50249439
submission
Toe, The writes:
It has long been understood that completely different animals can end up with very similar traits (convergent evolution), and even that genes can converge. But a new study shows an unbelievable level of convergence among entire groups of genes. The study shows that animals as diverse as bats and dolphins, which independently developed echolocation, converge in nearly 200 different genomic regions concentrated in several 'hearing genes'. The implications are rather deep, if you think about it, delving into interesting limitations on diversity or insights into the potential of DNA. And perhaps more importantly, this finding goes a long way toward explaining why almost aliens in the universe look surprisingly identical to humans (though still doesn't explain why they all speak English).
19180838
submission
Toe, The writes:
Barclays Capital analyst Ben Reitzes follows up on a conference call with Forrester Research by concluding that the iPad is “running far ahead of its tablet competition and its their game to lose." He also notes that Apple is the "½Â½Âoewinner in the consumerization of IT," with hoards of enterprise workers bringing their Apple devices into work. He predicts Apple will claim over 70% of 47 million tablets sold in 2011. Recently, Apple announced that over 80% of Fortune 100 are already deploying or testing the iPad.
18702088
submission
Toe, The writes:
Earlier today, Website was reportedly hacked. It appears that 590 million customers' data (including but not limited to credit card information, user ID and password, shopping history, and shoe size) was obtained by hackers. The stolen data apparently was acquired when hackers called Company and asked the receptionist for passwords to their vpn and central database. Company says they were shocked this could have happened, that they doubt the hackers will find any use for this information, and that in any event there was little they could have done to prevent the breach. In response to the incident, Company sent a two-sentence apology e-mail to their customers and now considers the case to be closed. Company reportedly has no plans to upgrade their internal security, since again, these sorts of things "just happen." In other news, retailers around the globe are reporting fantastic sales today, most notably from customers paying by credit card.
18431502
submission
Ed writes:
Practically every computer system appears to be at the mercy of at least one individual who holds root or whatever other superuser identity can destroy (or subvert, etc.) that system. Each application on a system has the same weakness. However, making a system require multiple individuals for any root operation (think of the classic two-keys to launch a nuke) has shortcomings: simple operations sometimes require root, and would be enormously cumbersome if they needed a consensus of administrators to execute. A core principle of the Metagovernment project is that individuals should not be empowered over other individuals (collaborative governance), yet we repeatedly encounter scenarios where one individual has sweeping power over any technological system we use. We have the idea of a Distributed Administration Network, which is like a cluster of independently-administered servers, but this is a limited case for deployment of our governance applications... and anyway it is still (as far as we know) vaporware. Are there more sweeping yet practical solutions out there for avoiding the weakness of a singular empowered superuser?