Spacelift Transporting Trek Into The 21st Century, shows you how they Remastered The Special Effects to CGI, the re recording of the theme music and the look of Star Trek The Original Series.
You must log in to post a comment.
- Nile Rodgers – The Di… by Glenn Herman
Last month, when the band were filming the video for Get Lucky in Los Angeles, Rodgers says he realised that the dancers didn’t really know what they were listening to.
“Somebody called out, ‘Wow, what kind of music is that?'” Rodgers recalls. “I didn’t hesitate, I said, ‘disco!’ And they all screamed back, ‘Yeah!’. It was like they’d found something mythical that they’d heard about but didn’t know. There was an organic connection between the kids and the music. At the end they were literally weeping. I’ve seen those moments. I’ve been that guy – and it was for real.”
- SS United States Faces the … by Glenn Herman
Marilyn Monroe, JFK and the Mona Lisa all enjoyed the luxurious Atlantic crossing provided by the Titanic-sized SS United States.
But the famed liner, which still holds the speed record for a crossing between the US and Britain by a passenger ship, now faces its final journey – to the scrapyard.
- Is Apple Siri Recording Eve… by Glenn Herman
Image Credit: wccftech.com
Thanks to the iOS 9 upgrade, released Sept. 16, users can now set Siri to activate automatically when they say “Hey, Siri.” The function isn’t enabled automatically; system defaults have it turned off. However, for users who turn it on, it means that Siri will listen to every word spoken in its vicinity.
That means the world is entering an era where more audio is going to be recorded than at any point in history. Think you have privacy at a friend’s house? That may no longer be the case. If you’re on the sidewalk, in a mall, or even in a public bathroom with other people, Siri is going to be monitoring you.
Apple’s terms of service also make it clear that the company has a right to know everything about you that Siri knows. “When you use Siri … the things you say and dictate will be recorded and sent to Apple to process your requests. Your device will also send Apple other information, such as your name and nickname; the names, nicknames, and relationship with you (e.g., ‘my dad’) of your address book contacts, song names in your collection,” and other information, the terms state.
That provision of Apple’s terms gained notoriety this year, when a Reddit poster named “FallenMyst” nonchalantly mentioned that they had been working for a company to review conversations that had been harvested by Siri unbeknownst to users. Apple said it was trying to improve Siri’s ability to transcribe speech.
- Devo’s Jerry Casale S… by Glenn Herman
Devo co-founder, singer and bassist Gerald Vincent “Jerry” Casale, 67, was married to Krista Napp, 26, on Friday, Sept. 11, in a modest ceremony, but thanks to the 9/11-themed reception that followed, the response to the event has been anything but. On Monday morning (Sept. 14), TMZ ran photos from Casale and Napp’s intimate wedding[…]
- YouTube ‘Dancing Baby’ Copy… by Glenn Herman
In February 2007, Stephanie Lenz, a mother in Gallitzin, Pa., went on YouTube and uploaded a 29-second video of her toddler dancing while Prince’s song “Let’s Go Crazy” played in the background. Prince’s publishers objected, Ms. Lenz filed a lawsuit, and for more than eight years the case has been symbolic of the clashes over[…]
- Warp speed could be a reali… by Glenn Herman
Warp speed space travel that will allow us to travel between galaxies could be a reality in the next 100 years. This is according to Professor Geraint Lewis, from the University of Sydney, who claims the idea of warp speed is, in theory, possible. He claims the futurist concept was part of Einstein’s theory of[…]
- Surfing the Internet… from … by Glenn Herman
The true test of a man’s patience is crimping pins onto the end of a cable that leads to building a custom serial cable—especially if it’s the first time you’ve even handled a serial cable in a decade. So as I searched under my desk, using my phone for a flashlight, I wondered whether I had finally found the IT project that would send me over the edge. On a recent day, I set out to turn my recently acquired vintage Radio Shack TRS-80 Model 100 computer into a working Internet terminal. And at this moment, I crawled on the floor looking for a DB-25 connector’s little gold pin that I had dropped for the sixth—or maybe sixteenth—time.
Thankfully, I underestimated my patience/techno-masochism/insanity. Only a week later, I successfully logged in to Ars’ editorial IRC channel from the Model 100. And seeing as this machine first saw the market in 1983, it took a substantial amount of help: a Raspberry Pi, a little bit of BASIC code, and a hidden file from the website of a certain Eric S. Raymond.
- As Collapse of IBM Continue… by Glenn Herman
As International Business Machines Corp.’s (IBM) financial results continue a remarkable collapse, its CEO, Ginni Rometty, becomes ever more optimistic in her view of the company’s future. Rometty’s public comments are either a sign of self-delusion or a means to keep a job on which her grip weakens by the quarter.
Consider that IBM posted a 13.5% drop in revenue to $20.8 billion in the second quarter and that net income fell 16.6% to $3.6 billion. Measure that against her reaction:
Our results for the first half of 2015 demonstrate that we continue to transform our business to higher value and return value to shareholders. We expanded margins, continued to innovate across our portfolio and delivered strong growth in our strategic imperatives of cloud, analytics and engagement, which are becoming a significant part of our business.
- How Much Damage Can the OPM… by Glenn Herman
The Office of Personnel Management announced last week that the personal data for 21.5 million people had been stolen. But for national security professionals and cybersecurity experts, the more troubling issue is the theft of 1.1 million fingerprints.
Much of their concern rests with the permanent nature of fingerprints and the uncertainty about just how the hackers intend to use them. Unlike a Social Security number, address, or password, fingerprints cannot be changed—once they are hacked, they’re hacked for good. And government officials have less understanding about what adversaries could do or want to do with fingerprints, a knowledge gap that undergirds just how frightening many view the mass lifting of them from OPM.
“It’s probably the biggest counterintelligence threat in my lifetime,” said Jim Penrose, former chief of the Operational Discovery Center at the National Security Agency and now an executive vice president at the cybersecurity company Darktrace. “There’s no situation we’ve had like this before, the compromise of our fingerprints. And it doesn’t have any easy remedy or fix in the world of intelligence.”
- Office of Personnel Managem… by Glenn Herman
The House Oversight Committee’s hearings on the massive OPM data breach have been absolutely astounding. The rank incompetence on display at this agency was mind-boggling.
The government knew security was wide open for years, and did nothing. It’s a wonder they weren’t hacked before now. As committee chair Rep. Jason Chaffetz (R-UT) but it, “OPM’s data security posture was akin to leaving all your doors and windows unlocked and hoping nobody would walk in and take the information.”