IT Trends :: Thursday, September 7, 2006

IT News

Freshmen Told to Leave Laptop at Home

Last year, 90 students quit studies at Zhejiang University in China. The recruitment office director says 60 of those students left because of "Internet addiction." The university’s director believes that the main factor in the students' Internet addiction is a dwindling appetite for learning. This year, incoming freshman received a written recommendation to come to school without laptops. Furthermore, there is no broadband access in dorms and there is a three hour network access limit in computer labs…

Read Complete Article | Back to top

Cell Phones Won't Keep Your Secrets

Trust Digital provides businesses with phone-security tools. To test their services, they bought used cell phones on eBay. Personal information on the phones had been "erased" by the previous owners, but Trust Digital was able to recover some very sensitive information, and without much difficulty. The company's chief executive said, "We found just a mountain of personal and corporate data." Experts say that giving away an old phone is commonplace. Consumers upgrade their cell phones on average about every 18 months…

Read Complete Article | Back to top

Putting Wireless Networks to the Terrorism Test

The Operation College Freedom drill at the University of California, San Diego was a "full-scale exercise is the culmination of a three-year, $4 million research project carried out by the California Institute for Telecommunications and Information Technology." The drill involved a coordinated effort by the school and local emergency and law-enforcement officials to respond to a simulated terrorist attack. They tested Wi-Fi, medical patient tracking technology, portable antennas, and a helmet-cam. At the heart of the drill was a system designed to coordinate triage and manage medical data...

Read Complete Article | Back to top

Safety Last

A detailed explanation of why Apple and Dell recalled about 6 million Sony-made lithium-ion laptop batteries. While consumers might wonder why vendors are selling batteries that have greater energy storage density than dynamite, recent history actually shows that we’ll accept almost any risk for more power. This article from the New York Times (free log-in required) will help you learn the difference between lithium-ion, nickel-cadmium, and nickel-metal-hydride batteries, and find out why Sony chose to send the potentially explosive batteries to market…

Read Complete Article | Back to top

Featured

  • student reading a book with a brain, a protective hand, a computer monitor showing education icons, gears, and leaves

    4 Steps to Responsible AI Implementation

    Researchers at the University of Kansas Center for Innovation, Design & Digital Learning (CIDDL) have published a new framework for the responsible implementation of artificial intelligence at all levels of education.

  • glowing digital brain interacts with an open book, with stacks of books beside it

    Federal Court Rules AI Training with Copyrighted Books Fair Use

    A federal judge ruled this week that artificial intelligence company Anthropic did not violate copyright law when it used copyrighted books to train its Claude chatbot without author consent, but ordered the company to face trial on allegations it used pirated versions of the books.

  • server racks, a human head with a microchip, data pipes, cloud storage, and analytical symbols

    OpenAI, Oracle Expand AI Infrastructure Partnership

    OpenAI and Oracle have announced they will develop an additional 4.5 gigawatts of data center capacity, expanding their artificial intelligence infrastructure partnership as part of the Stargate Project, a joint venture among OpenAI, Oracle, and Japan's SoftBank Group that aims to deploy 10 gigawatts of computing capacity over four years.

  • laptop displaying a phishing email icon inside a browser window on the screen

    Phishing Campaign Targets ED Grant Portal

    Threat researchers at cybersecurity company BforeAI have identified a phishing campaign spoofing the U.S. Department of Education's G5 grant management portal.