Saturday, August 7, 2010

IT News HeadLines (Slashdot Stories) 07/08/2010



Counting the World's Books
The Google Books blog has an explanation of how they attempt to answer a difficult but commonly asked question: how many different books are there? Various cataloging systems are fraught with duplicates and input errors, and only encompass a fraction of the total distinct titles. They also vary widely by region, and they haven't been around nearly as long as humanity has been writing books. "When evaluating record similarity, not all attributes are created equal. For example, when two records contain the same ISBN this is a very strong (but not absolute) signal that they describe the same book, but if they contain different ISBNs, then they definitely describe different books. We trust OCLC and LCCN number similarity slightly less, both because of the inconsistencies noted above and because these numbers do not have checksums, so catalogers have a tendency to mistype them." After refining the data as much as they could, they estimated there are 129,864,880 different books in the world.

Read more of this story at Slashdot.



Read More ...

Senate Confirms Elena Kagan's Appointment To SCOTUS
eldavojohn writes "As expected, by a vote of 63 to 37 Elena Kagan has been appointed as the 112th member of the Supreme Court of the United States. Kagan, only 50 years old, has no judicial experience. The Washington Post explains: 'Other justices have corporate law backgrounds or a long record of arguing before the court. Kagan worked briefly for a law firm and argued her first case before an appellate court 11 months ago. It happened to be before the Supreme Court, the first of six cases she argued as the nation's first female solicitor general.' Her fair use views and free speech views have made her a focus of Slashdot recently."
Read more of this story at Slashdot.



Read More ...

AmigaOS Twenty-Five Years of Check-Ins Visualized
the_arrow writes "As a celebration of the 25th anniversary of the Amiga computer, Hyperion Entertainment has made a video using the Gource CVS visualization software showing a time-compressed version of 25 years of Amiga development, from the early days of AmigaOS 1.0 to the present. Personal commentary added by one of the current core full-time AmigaOS developers, Hans-Joerg Frieden (a.k.a. 'Rogue')."
Read more of this story at Slashdot.



Read More ...

Child Porn As a Weapon
VoiceOfDoom writes "Want to get rid of your boss and move up to his position? Put kiddie porn on his computer then call the cops! This was the cunning plan envisaged by handyman Neil Weiner of east London after falling out with school caretaker Edward Thompson too many times. Thankfully, Weiner didn't cover his tracks quite well enough to avoid being found out — earlier boasts about his plan to friends at a BBQ provided the police with enough evidence to arrest him for trying to pervert the course of justice. Frighteningly, however, between being charged with possession of indecent images and being exonerated, innocent (if 'grumpy') Thompson was abused and ostracized for eight months by neighbors and colleagues. With computer forensics for police work often being performed by 'point 'n click'-trained, nearly-retired cops, or languishing in a 6-month queue for private sector firms to attend to it, the uncomfortable question is raised: how easily might this trick have succeeded if Weiner had been a little more intelligent about it?"
Read more of this story at Slashdot.



Read More ...

Regenerating Muscle Cells With Newt-Inspired Tech
gmp writes "The NY Times and the Wall Street Journal are reporting on a new paper, published in the science journal Cell Stem Cell, where scientists, inspired by the ability of newts and other lower organisms to regrow lost limbs, have demonstrated that adult mammalian cells can be made to regenerate by suppressing a pair of anti-cancer genes. 'Interfering with tumor suppressor genes is a dangerous game, but Dr. Pomerantz said the genes could be inhibited for just a short period by applying the right dose of drug. When the drug has dissipated, the antitumor function of the gene would be restored. Finding the right combination of genes to suppress was a critical step in the new research. One of the two tumor suppressor genes is an ancient gene, known as Rb, which is naturally inactivated in newts and fish when they start regenerating tissue. Mammals possess both the Rb gene and a backup, called the Arf gene, which will close down a cancer-prone cell if Rb fails to do so.' Is regeneration nature's default, only turned off by our evolved defenses against cancer?"
Read more of this story at Slashdot.



Read More ...

'Old School' Arcade Still Popular In NYC
pickens writes "In 2005, there were 44 licensed video game arcades in New York, according to the Department of Consumer Affairs; today, 23 survive. With the expansion of interactive online gaming, video game action has largely shifted to the home. 'Arcades are an anachronism now,' says Danny Frank, a spokesman for the Amusement and Music Owners Association of New York. 'They exist only in shopping malls.' But Chinatown Fair has become a center for all the outcasts in the city to bond over their shared love for a good 20-punch combo and 'old school' games that more popular arcades don't stock anymore — the classic Street Fighter II from 1991 and King of Fighters 1996, for example, as well as Ms Pac-Man and Time Crisis. 'Now, you can play a million people from all around the world,' says one player. 'For me, it's not the same as playing face-to-face. The young'uns may not care, but I do.'"
Read more of this story at Slashdot.



