Friday, January 30, 2009

Zombies in Texas.

Resourceful hackers have succeeded, two electronically controlled traffic billboards in Austin, Texas, umzuprogrammieren - they warned against zombies instead of building sites. After the punishing Lacher, began to think: The case demonstrates the dangers of networked infrastructures.

 


Two temporary signs reprogrammed caused "significant traffic problems" on a small road in Austin, Texas. The disabilities were established because of the many drivers in the iron went up, stopped and drove at a snail's pace in order to photograph these things. Instead of the usual warnings on a construction site showed the electronic displays five different warnings about zombies, approaching Nazi zombies ( "Rennt!"), Which was also approaching the end and make a good piece of advice: "flees in warmer climes!"


AP / Chris Nakashima-Brown
No hack, if it is exactly besieht: The messages to mobile traffic displays are easy to change if they are inadequately protected


Both the city of Austin as well as the construction company, which include signs, saw Complaints from: You've finally humor in Texas. The hackers, as the media called him the signs reprogrammed, will not have to fear that his investigators to move Pelle.

And certainly it is questionable whether the hacker really Scherzkeks qualities needed for the electronic signs umzuprogrammieren. Because after the punishing Lacher, began the analysis - and quickly found IT professionals and journalists learned that as good as everyone would have this little trick you can perform: Supposedly, there is hardly a building contractor, the default password of the default display panels changed.

Is also logical: The builder knows everyone and can be the message of the display panel to change, without having to contact someone to have to ensure the necessary password. Everything we do, in order to the streets of Austin to Beware of zombies to warn was a plastic cover on the back of the screen to open a default password (for manufacturers to choose something like "0000" or "9999 "etc.) and a new message einzutippen. In this case, although it was another, but also probably has no problem: A simple Google search is enough to find it when you display the type known.

Perhaps a small change in the educational message Scherzkeks conclude the password, so that technicians of the display manufacturer for help had to be called to the warning signs once again of "Zombie" to "construction site" in abeyance. That was really unnecessary, because the instructions to the system reset is to be found on the web.


Not safe


Now the public has started brooding about what a potential risk of such a program, but inadequately protected systems if they are not for jokes, but would maliciously reprogrammed. Whole cities were targeted traffic diversions into chaos.

Especially since it is not only mobile electronic displays for traffic management, but more and more networked systems. Many of those who speculated on Friday on the IT security specialist technician Adam O'Donnell in an article at ZDnet, were installed before the security people, by the awareness of the Internet boom, the need for increased password security discovered. They could therefore be similarly easy to crack.

In their wild fantasies about cyber-terrorism security politicians speculated in recent years with fondness about scenarios like hacks into the networks of water companies or power plants. The truth can be seen with far profane goals a whole lot cause chaos in Australia was in 2001 for example, a frustrated Jobbewerber succeeded in the control system of sewage follicle.

He opened sewage-locks, the multi-million liters of broth on streets, rivers and parks Hotel dismissed. The revenge of the rejected candidates stank as unintended, but demonstrative warning before the weaknesses of so-called critical infrastructure to heaven. What is the hack into a regional traffic control system could cause a big city, you will hardly imagine. The discussion after the zombie gag from Austin started again.

Thursday, January 29, 2009

Sony patented touch-screen printer.

Images wirelessly from the camera to the printer copy, with the fingers on a screen and instantly edit in color on paper: apparently Sony is working on a new printer ink, where a touch screen the crucial role.

 


The real novelty is only in the fifth paragraph mentions: "The display has a touch panel function. From mobile phones, laptops and MP3 players know something already - as a characteristic of a printer, it is new. To read the sentence in the U.S.
Patent application 20090022510, filed on 22 January 2009 by the Sony Corporation.


And what else gets to read this document clearly shows that the engineers of the Japanese group actually an application have found that the use of a touch-sensitive screen can seem. The images that accompany the application, can also hope that the planned touch-screen printer, not only modern, but still chic and probably will be mobile.

However, the initiation of the patent application is anything but a desire to read more. From a pictorial unit ends with a discharge chute and a display that is mounted to housing ", there is the question. Aha, a printer with the display also. There is abundance, but this is different.


The images come wirelessly


This is the first of its touchscreen, the Sony illustrations that cover the entire position. With this screen, the user should have the opportunity, "the images to browse or print and on the output shaft of the display to get." Images of ways to manipulate, modify and edit, at least not yet speak - but maybe just like Sony has not revealed everything.

Giving is the way the developers that the images in the printer should be. "The surface is a touchscreen, the wireless connection with a digital camera and record their images automatically into the own memory can copy," they wrote. To transfer to set in motion, it should be rich, the camera "somewhere on the touch screen off."


Magic and tech


Sounds like a nice blend of magic and high tech, and quite reminiscent of huge concepts that Microsoft, with its
Surface Table has developed. With what technology Sony wireless connection will be open to the patent application, would certainly be conceivable Bluetooth. But the Near Field Communication technology (NFC), which together with Sony, Philips has developed could be integrated in order in tandem with Bluetooth to detect the camera and controlling the transfer guarantee.

But even all this is science fiction. So far there is not a single camera, which as a counterpart for such a printer would own. But even the might of the Japanese group in due course. Sure is: Sony is working because of an innovative new printing concept and filed for patent application gives hope that such devices, at least in the foreseeable future, actually on the market - if the group does not
lack of money must slow down the development.

Schallplatten Pallas pressed yet.

The oldest machines have a half-century on the hump, but they are still well in the business: In the northern German Diepholz produces one of the last day stamping 10,000 records. A journey into the history of consumer electronics.

 


It whistles, hisses, squeaks and clatters - louder than a disco. When Pallas Diepholz in Lower Saxony, one of the last remaining vinyl stamping Europe, is still partly to almost 50-year-old machines. Here you can "time travel experience," Frank Dietz calls Mann, technical manager at Pallas in the hell of noise, where every day 10,000 small and large records to be produced.


Basic ingredient for each record is Polyvinylchorid (PVC). "The exact recipe is secret, however," Dietz says Mann. The PVC granule is heated, and as a black mass on a form is pressed. Matrices with the A-and B-side then pressing this mass with 180 degree hot steam flat. Then the black disc down with a suction cup to focus in a paper bag sunk.

Everything fully automatic.

Several of the sixties, born in the stamping machines, he still inherited from his father, the 1949, the company says Pallas CEO Holger Neumann. Parts of this were on the market no longer available. If one was needed, ready the company's own locksmith to. The junior for the company would house trained.


Customers: Indie labels, the vanguard of the industry


For clients of his company to 80 percent among independent record companies, explains the company's boss. But even big labels like Sony, EMI and BMG in order Diepholz. 60 percent of production goes into the techno and hip-hop scene. The remaining 40 percent are high-quality records from the fields of rock, pop, jazz and classical. Only recently was at Pallas, the complete catalog of the Rolling Stones has been pressed.

Most customers of the company are based in the United States. Only recently has the American record company by Metallica 80,000 copies of the new album "Death Magnetic" in Diepholz ordered. In the Americas were the customers of the quality of Diepholzer Vinyls confident man says Dietz. There will even consider, plates with the quality seal "Made by Pallas' device.

It is much easier to a CD as a vinyl record manufacture.

A compact disc of which 100,000 per day in Diepholzer works are produced in 3.4 seconds is ready for a record 26 seconds are needed. Probably for this reason, many record companies at the beginning of the nineties, the death of the record predicted, says Neumann. "At that time we had about the production."


Small but stable niche


But it was different: In the techno scene attacked the mid-nineties many DJs on the old vinyl back. "I find that vinyl really sounds better than a CD," says DJ and producer Mousse T. from Hanover. It is for club-goers even more thrilling, a DJ to see the beautiful art and vinyl handle than small pieces of silver to use, or perhaps even the entire evening on a computer monitor to stare.

He had not a lot. And because CDs were not so hard, pick it, unlike many colleagues, is always less for the record, admits Mousse T. A. For many DJs, the plates with the "only a matter of philosophy or even pure nostalgia." In addition, there were labels that their music released on vinyl only.

Records would be but never quite disappears, Mousse T is convinced. Finally, they were "cult".

It is this cult of the black discs pay homage to the members of the Analogue Audio Association, a registered association for the preservation and promotion of analog music reproduction. "Since its founding in 1990, we work to ensure that a significant part of the cultural heritage of humanity - namely, the analog vinyl record - not the supposed progress victim to fall," it says on the website aaanalog.de.

A Keeper of analog recordings is Uwe Mehlaff from Hanover. He collects records, cassettes, tapes and CDs. The "analog music enjoyment" interested him the manual says Mehlaff.

"You have the record out of the shell take it on the turntable set, they cleanse, tone arm gently to hang up - this is fascinating," says the 51-year-olds. People like it when he should Pallas Diepholz remain in force to rattle.

Wednesday, January 28, 2009

The fire fox rushes the Explorer.

2009 Microsoft new mix the cards, with the Internet Explorer 8 will be the long-lasting loss of browser market share be stopped. It is time for the world is the first Explorer below 70 percent - and in Germany it could even overtake Firefox.

 


Your current browser edition of the monthly statistics provides the U.S. market research company Net Applications with a veritable warning: "The holidays in December," they wrote, "have been strongly in favor of the home to use the business-use impact. This in turn increases the relative market share of Macs, Safari, Firefox and other products with a relatively high rate of home use. Therefore, all users of statistics for December, against this background read. "


Internet Browser: At home is different than in the office gesurft


The friendly warning before the Wackler in the statistics bear in itself a message: If computer users no official sit in front of the computer, they use different machines and programs as in the workplace. Then lies - as in December 2008 - according to
Net Applications market share worldwide market share of Apple's Mac OS X is not at 8.87 percent, but at 9.63 percent. And of course, the December figures show losses of market share of Internet Explorer, and corresponding increases in the alternative browsers (see table).

