Spacelift Transporting Trek Into The 21st Century, shows you how they Remastered The Special Effects to CGI, the re recording of the theme music and the look of Star Trek The Original Series.
You must log in to post a comment.
- Bitcoin not money, Miami ju… by Glenn Herman
A Miami-Dade judge ruled Monday that Bitcoin is not actually money, a decision hailed by proponents of the virtual currency that has become popular across the world.
In a case closely watched in financial and tech circles, the judge threw out the felony charges against website designer Michell Espinoza, who had been charged with illegally transmitting and laundering $1,500 worth of Bitcoins. He sold them to undercover detectives who told him they wanted to use the money to buy stolen credit-card numbers.
But Miami-Dade Circuit Judge Teresa Mary Pooler ruled that Bitcoin was not backed by any government or bank, and was not “tangible wealth” and “cannot be hidden under a mattress like cash and gold bars.”
“The court is not an expert in economics; however, it is very clear, even to someone with limited knowledge in the area, the Bitcoin has a long way to go before it the equivalent of money,” Pooler wrote in an eight-page order.
- Employee Extinction? The Ri… by Glenn Herman
In the future, will employees become extinct? All over the world, from the United States to Japan, businesses of all sizes – corporations and small enterprises – are gradually phasing out the employee.
Contractual workers are becoming the norm, while firms are taking on freelancers.
Crowdsourcing the New Reality in Labor Market
Uber is the latest sensation in the marketplace.
The ride-sharing app allows consumers to save money on transportation, while the drivers earn a little bit of extra cash.
- Line by line, how the US an… by Glenn Herman
In the wake of the FBI’s failed fight against Apple, Senators Richard Burr (R-NC) and Dianne Feinstein (D-CA) have introduced a draft bill that would effectively ban strong crypto.
The bill would require tech and communications companies to allow law enforcement with a court order to decrypt their customers’ data. Last week a draft copy of the bill, dubbed the Compliance with Court Orders Act of 2016, was leaked, but the new version is even worse than the discussion draft.
The bill would apply to “device manufacturers, software manufacturers, electronic communication services, remote communication services, providers of wire or electronic communication services, providers of remote communication services, or any person who provides a product or method to facilitate a communication or to process or store data.” That’s a pretty wide net.
“No entity or individual is above the law,” said Feinstein. “The bill we have drafted would simply provide that, if a court of law issues an order to render technical assistance or provide decrypted data, the company or individual would be required to do so.
“Today, terrorists and criminals are increasingly using encryption to foil law enforcement efforts, even in the face of a court order. We need strong encryption to protect personal data, but we also need to know when terrorists are plotting to kill Americans.”
Not that it would stop terrorists – apart from the very, very stupid ones. This law would only apply to US companies or overseas firms with offices here, so anyone else who writes encryption software would still be able to sell their code online to the evil terrorists and their ilk.
- Zuckerberg and the Facebook… by Glenn Herman
Billionaire, alleged tax-dodger, CEO and all-round PC dullard Mark Zuckerberg has said Facebook is not doing enough to combat hate speech.
At a recent townhall event in Berlin he pledged to work closer with the German authorities, and even offered to fund a section of the German police, in order to help Facebook expand its view of ‘protected groups’ and restrict ‘hate speech against migrants’.
Pardon my German, but what utter scheisse.
- Apple plays digital privacy… by Glenn Herman
Apple was hailed as a champion of digital privacy this week after refusing to help the FBI hack into an iPhone belonging to a suspect in the San Bernardino shooting. But the firm hasn’t always been so scrupulous about user data, especially in China.
The standoff between the FBI and Apple over the investigation into the San Bernardino shooting, which claimed the lives of 14 people in early December, has divided the United States. While some have argued that the company should, in this particular case, help investigators by bypassing the phone’s security system, others have insisted that doing so will set a dangerous precedent.
- Computerworld: Laid-off IT … by Glenn Herman
Flags went up in silent protest at the former Northeast Utilities, now Eversource Energy. They were taken down once H-1B workers came on-site and occupied the cubicles.
Some of the utility’s IT employees had to train their foreign replacements. Failure to do so meant loss of severance. But an idea emerged to show workers’ disdain for what was happening: Small American flags were placed in cubicles and along the hallway in silent protest — flags that disappeared as the workers were terminated.
- Teen stoner says he hacked … by Glenn Herman
Hillary Rodham Clinton’s email scandal didn’t stop the head of the CIA from using his own personal AOL account to stash work-related documents, according to a stoner high school student who claims to have hacked into them.
CIA Director John Brennan’s private account held sensitive files — including his 47-page application for top-secret security clearance — until he recently learned that it had been infiltrated, the hacker told The Post.
Other emails stored in Brennan’s non-government account contained the Social Security numbers and personal information of more than a dozen top American intelligence officials, as well as a government letter about the use of “harsh interrogation techniques” on terrorism suspects, according to the hacker.
- IBM Allows Chinese Governme… by Glenn Herman
International Business Machines Corp. has agreed to let China review some product source code in a secure room, according to two people briefed on the practice, making it the first major U.S. tech company to comply with Beijing’s recent demands for a stronger hand in foreign technology there.
IBM has begun allowing officials from China’s Ministry of Industry and Information Technology to examine proprietary source code—the secret sauce behind its software—in a controlled space without the ability to remove it from the room, the people said. It wasn’t clear which products IBM was allowing reviews of or how much time ministry officials can spend looking at the code. The people said the practice was new and implemented recently.
IBM said in a statement Friday that it had established in several countries the capability to conduct limited tests in a controlled IBM environment to reassure clients and others that there was no way for third parties to access its technology.
- Nile Rodgers – The Di… by Glenn Herman
Last month, when the band were filming the video for Get Lucky in Los Angeles, Rodgers says he realised that the dancers didn’t really know what they were listening to.
“Somebody called out, ‘Wow, what kind of music is that?'” Rodgers recalls. “I didn’t hesitate, I said, ‘disco!’ And they all screamed back, ‘Yeah!’. It was like they’d found something mythical that they’d heard about but didn’t know. There was an organic connection between the kids and the music. At the end they were literally weeping. I’ve seen those moments. I’ve been that guy – and it was for real.”
- SS United States Faces the … by Glenn Herman
Marilyn Monroe, JFK and the Mona Lisa all enjoyed the luxurious Atlantic crossing provided by the Titanic-sized SS United States.
But the famed liner, which still holds the speed record for a crossing between the US and Britain by a passenger ship, now faces its final journey – to the scrapyard.