Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Defensive patent (Score 1) 191

by blee37 (#30823628) Attached to: USPTO Grants Google a Patent On MapReduce
If the Google patent is truly for something that is already known then it should not have been issued. I did not read the whole patent. Patents always have to be for something new that is not yet known by others: If what Google patent was already known (and I'm not saying that it is because I didn't read the whole thing) then it can be challenged and overturned in court. It can be challenged in federal district court, appealed to the Federal Circuit, and appealed to the Supreme Court.

+ - Apple's TV/DVR iPod is Patent Pending->

Submitted by blee37
blee37 (1181835) writes "The USPTO has published a patent application by Apple for technology to enable a TV / DVR iPod. It suggests that an iPod would be able to switch between different content streams like terrestial TV, satellite TV, and HDTV. The diagrams also show an external device that could be connected to older iPods to enable TV/DVR capability."
Link to Original Source

+ - How the Great Firewall Works, and Evading It-> 1

Submitted by blee37
blee37 (1181835) writes "This article describes the nuts and bolts of the Great Firewall of China. Surprisingly, it "censors" sites by sending TCP reset requests to the client and server and relies on these endpoint computers to comply with the reset request. It is shown that using a one line Unix command to ignore TCP resets defeats the Great Firewall. Original analysis done by Dr. Richard Clayton of the University of Cambridge."
Link to Original Source

Comment: Re:already been done (Score 2, Informative) 148

by blee37 (#30792964) Attached to: CMU Web-Scraping Learns English, One Word At a Time
Cyc is a controversial project in the AI community, and I'm glad that you brought it up. I don't think anyone yet knows how to use a database of commonsense facts, which is what Cyc is (though limited - the open source version only has a few hundred thousand facts) and which is one thing NELL could create. However, researchers continue to think about ways that an AI could use knowledge of the real world. There are numerous publications based on Cyc:

CMU Web-Scraping Learns English, One Word At a Time 148

Posted by timothy
from the hao-ubowt-hahmnimz dept.
blee37 writes "Researchers at Carnegie Mellon have developed a web-scraping AI program that never dies. It runs continuously, extracting information from the web and using that information to learn more about the English language. The idea is for a never ending learner like this to one day be able to become conversant in the English language." It's not that the program couldn't stop running; the idea is that there's no fixed end-point. Rather, its progress in categorizing complex word relationships is the object of the research. See also CMU's "Read the Web" research project site.

Comment: Unfortunate (Score 1) 178

by blee37 (#30791944) Attached to: China Begins Monitoring Billions of Text Messages
It's unfortunate that the Chinese government continues to spy on the population. Many text messages that people send are quite personal.

Text message technology actually makes it easier to spy on people because you can just filter for words like "democracy" rather than actually having to pay an operator to listen to people's phone conversations. Many human rights activists in China had previously reported having their phones tapped.

China Begins Monitoring Billions of Text Messages 178

Posted by Soulskill
from the that-would-be-a-terrible-job dept.
eldavojohn writes "The Telegraph is reporting that China has begun monitoring 'billions of text messages' in order to increase censorship. However, a People's Daily article claims they only monitor users who have been reported, and only shut down their message service if the complaints are true. Anything considered pornographic will require the user to bring a letter of guarantee to the local public security bureau promising to never again send such messages before service can be reactivated."

+ - Web Scraping AI Lives Forever-> 1

Submitted by blee37
blee37 (1181835) writes "Researchers at Carnegie Mellon have developed a web-scraping AI program that never dies. It runs continuously, extracting information from the web and using that information to learn more about the English language. The idea is for a never ending learner like this to one day be able to become conversant in the English language."
Link to Original Source

Protecting At-Risk Cities From Rising Seas 243

Posted by Soulskill
from the steal-moses'-superpowers dept.
Hugh Pickens writes "BBC reports that with about 10 million people in England and Wales living in flood risk areas, rising sea levels and more storms could mean that parts of at-risk cities will need to be surrendered to protect homes and businesses, and that 'radical thinking' is needed to develop sea defenses that can cope with the future threats. 'If we act now, we can adapt in such a way that will prevent mass disruption and allow coastal communities to continue to prosper,' says Ruth Reed, President of the Royal Institute of British Architects. 'But the key word is "now."' Changing sea levels is not a new phenomenon. In the Netherlands, for example, with 40% of its surface under sea level, water management and water defense have been practiced since time immemorial; creating mounds and dykes, windmills, canals with locks and sluices, the Delta Works and the Afsluitdijk, all to keep the water out. Similar solutions to protect British cities are based on three themes (PDF): moving 'critical infrastructure' and housing to safer ground, allowing the water into parts of the city; building city-wide sea defenses to ensure water does not enter the existing urban area; and extending the existing coastline and building out onto the water (using stilts, floating structures and/or land reclamation)."

+ - Feds Hold Open Competition for Hash Standard ->

Submitted by blee37
blee37 (1181835) writes "The federal government is holding an open competition to decide the next secure hash standard, which will be called SHA-3. The winner will be specified as one of a handful of secure hash algorithms approved for use by all federal agencies for digital signatures, secure key-exchange, and similar protocols. With SHA-1 on the way out and SHA-2 having never gained wide adoption, it is likely that a good SHA-3 algorithm would become the de facto standard. The competition is in the second round and 14 algorithms remain.

The feds have used open competitions to select encryption algorithms in the past — for example DES and AES were chosen this way. The open process makes perfect sense because the government wants as many smart people as possible to submit and try to break each other's codes. Modern encryption algorithms no longer rely on the secrecy of their source code because it is assumed that source code will fall into the wrong hands anyway. Furthermore, the open process creates a perception of greater legitimacy. A hash algorithm handed down directly by the government would be suspected of having a "backdoor" allowing national security agencies to read your messages."

Link to Original Source

Comment: Re:Policy document (Score 1) 246

by blee37 (#30763156) Attached to: Challenge To US Government Over Seized Laptops
Particularly interesting is the following clause indicating that your electronic devices can be searched even if the officer has no good reason to think you are 'suspicious.'

5.1.2. In the course of a border search, with or without individualized suspicion, an Officer may examine electronic devices and may review and analyze information encountered at the border, subject to the requirements herein and applicable law.

I suppose this is the same as the right of officers to open everyone's bags, without any need of proving suspicion. This is quite an invasion of people's privacy and property, yet realistically I don't think this will endanger attorney-client privilege or trade secrets. The officer searching you probably searches thousands of people a day. It's not like he's going to go through your data files and memorize all the important business/legal documents and then report them to your competitors. The policy document indicates that all electronic searches take place in your presence and with a supervisor present.

... though his invention worked superbly -- his theory was a crock of sewage from beginning to end. -- Vernor Vinge, "The Peace War"