The only question is whether this really is on December. Even the show the Net Applications numbers: The trend in the browser market is as stable as the long term. The losses of Internet Explorer in December 2008 to coincide with the November minus 1.62 percent barely larger than losses in the November compared with October (minus 1.5 percent).


The change is accelerating


Within a year, the Explorer is now 7.89 percent market share. In the year before it was only just under four percent. In short: The loss of market share is accelerating, according to increase the market share of Safari, Opera, Google Chrome recently, especially Firefox.

Browser Charts December 2008


Place
  Browser
  Market share
  Change from previous month
Change from same month previous year


1
Internet Explorer
68.15%
-1.62%
-7.89%


2
Firefox
21.34%
+0.56%
+4.54%


3
Safari
7.93%
+0.80%
+2.34%


4
Chrome
1.04%
+0.21%
--


5
Opera
0.71%
+ / -0%
+0.07%


6
Netscape
0.57%
-0.04%
-0.09%


7
Other
0.26%
+0.01%
+0.07%


Worldwide percent market share according to Net Applications



And the 2009, could accelerate - the browser market could be a year of decision-making experience. This contributes not only to ensure that your browser alternatives of more and more users than perceived to be better products, which they then use their private prefer, but may also help the policy under: News, the EU Commission from Microsoft,
Browser software and operating system to decouple. It could once again to walk a delicate fine that could reach billions.

That seems like a belated response to the "browser war between Microsoft and Netscape in the nineties and the subsequent antitrust litigation against Microsoft, but as a measure against distortions thought: As before, the EU Commission in the preinstall Internet Explorer an unfair competitive advantage. For ten years the Commission rangelt from this and other reasons, with Microsoft, growled the group so far in fines of 1.7 billion euros.

VOTE


Browser survey in January 2009: Office machines
Which browser you use in your workplace?


Internet Explorer
Firefox
Opera
Safari
Google Chrome
Netscape
another


Now the EU Commission is considering even the delivery of Windows, or PC with preinstalled operating systems, with a selection of alternative browsers to force. The "home advantage" of Internet Explorer would be so at least in Europe evaporate.

Not that the still would be very large. The European market is in terms of browser use completely different than the international - nowhere are Microsoft's market share lower and higher Mozilla. In Germany in particular, Mozilla's Firefox is on the way to the majority of browsers will.


Germany: tilting majorities


In the User statistics of blogs online, it's the weekend already long. They show Firefox at about 50 per cent share when the companies expect computer, while Internet Explorer is now below 35 percent before hindümpelt. This however is not representative: the readership well informed in matters of IT, the higher the usage rate of alternative browsers. Users of blogs ONLINE shank is evident here on the average.

VOTE


Browser survey in January 2009: Private use
Which browser do you prefer on your home computer?


Internet Explorer
Firefox
Opera
Safari
Google Chrome
Netscape
another


But the average German is slowly approaching this image, it maintains at least the latest
W3B survey of the market research company
Fittkau & Maass. The attempts since 1995 to focus on the demographics of German web users and their preferences to be recorded. 2009, the researchers believe, will show whether Firefox (...) the total will reach market leadership. " Because in the field of "modern" browser have the latest generation of Firefox in Germany has already obtained: Firefox 2 o'clock-3 o'clock would be combined with nearly 38 percent market share against Internet Explorer 7 with 37 percent.

YOUR OPINION IS ASKED

Discuss about this article


Two against one is designed a little, but overall, the Internet Explorer browser in Germany to just fell 53.9 percent market share, say Fittkau & Maass, the Mozilla browser was Microsoft with 38.9 percent on the heels. "Should this trend continue," concluded the German market researcher, "it is only a matter of time until the Firefox leadership role among the browsers."

The browser market in 1996 until the end of 2008: the rise and decline of the Explorers, down from Netscape / Mozilla - and returned as a Firefox

This issue will also have to decide whether Microsoft succeeds with the Internet Explorer 8 to the quality rivals Firefox, Safari and Opera catch. Shows increases in the past two months, the repaired Google Chrome browser, its worldwide market share of 1.04 percent but with caution is always releases lead to rashes in a trial phase. It remains to be seen whether Google permanently established in this region may increase or even recorded.

Either way: 2009 is an unusually exciting year on the browser market.

Tuesday, January 27, 2009

Nano-fridge for microchips.

How can PC processors best cool? With huge fins in a steady flow? With a special water? Both wrong to believe U.S. researchers and the problem went wherever it arises - on the chip itself

 


Computer processors generate heat. That is inevitable, so long as the electrons through the microchip traces be hunted. The resulting heat is simply a waste product of the electrical processes in the chip. The basic principle: The higher a processor is switched, so the sooner he works and the more switching operations per second, he points out, the hotter it is. Under full load could be such a smooth chip used as a kettle. Temperatures of hundreds of degrees Celsius or more are not uncommon.

blogs ONLINE
CPU cooler (small model): the future, the cooling in the chip to be integrated


The problem of the increasing heat with increasing frequency, the chip manufacturer years ago led the race for ever higher clock speeds to an end. Instead, it strives to now, more processor cores on one chip to accommodate. The aim at relatively low frequencies already high performance. The problem of waste remained, however.

Usually the fans from the PC case gepustet. In order for the above works, set the major processors lamellas cooler, which multiply the surface and thus improve the heat removal. An alternative is for water cooling. Like a car engine water takes the heat on the processor, is used by a pump to radiators transported to back down there to be.


Nanomaterials should help


Both methods have drawbacks: You need a lot of space in the cabinet, make the computer difficult and, depending on the version, even loud. But this must not happen.

This view at least some U.S. researchers. Together, the companies Intel, RTI International, and the University Arizona State a micro-refrigerator for computer chips. The will allow the heat to finish right there, where it arises, ie on the chip itself elaborate designs, as with current cooling systems are needed, should it become obsolete.

This will be possible to make a material that the researchers as a nanostructured thin film super-lattice designate. This is one very good power forward can, but if well insulated. Moreover, he ascribed to the property that its temperature drops 55 degrees Celsius, when you create an electric current.


The introduction is a price issue


The whole chip, however, want the researchers in this way is not cool. In an attempt mounted a cooling with a floor area of 0.4 square millimeters to a processor and both by how much the degree of temperature in which the mini-cooler can reduce the area covered. Their previous record: 15 degrees.

This is not yet everything to do with the cooling would be possible, however, are a good beginning, the researchers said the "
Technology Review ". In the future we could imagine, with several of these elements are particularly hot zones of microchips to cool. These so-called hot spots will be at the next-generation chip in ever greater numbers of the more processor cores on the chips together .

When it is the first micro-fridges in standard PCs given, is currently still unclear. A concrete timetable, the researchers have not yet. Still had a lot to do research. Above all, the combination of cooling and chip surface must be improved in order to minimize heat loss. Ultimately, it was only a matter of the chips to create another layer, namely the Kühlschicht to expand. Once the situation was, at a reasonable price to realize, we will do it, too.

As always with new technology so its introduction is nothing more than a cost issue.

Monday, January 26, 2009

New Zealand broadcaster foolish U.S. Army.

From something every journalist dreams: The New Zealand News Channel One News has a 60-page file containing the names and contact information to U.S. troops, details on equipment and other secret information. Ownership was the explosive file in a secondhand shop.

 


Wellington - What do you do when you are in a secondhand store an MP3 player buys and soon understands that highly sensitive military secrets with them around? The 29-year-old Chris Ogle from the New Zealand Whangerei gave the thing a TV Channel that he knows and he trusts - One News is the news channel of state television, Television New Zealand.


DPA
A U.S. army soldier at the computer: Better no data stored on mobile media. They could be in secondhand stores appear


Ogle had bought the little machine, however, in a shop in Oklahoma. Setback nine U.S. dollars (about 7 euro) cost of the offer, which is soon to be rather strange job out: At no time, says Ogle, had the device as an MP3 player functions. But he was followed by a roughly 60-page file, which is truly in him: "The longer I've viewed the file, the more clear to me was that I probably would not have been allowed to see."

Since he is probably correct, as searches of the New Zealand television show: The document contains einzustufende be as secret information about the supply of military equipment to different bases, but especially lists of names of soldiers in Iraq and Afghanistan served. Including contact information, such as mobile phone numbers of soldiers abroad and social security numbers of course. In some cases, searchers had to tell, they could report on at the time of Dateiabspeicherung current pregnancies.


No response


Although at that time in the fetal stage of development recorded army born offspring now, because the data on the MP3 player came from the year 2005. Contact information for the soldiers but were to a large extent still valid, as the Channel One News by some random phone calls quickly could clarify.

The U.S. Army is aware of the potential risks by portable disk perfectly clear: In the last year
forbade the U.S. Department of Defense, the use of USB flash drives, memory cards and MP3 players to service computers. Whether as a second-hand goods in the sale came MP3 player so was no longer needed, by whom and under what circumstances he was sold, is unclear.

In an opinion by the U.S. Army or the American Embassy in New Zealand News One waited in vain so far. Chris Ogle has offered to the MP3 player at the request of the U.S. Defense Department to hand over. As I said: it does not work.

Sunday, January 25, 2009

Full color advance.

A bit brighter note: If a picture looks different when printed on the screen, agrees with the color something is wrong. "Color Photo" explains how to get the maximum quality of his pictures can bring out.

 


Photography is not as simple as ever: record, edit on the computer, and then ... The big surprise: The expression in the photo has a color on the computer and the little fellow saturation. Responsibility is the color, or rather the lack of an accurate color, and perhaps the wrong color.

Indeed, always a color to use, though often not the best: There is no input from the user's operating system manages the equipment and the corresponding color.