Read More ...

More Than 10% of Mozilla Bug Finders Refuse Cash
angry tapir writes "The open-source Mozilla project has been offering cash bounties for security bugs for six years now, but often bug finders simply turn down the cash. Between 10 percent and 15 percent of the serious security bugs reported since Mozilla launched its bug bounty program have been provided free of charge, according to Mozilla."
Read more of this story at Slashdot.



Read More ...

Building the Zero-Fatality Car
CWmike writes "In the future, new cars might include an appealing sticker: 'This car is rated for zero fatalities.' John Brandon reports that Volvo, for instance, has launched a program called Vision 2020, which states, 'By 2020, nobody shall be seriously injured or killed in a new Volvo.' It includes not just new protective measures in the car, but technology for communicating dangers to and from the car. Other car companies have similar, less formalized programs. As ambitious as it seems, Ed Kim, an analyst at automotive research firm AutoPacific, says the zero-fatality goal is achievable. In the next 10 years, there will be a confluence of safety technologies — such as road-sign recognition, pedestrian detection and autonomous car controls — that lead to safer cars, says Kim. Will your next car look something like this?"
Read more of this story at Slashdot.



Read More ...

Pentagon Demands Return of Leaked Afghanistan Documents
Multiple news agencies are reporting that the Pentagon has demanded the return of WikiLeaks' collection of secret documents relating to the war in Afghanistan. Defense Department spokesman Geoff Morrell said, "The only acceptable course is for WikiLeaks to take steps immediately to return all versions of all of these documents to the US government and permanently delete them from its website, computers and records." According to the BBC, Morrell also "acknowledged the already-leaked documents' viral spread across the internet made it unlikely they could ever be quashed," but hopes to prevent the dissemination of a further 15,000 documents WikiLeaks is reportedly in the process of redacting. "We're looking to have a conversation about how to get these perilous documents off the website as soon as possible, return them to their rightful owners and expunge them from their records." WikiLeaks, predictably, shows no sign of cooperating.
Read more of this story at Slashdot.



Read More ...

Google CEO Schmidt Predicts End of Online Anonymity
Andorin writes "A tweet from the EFF pointed me to a short article detailing part of Eric Schmidt's speech to the Techonomy conference in Lake Tahoe on August 4. According to Schmidt, true transparency and anonymity on the Internet will become a thing of the past because of the need to combat criminal and 'anti-social' behavior. 'Governments will demand it,' he says, referring to full accountability and a 'name service for people,' possibly hinting towards mandatory Internet passports. The CEO of Google also made a couple of somewhat creepy references to the availability of information: 'If I look at enough of your messaging and your location, and use artificial intelligence, we can predict where you are going to go ... show us 14 photos of yourself and we can identify who you are. You think you don't have 14 photos of yourself on the internet? You've got Facebook photos!'"
Read more of this story at Slashdot.



Read More ...

Where To Start With DIY Home Security?
secretrobotron writes "I'm a recent university graduate from a co-op system which has kept me on the move every other semester, so I've never really had a permanent place to live, and I've never had the opportunity (or the capital) to buy expensive things. Now that I'm working, those restrictions on my life are gone and I'm living in an apartment with things I don't want stolen. I would love to build a DIY home security system, but I don't even know where to start since Google searches reveal things like diysecurityforum.com, which help only to an extent for a curious newcomer. Has anybody out there successfully built a home security system on a budget? If so, where did you start?" Related query: When similar questions have come up before, many readers have recommended Linux-based Zoneminder (last updated more than a year ago); is that still the state of the art?
Read more of this story at Slashdot.



Read More ...

A Pointed Critique of Thunderbird 3's Performance Compared to v.2
PerfProtector writes "Did you recently install Thunderbird 3 or upgrade from Thunderbird 2 to Thunderbird 3? Did you notice any severe slowdown in your machine or a major decrease in its performance? Well, many people around the world encountered these problems. We wrote a technical analysis about the severe problems that are caused by Mozilla Thunderbird e-mail client. These problems include anomalous usage of CPU, memory, hard disk and Internet bandwidth. You can read the full analysis, including several graphs that show how bad the situation is and what went wrong from Thunderbird 2 to Thunderbird 3. For example, while CPU utilization of Thunderbird 2 is usually between 0% to 10%, with an average of 0.3%, Thunderbird 3 CPU utilization is between 5% to 80%, with an average of 30% — 100 times more than Thunderbird 2. In addition, during long periods of time, Thunderbird 3 used more than 50% of the overall CPU resources.This behavior slows dramatically the whole machine." It's worth noting that this analysis comes from developers who have developed a (freeware) tool they claim will improve Thunderbird's performance, but they explain also how to do so with manual changes.
Read more of this story at Slashdot.



Read More ...

5 Trillion Digits of Pi — a New World Record
KPexEA writes "Alexander J. Yee & Shigeru Kondo claim to have calculated the number pi to 5 trillion places, on a single desktop and in record time. The main computation took 90 days on Shigeru Kondo's desktop. Verification was done using two separate computers. The program that was used for the main computation is y-cruncher v0.5.4.9138 Alpha." Looks like the chart of computer-era approximations of Pi here might need an update.
Read more of this story at Slashdot.



Read More ...

400 Turns of Civilization V
Wes found a preview of one of the most anticipated upcoming releases by the inhabitants of my office: Civ V. It starts "This preview of Civilization V is incomplete. It takes more than nine Earth hours, you see, for the great Arabian empire — land of Mecca, Rio De Janeiro and Beijing — to assume dominance of the globe."
Read more of this story at Slashdot.



Read More ...

Swinging Robot Excels At Wall-Climbing
Zothecula writes "Engineers have used a variety of techniques to create robots that can scale walls — the Climber uses a rolling seal, while the insect-like robots from SRI have caterpillar tracks with electro-adhesive properties. While such robots generally focus on speed, adhering to the wall and deciding how and when to move, the creators of a small robot named ROCR say it is the first wall-climbing robot to focus on climbing efficiently. And it does so by using the momentum of a tail that swings like a grandfather clock's pendulum."
Read more of this story at Slashdot.



Read More ...

Apple Mines App Store Submissions For Patent Ideas
I Don't Believe in Imaginary Property writes "Apple has started filing a bunch of patents on mobile applications. That might not be so interesting in and of itself, but if you look closely at the figures in one of the patents, you can see that it's a copy of the third-party Where To? application, which has been on the App Store since at least 2008. There's also a side-by-side comparison which should make it clear that the diagram was copied directly from their app. Even though it's true that the figures are just illustrations of a possible UI and not a part of the claimed invention, it's hard to see how they didn't get some of their ideas from Where To? It might also be the case that Apple isn't looking through the App Store submissions in order to patent other people's ideas, but it's difficult to explain some of these patents if they're not. And with the other patents listed, it's hard to see how old ideas where 'on the internet' has been replaced with the phrase 'on a mobile device' can promote the progress of science and useful arts. This seems like a good time to use Peer to Patent."
Read more of this story at Slashdot.



Read More ...

SpaceX Unveils Heavy-Lift Rocket Designs
FleaPlus writes "At the recent Joint Propulsion Conference, SpaceX's rocket development facility director Tom Markusic unveiled conceptual plans for how its current Falcon 1 and Falcon 9 commercial rockets can be evolved into heavy-lift rockets, ranging from a Falcon X capable of lifting 38,000kg to orbit, up to a 140,000kg Falcon XX (more than either the Saturn V or the 75,000kg shuttle-derived rocket Congress currently plans on having NASA spend >$13B building). SpaceX presentations also discuss a new Merlin 2 heavy-lift engine, solar-electric cargo tugs, adapting their current engines for descent/ascent vehicles fueled by Mars-derived methane, and a desire for the government to take the lead on in-space nuclear thermal propulsion while commercial focuses on launchers. In a recent interview, SpaceX CEO/CTO Elon Musk expressed his goal of lowering the price of Mars transportation enough to enable early colonization in 20 years, and his own plans for retiring to Mars."
Read more of this story at Slashdot.



Read More ...

ReCAPTCHA.net Now Vulnerable to Algorithmic Attack
n3ond4x writes "reCAPTCHA.net algorithms have been developed to solve the current CAPTCHA at an efficacy of 30%. The algorithms were disclosed at DEFCON 18 over the weekend and have since been made available online. Also available is a video demonstration of random reCAPTCHA.net CAPTCHAs being subjected to the algorithms." There's probably an excellent Firefox plugin to render this page's color scheme more bearable. Note: the PowerPoint presentation linked opens fine in OpenOffice, and the video speaks for itself.
Read more of this story at Slashdot.



Read More ...

Google and Verizon In Talks To Prioritize Traffic (Updated)
Nrbelex writes "Google and Verizon are nearing an agreement that could allow Verizon to speed some online content to Internet users more quickly if the content's creators are willing to pay for the privilege. Any agreement between Verizon and Google could also upend the efforts of the Federal Communications Commission to assert its authority over broadband service, which was severely restricted by a federal appeals court decision in April. People close to the negotiations who were not authorized to speak publicly about them said an agreement could be reached as soon as next week. If completed, Google, whose Android operating system powers many Verizon wireless phones, would agree not to challenge Verizon's ability to manage its broadband Internet network as it pleased." Update: 08/05 20:03 GMT by T : nr3a1 writes with this informative update excerpted from Engadget: "Google's Public Policy Twitter account just belted out a denial of these claims, straight-up saying that the New York Times 'is wrong.' Here's the full tweet, which certainly makes us feel a bit more at ease. For now. '@NYTimes is wrong. We've not had any convos with VZN about paying for carriage of our traffic. We remain committed to an open internet.' Verizon's now also issued a statement and, like Google, it's denying the claims in the original New York Times report."
Read more of this story at Slashdot.



Read More ...

A Pointed Critique of Thunderbird 3's Performance Compared to v. 2
PerfProtector writes "Did you install recently Thunderbird 3 or upgrade from Thunderbird 2 to Thunderbird 3? Did you notice any severe slowdown in you machine or a major decrease in its performance? Well, many people around the world encountered these problems. We wrote a technical analysis about the the severe problems that are caused by Mozilla Thunderbird e-mail client. These problems include anomalous usage of CPU, memory, hard disk and Internet bandwidth. You can read the full analysis, including several graphs that show how bad the situation is and what went wrong from Thunderbird 2 to Thunderbird 3. For example, while CPU utilization of Thunderbird 2 is usually between 0% to 10%, with an average of 0.3%, Thunderbird 3 CPU utilization is between 5% to 80% with an average of 30% — 100 times more than Thunderbird 2. In addition, during long periods of time, Thunderbird 3 used more than 50% of the overall CPU resources.This behavior slows dramatically the whole machine." It's worth noting that this analysis comes from developers who have developed a (freeware) tool they claim will improve Thunderbird's performance, but they explain also how to do so with manual changes.
Read more of this story at Slashdot.



Read More ...

Steve Furber On Why Kids Are Turned Off To Computing Classes
nk497 writes "UK computing legend Steve Furber — co-founder of Acorn and ARM designer — believes students are avoiding computing classes because they teach nothing but the boring basics. Currently studying why the number of students signing up for computing has halved in the past eight years, Furber said schools focus too much on teaching kids how to use spreadsheets, word processors and PowerPoint, rather than teaching more challenging areas such as programming. 'What schools are presenting as ICT as an academic subject is very mundane compared with what students know they can do,' he said. 'It's as if maths was just arithmetic or English was taught as just spelling. It's not unimportant that you can do arithmetic or you can spell, but it certainly doesn't open up the whole world of interest and challenge, if that's all you do.'"
Read more of this story at Slashdot.



Read More ...

Churchill Accused of Sealing UFO Files, Fearing Public Panic
Newly released secret files show that Winston Churchill ordered a cover-up of an alleged encounter between a UFO and a RAF bomber because he feared public panic. From the article: "Mr Churchill is reported to have made a declaration to the effect of the following: 'This event should be immediately classified since it would create mass panic among the general population and destroy one's belief in the Church.'"
Read more of this story at Slashdot.



Read More ...

400 Turns of Civilization V
Wes found a preview of one of the most anticipated upcoming releases by the inhabitants of my office: Civ V. It starts "This preview of Civilization V is incomplete. It takes more than nine Earth hours, you see, for the great Arabian empire — land of Mecca, Rio De Janeiro and Beijing — to assume dominance of the globe."
Read more of this story at Slashdot.



Read More ...

Tech Specs Leaked For French Spyware
An anonymous reader writes "With the 'three strikes' law now in effect in France, the organization tasked with implementing it, Hadopi, has been working on technology specs for making the process work — and those specs have now leaked. It appears to involve client-side monitoring and controlling software, that would try to watch what you were doing online, and even warn you before you used any P2P protocol (must make Skype phone calls fun). It's hard to believe people will accept this kind of thing being installed on their computers, so I can't wait to see how Hadopi moves forward with it. It also appears to violate EU rules on privacy."
Read more of this story at Slashdot.



Read More ...

Software Freedom Conservancy Wins GPL Case Against Westinghouse
fishthegeek writes "The Software Freedom Conservancy has received a judgement against Westinghouse Digital Electronics for $90,000 in damages, $50,000 in costs plus a donation of all of the offending HDTV's that were using BusyBox in violation of the GPL. Given that WDE is nearly bankrupt it's likely that most if not all of the cash will disappear in a legal 'poof,' but it is a victory regardless."
Read more of this story at Slashdot.



Read More ...

No comments: