×
NASA

NASA Releases New High-Definition Image of Earth 106

New submitter klchoward writes "Working for NOAA, I have been really pleased to see the weather data from the new Suomi NPP satellite coming into our computer models already but have been blown away by its capability to take stunning high-definition images of our planet. See the article at Huffington Post or go straight to the image at NASA's website." Reader derekmead has some images from further afield, too: these beautiful images of Mars come from NASA's High Resolution Imaging Science Experiment camera, mounted on the Mars Reconnaissance Orbiter.
Privacy

Hawaiian Bill Would Force ISPs to Track Users' Web Histories For 2 Years 200

New submitter mazinger writes "In Hawaii, a bill has been proposed to retain data on Internet users and the sites they visit. Apparently, there is also no requirement for a warrant to obtain the information from service providers. The bill affects not only ISPs but also coffee shops and anyone providing Internet access."
Education

Stanford Online Courses Delayed; More Time To Sign Up 66

mikejuk writes "Online Computer Science classes that have attracted tens of thousands of students have been put back for a couple of weeks. Is this on account of Sebastian Thrun's resignation from Stanford? Whatever the reason, providing certificates for online students seems to be a real point of contention. James Plummer, dean of Stanford's School of Engineering, said 'I think it will actually be a long time, maybe never, when actual Stanford degrees would be given for fully online work by anyone who wishes to register for the courses.' The good news is that the delay means that there is still time to sign up."
Security

Symantec Tells Customers To Stop Using pcAnywhere 149

Orome1 writes "In a perhaps not wholly unexpected move, Symantec has advised the customers of its pcAnywhere remote control application to stop using it until patches for a slew of vulnerabilities are issued. If the attackers place a network sniffer on a customer's internal network and have access to the encryption details, the pcAnywhere traffic — including exchanged user login credentials — could be intercepted and decoded. If the attackers get their hands on the cryptographic key they can launch remote control sessions and, thus, access to systems and sensitive data. If the cryptographic key itself is using Active Directory credentials, they can also carry out other malicious activities on the network."
Mars

Candidate Gingrich Pushes a Moon Base, Other Space Initiatives 602

New submitter thomas.kane writes "Newt Gingrich announced yesterday, while visiting Florida's Space Coast, a visionary plan for the future of space travel. He suggested a combination of the current private incentives and a government funded section, developing a moon base, commercial near earth orbit, and continuous propulsion systems to better reach Mars." "Visionary" seems an awfully positive spin on it; Gingrich is not the first President or presidential candidate to propose revisiting the moon — and the moon seems like small potatoes, by some measures.
Censorship

Foreign Data Unsafe From US Patriot Act, Says American Law Firm 328

natecochrane writes "A prestigious law firm warns non-U.S. businesses their data is unsafe from costly and invasive raids by American law enforcement even if they host their data in their own countries. The wide interpretation of the USA Patriot Act ensures U.S. cops can legally demand data from almost anyone, anywhere for any reason and countries and their citizens are largely powerless to resist. The advice has resonance with the arrest this week of Kim 'Dotcom' on alleged copyright violations in the U.S."
Iphone

Zynga Accused of Cloning Hit Indie iPhone Game Tiny Tower 245

FrankPoole writes "Indie iPhone game developer Nimblebit is accusing social games giant Zynga of ripping off its popular mobile title Tiny Tower. Nimblebit's Ian Marsh got word out about the similarities between Dream Heights and Tiny Tower with an image that's still making the Twitter rounds. The image is made up of screenshots showing how Dream Heights' interface and gameplay mechanics appear strikingly similar to Tiny Tower's."
Australia

OzLog: Unlimited Private Data Retention For Australia? 54

AHuxley writes "Australia would like to follow the EU down the 'European Directive on Data Retention' path. Law enforcement agencies may have the option to request a log of all a users of interest telco usage without any review or time limits. From the article: 'The proposal — known popularly as ‘OzLog’ — first came to light in June 2010, when AGD confirmed it had been examining the European Directive on Data Retention (PDF) to consider whether it would be beneficial for Australia to adopt a similar regime. The directive requires telcos to record data such as the source, destination and timing of all emails and telephone calls – even including internet telephony.'"
United Kingdom