DIGITAL PICTURES IN NEW TEXTS PER RSS FEED

Digital images - photo blogs on topics ONLINE
Click on the icon, then your browser is usually linked to the RSS feed to order. Problems? to help ...
Or would you prefer e-mail to be informed? Free email services with each new column to - how it works, click here ...
RSS feed of this column: http://www.blogs.de/netzwelt/tech/k- 7464.rss

Is there no color, it uses basically the lowest common denominator, the "sRGB" color. A perfectly acceptable solution for those who are already in JPEG format photographs and any red-eye or a crooked horizon correct. But if you are on maximum quality and the best possible color emphasis should not be satisfied.


Background color


From the photo to print many devices come with as many different color is used. Remedy to create color, the colors of each device and define the transformation into independent Zwischenfarbräume it. They come with the standard profile of the ICC (International Color Consortium) to be used? ICC profiles mentioned. The operating system must be prepared for each device in the processing chain such a profile, so that a reproducible color can be reached.


FOUND IN ...

Color Photo 1 / 2009

The magazine for digital and analog photography

Content
Trial order
www.colorfoto.de


Two such profiles, everyone has seen that already in the depths of his camera has dug settings: sRGB, short for Standard RGB, and AdobeRGB, the larger space, which can display more colors. Both are so-called device-independent color spaces. They do not describe the gamut of a digital camera or a monitor, but are for the exchange between devices with different colors thought. As the name suggests, color, both on the color with the three basic colors red, green and blue. Mixed together showed all three colors white.


sRGB - the lowest common denominator


The variety of devices with their respective colors makes compromises inevitable. The sRGB color makes for the bulk of computer users Least problems. It contains all the colors that everyone should be able to monitor display. There is also every color in the position, all defined by sRGB colors on paper.

The problem is: Fotoprintere can usually considerably more color. And as good as any current monitors surpass the gamut of sRGB far. Digital cameras are distinguished in the theory once more colors on a monitor and printer can represent. Only Apple's Safari browser dominates the other dealing with color longer. The open-source Mozilla Firefox browser may be in the new version also? However, users must explicitly color in a confusing configuration interface on. In the best case, with more color photos in programs without color simply too little from saturated. In the worst case, the true color is no longer agree with the target. Those who are not aware of color busy getting in the use of different color than sRGB trouble sooner or later.


FARBMANAGEMENT - LEXICON

Farbabtrennung


How many colors in the image with smaller color actually lost, it is proof of the capabilities of Photoshop quite simple test. They shoot a RAW image that as many rich colors. Then the RAW 16-bit RGB Prophoto image opened in Photoshop. The Gamut warning in the View menu shows there is gray, where the colors of the set target color can not be displayed. In the jargon of this phenomenon is called "clipping"? because the colors would be cut. As the target color is defined
Then for comparison once again AdobeRGB and sRGB. Both are widely available colors are not mapped. AdobeRGB has especially in orange, but also some green and yellow problems. For further compounded sRGB orange and blue tones to the nichtdarstellbaren colors.

Calibrate


No matter how great the color is? a binding means the color is not. It requires only a correct configuration of the monitor. However, the Monitor also fehleranfälligste device in the processing chain. Because the manufacturer cheaper, in itself good monitors are seeking to expand in the exhibition rooms of Media Markt and Co with überschärften and oversaturated images hervorzustechen. For professional monitors certainly looks different, but few are willing to Matt comparatively small slices for 1000 euro and more to purchase. However, the trouble with a lot of photographs drawn from the monitor to look reliably. Remedy the calibration of the monitor. Previously this was expensive special hardware is required, now manages the already quite adequate affordable devices such as the Spyder 3 Pro for about 150 euros. The included software sets the white point of the monitor largely automatically and adjusts it to the ambient light. For many monitors are on top of manual settin!
gs in circulation. They are, however, with caution, because even two monitors of the same type a different color behavior. Moreover, such attitudes do not take into account that the ambient light changes again.

CMYK - RGB


Cameras and scanners to digitize their records in RGB color space by mixing the three basic colors red, green and blue, which together result in white. Monitors and projectors also set to RGB. The print edition is on the other hand, the operating principle color with the basic colors cyan, magenta, yellow and black used. Black is just a practical and would complement purely arithmetically not necessary because, together, a mixture of rich CMY Black revealed. In practice this is not ideal because of the colors on a non-ideal base hardly possible. Many types of paper do not tolerate any color 300-percent (100 percent per color). Moreover, the additive mixture of black comparatively expensive, because you will need the triple ink.
The Unbuntanteil of mixed colors can be replaced in print, depending on the saturation of up to 100 percent black job.

Colors according to figures: CIE L * a * b *


The Commission Internationale de l? Éclairage (CIE, in English: International Commission on Illumination) 1931, developed the CIE XYZ color space, the totality of human-perceivable color density. The now common CIE L * a * b *- color of 1976 is based on CIE XYZ? the distances between the colors are, however, unlike its predecessor the human Sehempfinden lookalike. L * a * b * consists of a dedicated channel brightness L * and the two color a * (red-green axis) and b * (blue-yellow axis). The distances between the primary colors are balanced and can therefore easily calculated. Brightness or color does not influence each other, so L * a * b * color space as a reference for some colorspace conversion from RGB to CMYK, and also in ICC profiles used. In addition, the support many image editing programs, including Adobe Photoshop, in the internal color of CIE L * a * B * back. Losses occur during the conversion in the CIE L * a * b * not to, since it contains all colors of RGB !
and CMYK contains. The only drawback is that no device directly to the color can play. CIE L * a * b * is necessarily device-independent and needs for playback in RGB (monitor) or CMYK (print) will be changed. For the daily work is the L * a * b *- space not as a whole only a few programs with images in L * a * b * can handle? even if their color under the surface in the same color settings.


The professional image-editing program Photoshop, Adobe recommends sRGB for Web / Internet "as well as in the" Universal applications. " For AdobeRGB advises manufacturers on the other hand, only in the press? meant is the professional color printing. Who, like most users, not in the press works from Adobe will allow more or less the sRGB color space as a working reference. But this is not always optimal, because the colors of the few small color can hardly play for corrections and cut many colors, both in print and on the monitor would simply.

Friday, January 23, 2009

Obama's staff suffer from ancient technique.

Poor phone lines, outdated computers and not connected to community Web sites: The staff of U.S. President Barack Obama It is not easy to work in the government seat incorporated. For many of the worst: There are no Macs.

 


This team had Barack Obama, the new president of the United States, nobody expected: "It is as you would from an Xbox to an Atari change," said spokesman Bill Burton President of "
Washington Post after his moving into the White House. As he had many of the new government employees shocked when they are on the first day in her new job in the U.S. government tried to set up headquarters.


The problems experienced at first especially the telephone system. The newspaper got that callers who tried the west wing of the building to reach for hours only a busy signal can be heard. Who even tried the main number to call the government, landed in a band announcement to the Web site of the U.S. President,
whitehouse.gov, recalled.

Those who tried, at least by e-mail with the outside world in touch, had little more success. Obama staff, to Macintosh computers are used, saw plenty of dusty Windows PCs to their software in six years is no longer updated. But PC workstations appear in collecting any scarce commodity to have been. Notebooks, which is in the house could move freely, were apparently only very few people satisfied.


Call forwarding to wife

INTERACTIVE GRAPHICS


blogs ONLINE


Obama's office: Take a look at the home of the new U.S. president and his family

Some of the staff take in their plight to help themselves to their communication problems. An official who is only with difficulty through the security checks had managed to use his foreign mobile phone now, because he is neither a telephone or computer at his work that interrupts reported the Washington Post. This is expensive, but at least it works. Another, they say, has responded to the mailbox of his mobile aufgesprochen an announcement, the caller on the phone to his wife recalls. His previous mobile phone he had to submit.

There are new problems such apparently not. Already the Internet Representatives of George W. Bush faced unexpected difficulties, as in 2005 he took office. One week, it took time until he finally get a computer and got a BlackBerry.


The predecessor took less technology


The blame for the current technology in the seat of government plight of the most powerful nation on earth with the ex-President Bush and his employees' fault, however, would be misguided, says Scott Merrill of
Crunchgear. The had their successors hardly knowingly stumbling blocks in the way. Rather, it was probably the case that the predecessor of the current government, with modern technology is not quite so obviously are handled as their successors from the Obama team.

That is why it was in the White House no reason given, the internal information infrastructure to be updated. If you do not use Facebook, not using Twitter to communicate and urgent messages by courier rather than by e-mail, just do not need W-LAN, no iPhone, and no modern computer.


"The Macs are coming"


Obama's team, however, is entirely self-evident with the new media order,
took advantage of the possibilities of the Internet to meet their boss's reputation of "Internet president" to provide.


That reputation, however, the new masters in the White House has not yet entirely meet. In the blog of the president if any of five items are listed, you may comment on any of them. The latest of these is at 21.1. dated, is already two days ago, includes Obama's inaugural speech (interestingly, with the indication that there was applause at the end). There are at "Executive Orders" have plenty of reading material on topics such as Guantanamo and the torture ban.

Thought to have first presidential Webmaster to the new old technique used. By Matt Asay
CNET makes hope in any case, urges patience. "The Macs will come, just as open-source software. Do not over night."

The change also requires time - and the White House a bunch of new hardware.

Bracelet phones, micro PCs and green supercomputer.

Middle of winter are already reports of the spring, at least the technical Spring: On the Cebit preview was shown in Hamburg, which some companies innovations at this year IT auftrumpfen fair want. With this: The 0-watt PC, the low-power supercomputers and many more.

 


Hamburg - Save Power was before. Now current waiver announced. At least according to Fujitsu Siemens Computers is. Instead of simply reducing the consumption, the company wants its computers to the current thirst altogether abgewöhnen - at least if they are not needed anyway.


