Linux laptop company Tuxedo Computers is now offering a handful of notebooks with support for NVIDIA GeForce RTX 30 series graphics, including the new Tuxedo Book XP15 Gen 12 notebook which is a 4.4 pound computer with a 15.6 inch display, an Intel Co…
Linux laptop company Tuxedo Computers is now offering a handful of notebooks with support for NVIDIA GeForce RTX 30 series graphics, including the new Tuxedo Book XP15 Gen 12 notebook which is a 4.4 pound computer with a 15.6 inch display, an Intel Core i7-10870H processor, and support for up to RTX 3080 Max-Q graphics. […]
Eine neu eingerichtete Clearingstelle der Provider und Rechteinhaber hat erstmals eine Webseitensperre empfohlen. Jährlich sind bis zu 250 Sperren möglich. (Netzneutralität, WLAN)
Eine neu eingerichtete Clearingstelle der Provider und Rechteinhaber hat erstmals eine Webseitensperre empfohlen. Jährlich sind bis zu 250 Sperren möglich. (Netzneutralität, WLAN)
Auf zwei Ebenen klagen Umwelthilfe und Aktivisten gegen die Bundesregierung: Bestenfalls muss sie die Zielvorgaben im Klimaschutzgesetz von 2019 nach oben korrigieren. Oder wenigstens die bescheidenen Ziele einhalten
Auf zwei Ebenen klagen Umwelthilfe und Aktivisten gegen die Bundesregierung: Bestenfalls muss sie die Zielvorgaben im Klimaschutzgesetz von 2019 nach oben korrigieren. Oder wenigstens die bescheidenen Ziele einhalten
Das BR1100 sollte fürs Lernen zu Hause und in der Schule ausreichend leistungsfähig sein. Es wird auch als Convertible mit Stift und Touch angeboten. (Asus, Notebook)
Das BR1100 sollte fürs Lernen zu Hause und in der Schule ausreichend leistungsfähig sein. Es wird auch als Convertible mit Stift und Touch angeboten. (Asus, Notebook)
Last week, Arizona's House of Representatives approved legislation to prohibit platform owners like Apple and Google from locking app makers into their own payment systems. The bill passed only narrowly, and it must be approved by the Arizona Senate and Gov. Doug Ducey before it can become law. But regardless of the bill's ultimate fate, the vote is the latest sign of a dramatic shift in public attitudes toward Silicon Valley's most powerful companies.
For the first two decades of the Internet era, there was a broad consensus that politicians shouldn't tie Silicon Valley companies down with burdensome rules and regulations. Companies like Apple, Amazon, Google, and Uber were widely admired. In 2007, presidential candidates from both parties made pilgrimages to associate themselves with Google. In 2015, Jeb Bush, Ted Cruz, and other Republican hopefuls tripped over each other to position themselves as the most Uber-friendly candidate.
Tech companies' prestige bolstered their political power. Those who proposed regulations to rein in tech companies—or in some cases just wanted to subject them to the same rules as other companies—were often dismissed as out-of-touch reactionaries and enemies of progress.
Nach einem Gerichtsbeschluss sind vernetzte Stromzähler nicht schlau genug für die Energiewende. Was bedeutet das für Betreiber und Verbraucher? Eine Analyse von Friedhelm Greis (Smart Meter, GreenIT)
Nach einem Gerichtsbeschluss sind vernetzte Stromzähler nicht schlau genug für die Energiewende. Was bedeutet das für Betreiber und Verbraucher? Eine Analyse von Friedhelm Greis (Smart Meter, GreenIT)
The Microsoft Exchange vulnerabilities that allow hackers to take over Microsoft Exchange servers are under attack by no fewer than 10 advanced hacking groups, six of which began exploiting them before Microsoft released a patch, researchers reported Wednesday. That raises a vexing mystery: how did so many separate threat actors have working exploits before the security flaws became publicly known?
Researchers say that as many as 100,000 mail servers around the world have been compromised, with those for the European Banking Authority and Norwegian Parliament being disclosed in the past few days. Once attackers gain the ability to execute code on the servers, they install web shells, which are browser-based windows that provide a means for remotely issuing commands and executing code.
When Microsoft issued emergency patches on March 2, the company said the vulnerabilities were being exploited in limited and targeted attacks by a state-backed hacking group in China known as Hafnium. On Wednesday, ESET provided a starkly different assessment. Of the 10 groups ESET products have recorded exploiting vulnerable servers, six of those APTs—short for advanced persistent threat actors—began hijacking servers while the critical vulnerabilities were still unknown to Microsoft.