Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - The Hollywood Vixen, The Dadaist Composer, and Spr (nytimes.com)

circletimessquare writes: "In the New York Times Sunday Book Review section is one of those truth-is-stranger-than-fiction stories. This one is about Hedy Lamarr, the Hollywood star, and George Anthiel, the avant garde composer. A new book out by Richard Rhodes, “Hedy’s Folly,” details how this odd friendship produced an even odder product: sophisticated military munition designs during World War II, including an early original implementation of spread spectrum radio for torpedo guidance.

'Hedy’s folly may have been in assuming men in government might overcome their prejudice that a beautiful woman could not have brains and imagination. But she lived to see similar versions of her invention be put into common practice, and in 1997, Hedy Lamarr, at the age of 82, and George Antheil (posthumously) were honored with the Pioneer Award by the Electronic Frontier Foundation.'"

Your Rights Online

Submission + - Trying to add a little sanity to the TSA Security (whitehouse.gov) 1

A_linux_covert writes: A whitehouse.gov petition, http://wh.gov/DDz , has been submitted for the 30 day signature countdown. I am the petitioner. On the return trip home from Thanksgiving, the TSA decided to confiscate a micro tool kit used most often to disassemble laptops;it was no great loss, but it had made several trips across the country before it did not, they changed the script. The real screw up was on my part, take off was at 6:00AM, boarding at 5:40AM. I had risen at 3:30AM to make it to the airport with time too spare. After standing in line for ~40min I get up to the unload you pockets,shoes and belt off, and laptop in the bin. As I slid my hand into my left pant pocket I felt the cool surface of my trusty Buck 110, did I mention my Grandfather gave me the knife 30 years ago. FUCK!!! is what I am thinking. No way will it get through, but what the hell. I laid it down in between my shoes. I thought that perhaps I might get lucky and the TSA agent might miss it... It happens right? Well to say the least it did not work. Now at this point it is 5:25AM, the plane boards in 00:15 minutes. It would be physically impossible to navigate security again and make the flight. So I had to toss a knife I never intended to carry with me and I gave a damn about the knife. The solution is simple, http://wh.gov/DDz , and there is zero chance of getting rid of the TSA or HSA, so maybe we can force them to adapt the theater to us plebes a little bit.

Comment Re:General concepts (Score 3, Interesting) 90

You miss the point - the researchers discovered an application of the laws of physics to cryptanalysis. Cool, interesting, but not inherently patentable. Then they patented every way to fix that problem, many of which would be obvious to someone skilled in the art.

If I discover that 1+2 = 3, I cannot patent that equation. If I discover an application of that equation to a physical problem, the intent of the framers in patent law was that only a non obvious application may be patented. The fact that they discovered the problem doesn't (at least by law) eliminate or nullify the PHOSITA requirement.

The researchers found a hard to find problem, then patented the obvious solutions to that problem.

This is one of the problem with patents in general - patents are being issued where the person "skilled in the art", i.e. someone who has the same degree of specialization, would have developed the same solution, and the USPTO no longer makes a reasonable effort to prevent that.

Comment Re:General concepts (Score 2) 90

Not everyone who complains on Slashdot is naive on patent realities, and the problem is real and ugly.

Aside from the legal fiction of the PHOSITA (Person Having Ordinary Skill In The Art), the intent of this clause by the framers was that it should not be possible for anyone to obtain a patent on something that would be obvious to someone working in the field.

In this specific case, once the feasibility of power vector side channel attacks was understood, any ideas that should have been obvious to someone having ordinary skill in the applicable fields (cryptanalysis of side channels, EE, FPGA layout internals) should not be patentable.

While credit must be given to researches who discovered these attack vectors, the fact remains that the patents they obtained are broad enough to intersect essentially every idea a PHOSITA would come up with. While it is possible to interpret claims narrowly through the context of the background and description, juries often (especially in East Texas) fail to narrow interpretations sufficiently, and just attempting just a narrow interpretation will still cost you $1-3M in legal fees.

If your job includes evaluation of risk of patent infringement (which mine does, for one of the worlds largest companies) then you would understand that the combination of lowering the bar on "obvious" and "prior art", along with the challenges that venue shopping presents, have created a situation where it has become nearly impossible to do anything interesting without infringing many patents that should NOT have been issued.

Comment DPA protection is patented... (Score 2) 90

An interesting blurb from the Actel linked page:

Many of the fundamental techniques used to defend against DPA and other side-channel attacks are patented by Cryptography Research, Inc. ... One of CRI's businesses today is licensing this portfolio of very fundamental patents. Nearly all the secure microcontrollers used in smart cards, set-top boxes, SIM cards for GSM phones and Trusted Platform Modules (TPM) for personal computers are built under license to CRI, amounting to about 4.5 billion chips per year in total.