Green IT: The motto of the Cebit of 2008 seems correct until 2009 at the fairgrounds to arrive


But otherwise seems to Green IT, the environmentally conscious dealing with computer technology, much more on the topic to develop than in the previous year, when the fair society with a little green village a green coat to lend examined.

This time, geklotzt and not gekleckert. From the
Green IT Village, a Green IT World. The aim in the first week of March 2009, when the Cebit takes place, fill an entire hall. That they will create is beyond question. Finally, at the fair even supercomputers shown by green principles have been constructed (see below).

In any case, the manufacturers is the issue arrived. From low-power mini-PC computing resource-saving to those 'green' super computers is not only in the Green-IT World lot at the fairgrounds around the themes of environmental protection and energy saving spin.

An exciting technical highlights, however, it is still no shortage. That was already evident earlier this week, as many manufacturers in Hamburg on a CeBIT preview in Hamburg, a brief look at some of their Fair Highlights granted. ONLINE blogs and has been the most interesting innovations herausgepickt.


The 0-watt PC, the super lightweight Netbook, the Micro PC: See the following pages, the first highlights of the Cebit 2009:

Trojans threatened Mac Raubkopierer.

Until now, Macs an island of bliss. While PC users every day with fresh anti-virus updates from attacks by malicious software arm had been Mac users from criminal programmer mostly ignored. That could now be over.

 


The Trojans called OSX.Trojan.iServices.A hidden in a pirated copy. Only a few days, iWork 09, the new Office software from Apple, ever available, they will have as a vehicle for the spread of malicious software used. Affected are, however, seems only users who are trying to package the program through illegal means such as the sharing of Bittorrent network to obtain.


Corbis
Attack using malicious software: Now also advised Mac users to target criminal programmer


Apple sells the software in two ways. The one on DVD. The can for 79 euros in the shop, on his computer to install and get started. Entering a serial number of the software is not required. Anders, however, the trial version of iWork 09, which as a free download from Apple. 30 days to run the programs smoothly, then the software asks to enter a serial number on which you can buy from Apple.

In a rigged trial version of this software has a cracker now apparently hidden his Trojans. In her block "
Thread Researcher describes Methusela Cebrian Ferrer, antivirus specialist with the IT consultancy company CA Inc., as the Trojans work. Consequently, the malicious software as a trojan, backdoor, botnet client and P2P worm act.

The precise role of the Trojan, however, confusion still reigns. The
Security software vendor Intego that the malicious software is also capable of additional software modules from the Web nachzuladen could therefore be adapted to different tasks. Since the program launch itself as the object on the Mac is taking over and gives the administrator rights, it is likely that the author is a mac-based botnet wants to build, for example, for the sending of spam e-mails or for targeted attacks on the server can be used.

Affected were already up to 20,000 users, it says at Intego. So many users were infected, the version of the iWork 09-install package already from sources such as Bittorrent downloaded. Intego warns explicitly before, the software from illegal sources to obtain.

Concerned that the package is already installed, the trojan will be using the Terminal program in Mac OS X itself can be removed, they say in Internet forums. They are, however, a good knowledge of Mac OS X required.

Who is the software from legitimate sources, directly from Apple, is worried, however, must not worry. The original software from Apple's Web site may continue to be installed. The time of bliss, however, could this new Trojan horse for Mac fans have been completed.

Mr. President gets a Barack Berry.

His old cell phones and BlackBerrys can Barack Obama does not keep, but there is hope for the professing communication addicts in the White House: The Barack Berry "- indestructible, tap-proof, encrypted language as text messages, and is similar to a BlackBerry.

 

General Dynamics
Hard smartphone Sectera: Heard on the equipment of the military and secret services


The fresh gekürten U.S. president Barack Obama is in the course of the past two years has managed a feat that is probably without precedent: In spite of the vortex around his person, despite extensive campaigning endlessly, he has managed to establish contact with the normal world to date. Obama, confirmed countless Zuarbeiter, supporters and other contact persons, had until recently not communicate, but communicated itself over the Web, cell phone, e-mail - on every available means.

From the perspective of hardworking helpers to the power apparatus of the White House running, add Obama's desire to communicate more than just a worst-case scenario. It is a security-political risk premium quality:

foreign powers could be via cell phone to determine the whereabouts of the President
malicious bloggers could Obama informal messages to PR disasters auswalzen
criminal or anti-cracker bug the phone to make
his e-mails could be intercepted
or a conduit for spyware are

All this would be bad enough, but in addition there are U.S. laws, which oblige every beep expressed a president be documented and archived. Bill Clinton did so in this respect, abstinence, and George W. Bush had the e-mail and ledges can ban: Too big a risk advisers appeared that sometime thoughtless abgefeuerten details from e-mail in complaints, investigations or impeachment of Congress could be evidence.


With Obama has the intelligence, security officers, consultants and strategists, however, one problem: He
wants to continue to communicate. For months
There was a debate about whether the U.S. president actually Obama and could prohibit a digital decreed celibacy.


Hope for Hope


The so now it seems to have prevailed. Obama's new phone, his BlackBerry replacement for the next few years, says the current U.S. media reports that
Sectera Edge and is a smartphone from forging the weapons of the U.S. defense company
General Dynamics.

The thing was described as "rugged smartphone" designed and developed as an extremely stable device for use under harsh conditions, for example in the military. It could Obama through the garden of the White House crawl if he wanted. He could throw it from the roof, into the tub dropped, but especially so he can make phone calls and e-mail without having to listen to him is: Since March 2008, the Sectera the blessing of the powerful electronic eavesdropper of the National Security Agency NSA.

If anyone knows how to crack electronic communications, overhears people, across all borders to monitor the data, then the cracks from Fort Meade. The surveillance and spying on the global electronic communications specialist service is considered the largest and best equipped of the U.S. Secret Service. If the NSA says it is also a device to transmit secret data to use, then this is a knighthood. The Sectera received in the form of an NSA certification.

Technically the Flachsmann based on a Palm Treo 750, but was strongly aufgebohrt. The smartphone can e-mail and Web, serves many types of network including HSDPA, UMTS and Edge, has Wi-Fi, and some less common features.


General Dynamics
Sectera Edge: Not quite, what a Palm Treo 750 is sold

Thus, the potential temperature between -23 and +75 degrees - and times when the temperature falls to -55 degrees, the battery will not even order. Holds 35 hours of standby time and also a conversation about three hours, if need be. Encrypted communication eats more resources to shorten the battery life by a third, and doubles the required storage volumes. Individuals reportedly be the model for Obama, but with a battery with increased capacity will be delivered.

Allegedly, the Barack version also has a free market in the completely unknown product, which could generate envy: a virus of the NSA made sure Internet Explorer. Because the software comes from inside Microsoft.

The Windows-based operating system synchronizes itself with the laptop, but it has a totally non-commercial application: An incoming and outgoing communications of any kind will be encrypted in real time.

As the only product of its kind, the Sectera at the push of a button between open and encrypted communications switch. The encryption level is not known, but it is of the highest class of the NSA Certification: This means a share for the transmission of high-quality information as secret.

Cheap is the fun of course not. Currently, based on the nickname "Barack Berry" baptized device for $ 3350 satte traded.

Wednesday, January 21, 2009

Hackers steal millions of credit card data.

Data from one of the largest service provider for credit card payments in the U.S.: Computer hackers gained access to the databases of a U.S. company that each month some 100 million payment settles. Experts speak of the worst such case of all time.

 


Princeton - Experts estimate, according to U.S. media reports on Wednesday that many millions of customers could be affected. Some even believe that it may be the largest case of credit card abuse in the U.S. act.


Getty Images
Credit cards: Probably the largest theft of card data in the U.S.


The Computerhackern succeeded, according to the concerned service provider Heartland Payment Systems, the card numbers, names and valid data. The extent and damage are not yet to quantify. The company works for Around 175,000 mainly small shops and restaurants in the United States.

The data on the magnetic stripes are actually encoded, but would need to be decrypted query short, so the service provider. At this point, the attacker picked the data. Heartland Payment Systems, according to its own figures from the world's leading credit card companies Visa and Mastercard on unusual transactions have been made aware.

In so far according to media reports largest known case of Data in the U.S. were two years ago about 45 million customers of the discounter TJX affected. In Germany last several scandals with comprehensive data about abuse at banks and Deutsche Telekom for attention.

Wednesday, January 14, 2009

Cyber-criminals go IT researchers in the case.

Hackers, crackers, phishers: Cyber criminals steal with the help of spy programs, data on the network. But IT researchers at the University of Mannheim show now in a study, how they're able to give a fraudster with a malicious computer auszutricksen.

 


As we plunge into the often highly networks from hackers, crackers and phishers Ein? The best also highly thought Thorsten Holz, Markus Engelberth and Felix Freiling from the Laboratory for Dependable Systems of the University of Mannheim, all three experts on network security.


blogs ONLINE
Under the microscope: Mannheim IT researchers spionierten Cyber-criminals are from, how they are Internet users ausspionierten


For their thesis to verify they laid April-October 2008 a bait on the Internet: an unprotected, but groomed computer. They could not know how successful their experiment would be. By flycatcher made them rich booty. They found the data hiding and backdoor network of numerous criminals.
The results of their case study are now available.

In 33 gigabytes of raw text - the equivalent of 48 CDs - the three researchers found traces of 173,000 victims in 175 countries. Nearly 12,000 of whom come from Germany. The data cover 10,775 access to online banking accounts, 5600 complete credit card records, 149,000 e-mail tens of thousands of passwords and login information for other sites, such as social networks - data stolen hitherto unknown proportions.


