First time accepted submitter Zilog writes "The end of the 3.5-inch floppy and the disappearance of associated drives showed to me the need to backup the tens of diskettes that accompanied my youth. Carefully preserved, these diskettes have proved readable for the most part — while some are approaching 20 years old. However, some diskettes have shown surface defects in areas with compressed archives (zip). Any ideas on how to recover (as much as possible) these bad sectors?"
Julie188 writes "More than 70% of IT departments plan to upgrade their websites to support IPv6 within the next 24 months, according to a recent survey of more than 200 IT professionals conducted by Network World. Plus, 65% say they will have IPv6 running on their internal networks by then, too. One survey respondent, John Mann, a network architect at Monash University in Melbourne, Australia, said his organization has been making steady IPv6 progress since 2008. 'Mostly IPv6 has just worked,' he said. 'The biggest problem is maintaining forward progress with IPv6 while it is still possible to take the easy option and fall back to IPv4.'"
whoever57 writes "Ryan Gibbs, a UK footballer (soccer player) had obtained a 'superinjunction' that prevented him being named as the person involved in an affair with a minor celebrity. However, he was named by various users on Twitter. Now, in response to legal action initiated by Mr. Giggs in the UK courts against the users, Twitter has stated that it is prepared to identify the users who broke the injunction if it was 'legally required' to do so. Twitter will attempt to notify the users first in order to give them an opportunity to exercise their rights."
Hugh Pickens writes "Emily Singer reports in MIT Technology Review that a nightshirt embedded with fabric electronics can monitor user's breathing patterns while a small chip worn in a pocket of the shirt processes that data to determine the phase of sleep, such as REM sleep (when we dream), light sleep, or deep sleep. 'It has no adhesive and doesn't need any special setup to wear,' says Matt Bianchi, a sleep neurologist at Massachusetts General Hospital and co-inventor of the shirt. 'It's very easy—you just slip it on at night.' Until now people with sleep disorders were hooked up to a complex array of sensors that monitor brain activity, muscle activity, eye movement, and heart and breathing rate but the 'smart pajamas' simplify this by focusing only on respiration. 'It turns out that you can tell if someone is awake or asleep and which stage of sleep they are in purely based on breathing pattern,' says Bianchi. 'That's a much easier signal to analyze than electrical activity from the brain.' Sleep specialists hope the pj's can help patients with insomnia or other sleep disorders since the shirt allows repeated measurements over time in the home so users can log their habits, such as coffee or alcohol intake, exercise, or stress, and look for patterns in how those variables affect their quality of sleep."
Glyn Moody writes "The annual BSA report on software piracy is out, with even bigger numbers: 'The commercial value of software piracy grew 14 percent globally last year to a record total of $58.8 billion.' Yes, they're using the old 'commercial value' trick: 'The commercial value of pirated software is the value of unlicensed software installed in a given year, as if it had been sold in the market.' Except, of course, that the main reason users in developing countries — the main focus of the report — resort to piracy is because they can't afford Western-style pricing. It's also fun to see the BSA trotting out the old 'reducing piracy would generate lots of new jobs and taxes for local governments' — except that it doesn't, because the money not paid for software licences does not disappear, but is just spent elsewhere in the local economy."
natecochrane writes "Looking for a new job? Then Google and Microsoft have 6200 roles globally this quarter up for grabs, the first salvos in a costly war for talent. Google alone will hire 6200 engineers, executives and sales staff this year — its biggest intake ever. This story details where the biggest bucks and most fun jobs are to be had and how you can apply for them. There's even a job for an Xbox PR person — fancy being paid to play with toys all day?"
An anonymous reader writes "James Laird has reverse engineered the Airport Express private key and published an open source AirPort Express emulator. 'My girlfriend moved house, and her Airport Express no longer made it with her wireless access point. I figured it'd be easy to find an ApEx emulator — there are several open source apps out there to play to them. However, I was disappointed to find that Apple used a public-key crypto scheme, and there's a private key hiding inside the ApEx. So I took it apart (I still have scars from opening the glued case!), dumped the ROM, and reverse engineered the keys out of it.'"
An anonymous reader writes "Brian Krebs recently posted an interesting piece looking at an invite-only service marketed on shadowy underground forums that lets crooks 'rent' or 'buy' access to individual botted PCs that can be used to tunnel traffic. The story looks at the mechanics of renting out bots, and the author traces some of the infected systems back to real businesses. From the post: 'The Limited; Santiam Memorial Hospital in Stayton, Ore.; Salem, Mass. based North Shore Medical Center; marketing communications firm McCann-Erickson Worldwide; and the Greater Reno-Tahoe Economic Development Authority.'"
Schneier's blog tips an article about research into geolocation that can track down a computer's location from its IP address to within 690 meters on average without voluntary disclosure from the target. Quoting: "The first stage measures the time it takes to send a data packet to the target and converts it into a distance – a common geolocation technique that narrows the target's possible location to a radius of around 200 kilometers. Wang and colleagues then send data packets to the known Google Maps landmark servers in this large area to find which routers they pass through. When a landmark machine and the target computer have shared a router, the researchers can compare how long a packet takes to reach each machine from the router; converted into an estimate of distance, this time difference narrows the search down further. 'We shrink the size of the area where the target potentially is,' explains Wang. Finally, they repeat the landmark search at this more fine-grained level: comparing delay times once more, they establish which landmark server is closest to the target."
welcher writes "An elderly Georgian woman was scavenging for copper with a spade when she accidentally sliced through an underground cable and cut off internet services to nearly all of neighboring Armenia. The fibre-optic cable near Tiblisi, Georgia, supplies about 90% of Armenia's internet so the woman's unwitting sabotage had catastrophic consequences. Web users in the nation of 3.2 million people were left twiddling their thumbs for up to five hours. Large parts of Georgia and some areas of Azerbaijan were also affected. Dubbed 'the spade-hacker' by local media, the woman is being investigated on suspicion of damaging property. She faces up to three years in prison if charged and convicted."
thecarchik writes "Scientists in Europe are working closely with industry and government as part of a new initiative called SARTRE (SAfe Road TRains for the Environment), which hopes to develop self-driving technology that will allow vehicles to drive autonomously in long road trains on the highway. The team behind SARTRE has now conducted its first real world test, using a sole Volvo S60 sedan that followed a lead truck around the automaker's test facility near Gothenburg, Sweden. In the video, the driver is free to take his eyes off the road and his hands off the wheel. In fact, he uses neither his hands nor feet during the test. Subsequent phases of the work will be carried out in 2011, and early 2012 will see the concept demonstrated on a five-vehicle road train with strategies handling interaction with other road users."
An anonymous reader writes "All top of the range smartphones will be sporting dual-core chips this year. So is it time to ditch your current pocket rocket? Not necessarily — dual-core will give a bit of a boost to multitasking and media streaming but probably won't persuade iPhone owners to switch to Android, says the writer."
Was it just me that thought the song was going to be "Through the fire and flames?"