Yet another critical set of concepts which should be obvious to anyone working in the field locked behind a paywall due to USPTO incompetence and/or malfeasance...

Comment IT Security vs as cost center... (Score 1) 77

The only thing changing is that IT in general is generally considered a "cost center" to trim, IT security an even less indirectly profitable component of that cost center, and management of most organizations is becoming more aggressive at reducing that cost. Add outsourcing and subcontracting issues and you end up with a system where there is real interest only in having an appearance of security, and standard practices revolve around plausible deniability and passing the buck.

Almost everyone whose been in enterprise security for a while has a collection of cringe worthy stories they cannot share... (sigh)

Submission + - Infosys, IBM using B1 visa workers ILLEGALLY (youtube.com)

visasrus writes: http://www.youtube.com/watch?v=ZdhIR1-s8Mg

This is a 'Dan Rather Reports" video piece about a lawsuit filed by an ex-Infosys employee about the rampant fraud committed by Infosys and others such as IBM to illegally use B1 visas to bring their Indian workers to the US and being allowed to displace and ignore US citizen workers
When he refused to help them commit the fraud , he actually got death threats!!!!
Watch the piece and see for yourself. Pass this onto anyone and everyone you know. The truth is finally getting published about the Indian IT worker fraud on this country!!!!

Japan

Submission + - FUKUSHIMA core cooling pools R HOT (iaea.org)

DarkStarZumaBeach writes: "Reactor fuel cooling pools need to be kept at 26 degrees Celsius. The reactor 4 cooling pool caught fire when used reactor fuel overheated earlier this week because water either evaporated or leaked out due to primary structural failure. The reactor 3 cooling pool is also very low — and both 3 and 4 are exposed to open air. And, reactor 5 and 6 cooling pools are registering increasing temperatures ..."
Media

1928 Time Traveler Caught On Film? 685

Many of you have submitted a story about Irish filmmaker George Clarke, who claims to have found a person using a cellphone in the "unused footage" section of the DVD The Circus, a Charlie Chaplin movie filmed in 1928. To me the bigger mystery is how someone who appears to be the offspring of Ram-Man and The Penguin got into a movie in the first place, especially if they were talking to a little metal box on set. Watch the video and decide for yourself.
Security

Submission + - China Penetrated NSA's Classified Operating System 2

Pickens writes: "Seymour M. Hersh writes in the New Yorker that after an American EP-3E Aries II reconnaissance plane on an eavesdropping mission collided with a Chinese interceptor jet over the South China Sea in 2001 and landed at a Chinese F-8 fighter base on Hainan Island, the 24 member crew were unable to completely disable the plane’s equipment and software. The result? The Chinese kept the plane for three months and eventually reverse-engineered the plane’s NSA.-supplied operating system, estimated at between thirty and fifty million lines of computer code, giving China a road map for decrypting the Navy’s classified intelligence and operational data. “If the operating system was controlling what you’d expect on an intelligence aircraft, it would have a bunch of drivers to capture radar and telemetry,” says Whitfield Diffie, a pioneer in the field of encryption. “The plane was configured for what it wants to snoop, and the Chinese would want to know what we wanted to know about them—what we could intercept and they could not.” Despite initial skepticism, over the next few years the US intelligence community began to “read the tells” that China had gotten access to sensitive traffic and in early 2009, Admiral Timothy J. Keating, then the head of the Pacific Command, brought the issue to the new Obama Administration. "If China had reverse-engineered the EP-3E’s operating system, all such systems in the Navy would have to be replaced, at a cost of hundreds of millions of dollars," writes Hersch. "After much discussion, several current and former officials said, this was done" prompting some black humor from US naval officers. “This is one hell of a way to go about getting a new operating system.”""

Submission + - BP dispersants 'causing sickness' along Gulf coast (aljazeera.net)

An anonymous reader writes: Al Jazeera English has found toxic illnesses linked to BP oil dispersants along Gulf coast.

Two-year-old Gavin Tillman of Pass Christian, Mississippi, has been diagnosed with severe upper respiratory, sinus, and viral infections. His temperature has reached more than 39 degrees since September 15, yet his sicknesses continues to worsen. His parents, some doctors, and environmental consultants believe the child's ailments are linked to exposure to chemicals spilt by BP during its Gulf of Mexico oil disaster. Gavin's father, mother, and sister, Shayleigh, are also facing serious health problems. Their symptoms are being experienced by many others living along the coast of the Gulf of Mexico.


Slashdot Top Deals

"Protozoa are small, and bacteria are small, but viruses are smaller than the both put together."

Working...