Forgot your password?
typodupeerror

+ - First Demonstration Of Artificial Intelligence On A Quantum Computer

Submitted by KentuckyFC
KentuckyFC (1144503) writes "Machine learning algorithms use a training dataset to learn how to recognise features in images and use this 'knowledge' to spot the same features in new images. The computational complexity of this task is such that the time required to solve it increases in polynomial time with the number of images in the training set and the complexity of the "learned" feature. So it's no surprise that quantum computers ought to be able to rapidly speed up this process. Indeed, a group of theoretical physicists last year designed a quantum algorithm that solves this problem in logarithmic time rather than polynomial, a significant improvement. Now, a Chinese team has successfully implemented this artificial intelligence algorithm on a working quantum computer, for the first time. The information processor is a standard nuclear magnetic resonance quantum computer capable of handling 4 qubits. The team trained it to recognise the difference between the characters '6' and '9' and then asked it to classify a set of handwritten 6s and 9s accordingly, which it did successfully. The team say this is the first time that this kind of artificial intelligence has ever been demonstrated on a quantum computer and opens the way to the more rapid processing of other big data sets--provided, of course, that physicists can build more powerful quantum computers."

+ - Annals of sleazy domain name squatting

Submitted by lpress
lpress (707742) writes "The domain name ebola.com is for sale. In the meantime, the folks who own it are redirecting to ebola.org, where you can read frightening articles and purchase BHT, a nutritional supplement that could help with ebola. I don't know which is more depressing — the fact that someone would try to exploit the ebola epidemic this way or that there are enough people who would pay for BHT to fend off ebola to make squatting on disease domain names a profitable business."

+ - Analysis of Linux backdoor used in freenode hack

Submitted by Anonymous Coward
An anonymous reader writes "A detailed analysis has been done of the Linux backdoor used in the freenode hack. It employed port knocking and crypto to provide security of the backdoor against others using it.. This seems a little more sophisticated than your average jane hacker.. Criminal? Government?"

+ - Supposed Battery Breakthrough. 70% charge in 2mins, 20yr life.->

Submitted by chaosdivine69
chaosdivine69 (1456649) writes "According to Scientists at Nanyang Technology University (NTU), they have developed ultra-fast charging batteries that can be recharged up to 70 per cent in only two minutes and have a 20 yr lifespan (10,000 charges). The impact of this is potentially a game changer for a lot of industries reliant on lithium ion batteries.

In the car industry for example, consumers will save huge on costs for battery replacement and manufacturers will save on material construction since they're using a nanotube structure of Titanium dioxide which is an abundant, cheap and safe material found in soil. Titanium dioxide is commonly used as a food additive or in sunscreen lotions to absorb harmful ultraviolet rays. It is believed that charging an electric car can be achieved in as little as 5 minutes making it comparable to filling up a gasoline based automobile."

Link to Original Source

+ - Remote exploit vulnerability found in bash->

Submitted by kdryer39
kdryer39 (1210976) writes "A remotely exploitable vulnerability has been discovered by Stephane Chazelas in bash on Linux and it is unpleasant. The vulnerability has the CVE identifier CVE-2014-6271. This affects Debian as well as other Linux distributions.

The major attack vectors that have been identified in this case are HTTP requests and CGI scripts. Another attack surface is OpenSSH through the use of AcceptEnv variables. As well through TERM and SSH_ORIGINAL_COMMAND. An environmental variable with an arbitrary name can carry a nefarious function which can enable network exploitation."

Link to Original Source
Windows

+ - WINDOWS 8 PREVIEW REVEALS MAJOR UI METAMORPHOSIS->

Submitted by
martty
martty writes "Microsoft began its Windows 8 publicity blitz in earnest Wednesday, previewing an operating system that appears to break from the norm in more ways than one.
It has a tile interface similar to that of Windows Phone 7, it will run on PCs and tablets, and it will support both touchscreen and mouse-and-keyboard interactions."

Link to Original Source
Microsoft

+ - 8 rumored features in Windows 8->

Submitted by stinkymountain
stinkymountain (962420) writes "Microsoft recently allowed select OEM partners to download updated preview builds of Windows 8. Since then, there have been several leaked images of supposedly new features that you might see in the next version of Windows when it launches (perhaps in early 2012). And Microsoft showed off some features in a preview last week. Here's a compilation..."
Link to Original Source
The Internet

EU Telecom Deal Finished — No Three Strikes 109

Posted by Soulskill
from the infield-fly-rule-still-applies-though dept.
a_n_d_e_r_s writes "The battle was hard, but the final text of the agreement ensures that people in the EU are not disconnected from the Internet without a chance to get a fair and impartial hearing beforehand. The important part is: 'Accordingly, these measures may only be taken with due respect for the principle of presumption of innocence and the right to privacy. A prior fair and impartial procedure shall be guaranteed, including the right to be heard of the person or persons concerned, subject to the need for appropriate conditions and procedural arrangements in duly substantiated cases of urgency in conformity with European Convention for the Protection of Human Rights and Fundamental Freedoms. The right to an effective and timely judicial review shall be guaranteed.' This means that if someone is accused of copyright infringement, they can't just be disconnected from Internet. It lets the accused get a chance to disagree and take it to court first. The urgency clause means that a computer can be disconnected if it is part of an ongoing DDoS attack. Next, this has to be implemented into the EU nations' own laws, so the final ruling on how this will be implemented is not out yet. But, overall, it looks like a great success in stopping informal three-strikes disconnections."
Space

+ - The tech aboard the International Space Station->

Submitted by CNETNate
CNETNate (1469133) writes "With its own file server for uploaded Hollywood blockbusters, a 10Mbps Internet connection to Earth and a stock of IBM ThinkPad notebooks for sending emails, the amount of consumer technology aboard the $150 billion International Space Station is impressive. Yet it's the responsibility of just two guys to maintain the uptime of the Space Station's IT, and they have given an in-depth interview with CNET to explain what tech's aboard, how it works and whether Windows viruses are a threat to the astronauts. In a related feature, the Space Station's internal network (which operates over just bandwidth of just1Mbps) and its connected array of Lenovo notebooks is explained, along with the future tech we could see aboard the traveling colony as it traverses the future."
Link to Original Source
Spam

+ - Facebook on Spammer Rampage->

Submitted by Anonymous Coward
An anonymous reader writes "Facebook is on a never before seen legal rampage against high profile internet spammers. Today Facebook was awarded yet another 9 figure settlement, this time for over $700 million dollars. Facebook also has a criminal contempt case on Wallace, which means a high likelihood of prison, a big win for the internet and a milestone in cyber law.

From the courts:
"The record demonstrates that Wallace willfully violated the statutes in question with blatant disregard for the rights of Facebook and the thousands of Facebook users whose accounts were compromised by his conduct," Fogel wrote in his judgment order, which permanently prohibits Wallace from accessing the Facebook Web site or creating a Facebook account, among other restrictions."

Link to Original Source
Software

+ - Software That Fixes Itself-> 1

Submitted by shreshtha
shreshtha (1609099) writes "Martin Rinard, a professor of computer science at MIT, is unabashed about the ultimate goal of his group's research: "delivering an immortal, invulnerable program." In work presented this month at the ACM Symposium on Operating Systems Principles in Big Sky, MT, his group has developed software that can find and fix certain types of software bugs within a matter of minutes."
Link to Original Source
Music

Singer In Grocery Store Ordered To Pay Royalties 645

Posted by samzenpus
from the silence-is-golden dept.
yog writes "An assistant at a grocery store in Clackmannanshire, Scotland, was ordered by the Performing Right Society (PRS) to obtain a performer's license and to pay royalties because she was informally singing popular songs while stocking groceries. The PRS later backed down and apologized. This after the same store had turned off the radio after a warning from the PRS. We have entered an era where music is no longer an art for all to enjoy, but rather a form of private property that must be regulated and taxed like alcohol. 'Music to the ears' has become 'dollars in the bank'."

Comment: Re: Licensed books (Score 4, Interesting) 488

by Stanislav_J (#29595373) Attached to: Company Uses DMCA To Take Down Second-Hand Software

A friend who sells books on eBay often sells used copies of the Jane's books (Jane's All the World's Aircraft, Jane's Fighting Ships, etc.), the annual editions of which sell new for $900+. He's listed many of these over the years, but recently out of nowhere he gets an inquisitory e-mail from Jane's, demanding that he inform them of the source from which he obtained the books, and strongly suggesting that he not list them anymore because the reduced prices he gets for resale are "diminishing the perceived value of our products." He was tempted to tell them what to stick where, but as he put it, "the next step may be legal, and right or wrong, I don't want to get into a transatlantic pissing match over this."

(So now, he sends any Jane's books he finds to me, I list them, and we split the profits. And no nastygrams from across the pond yet. Yay for me.)

A good example, though, of how even a legally misguided implied threat can intimidate someone. If my friend sold nothing but Jane's books, he'd be more inclined to fight, but he does a decent business without them, and just figures he'll avoid getting into something that he has neither the time or money to deal with.

Is a person who blows up banks an econoclast?

Working...