Forgot your password?
typodupeerror
Science

Entanglement Could Be a Deterministic Phenomenon 259

Posted by kdawson
from the playing-dice dept.
KentuckyFC writes "Nobel prize-winning physicist Gerard 't Hooft has joined the likes of computer scientists Stephen Wolfram and Ed Fredkin in claiming that the universe can be accurately modeled by cellular automata. The novel aspect of 't Hooft's model is that it allows quantum mechanics and, in particular, the spooky action at a distance known as entanglement to be deterministic. The idea that quantum mechanics is fundamentally deterministic is known as hidden variable theory but has been widely discounted by physicists because numerous experiments have shown its predictions to be wrong. But 't Hooft says his cellular automaton model is a new class of hidden variable theory that falls outside the remit of previous tests. However, he readily admits that the new model has serious shortcomings — it lacks some of the basic symmetries that our universe enjoys, such as rotational symmetry. However, 't Hooft adds that he is working on modifications that will make the model more realistic (abstract)."
Privacy

+ - Tracking you by your P rather than IP->

Submitted by
An anonymous reader writes "Mass spec has great promise for all sorts of scientific problems. This study in Oregon shows tracking your sewage output is entirely feasible. I would imagine that the public domain here goes right up to most people's houses? While a municipal test seems innocuous, that would easily lead to a neighborhood sample, to a street sample to a house sample. Better get back to P'ing in the bushes I guess.

http://www3.interscience.wiley.com/journal/122512185/abstract"

Link to Original Source
Security

+ - UK national ID card cloned in 12 minutes-> 1

Submitted by
Death Metal
Death Metal writes "The prospective national ID card was broken and cloned in 12 minutes, the Daily Mail revealed this morning.

The newspaper hired computer expert Adam Laurie to test the security that protects the information embedded in the chip on the card.

Using a Nokia mobile phone and a laptop computer, Laurie was able to copy the data on a card that is being issued to foreign nationals in minutes."

Link to Original Source
Security

+ - Conficker frenzy exposed media ignorance->

Submitted by Slatterz
Slatterz (666) writes "Calling the panic over the virus an "April fool's joke", security researcher Bruce Schneier says it was a classic example of how the mainstream news media misunderstood the threat from malware and used it to make news to the detriment of security. "It appeared to come from nowhere, it had a funny-sounding name — and research shows unusual names provoke fear — and it came on a 'magic' date. But it was the classic boy who cried wolf story," Schneier said. Fr all the media frenzy, the malware didn't even itself on April 1st. Instead it did so five days later, by which time the media had forgotten the story. Schneier said that such cases may have helped vendors sell more security products but in some ways they made the situation worse, since people became inured to virus stories and this might lead them to ignore future warnings."
Link to Original Source
Microsoft

+ - Young Bill Gates' First Demo Disaster

Submitted by
theodp
theodp writes "Thanks to an excerpt from an upcoming book by Bill Gates Sr., TechFlash says it now knows why Bill Gates stays so calm on stage whenever Microsoft's product demos run into trouble: He had plenty of experience with such things, starting at an early age. Young 'Trey' managed to persuade employees of the City of Seattle to come to his parents' house for a demo of his and Paul Allen's Traf-O-Data software, but the first live demo of his system failed. So how did Bill react? He ran into the kitchen, shouting on the way, 'Mom! Mom! Come and tell them that it worked!' Let he who is without demo sin cast the first stone."
Microsoft

+ - Microsoft Already Starting on Windows 8->

Submitted by suraj.sun
suraj.sun (1348507) writes "According to a job posting on Microsoft's site, the company is starting to put its engineering team together for designing the successor to Windows 7. The job posting details of a storage related position with focus in the enterprise:

"For the upcoming version of Windows, new critical features are being worked on including cluster support and support for one way replication. The core engine is also being reworked to provide dramatic performance improvements. We will also soon be starting major improvements for Windows 8 where we will be including innovative features which will revolutionize file access in branch offices."

If you've got what it takes to be the "Lead Software Development Engineer in Test," apply right here:

Microsoft : http://members.microsoft.com/careers/search/details.aspx?JobID=524FE97F-DB02-4501-AD0E-8CCAF1719BB3"

Link to Original Source
Security

+ - Googlebot attacks 1

Submitted by JWSmythe
JWSmythe (446288) writes "It looks like Google's Googlebot's have been exploited.

    Today I noticed a surge in our server load. I had a look at our access logs, and found tens of thousands of requests like this. This is one from my Apache logs. (lines broken intentionally)

66.249.71.99 — -- [16/Apr/2009:18:16:51 -0400] "GET /mobile.story.php?sid=19365'%20and%201=2%20union%20select%201,
CONCAT(char(118),char(97),char(114),char(99),char(104),char(97),
char(114),char(39),char(124),(SELECT%20column_name%20%20from
%20information_schema.COLUMNS%20where%20table_schema=
CONCAT(char(100),char(117),char(98),char(116),char(101),
char(114),char(114),char(111),char(114))%20and%20table_name=
CONCAT(char(112),char(104),char(112),char(98),char(98),char(95) ,char(117),char(115),char(101),char(114),char(115))
%20limit%2011850,1),char(124),char(39)),3,4,5,6,7,8,9%20and
%20'1'='1 HTTP/1.1" 200 1342 "-" "Nokia6820/2.0 (4.83)
Profile/MIDP-1.0 Configuration/CLDC-1.0 (compatible;
Mediapartners-Google/2.1; +http://www.google.com/bot.html)"

It's a good thing my site is coded well. These sort of things don't get anywhere.

Parts of the request may be spoofed, but the IP is awful hard to spoof. That's a Googlebot IP.

The heaviest offender is an IP in China, with 48k requests. Google owns the rest.

My list of attackers from the last two hours are:

    48368 113.232.73.2
    22032 66.249.71.99
            2 66.249.71.21
            2 66.249.67.179
            2 66.249.66.244
            2 66.249.66.206
            1 66.249.73.37
            1 66.249.73.106
            1 66.249.72.139
            1 66.249.72.136
            1 66.249.71.134
            1 66.249.71.108
            1 66.249.70.75
            1 66.249.70.59
            1 66.249.70.248
            1 66.249.70.219
            1 66.249.70.193
            1 66.249.67.118
            1 66.249.65.83
            1 66.249.65.110
            1 66.249.65.109

    If anyone has any suggestion who could be masquerading as Google from their own IP's, that would be nice. I've blocked the offensive IP's at our firewall, so they are nothing more than a gnat buzzing at the door."
Education

+ - Snow Drift Game Replaces Prisoner's Dilemma->

Submitted by
eldavojohn
eldavojohn writes "It's a well known situation and one often studied in everything from behavioral sciences to artificial intelligence. It involves the idea that cooperation is promoted by two or more individuals working together to achieve a return greater than working for their own interests. Scientists are now leaning toward the iterated snow drift game (ISD) replacing the iterated prisoner's dilemma (IPD) to accurately model what humans experience in real life. Essentially it removes the defective partner risk that is inherent in the IPD situation. If you are fingered by your friend while in separate interrogation rooms while you claim that both you and your friend are innocent, the outcome is much worse. In the ISD, your idle partner does not negate points from your efforts to work together — it just doesn't add anything either."
Link to Original Source
Software

+ - 10 things to know about software jobs->

Submitted by
prostoalex
prostoalex writes "Apple Matters blog gives aspiring software developers 10 pieces of advice. Never stop learning. Most of the stuff you learned in college is irrelevant. You won't make friends right away, and you'll definitely meet insecure people who'll be mean to you for no reason. Make friends with IT — nothing moves a hardware request faster than personal relationship."
Link to Original Source

Save yourself! Reboot in 5 seconds!

Working...