magic maverick writes "A U.S. federal jury has ordered Agence France-Presse and Getty Images to pay $1.2 million to a Daniel Morel, Haitian photographer, for their unauthorized use of photographs, from the 2010 Haiti earthquake. The images, posted to Twitter, were taken by an editor at AFP and then provided to Getty. A number of other organizations had already settled out of court with the photographer."
Please create an account to participate in the Slashdot moderation system
An anonymous reader writes with this excerpt from the Washington Post "Researchers are trying to plant a digital seed for artificial intelligence by letting a massive computer system browse millions of pictures and decide for itself what they all mean. The system at Carnegie Mellon University is called NEIL, short for Never Ending Image Learning. In mid-July, it began searching the Internet for images 24/7 and, in tiny steps, is deciding for itself how those images relate to each other. The goal is to recreate what we call common sense — the ability to learn things without being specifically taught."
jones_supa writes "Kdenlive's project leader Jean-Baptiste Mardelle, who always used to let people know if he was going to be away for a couple of days, seems to have just disappeared. His last e-mail and blog post were in early July and they didn't suggest any problems. While there's many Kdenlive fans out there for the KDE-focused open-source video editor, it seems new development efforts around the project have ceased. Also the Kdenlive Git repository hasn't seen any new commits (aside from the automated l10n daemon script) since early July. There has been also people in KDE forums and Kdenlive developers' mailing list pondering about the status of the project, being left none the wiser."
wabrandsma writes "Two Israeli computer scientists say they may have uncovered a puzzling financial link between Ross William Ulbricht, the recently arrested operator of the Internet black market known as the Silk Road, and the secretive inventor of bitcoin, the anonymous online currency, used to make Silk Road purchases."
cold fjord writes "France24 reports, "Beijing on Saturday announced it was setting up an 'air defence identification zone' over an area that includes islands controlled by Japan but claimed by China, in a move that could inflame the bitter territorial row. Along with the creation of the zone in the East China Sea, the defence ministry released a set of aircraft identification rules that must be followed by all planes entering the area, under penalty of intervention by the military. Aircraft are expected to provide their flight plan, clearly mark their nationality, and maintain two-way radio communication allowing them to 'respond in a timely and accurate manner to the identification inquiries' from Chinese authorities. The outline of the new zone ... covers a wide area of the East China Sea between South Korea and Taiwan that includes the Tokyo-controlled islands known as the Senkakus to Japan and Diaoyous to China. "China's armed forces will adopt defensive emergency measures to respond to aircraft that do not cooperate in the identification or refuse to follow the instructions," according to the ministry. ' The Politico adds, "Secretary of Defense Chuck Hagel said Saturday the United States is 'deeply concerned'" over the move. Spiegel Online has background on the conflict with Japan and on related regional issues. This announcement follows the recent publication in Chinese state media of maps showing nuclear strike plans against the U.S."
theodp writes "The same cast of billionaire characters — Mark Zuckerberg, Bill Gates, Steve Ballmer, Eric Schmidt — is backing FWD.us, which is lobbying Congress for more visas to 'meet our workforce needs,' as well as Code.org, which aims to popularize Computer Science education in the U.S. to address a projected CS job shortfall. In laying out the two-pronged strategy for the Senate, Microsoft General Counsel and Code.org Board member Brad Smith argued that providing more kids with a STEM education — particularly CS — was 'an issue of critical importance to our country.' But with its K-8 learn-to-code program which calls for teachers to receive 25% less money if fewer than 40% of their CS students are girls, Smith's Code.org is sending the message that training too many boys isn't an acceptable solution to the nation's CS crisis. 'When 10 or more students complete the course,' explains Code.org, "you will receive a $750 DonorsChoose.org gift code. If 40% or more of your participating students are female, you'll receive an additional $250, for a total gift of $1,000 in DonorsChoose.org funding!" The $1+ million Code.org-DonorsChoose CS education partnership appears to draw inspiration from a $5 million Google-DoonorsChoose STEM education partnership which includes nebulous conditions that disqualify schools from AP STEM funding if projected participation by female students in AP STEM programs is deemed insufficient. So, are Zuckerberg, Gates, Ballmer, and Schmidt walking-the-gender-diversity-talk at their own companies? Not according to the NY Times, which just reported that women still account for only about 25% of all employees at Code.org supporters Apple, Google, Facebook, and Microsoft. By the way, while not mentioning these specific programs, CNET reports that Slashdot owner Dice supports the STEM efforts of Code.org and Donors Choose."
An anonymous reader writes "I'm currently being targeted by an overseas debt collection scam. My landline rings every 10-15 minutes all day every day. I considered getting a blacklisting device to block the incoming calls, but the call center spoofs a different number on my caller ID each time, and it's gotten to the point where I've just unplugged the phones. I'm already on the Do No Call Registry and have filed a complaint with the FTC. Aside from ditching my landline, changing my number, and/or blowing a whistle into the receiver anytime I actually pick up, are there any real solutions out there? Has anybody had luck with a blacklisting device?"
squiggleslash writes "The concerns, legitimate or otherwise, about genetically modified foods such as Monsanto's Round-up Ready soy-beans, may be causing unintended consequences: Monsanto's rivals such as BASF are selling 'naturally' mutated seeds where extreme exposure to ultra-violet is used to increase the rate of mutations in seeds, a process called mutagenesis. These seeds end up with many of the same properties, such as herbicide resistance, as GM seeds, but inevitably end up with other, uncontrolled, mutations too. The National Academy of Sciences warns that there's a much higher risk of unintentionally creating seeds that have active health risks through mutagenesis than by other means, including relatively controlled genetic engineering, presumably because of the blind indiscriminate nature of mutations caused by the process. But because mutagenesis is effectively an acceleration of the natural system of evolution, it's very difficult to regulate."
Hugh Pickens DOT Com writes "Joseph Stromberg writes at the Smithsonian that one afternoon in October 2005, neuroscientist James Fallon was sifting through thousands of PET scans to find anatomical patterns in the brain that correlated with psychopathic tendencies in the real world. 'Out of serendipity, I was also doing a study on Alzheimer's and as part of that, had brain scans from me and everyone in my family right on my desk,' writes Fallon. 'I got to the bottom of the stack, and saw this scan that was obviously pathological.' When he looked up the code, he was greeted by an unsettling revelation: the psychopathic brain pictured in the scan was his own. When he underwent a series of genetic tests, he got more bad news. 'I had all these high-risk alleles for aggression, violence and low empathy,' he says, such as a variant of the MAO-A gene that has been linked with aggressive behavior. It wasn't entirely a shock to Fallon, as he'd always been aware that he was someone especially motivated by power and manipulating others. Additionally, his family line included seven alleged murderers, including Lizzie Borden, infamously accused of killing her father and stepmother in 1892. Many of us would hide this discovery and never tell a soul, out of fear or embarrassment of being labeled a psychopath. Perhaps because boldness and disinhibition are noted psychopathic tendencies, Fallon has gone in the opposite direction, telling the world about his finding in a TED Talk, an NPR interview and now a new book published last month, The Psychopath Inside. 'Since finding all this out and looking into it, I've made an effort to try to change my behavior,' says Fallon. 'I've more consciously been doing things that are considered "the right thing to do," and thinking more about other people's feelings.'"
First time accepted submitter conoviator writes "The NY Times has just published a piece providing more background on the healthcare.gov software project. One interesting aspect: 'Another sore point was the Medicare agency's decision to use database software, from a company called MarkLogic, that managed the data differently from systems by companies like IBM, Microsoft and Oracle. CGI officials argued that it would slow work because it was too unfamiliar. Government officials disagreed, and its configuration remains a serious problem.'" The story does not say that MarkLogic's software is bad in itself, only that the choice meant increased complexity on the project.
jones_supa writes "A couple of weeks ago hacker Oona Räisänen told about finding a 16 kbps data stream on FM broadcast frequencies, and her suspicion was that it's being used by the public transit display system in Helsinki, Finland. Now it's time to find out the truth. She had the opportunity to observe a display stuck in the middle of its bootup sequence, displaying a version string. This revealed that the system is called IBus and it's made by the Swedish company Axentia. Sure enough, their website talks about DARC and how it requires no return channel, making it possible to use battery-powered displays in remote areas. Other than that, there are no public specs for the proprietary protocol. So she implemented the five-layer DARC protocol stack in Perl and was left with a stream of fully error-corrected packets on top of Layer 5, separated into hundreds of subchannels. Some of these contained human-readable strings with names of terminal stations. They seemed like an easy starting point for reverse engineering..."
Fnord666 writes with this excerpt from Tech Crunch "Twitter has enabled Perfect Forward Secrecy across its mobile site, website and API feeds in order to protect against future cracking of the service's encryption. The PFS method ensures that, if the encryption key Twitter uses is cracked in the future, all of the past data transported through the network does not become an open book right away. 'If an adversary is currently recording all Twitter users' encrypted traffic, and they later crack or steal Twitter's private keys, they should not be able to use those keys to decrypt the recorded traffic,' says Twitter's Jacob Hoffman-Andrews. 'As the Electronic Frontier Foundation points out, this type of protection is increasingly important on today's Internet.'" Of course, they are also using Elliptic Curve ciphers.
An anonymous reader writes "As Nicole Hemsoth over at HPCwire reports 'In a nutshell, the Automata processor is a programmable silicon device that lends itself to handing high speed search and analysis across massive, complex, unstructured data. As an alternate processing engine for targeted areas, it taps into the inner parallelism inherent to memory to provide a robust and absolutely remarkable, if early benchmarks are to be believed, option for certain types of processing.'" Basically, the chip is designed solely to process Nondeterministic Finite Automata and can explore all valid paths of an NFA in parallel, hiding the whole O(n^2) complexity thing. Micron has a stash of technical documents including a paper covering the design and development of the chip. Imagine how fast you can process regexes now.
An anonymous reader writes "The NSA snoops traffic and has backdoors in encryption algorithms. Law enforcement agencies are operating surveillance drones domestically (not to mention traffic cameras and satellites). Commercial entities like Google, Facebook and Amazon have vast data on your internet behavior. The average Joe has sophisticated video-shooting and sharing technology in his pocket, meaning your image can be spread anywhere anytime. Your private health, financial, etc. data is protected by under-funded IT organizations which are not under your control. Is privacy even a valid consideration anymore, or is it simply obsolete? If you think you can maintain your privacy, how do you go about it?"
cold fjord writes "Yahoo reports, 'Indonesian politicians plan to quiz former US National Security Agency contractor Edward Snowden in Russia about revelations Australia tapped the phone of President Susilo Bambang Yudhoyono. The move came as Indonesian protesters again laid siege to the Australian Embassy in Jakarta, burning images of Tony Abbott, throwing eggs and calling for a hard line against Australia. More than 1600 police were deployed to the Australian and US embassies and at several other potential targets in the capital after reports that hardline group the Islamic Defenders Front (FPI) planned to hold the rallies ... Indonesian media reported MPs had 'permission' from Moscow to go to Russia to meet with Snowden ... The Jakarta Post said a delegation of Russian politicians was in Indonesia this week to discuss the Australian phone tapping revelations. Indonesia also launched an investigation into local telecommunications companies to see what role they may have played.'"