Trojan hordes from the bandit-kit


Your information hunger fraudsters with the help of Trojans, it thousands of unsuspecting users on the computer locks with infected software, with a particularly malicious websites with spam. The Trojans eavesdrop on the user to send keyboard and Surfprotokolle to a secret location on the network, "Dropzone". Hacker software analyzes the data, extract passwords, credit card numbers and banking data. The cyber-criminals can use this data on the Internet black market for resale or for online shopping use on an agency basis.


This business has been around for years. What is new is that seems more and more classic criminals with little technical know-how into the net dare. They buy on dark channels Trojan kits, book a few million spam e-mails about this and need only the data from the Dropzone procedure.

Normally, these Dropzone is password protected. Many criminal hackers beginner but missed, even the back door to block their Diebesgutlagers - and then played the Mannheim in the hands of experts. The came with simple tricks gigabytes of data as they tried, often successfully access via standard server directories, came because of the sensitive data. Thorsten Holz, a doctoral student at the Laboratory for Dependable Distributed Systems at the University of Mannheim, is surprised by the Fund: "We have not thought that so easy."


With honey begins to hackers


In order to be able to say had Mannheimer but only take in the Trojans to give them the address of their quasi Dropzone abluchsen. Done it with a so-called honeypot (a "honey trap") - a malicious computer that sent it to Surfreise until he is infected with a Trojan. What the Trojans not noticed: The computer, which he infested, was under close observation.

ON TO ONLINE blogs

Micro-blogging service Twitter: Channels of Britney Spears and Barack Obama chopped (06.01.2009)

Cyber attacks: Chinese hackers penetrate the network of the White house (07.11.2008)

Federal Court: a warning for selling crack software is legitimate (17.07.2008)

Data that the Trojans received from the network or send files to which it is accessed, it changed all of this, the researchers. From April to October 2008 found the Mannheimer as about 2000 different Trojan files, discovered 350 Dropzone. To 73 this web store, the experts had unlimited access. There they found the stolen property: the minutes of online banking Trojans.

Such Trojans, where in the network, a user is staying, which keys on the keyboard, he just pushes ( "keyloggers"). The user enters an online banking site, the pest is logged with every step, turn access data, PIN and TAN codes.


HARMFUL AND spyware SOFTWARE: SO WORK Trojans and CO.


Click on the keywords to learn more

Trojans


Like the Trojan horse of Greek mythology hide computer Trojans their main objective (and harmfulness!) Behind a disguise. Most occur as a harmless software: screensavers, video files, access program. They are, for example, as e-mail attachment distributed. If the program starts, is thus always a hidden malicious function: Most of this is the opening of a so-called backdoor, a backdoor to the computer system compared to the open Internet and by other malicious programs are downloaded.

Virus


Computer viruses infect existing files on the computers of their victims. The landlord files work? at least for a while - to continue as before. Because viruses are not discovered. They spread not independent, but rely on that computer users infected files to pass them by e-mail, to a USB stick copy or sharing settings. Of the other malicious and Spähprogrammen is a virus spread by the sole method. What damage it causes depends solely on the will of its creator from.

Rootkit


The small compound, the words "root" and "kit" together: "Root" is for Unix systems, users with administrator rights, even in the depths of the system must intervene. A "Kit" is a collection of tools. A rootkit is therefore a set of programs, with full access to the system of a computer equipped. This allows the rootkit widespread manipulation, without that, for example, virus scanners can still be perceived. Either the rootkit software includes, for example, disable security scanner, or it builds a so-called shell on, which is regarded as a kind of mini-operating system operating in all suspicious transactions to the computer hides. The bulk of the outstanding rootkit is used, trojans, viruses and other malicious additional software over the Internet message. Rootkits are among the most difficult aufspürbaren compromise a computer.

Worm


Computer worms are, in practice, the tuned, lowered variant viruses and Trojans. In the strict sense of the term only describes a program, which provides its own spread - and the programs that are transported. Worms contain a nucleus is a malicious program, for example, by launching its own mail program to spread from one infected computer provides. Your Hauptverbreitungsweg are the communication channels of the Web: E-mail, chats, AIMs, P2P exchanges, and others. In practice, they are often seen as a vehicle for the dissemination of various other malicious programs used.

Drive-by


Under a drive-by is the influence of a computer or even the infection of a PC simply by visiting an infected Web page. The method is a few years the trend: Taking advantage of recent security vulnerabilities in browsers and the use of scripts, a Web page stored on a malicious code on a computer influence. Thus, virus spread, sniffer programs installed, the browser requests redirected to Web sites that pay for and more. Drive-BYS are especially perfidious because they are from PC users no activity (such as opening an e-mail) request, but only carelessness. Victims are mostly users that their software is not through regular updates currently hold - that is potentially as good as any.

Botnet


Botnets are networks of computers gekidnappter - the bots. With the help of Trojan programs, for example, through websites or manipulated fictitious e-mails on the computer infiltrate, to obtain the botnet operator access to the foreign PCs, they can be controlled via the Web. Such botnets to let can be a lucrative business. The zombie armies are used, among other things, to millions of spam e-mails to send a large number of simultaneous requests sites to its knees or on a large grassy styles passwords deductible. (more on blogs ONLINE)

Zero-day exploits


A zero-day exploits exploits a software vulnerability already andem day on which the risk is even noticed. Normally provide protection to producers of software and the authors of malicious software, a head-to-head races at stopper, sealing the well-known exploits and vulnerabilities.

Risk No. 1: User


The greatest security risk in the world of the computer sitting in front of the computer. Not only a lack of discipline when necessary software updates to make the user dangerous: He has a great fondness for free music from obscure sources, funny file attachments in e-mails and a great joy in communication oh so informal Plauderraum of the Web. The most damage is likely in the IT user-fingers on buttonpress caused.

Browser, the form data to the user's convenience store and automatically register on websites, especially come the Trojans a bonus: In such a case, he only read a key file in which all the login names and passwords are stored by the user. Together with the other log data, he invites them into the Dropzone. All this is completely automated.


Australian experts sift through digital stolen


Much of technical understanding is no longer necessary. Also, because such a Trojan kit with Euro 2000 to 3000 is quite favorable, there is so classic criminals a new field of activity. For the Trojans experts Thorsten Wood is a sign that traditional and digital crime are interwoven - Cyber-criminals are no longer the vanguard of the bandits. That also means no more long, and even the stupid cyber bandits know how to manage their online deeds can better hush.

YOUR OPINION IS ASKED

Discuss this article


And what happens with all the data, the digital stolen by the Mannheim found? That gave them to the Computer Emergency Response Team (CERT) in Australia, which focuses on banking issues specialized. The Australians will take care of the data and say the victims and affected companies targeted. Even where firms will sign up, ask for data, which show how the cyber bandits their online spying systems.

For German users of online banking systems, there are at least good news. Online banking in Germany is relatively safe as long as no fraudster TAN list get into the hand, they have virtually no chance of online accounts leerzuräumen. As a particularly safe mobile TAN procedures, some banks send TANs with a short shelf life via SMS. In some countries without TAN-based system is already on the other hand, the standard combination of access name and password. A gift to cyber-bandits.

Tuesday, January 13, 2009

The conspiracy of wind guard.

The sun bangs, a mild breeze blowing and the automatic rolling shutters for fear of storm damage high. Facade Verdunkler spin because the wind sensors wrong places and facilities are poorly programmed - or because the leaders of the accountability office of the doubt.

 


If the graphic wrapping paper rolls and roll out the window with several layers of brown tape up, then the summer there. It may be that the employees in most other office buildings in the height of Germany's shutdown blinds shielded sit comfortably in the twilight.

blogs ONLINE
Low-tech blinds: When will blogs ONLINE gekurbelt - without incapacitation by mimosa-automatic


In my old office we had to lock out the sun itself. External blinds although there were, but also an automatic transmission, this bright in the sun for hours and regularly unkorrigierbar hochfuhr - because of too much wind and the threat of storm damage to the blinds, like a house said.

So there is something not only in the Ruhr region - such mimosa-blinds complain blogs ONLINE readers from all over Germany.

Ingmar Hook, for example, works at an office in Munich with blinds disease: "The wind is going down the blind guard uncompromisingly high, when some wind goes. In this case, we have A0-old wall calendar worried that we will stick to the window so that you the screens to see something. "


COLUMN SUBSCRIBE

Malfunction: technology Macken, the millions of nerves
Click on the icon, then your browser is usually linked to the RSS feed to order. Problems? to help ...
Or would you prefer e-mail to be informed? Free email services with each new column to - how it works, click here ...
Address of the RSS feeds: http://www.blogs.de/netzwelt/tech/k- 7334.rss

Actually have automatic blinds is not as herumzicken. Actually, the technique is perfect, says Elmo Schwandke, chief editor of the journal for building and craft "g + h". His assessment: "I see no fundamental technical barriers to the components used." The problem is not the technology itself, but the installation and programming of the plant, as well as sensors for light and wind.

Certainly, as an expert Schwandke Building, there are installations in bright sun because of a "slight breeze, the Office of the midday sun completely suspended." But: "Something is in almost all cases, to faulty programming. Kompetenten electrical specialist undermined such errors do not."


A sensor for four facades


A frequent cause of zickende automatic blinds: A central meteorological station measured wind speed and light radiation, and the automatic transmission is based on this data on all four facades of the blinds react. As the sun square buildings experience a maximum of two sides also can catch some directly, so frustrated automatic at least half of the office.

The same problem arises when a wind sensor (on the roof?) Storm warning for external shutters on all building sides. Then it may well be that on one side, where just about no wind blows, the blinds because supposedly too high wind speed. Occurs confirmed Building Schwandke expert, but should not be: "With a facade-dependent control can exclude such errors. Furthermore, it is not necessary in every case, all the facades completely automated."

Say: If the client is too expensive, for each facade its own sensors to install, so you could at least the office workers a little more control over the Verdunkler give.


About Sensitive Sensors


But even if the central meteorological station of an office building stands on the roof, explains that not why every day more than the storm shutters because of perceived high risk of change. So often it is not pre-storm gusts that sweep through the office roof.

The fact that the auto still in high wind alerts daily, is usually wrong programmed limits. External blinds threatens only noticeable gusts at risk - not everybody warm breeze, the result of some automatic anspringt. But there is, of course, elaborate and expensive, an individual vote to be found than the very low default values should be used. Building expert Schwandke: "So obviously something must be accurately measured, tested and programmed. It is worthwhile here quite a bit more money for a professional programming and system support issue."


Programmed Blinds


And even if all this does not work if a central sensor in a very bad job on the building wind and light conditions and attaches arg low standard set limits - that is no reason why the decisions of such a limited automatic all occupants office necessary.

Since the early'90s, the wiring in most office buildings very flexible programming - data lines connect the electrical components, bus technique is called in the jargon. Theoretically, this infrastructure is also such a possible scenario: If someone in his office before the blinds five minutes has lowered itself, change the automatic five minutes later, the position of the blades not when its light sensor then determines that it is significantly brighter . Up to a certain critical wind speed automatic lets the office employees total control over the settings of the blinds.


Trust is good, better automatic blinds


Say: A good automatic should and could also see if the office is just can not prescribe how much light they need, because a few minutes before the blinds even so, how they want it. Whether in the office just too light or too dark, white and indeed every human being better than a weather station on the roof of a neighboring tract.

Nevertheless, when automatic blinds are often referred to an action for a long time any manual correction blocked. Building expert Schwandke: "It is sometimes surprising how little plumbers or client employees in an office building trust."


TECHNIKÄRGERNIS NERVT WHAT YOU? WRITE TO U.S.!


Hidden Einschaltknöpfe, confusing instructions, crazy machines - in the series "malfunction" in bulk, we follow Technikärgernisse to the millions of nerves. Send us your suggestions with a brief explanatory note. The best e-mail.

iTunes songs know who you bought.

Apple creates the copy protection for music files - leads but a watermark. Each iTunes file, reported a U.S. trade publication, contains a clear reference to the buyer. The DRM-free songs in the set-sharers would be more than unwise.

 

DDP
iTunes: watermarks in each "plus" file


As the watermark is in every iTunes Plus file the e-mail address hidden, with the buyer to the iTunes Store has logged. The reports of Fachdienst "Cnet". The offer iTunes Plus is characterized by,
that there is no copy-protection mechanism (DRM) contains. The files can be on any number of MP3 player or computer.

Too carelessly should his music files, but not pass - because if the two files, one day in an illegal exchange should appear, they are on the e-mail address is clearly back to the buyer to follow.

"Cnet" also describes how the watermark can even find one: by an iTunes Plus file with a text editor such as Windows Notepad to open. With the search function of the software could easily be one's own e-mail address in the text track.

What you when copying and downloading nor should note, to the German Industry Association
Bitkom just a small guide published. It was, for example, in order "to the CD a good friend to burn." But only if the non-copy protected, because "those who tried to bypass the lock, is punishable by law."

The issue remains complicated.

The coal track of the Internet.

Microsoft proudly announces that it promotes the efficient use of computing resources. " Is better, because usually make IT companies other headlines: News Google is once again in the pillory, because the Web has long produced more CO2 than the aviation industry.

 


The physicist Alex Wissner-Gross of Harvard University is a distinguished man, if such an environment concerns in the crisp formula pouring any search on Google caused a pollutant emission of 7 grams of CO2, then, the press likes to refer to. "Enthüllt," the headline in Britain's "Times":
"The environmental impact of Google Search." And before expects that with two Google searches a kettle to heat water could.


DPA
Internet eats energy, causing emissions at all points of the communication process: Here to reduce serves all


That sounds drastic: What Wissner-Gross as relatives, however, is composed of many factors, including not only the energy hunger of the Google server park belongs, but also the power of the local computer, the energy requirements of all participating providers and - if he expects clean - The proportion of production costs for the machinery involved. Quite possible that since a seven-gram lump of coal harder comes out - difficult enough to be painfully felt, if it is someone strong enough to raise his head. Is the goal of Google, it will be perceived.

That in turn should Mr. Wissner-Gross pleased, because the business does so incidentally, Web entrepreneurs a green jacket to sell
by giving them contracts for the supply of green power offers. What in turn, publicly announced its recognition as an effective advertising outet, but not generally discredited: The problem is well known and not by the hand. Our growing electronic communications desire is reflected in the LCA is now heavier than the weight down so often oltenen of aviation industry.


New is not everything


A scandal is the fact, however, not designed, and it is not sensational news. Estimates of what our IT use, which use the Internet to CO2 emissions, it has during the past year, many people - even in relation to Google. The IT companies take a long time is true, that the issue be detrimental to their image can be.

The CO2 emissions, they actually cause themselves, they may also in its ever-growing electricity bills, see: There is therefore a mixture of Ökobewusstsein, image advertising and healthy economic interests when companies such as Google or Microsoft in "green" server technology investing. The last Cebit not devoted to the topic of about one topic. And Google has long been concerned with the issue.

The company points out the greenest ever server parks to maintain. And also responded promptly and dünnhäutig on the "Times" article: manager Urs Hölzle
made in the Google blog that after Google's opinion, the estimates of Wissner-Gross were completely covered. A Google search of course caused CO2 emissions, but rather in the range of 0.2 grams per search - Wissner-Gross is 35-times as high.


The solution: Less eat burgers


Probably both figures can somehow conclusively substantiated. And also quite different: that a Google search one to ten grams, or seven to ten grams eat, cited the "Times" itself from other sources, the mere fact that viewing a PC screen from 40 to 80 grams per hour causing emissions. That a single "Second Life" avatar 1752 kilowatt hours per year.

Even if Google, with its 0,2 grams per search closer to the truth would be, would still be prohibitively large sums out. No wonder that only computer now for about two percent of all the climate should be responsible, as the market research firm Gartner calculated wants.

Google countered all this with the car argument. A car emittiere in the best case 140 grams of CO2 per kilometer. One kilometer drive cradle that is thousands of Google searches "on. Calculated is also not entirely, but still prefers the argument: the emissions, electronic communications and Internet usage cause, the opposite, which is thereby avoided. By not just goes to library, not only between four shops commutes in order to compare prices, not on suspicion recherchierend sources ordered under ten wrong, post zugelieferten, the right to find. By online pre before the really big CO2 emissions set in motion.

Sure, green would be better, but a little less hysteria, too. At the point but the
Jason Kincaid of Techcrunch in his own personal CO2 offsetting. A cheeseburger, he says, have a CO2 footprint of 3600 grams - and so far, far more than he weighs. Who's with a clear conscience at Google wants to browse and search, he suggested, should eat less burgers.

Monday, January 12, 2009

Professional Tips for great panoramic views.

For each photo to view a powerful craft that requires a few basic skills. Professional photographer Michael Freeman explains what "stitching" is how a 360-degree panoramic view of a single image is, and how crossfades between images clean succeed.
  Technologies, which are claimed to promote the creativity, I am by nature skeptical. But in the case of multiple images Anstückelns (jargon "stitching") I make an exception.
Michael FreemanAus a variety of single images of several sequences, eight shots chosen to view this impression from the studio of the Chinese artist Shao Fan records
The technology behind this very simple concept has over the past few years significantly. Basically Stitching is nothing but the combination of multiple, overlapping images into a single, larger picture.
Michael FreemanStitching software has in the analog days, almost unthinkable process of Aneinanderfügens of 360-degree panoramas or giant pictures of several individual shots as easy as never before. These options provide an inexhaustible creative potential and have even found their way into the art of photography found.
PERSONAL Michael Freeman, internationally renowned photographer and author, was for many years the leading photographer of the magazine "Smith Sonia" and regularly works for Time-Life Book, "" Reader's Digest and the BBC. He is dedicated to love of travel reportage, architecture, photography and "photos with special effects." michaelfreemanphoto.com

Sunday, January 11, 2009

Update for the nose cinema.

A movie to go, with great pictures, that should the video glasses Cinemizer offer. After the first version was struggling with childhood diseases, a new model now pledges. Matthias Kremp, a pre-tested.
  In its first version was the "mobile cinema in eyewear format failed. Too vague, too matte colors, little convincing headphones and, above all: After about ten minutes of film pleasure with the glasses was a sick feeling, at least for me.
All these flaws will be eliminated when Cinemizer Plus his promises Zeiss Marketing Manager Andreas Klavehn during a conversation at the Macworld in San Francisco. Only for the sick feeling he will not accept any liability that was not objectively understand and therefore not using technical means to eradicate.