Non-Copied Photo Is Ruled Copyright Infringement 657

An anonymous reader writes "A UK judge ruled that a photograph inspired by another photograph, but clearly different from it, infringes the original photo's copyright. The two photographs were shot in the same location, have the same subject, and use the same distinctive post-processing treatment. However, the angle and composition are different. From the article: '[The judge] said a difficult decision hinged on a "qualitative assessment of the reproduced elements." He defined Fielder's image a "photographic work," as distinct from a simply a photograph, in that "its appearance is the product of deliberate choices and also deliberate manipulations by the author," and concluded that those aspects had been copied.'"
Chrome

Chromium-Based Spinoffs Worth Trying 185

snydeq writes "InfoWorld's Serdar Yegulalp takes an in-depth look at six Chromium-based spinoffs that bring privacy, security, social networking, and other interesting twists to Google's Chrome browser. 'When is it worth ditching Chrome for a Chromium-based remix? Some of the spinoffs are little better than novelties. Some have good ideas implemented in an iffy way. But a few point toward some genuinely new directions for both Chrome and other browsers.'"
Government

Revolutionary Wants Technology To Transform Libya 117

pbahra writes in with the story of Khaled el Mufti, the network-security engineer who was in charge of providing telecommunications for the Libyan revolution. "It isn't often you get the chance to meet a real revolutionary. It is a term cheapened by misuse, but Khaled el Mufti is a revolutionary. It is no exaggeration to say that the role he played in the Libyan uprising last year was crucial; had he and his telecoms team failed, it isn't hard to think that Col. Muammar Gadhafi might still be in power. Today, Mr. Mufti is a telecoms adviser to the interim government and heads the e-Libya initiative, a bold plan to use the transformative powers of technology to modernize the Libyan state, overturning 40 years of corruption and misrule under Gadhafi. Mr. Mufti is an unlikely revolutionary, a softly spoken network-security engineer with a degree from Imperial College in London. Almost by chance he was in his native Libya when the revolution took place, working on a project with BT in the capital, Tripoli."
Transportation

Autonomous Vehicles and the Law 417

Hugh Pickens writes "Google's autonomous cars have demonstrated that self-driving vehicles are now largely workable and could greatly limit human error, but questions of legal liability, privacy and insurance regulation have yet to be addressed. Simple questions, like whether the police should have the right to pull over autonomous vehicles, have yet to be answered and legal scholars and government officials warn that society has only begun wrestling with laws required for autonomous vehicles. The big question remains legal liability for the designers and manufacturers as some point out that liability exemptions have been mandated for vaccines, which are believed to offer great value for the general health of the population, despite some risks. 'Why would you even put money into developing it?' says Gary E. Marchant, director of the Center for Law, Science and Innovation at the Arizona State University law school. 'I see this as a huge barrier to this technology unless there are some policy ways around it.' Congress could consider creating a comprehensive regulatory regime to govern the use of these technologies say researchers at the Rand Corporation adding that while federal preemption has important disadvantages, it might speed the development and utilization of these technologies (PDF) and should be considered, if accompanied by a comprehensive federal regulatory regime. 'This may minimize the number of inconsistent legal regimes that manufacturers face and simplify and speed the introduction of these technologies.'"
HP

HP To Open Source WebOS 137

First time accepted submitter pscottdv writes "This year the artists formerly known as Palm had quite a rough few months with HP dumping the hardware side of their own webOS mobile computing platform – their most recent move, having been announced just last month, is live today: open sourced webOS for all. While the actual main product which will be known as Open webOS 1.0 will not be released until September, they've already got the Enyo piece of the pie available today."
Hardware Hacking

High School Students Send Lego Man 24 Kilometers High 115

First time accepted submitter AbilityLiving writes "Two high schoolers have launched a Lego Man to 80,000 feet — three times the height of a jet — in a homebrew project that involved a few Ebay-purchased cameras, a giant helium balloon and a star-ship full of ingenuity."
Security

Exploits Emerge For Linux Privilege Escalation Flaw 176

angry tapir writes "Linux vendors are rushing to patch a privilege escalation vulnerability in the Linux kernel that can be exploited by local attackers to gain root access on the system. The vulnerability, which is identified as CVE-2012-0056, was discovered by Jüri Aedla and is caused by a failure of the Linux kernel to properly restrict access to the '/proc//mem' file."

Slashdot Top Deals