the image that could reveal confidential information. Read More
Universal getting ready to take down iTunes?
Interesting read about Universal partnering with BMG and Warner to develop a new music subscription service to try steal some of the market share that Apples iTunes currently has.
Read More
Universal getting ready to take down iTunes? – Universal CEO Doug Morris is looking to partner with Sony BMG and Warner to develop "a new music subscription service that will try to loosen Apple’s grip on the online music market.(more…)[CrunchGear]
RESTORE 4.0a28-1 (Default branch)
This is a similar application to PC Backup, both are software managed backups which are open sourced and free as in beer. I will be doing a review of this software if time permits, as it does look really good instead of manual rsync backups.
Read More
RESTORE 4.0a28-1 (Default branch) – RESTORE is an enterprise network backup and recovery solution for Windows, Novell, Mac OS X (data fork), Unix, and Linux systems. It is scalable to a complete backup solution for multiple workstations, servers, and data centers. It operates over local area networks, wide area networks, and the Internet.
pyctd 0.4.2 (pyctd branch)
This is a really neat application, however I was not able to get it to run on Debian Testing. I was getting a strange error message after installing “python-ctypes” “libnetfilter-conntrack1” through apt-get:
Read More
Traceback (most recent call last):
File "/usr/bin/pyctd", line 27, in ?
import pyctd
File "/usr/lib/python2.4/site-packages/pyctd/__init__.py", line 2, in ?
from pyctd.conntracking import DataCollector
File "/usr/lib/python2.4/site-packages/pyctd/conntracking.py", line 31, in ?
import pynetfilter_conntrack as nfct
File "build/bdist.linux-i686/egg/pynetfilter_conntrack/__init__.py", line 4, in ?
File "build/bdist.linux-i686/egg/pynetfilter_conntrack/func.py", line 32, in ?
File "/usr/lib/python2.4/site-packages/ctypes-1.0.2-py2.4-linux-i686.egg/ctypes/__init__.py", line 353, in __getattr__
func = self.__getitem__(name)
Intel’s Dual-Processor Enthusiast Platform Q1 2008
Would you pay for a Dual Quad Core gaming system, that also has support for 4 way SLI multi-GPU configuration? Well, if you would, then its almost near with the new platform from Intel called Skulltrail. Specifically for gaming, its also possible that this rig could used for other applications. I'm sure Intel will be releasing a server/enterprise version shortly after.
Read More
NEC’s VersaPro VY10A/C-4 laptop lasts 14.5-hours on a single charge
I would definitely want to have this laptop. Battery life is one of the key reasons why I like laptops, having to pull out the old charger and find a plug in a coffee shop or Bread Garden is not fun.
Read More
NEC's VersaPro VY10A/C-4 laptop lasts 14.5-hours on a single charge NEC's latest VersaPro UltraLite Type VCwon't appeal to any hardcore gamers or mobile movie cutters, but the casual joe (or jane) will likely find its hardware plenty capable of handling those everyday tasks. What's more is that this sucka claims a whopping 14.5-hours of life if you utilize the extended battery, which is pretty impressive for a 12.1-incher.
Adobe says Acrobat, Reader vulnerable to hacks
This is a disturbing as most white pages and manuals ranging from automobiles and computer motherboards are in PDF format. Even eBooks could be an easy way for a hacker to gain access to your machine, illegal books put online could be a trap for unsuspecting downloaders.
Read More
Adobe says Acrobat, Reader vulnerable to hacks - BOSTON (Reuters) - Adobe Systems Inc, whose software is used by millions of people to read documents sent over the Internet, said on Wednesday some of its programs contain yet-to-be-fixed flaws that make computers vulnerable to attack. On October 5, Adobe posted a notice on its Web site that said it had unknowingly incorporated vulnerabilities into versions of Adobe Reader and Acrobat software that could allow malicious programs to get on to a PC without the user's knowledge.