He also downplayed the threat of Dell Computer (nasdaq: DELL - news - people ) in the enterprise space.
That seems to be the case with the hype that is portraying the Year 2000 computer bug as the biggest threat to civilization since Godzilla destroyed Tokyo.
When computer scientists talk about the possible threat to humanity from superintelligent AI, they don't mean the Terminator or Matrix.
Both should also benefit some from the recent problems that Dell is having with its direct sales model, once thought to be a bigger threat to retail store computer sales.
Hambre asserted the great threat to citizen privacy in the computer age is not from government, but from criminals and certain highly-invasive private sector businesses.
Don DeBolt, director of threat research at CA, a computer security company, said it's too early to tell who or what may be behind the Twitter attack.
The proof-of-concept computer won't give silicon circuits any threat when it's running at just 0.15Hz and takes up as much space as a mini fridge, but the hope is to dramatically speed up and shrink down future iterations to where there are advanced computers that occupy the same size as real muscles.
ENGADGET: Turing machine built from artificial muscles may lead to smart prosthetics
Officials there concluded that the FBI did not have sufficient proof that Lee posed a national-security threat grave enough to merit a raid on his computer.
Last month, President Barack Obama signed an executive order aimed at bolstering computer-network protections, and he noted the "rapidly growing threat from cyberattacks" in his State of the Union address.
According to Neil Smith, a researcher from the US Computer Emergency Readiness Team, unauthorized access to those devices could be a very real threat -- if you happen to own a Samsung model.
ENGADGET: Samsung printer hack could let the wrong ones in (updated)
On the cyber-security threat, Blair's written testimony described an inability to contend with attacks using computer networks and telecommunications systems.
The most common threat was a technique known as spear-phishing, which can corrupt a company's computer system by uploading malicious attachments and gaining access to sensitive information.
应用推荐