Above all, the weaknesses in the picture had been resolved, said Klavehn. Much had to do the German manufacturer Zeiss Cinemizer for not first. Because of the lack of image quality, when the first test Cinemizers irritated, was not the manufacturers themselves, it later emerged.
An update has the image zermatscht
"That was bad luck," explains Klavehn. Just a day after the Cinemizer in January 2008 in San Francisco had been presented, Apple released a software update for iPod Touch and iPhone. The changes, among other things the way the Apple device to an external video playback devices, such as the Cinemizer further said. The result was that the video glasses with weak signals reliable got tired it generated images. Until the publication of the update that was not foreseen, says Klavehn. Moreover, Zeiss, the problem does not resolve itself, but on a solution from Apple have to wait.
For Apple, the problem in a new version of the iPhone and iPod software solution, is for users of the quasi-glasses Cinemizer the sun risen: contrast, sharpness, colors should be much better now than before. Of that Klavehn that's not exaggerating, I had the basis of a new pre Cinemizer Plus at the edge of the Macworld Expo convincing.
Abschaltbuchse for headphones
In effect, films, with the video glasses, is now much livelier, stronger colors. Now Watch the video with the last Cinemizer fun. Above all, however, the glasses have become more comfortable. The nose of the old model operator, the manufacturer now by a much softer, more flexible model replaces. The downright clings to the shape of my olfactory bulb, instead simply pointed to press, as its predecessor was the case.
Do not have gotten better for the integrated headphones. Even when the revised model does not prevent outsiders can overhear what the mini-speakers by themselves. We can now ignore, because in the control of the Cinemizers a headphone port was built. Once, for example, in-ear headphones einstöpselt, silent Cinemizers of the headphones, and you can listen to the soundtrack - without his seat to disturb neighbors.
High-tech with envy factor
This may be especially true fun, if you look at 3D movies or games worried. The effect of video-Zeiss glasses really plastic. A demo movie with a rapid ride through a subterranean labyrinth made me involuntarily my head as shown in the film tend movements. Too many, and especially high-quality 3D movies but there is not yet. If one day come, 3D would be the highlight of the Cinemizer Plus.
Whether you are concerned with such a video glasses actually want to feature-length film, is of course another matter. Even if the glasses now comfortable rests on the nose, better pictures, it remains relatively solid, above all because of the cable for some time after disturbance. If that is not mind and those who desire to have high-tech, but it will certainly be fun. This all the more so if the Cinemizer in the train or airplane used. Envious glances and curious questions come from a safe.
Above all, of course, after the price. Zeiss Klavehn man says that the increase will Cinemizer as expensive as its predecessors in that it cost about 370 euros. Cheap is not that the fun factor, but certainly adequate. A little patience must be friends of the nose and cinemas still afford. Not until March will be the new model in the shops are.

Saturday, January 10, 2009

Ladekabel Started.

Aufladefläche instead of power: On the high-tech show CES show producers the first mobile phones, wireless electricity via magnetic refuel. The Demo function, but the end of the cable Kuddelmuddels is still far away? currently lacks a standard for wireless power.
  The anger had been at any time with a digital camera, a wireless phone and an MP3 player is verreist: Each device requires its own power supply, many are faced with similar, but no power adapter fits one manufacturer to another device. So it is with a bag full of cable spaghetti on the road. And some cable in which one has forgotten Kuddelmuddel guaranteed.

At the CES show high-tech companies to show two solutions to this problem: cable away. Replace a bearing surface, in combination with small, at best, in the devices, the worst in a protective built Solenoids.
Aufladefläche instead of cable spaghetti
That sounds complicated, does the self-experiment with the prototypes of the manufacturer Powermat and Fulton Innovation at the fair but easy: It puts the BlackBerry, the iPhone or cordless screwdriver on the pallet, the magnetic attraction know the way in the right position and immediately invite the battery. No cables, no distribution outlets? a Aufladefläche enough for several devices.
Such wireless electricity companies promise a long time - at CES this year are the first market-ready products to be seen. Smartphone manufacturer Palm delivers his new phone with a wireless Pre-charger called from Touchstone. The principle is the same as for the Aufladeflächen of Fulton and Powermat: magnetic resonance. A transmitter coil in the charger transmits electromagnetic energy coupled to the receiver coil in aufzuladenden device.
RFID-enabled chip magnetic field
Only a device with the same resonance frequency, the energy? other objects should not have been affected. The fine for a simple self-test at Powermat - one on the Aufladefläche of Powermat gelegtes iPhone took no damage. Nothing happened.
The manufacturer builds in Aufladeadapter-Nahfunk RFID chips. Your signal is activated until the Aufladefläche and told her what equipment they have to operate. Alticor, the parent company of the manufacturer Fulton uses the wireless technology already longer in its products for water treatment by UV light? the lamps are driven by magnetic field.
100 U.S. dollars for the cargo area
Powermat wants the end of the year, the first wireless adapter for power sale. Initially only available in the United States, a startup in Germany is scheduled for 2010. The loading will be U.S. $ 100 cost. You can charge the packs on the folding Aufladefläche (such as voluminous as five tablets of chocolate on top of each other) that they stöpselt into the outlet and then four devices simultaneously wirelessly charge - three small as cell phones and a bigger like a laptop (which you plug into a special stöpselt adapter, which is located on the Aufladefläche).
The Powermat adapter for devices to be 30 U.S. dollars cost. Powermat showed adapter for iPhones, iPods (Touch, Nano, Classic), some Motorola and Nokia phones. These adapters are the coils and radio chips in protective hidden.
This is a stopgap. The engineers of Fulton and Powermat say that the technology is small enough to use in small devices such as mobile phones to integrate. Fulton showed a prototype of a corresponding iPhones, which the engineers somehow Aufladetechnik interface. When Fulton was also the prototype of a mobile phone battery to see the technology for wireless recharging is integrated. Palm has apparently also in pre done.
Even if everything in practice working as well as for the demonstrations of the manufacturer of wireless electricity has a fairly big problem? the chicken-egg dilemma. Really, the technique is attractive only if the cell phones, cameras and other cameras no extra adapters for wireless electricity needs. But for manufacturers to convince these modules installed, a lot of people buy wireless chargers.
Invites laptop wirelessly
Powermat is this dilemma with the adapter to stopgap. Fulton Innovation will not own any products? they are working with partners who royalties against the current wireless technology in their equipment racks. Later this year, Bosch in the United States sell cordless screwdrivers, which can wirelessly charge. In addition, the chip manufacturer Texas Instrument Fulton wireless Aufladetechnik to integrate some of its chips.
However, it currently is that one's palm Pre not just on a Aufladefläche by another manufacturer such as Fulton or Powermat can load. A standard for communications equipment and the frequencies used is missing so far. After all, has existed since mid-December, a consortium of manufacturers, which should develop a standard? some of the best known members alongside Fulton Innovation: Texas Instruments, Logitech, Philips and Olympus.
Three manufacturers, no standard
Whether that is enough to create a standard set, is unclear. Schön wär's. And even if it is a standard there, the manufacturers still have all sorts of intriguing ideas, what the wireless electricity could still do everything: Fulton Innovation showed a kitchen table with recessed Ladepunkten that drives kitchen appliances (blender, food processor), an engineer led Powermat a desk with a recessed Ladepunkten, which was a radio, a laptop and a lamp powered wirelessly.
That could be the end of the ugly staubfangenden cable clusters, which almost lurking under every desk. The only catch is: You can use the devices not just move? they must have been near the Ladepunkte stand.

German engineers give U.S. Media from.

When it comes to the prestigious Oscar and Emmy statuettes goes, German artists have rarely anything to report. The local engineers, however, like to land on the podium: Five of the first technology prizes this year went to German.
  There is hardly an activity in the film and TV business, for which there is in the United States would no markup. The Academy of Motion Picture Arts and Sciences, the Oscar-known among the film brings people, draws an annual cohort of creatives in up to 35 categories. We see only a part of it, because the Oscar gala with its pathos, and the "... oh yeah, and the great aunt of the girl child, I thank my mother even 'speeches is the glamor of the movie business group reserved. The input of the first stars to shine, and will advance on a smaller scale appreciated.
As Erwin Melzner, Volker Schumacher and Timo Müller of the Munich firm Arnold & Richter Cine Technik, film freaks better known as ARRI. They developed the pictures since learned film cameras, which until now among the best in the world are counted - but not only that the team was in Munich on Thursday with a technical Oscar award for the development of the most powerful headlamp Arrimax 18/12.
And solemnly celebrated awarded this prize and three other awards on 7 February in the framework of a gala dinner in Beverly Hills. The glamorous group exercises then on 22 Hollywood in February in another record attempt in the permanent smile.
One product, two Emmys
Quite probably smiled broadly Thomas Wiegand, a professor at the Technical University of Berlin, and Jens-Rainer Ohm of the RWTH Aachen. They picked on Thursday in Las Vegas a technician-Emmy for its development work on the H.264 video compression codec.
It is now all Web users, MP4 player-owner or HD fan encounters, even if he is not aware about the H.264 procedure only enables the compression of HD images on half of their data volume, and thus also streaming high-quality yet compact video across the Web. He werkelt also the encoding of Blu-ray videos in mobile TV solutions, and forms the basis of future HD-TV standards via satellite.
For Wiegand ohms and is already the second Emmy on the shelf - for the first time in the history of the Emmys, a technology prize twice for the same performance award. Ohm Wiegand and took the prize together with her colleagues Garry J. Sullivan from Microsoft and Ajay K. Luthra Motorola contrary: All four are in the developer groups Video Coding Expert Group (VCEG) and Moving Picture Experts Group (MPEG) is involved.

Friday, January 9, 2009

"Only time will be the number two."

Windows 7 is now available as a trial in the network, and Yahoo, he is still interested: Microsoft CEO Steve Ballmer said in an interview with blogs ONLINE current plans of the software giant, and reports of his new hobby - the study of historical economic crises.
  blogs ONLINE: Mr. Ballmer, they have even a Netbook used?
Ballmer: Sure.
blogs ONLINE: What did you like it?
Ballmer: That is easy. But I have to say, for the daily work so I would not want to use. I like larger screens and larger keyboards. And because my budget is not particularly close, I can I afford to buy a computer, which is slightly, but still has a beautiful screen. For me would be such a Netbook that is not the right thing, but for many people have such devices attractive.
blogs ONLINE: The success of Netbooks led to Windows XP a lot longer than planned on. What is the impact on the development of Windows 7 with?
Ballmer: Actually no.
ONLINE blogs: No adjustments to the small computer, so that Windows 7 runs better than Vista?
Ballmer: We have clearly demonstrated that Windows 7 on Netbooks running.
blogs ONLINE: And this will also work with current models?
PERSONAL Steve Ballmer, 52 grew up in the Motor City at Detroit, where his father's money as a manager at Ford earned. During his studies he met the future Microsoft founder Bill Gates know him in 1980 as the first manager of the then-fledgling software company hired. 2000, Gates, Ballmer to the position of Microsoft's managing director. His stake in the company have him for billionaire gemacht.Ballmer: You will see that it works, if the people the Windows-7-beta download and install on their Netbooks. We have even made yesterday, and Windows 7 on a standard Netbook with a gigabyte of memory Requirements, which has gone smoothly. Ultimately, the people themselves decide what they like. We will definitely not try Windows 7 on any old box to run. But Netbooks are no longer what they were when introduced. They have more memory, they have hard drives instead of flash memory, is very different than it did a year ago.
blogs ONLINE: The Development of Windows 7 seems much closer to the schedule, than with Vista was the case ...
Ballmer: It's one of our objectives, the plan set. In Vista, we have a lot of attempts, many wanted to innovate. If we could comply with the timetable, it was good. But we have long tried, too many new features at the same time to develop. Then we have the reset button and said: "The timetable is also a function." But until we were so far, we had already several years behind us, where we have always developed new features and the schedule was postponed again and again. In this way, we even give the time, things develop in their time were too far ahead.
blogs ONLINE: You have opted for Windows 7 so even disciplined? Would you actually planned to jettison functions in order to schedule them?
Ballmer: Sure. But that's not my decision. The development team regularly makes such cuts. But the beta actually contains everything that the final version also have.
ON TO ONLINE photo blogs trends at CES: The megapixel madness is over (09.01.2009) Microsoft's fair promise: The evil is suddenly Steve brav (08.01.2009) CES News: Mini-laptops and folding BildschirmeBallmer on cooperation in the CESblogs ONLINE: What do you believe how fast Windows 7 by the users will be adopted? Vista had some problems because, especially among corporate customers.
Ballmer: The truth is that there are probably more similarities than differences exist. New computer for end-users are from the date of Windows 7 to be delivered when the new system is available, just as it was in Vista. Windows 7 companies will only want to try and test if they are still running Windows XP. If they already use Vista, they will have less work, but they will still want to test and experiment. The business market is simply slow. I think now that companies quickly to change Windows 7 will be on Vista? Good possible. You are already converted to Vista faster than before on Windows XP.
blogs ONLINE: But with Vista, there were some problems.
Ballmer: The problem is that expected, all would immediately change. But that is not what happens. Of course there were problems with Vista, but the percentage of firms within the first two years after the introduction of Vista to Vista transition, is higher than the corresponding percentage for Windows XP. When XP came out, there was the same reservations about the compatibility with corporate applications.

Palm invents new iPhone.

What a comeback: At the CES has the Palm OS mobile web and the Palm OS pre presented. Spectators and journalists are excited to compare the innovative mobile phone with Apple's iPhone. Only one question remained open.
  In Las Vegas, presented mobile phone manufacturer Palm on Thursday (local time) an entirely newly developed mobile operating system, the Palm OS and the web pre Palm, the first device on which the new software is running. The first public presentation of the new system fell to fan show, sparked excitement in the audience from storms.
AFPPalms new hope: the web with pre Palm OS - a smart phone, which Apple has learned
These were the doubts in the run-up were great: Does the Palm turnaround? If the code under the name Nova developed new Palm operating system, which supporters hope and firm like this? Finally, the company had, with the first PDA, the Palm Pilot was great, in recent years, friends lost. The Palm OS has not been renewed, seemed stale and consumed, the new software was considered the last chance to save the company.
Their idea, however, had no doubt that Palm is safe, a winner to have developed.
As the lights in the room out, the words "Palm" on the screen appears to Brandet enthusiastic applause. Such Zuneigungsgbekundungen known only by Apple events. But the first person who enters the stage, known previously from Apple: It's Jon Rubinstein, the man who until 2006 for the development of iPods and iMacs was responsible.
The end of a Mexico-leave
Candidly depicts the computer engineer, as he referred to his departure from Apple moved to Mexico, it is at the beach was going well. Until he persuaded his endless vacation on the Mexican coast off to Palm to come and help the company to innovative new products to be invented. And that was not a bad idea, because what Rubinstein little later in the cameras keeps Palms is not only a last chance in the mobile-regional team positions.
It is the pre Palm, the first smartphone, the Palm OS web is running an operating system, according to Palm CEO Ed Colligan the way, how to work with data in the networked world bypasses, will completely change. Finally, it Colligan are networked mobile devices, "the next big thing".
Like surfing on the iPhone
The Palm pre although at first glance more like a fairly small thing, much slimmer than the iPhone, BlackBerry and the like. Inside is the latest mobile processor from Texas Instruments, and apparently has plenty to do. Because the graphical user interface via the touch screen-controlled device is still more expensive than the iPhone? and it may at first glance enthusiasm.
APSmart: Palms Matias Duarte demonstrated what Palm can do pre

As for Apple's success here is HandyGames all very organic, actions will be executed without delay. When scrolling lists and websites are running loose on the same screen as the iPhone. Even the zoom function works like Apple, will be activated simply by dividing the screen with two fingers virtually "raise". Even the browser is reminiscent of Apple's Safari, which also provides Web sites, as is a computer browser would do, only smaller.
The web leads OS data
These are the similarities with the iPhone but also exhausted, because in addition to touch-screen operation is a suspensory keyboard installed. Above all, web Palms OS to run multiple programs simultaneously, which the iPhone does not. So people are not confused comes, you have a playing-out metaphor: For each active program such a map on the screen is created. Between these cards will be changed again by clue.
A highlight is how the system with data bypasses. Synergy refers to as Palm is the method by which the web OS data from different sources clearly summarizing it redundant, so duplicate information intelligently ausfiltert. Thus, for example, in the address book info from Google alongside those from Facebook appear in the calendar dates are available from Google's calendar alongside those from Outlook. Particularly fine: memories and hints for new messages always appear discreetly on the bottom of the screen. So they do not interfere with annoying messages.
The memory can be closely
And also about details seems to sch at Palm thought to have. So spare time in the calendar graphically compressed to allow more space for real dates remains. The Messenger can be a variety of chat services and you can combine the exchange of views with friends and colleagues from any e-mail, instant messaging and SMS jump.
Besides all these software, the hardware highlights of the Palm pre something in the background, although it is not to despise. Rise to criticism, offers a maximum memory of only eight gigabytes in size and is not upgradeable. For music and data may be rich, but also wants to bring movies, will soon close.
But it can easily replace the battery in this way probably also extend the duration. So far only rarely in a cell phone to find the Bluetooth function, which not only transmits data wirelessly, but also music to wireless speakers, headphones and car broadcasts. This also fits the first accessory device, the Palm to offer pre wants. Under the title Touchstone will provide a charging station to which the smartphone is simply offering incentives to charge the battery to be completely without cables. Even a small trend of the CES: Wireless battery chargers, the apparatus by induction load, there are several (see pictures above route).
And when it's going on?
When such devices will be able to buy, but so far only very roughly predictable. Sometime in the first half of 2009, the pre on the market. An exact date liked Ed Colligan not mention too much work still had hitherto done. In the U.S., the device will initially only at the mobile operator Sprint to get his. When the new Palm mobile phone in Europe will allow Colligan still open. And also about the price, we need to pay will be silent, the head of the Palm.
Apparently, he wanted only to respond to wait for the new model. More expensive than the iPhone or the Google G1 mobile phone is unlikely he will.
Due to the great old user base who have been waiting years for new developments, but he has chances to become popular: Whether but the many thousands of Palm applications to be able to use it until today, there have Colligan and Rubinstein in her presentation completely open. Originally it was planned, the new Palm-compatible to the old to make. Given the many new feature of web OS but it is doubtful whether this really was possible.
The Palm Pre Overview

3G mobile connection (EVDO Rev A or UMTS / HSDPA)

Wi-Fi 802.11 b / g

Integrated GPS

3.1-inch touch screen with 320x480 points

Aufschiebbare keyboard

3-megapixel digital camera with LED flash

Standard headphone jack (3.5 mm)

Bluetooth 2.1 + EDR with A2DP

8 GB internal memory (of which approximately 7.4 GB free)

Approaching the sensor, the Tochscreen and the display is automatically disabled when the phone is held to the ear

Light sensor that the display in dark environments Dims

Acceleration sensor, photos and Web pages automatically to fit the user perspective

Ruftonschalter for mute with just one push of a button

Removable battery

Dimensions: 59.57mm (W) x 100.53mm (L, closed) x 16.95mm (T)

Weight: approximately 135 grams

The megapixel madness is over.

26-fold zoom, extreme slow motion, and a miniature video camera for the handbag? on the CES show high-tech camera manufacturers also compete in the compact area with genuine innovations. This is the age of megapixel records over.
  Who squeezes more megapixels on a small image sensor? The big 'M' was once the beating promotional argument for new compact Snap. Today it is rather: Who ran closer? Who will shoot more photos in the second? Who has more wide?
The absurd race for the highest megapixel number seems forgotten - good news. Because the crazy race, the highest resolution on the small photo sensors to accommodate the compact cameras, the picture quality suffered for many compact cameras. The more pixels on a small surface to stay, the less light reaches each pixel. Therefore, the signal must be strengthened, which in turn more interference by the so-called image noise at all.
The most exciting cameras at CES this year, only six, nine or eleven megapixels. These are not records, but that's enough slack for A3 prints. Therefore, the new compact cameras, photos taken with such models have not been able to.
Superzoom, wide-Knipsen compact and low-cost HD cameras? blogs ONLINE photo shows the trends of the CES: