Microsoft Seeks 1-Click(er) Patent
theodp writes "Assuming things go patent reformer Microsoft's way, answering multiple choice, true/false, or yes/no questions in a classroom could soon constitute patent infringement. Microsoft's just-published patent application for its Adaptive Clicker Technique describes how 'multiple different types of clickers' can be used by students to answer questions posed by teachers. The interaction provided by its 'invention', explains Microsoft, 'increases attention and enhances learning.' Microsoft's Interactive Classroom Add-In for Office (video) provides polling features that allow students to 'answer and respond through their individual OneNote notebooks, hand-held clickers, or computers, and the results display in the [PowerPoint] presentation.' So, did Bill Gates mention to Oprah that the education revolution will be patented?"
Read more of this story at Slashdot.
Read More ...
When Computers Go Wrong
Barence writes "PC Pro's Stewart Mitchell has charted the world's ten most calamitous computer cock-ups. They include the Russians' stealing software that resulted in their gas pipeline exploding, the Mars Orbiter that went missing because the programmers got their imperial and metric measurements mixed up, the Soviet early-warning system that confused the sun for a missile and almost triggered World War III, plus the Windows anti-piracy measure that resulted in millions of legitimate customers being branded software thieves."
Read more of this story at Slashdot.
Read More ...
WikiLeaks, Money, and Ron Paul
Another day, another dozen WikiLeaks stories, several of which revolve around money. PayPal has given in to pressure to release WikiLeaks funds, though they still won't do further transactions. Mobile payment firm Xipwire is attempting to take PayPal's place. "We do think people should be able to make their own decisions as to who they donate to." PCWorld wonders if the WikiLeaks' money woes could lead to great adoption of Bitcoin, the peer-to-peer currency system we've discussed in the past. Meanwhile, Representative Ron Paul spoke in defense of WikiLeaks on the House floor Thursday, asking a number of questions, including, "Could it be that the real reason for the near universal attacks on WikiLeaks is more about secretly maintaining a seriously flawed foreign policy of empire than it is about national security?" The current uproar over WikiLeaks has prompted Paul Vixie to call for an end to the DDoS attacks and Vladimir Putin to break out a metaphor involving cows and hockey pucks.
Read more of this story at Slashdot.
Read More ...
Hosting Giants Teaming Against Small Businesses
BlueToast writes "Hosting giants SoftLayer, ThePlanet, Hosting Services Inc., and UK2 Group are teaming up to wipe out small competitors like SimpleCDN. Though ThePlanet isn't directly involved in the slicing of SimpleCDN's throat, ThePlanet runs the sales chat scripts for SoftLayer (check your NoScript). As a loyal customer of SimpleCDN, I really do not appreciate the disruption of service to a company I have been with for over a year. SimpleCDN's president wrote, 'Absolutely no valid reason or warning was or has been given for this termination, and our best guess currently is that these organizations could not provide the services that we contracted and paid for, so instead they decided that terminating services would be the best solution for them.'"
Read more of this story at Slashdot.
Read More ...
World's Smallest Battery Created
Zothecula writes "Because battery technology hasn't developed as quickly as the electronic devices they power, a greater and greater percentage of the volume of these devices is taken up by the batteries needed to keep them running. Now a team of researchers working at the Center for Integrated Nanotechnologies has created the world's smallest battery. 'It consists of a bulk lithium cobalt cathode three millimeters long, an ionic liquid electrolyte, and has as its anode a single tin oxide (Sn02) nanowire 10 nanometers long and 100 nanometers in diameter.' (Abstract in Science.) Although the tiny battery won't be powering next year's mobile phones, it has already provided insights into how batteries work and should enable the development of smaller and more efficient batteries in the future."
Read more of this story at Slashdot.
Read More ...
ChromeOS Laptop-Smashing Ad Equation Solved
An anonymous reader writes "Google's latest marketing video for Chrome OS is interesting to watch for the laptop-smashing amateurs or the slow motion fans, but the real fun may be at 2:24 in the video where a X=G/(CHROM-3) equation is displayed on a chalkboard. Only 20 hours later, it has already been cracked by Jamendo founder Sylvain Zimmer and his team. They posted details on how they did it and won a Cr-48 netbook, which may not even be delivered because they are not in the US"
Read more of this story at Slashdot.
Read More ...
Online Tracking Firms To Launch Opt-Out Program
storagedude writes "Threatened by the prospect of tougher US online privacy legislation, a handful of data collection companies have banded together to create a voluntary system for consumers to see what information companies have and to opt out of cookies or edit the data collected. The Better Advertising Project's Open Data Partnership is a long way from a viable solution — scores of tracking and big-name online companies have yet to sign on to the effort — but it is nonetheless the first attempt to put all this online tracking data in one place. Coupled with Microsoft's announcement this week that it plans to add a do-not-track mechanism to IE9, it appears that the FTC's call for a do-not-track system may be gaining some traction. The Open Data Partnership will be particularly interesting, as consumers will be getting a good look at the data collected about them. Better Advertising already lets consumers opt out of some behavioral ad targeting, and about 5% of those who click through to learn more actually opt out (PDF, slide 5). It will be interesting to see if the opt-out rate changes after consumers see what data is actually collected." To be clear, they aren't saying they'll stop collecting the data. They'll just make it available to users and let people opt out of getting ads based on the information, or simply remove anything they don't want shared.
Read more of this story at Slashdot.
Read More ...
All-Analog DIY Segway Project
An anonymous reader writes "One of the zany hacker-makers here at MIT just finished this DIY Segway project (video). Difference from the others: it's all analog. The controller is built without a microprocessor or even digital logic. It does use a gyroscope like the real Segway. The functionality looks fairly basic, but the fact that the controller works at all is amazing. The guy has a ton of other projects on his site too. Definitely worth a read for people who enjoy building things."
Read more of this story at Slashdot.
Read More ...
Small Fujitsu Device Harvests Both Solar and Thermal Energy
destinyland writes "Fujitsu has built a device that can simultaneously harvest energy from either light or heat. They've reduced production costs by using the same cheap organic substrate for both conversion processes, while also doubling the potential amount of energy that can be collected. 'Previously, dual harvesting of energy could only be done by combining two different devices,' the article notes — and the device's solar converter can even draw energy from indoor lighting as well as direct sunlight. Fujitsu predicts the device will be especially useful for powering medical sensors, since the flexible substrate can be included in monitors which conform to the shape of the human body."
Read more of this story at Slashdot.
Read More ...
Feds To Adopt 'Cloud First' IT Policy
theodp writes "The White House Thursday announced plans to restructure IT by consolidating federal government data centers and applications, and adopting a so-called 'cloud first' policy. Unveiled by federal CIO Vivek Kundra, the 25-Point Plan (PDF) calls for cutting 800+ data centers by 2015, as well as shifting work to cloud computing systems. The new 'Cloud First' policy cites the ability of Animoto.com to scale vs. the government's short-lived Cars.gov (Cash for Clunkers), although Google Trends suggests this may be somewhat of an apple-to-oranges comparison for justifying a national IT strategy. As long as we're talking clouds, a tag cloud of the 25-Point Plan underscores that the Feds are counting more on IT Program and Contract Management rather than Computer Science wizardry to deliver 'the productivity improvements that private industry has realized from IT.' Not to be a buzzkill, but those of you celebrating CS Education Week might be advised to consider an MBA if you want a Federal IT career."
Read more of this story at Slashdot.
Read More ...
Interval's Patent Suit Against the World Dismissed
randall77 writes with an update to a story we discussed in August about a patent infringement suit filed by Interval Licensing, a firm run by Microsoft co-founder Paul Allen, against many major tech companies over vague and broadly defined business methods. That patent suit has now been dismissed. Quoting Groklaw: "The court agreed with Google et al that it 'lacks adequate factual detail to satisfy the dictates of Twombly and Iqbal and also 'fails to provide sufficient factual detail as suggested by Form 18.' The court doesn't agree with Allen's Interval Licensing that the two cases do not apply to patent complaints, but it doesn't even need to go there: 'The Court does not find it necessary to determine whether Form 18 is no longer adequate under Twombly and Iqbal because Plaintiff's complaint fails to satisfy either the Supreme Court's interpretation of Rule 8 or Form 18.' Go Google. That was their argument in their motion to dismiss, along with AOL's. Google said the complaint was too vague to meet the standard under Ashcroft v. Iqbal, 129 S. Ct. 1937 (2009) and Bell Atl. Corp. v. Twombly, 550 U.S. 544 (2007). Then, after Interval Licensing brought up the lower patent form standard it thought should apply instead, AOL jumped in saying the complaint was too vague under even that standard, and the court agreed.
Read more of this story at Slashdot.
Read More ...
Backscatter X-Ray Machines Easily Fooled
Pinckney writes "A paper by Leon Kaufman and Joseph W. Carlson in the Journal of Transportation Security asserts that x-ray backscatter machines are not very effective (PDF) even in their intended role. While carelessly placed contraband will be detected, the machines have glaring blind-spots and have difficulty distinguishing explosives from human tissue. As they write, 'It is very likely that a large (15–20 cm in diameter), irregularly-shaped, cm-thick pancake [of PETN explosive] with beveled edges, taped to the abdomen, would be invisible to this technology. ... It is also easy to see that an object such as a wire or a boxcutter blade, taped to the side of the body, or even a small gun in the same location, will be invisible.'"
Read more of this story at Slashdot.
Read More ...
Venezuelan Gov't Seeks Internet Content Bill
Ah, none is more coward! writes "Several local and international news outlets report that the overwhelmingly pro-Chávez Venezuelan National Assembly is considering a reform of their Social Responsibility law to include Internet content. Besides regulations on mature content and mandatory airing of government messages, the existing bill includes broad prohibitions against 'destabilizing' and 'disquieting' content. The Assembly also has a proposal for a single national Internet access point, 'with a view to handling outgoing and incoming traffic in Venezuela.'"
Read more of this story at Slashdot.
Read More ...
Apple, Google Diss the DoD Over Mobile Security
Julie188 writes "The Defense Information Systems Agency (DISA) has long supported the use of BlackBerry smartphones for soldiers. It built a system called Go Mobile to provide secure communications, training, and collaboration applications to mobile soldiers. DISA recently decided to add Android and iPhone to the list of approved devices because of high demand from users. Unfortunately, this choice has become a giant pain in the flank. Why? Because both Apple and Google refuse to give DISA access to their security APIs."
Read more of this story at Slashdot.
Read More ...
Protect Your Pre-1997 IP Address
CWmike writes "With IPv4 space running out any day now, is your legacy IP address space safe? Marc Lindsey writes that if your company obtained its IP address space before 1997, you have probably received several letters from the American Registry for Internet Numbers encouraging you to enter into a contractual agreement to protect the IP address. But should you sign it? Be careful — there are several issues you should consider before signing up for this, writes Lindsey, who offers a deeper look at the issue."
Read more of this story at Slashdot.
Read More ...
Canadian Supreme Court To Decide If Linking Is Publishing
An anonymous reader writes "Will Canada become a black hole in cyberspace? Or will it remain a country of which former prime minister Wilfred Laurier once said, 'Canada is free and freedom is its nationality.' According to p2pnet's Jon Newton, that'll be for the nine members of the federal Supreme Court to decide. Newton was sued by ex-Green Party of Canada financier Wayne Crookes for allegedly defaming him by linking to a story Crookes didn't like. Newton is now back home on Vancouver Island after traveling to Ottawa for the SCC hearing. Was it win or lose? It's an 'Epic Fail' for Crookes, Newton says. The Supreme Court reserved its decision. Its rulings are 'typically released six to eight months after a hearing,' according to the CBC in its report on the case. Says Ars Technica, 'As CIPPIC puts it, if Newton loses, the ruling could "chill hyperlinking which in turn undermines the communicative force of the Internet and deters innovation of new, expression-enhancing platforms that may not develop due to fear of defamation actions."'"
Read more of this story at Slashdot.
Read More ...
'Anonymous' WikiLeaks Proponents Not So Anonymous
Giovane Moura writes "For a number of days the websites of MasterCard, Visa, PayPal and others are attacked by a group of WikiLeaks supporters (hacktivists). Although the group calls itself 'Anonymous,' researchers at the DACS group of the University of Twente (UT), the Netherlands, discovered that these hacktivists are easy traceable (PDF), and therefore anything but anonymous. The LOIC (Low Orbit Ion Cannon) software, which is used by the hacktivists, was analyzed by UT researchers, who concluded that the attacks generated by this tool are relatively simple and unveil the identity of the attacker. If hacktivists use this tool directly from their own machines, instead of via anonymization networks such as Tor, the Internet address of the attacker is included in every Internet message being transmitted. In the tools no sophisticated techniques are used, such as IP-spoofing, in which the source address of others is used, or reflected attacks, in which attacks go via third party systems.
Read more of this story at Slashdot.
Read More ...
Angles On Anonymous
A number of readers are sending in links related to Anonymous, the Internet phenomenon — don't call them a group — behind the controversial DDoS attacks on commercial entities that fail to support WikiLeaks. The best insight into Anonymous comes from the Economist's Babbage blogger, who hung out in one of their IRC channels. Reader nk497 points out that UK users looking to join Anonymous's DDoS army should be aware they could face a jail term of up to two years; simply downloading the LOIC software used in the DDoSing could suffice to earn a conviction. One 16-year-old has been arrested in The Netherlands and is charged with participating in the DDoS. Reader ancientribe sends in coverage of a claim by one security outfit that several existing criminal botnets have joined forces with Anonymous's Operation: Payback. And reader Stoobalou notes a Thinq.co.uk story on a manifesto of sorts that purports to come from "ANON OPS," even though Anonymous disclaims any central spokesperson or entity (press release here, PDF).
Read more of this story at Slashdot.
Read More ...
Navy Tests Mach 8 Electromagnetic Railgun
hargrand writes "Wired magazine has a story and publicly released video of the Navy test firing of a 32 megajoule electromagnetic railgun: 'Reporters were invited to watch the test at the Dalghren Naval Surface Warfare Center. A tangle of two-inch thick coaxial cables hooked up to stacks of refrigerator-sized capacitors took five minutes to power juice into a gun the size of a schoolbus built in a warehouse. With a 1.5-million-ampere spark of light and a boom audible in a room 50 feet away, the bullet left the gun at a speed of Mach 8.'"
Read more of this story at Slashdot.
Read More ...
Researchers Develop Genuine 3D Camera
cylonlover writes "Cameras that can shoot 3D images are nothing new, but they don't really capture three dimensional moments at all — they actually record images in stereoscopic format, using two 2D images to create the illusion of depth. These photos and videos certainly offer a departure from their conventional two dimensional counterparts, but if you shift your view point, the picture remains the same. Researchers from Ecole Polytechnique Federale de Lausanne (EPFL) hope to change all that with the development of a strange-looking camera that snaps 360 degrees of simultaneous images and then reconstructs the images in 3D."
Read more of this story at Slashdot.
Read More ...
Informative Shuttle Ascent Video
minterbartolo points out this video, produced by Matt Melis at the Glenn Research Center, excerpting from its description: "Photographic documentation of a Space Shuttle launch plays a critical role in the engineering analysis and evaluation process that takes place during each and every mission. Motion and Still images enable Shuttle engineers to visually identify off-nominal events and conditions requiring corrective action to ensure mission safety and success. This imagery also provides highly inspirational and educational insight to those outside the NASA family. This compilation of film and video presents the best of the best ground-based Shuttle motion imagery from STS-114, STS-117, and STS-124 missions. Rendered in the highest definition possible, this production is a tribute to the dozens of men and women of the Shuttle imaging team and the 30yrs of achievement of the Space Shuttle Program."
Read more of this story at Slashdot.
Read More ...
SHA-3 Finalist Candidates Known
Skuto writes "NIST just announced the final selection of algorithms in the SHA-3 hash competition. The algorithms that are candidates to replace SHA-2 are BLAKE, Grøstl, JH, Keccak and Skein. The selection criteria included performance in software and hardware, hardware implementation size, best known attacks and being different enough from the other candidates. Curiously, some of the faster algorithms were eliminated as they were felt to be 'too fast to be true.' A full report with the (non-)selection rationale for each candidate is forthcoming."
Read more of this story at Slashdot.
Read More ...
Military Bans Removable Media After WikiLeaks Disclosures
cgriffin21 writes "The Pentagon is taking matters into its own hands to prevent the occurrence of another WikiLeaks breach with removable media ban, preventing soldiers from using USB sticks, CDs or DVDs on any systems or servers. The directive prohibiting removable media followed the recent publication of more than 250,000 diplomatic cables, which were leaked to whistleblower Web site WikiLeaks at the end of last month by a military insider."
Read more of this story at Slashdot.
Read More ...
Chrome OS Doesn't Trust Apps Or Users
holy_calamity writes "Google's Chrome OS chiefs explain in Technology Review how most of the web-only OS's features flow from changing one core assumption of previous operating system designs. 'Operating systems today are centered on the idea that applications can be trusted to modify the system, and that users can be trusted to install applications that are trustworthy,' says Google VP Sundar Pichai. Chrome doesn't trust applications, or users — and neither can modify the system. Once users are banned from installing applications, or modifying the system security, usability, and more are improved, the Googlers claim."
Read more of this story at Slashdot.
Read More ...
No comments:
Post a Comment