destinyland writes "An online music site has raised over $13,000 to hire a full orchestra to record royalty-free classical music. ('"Although the actual symphonies are long out of copyright, there is separate protection for every individual performance by an orchestra," notes one technology site.') MusOpen has reached their fundraising goal for both the orchestra and a recording facility, and will now record the complete symphonies of Beethoven, Brahms, Sibelius and Tchaikovsky. And because their fundraising deadline doesn't end until Tuesday, they've promised to add additional recordings for every additional $1,000 raised."
alexmipego writes "I'm a developer, and a few months ago while working on a common geodesic problem (distance between two GPS points) I started to research a new algorithm that greatly improves the performance over existing algorithms. After relearning a lot of math I'm now fairly close to the final algorithm, after which I'll run extensive benchmarks comparing my algorithm with the most commonly used ones. After spending so much time on this, and if the final results are positive, I feel that simply posting this type of work on a blog might not be the best option, so I'm looking into something more formal, like a research paper. I've no experience on those, have not even read a complete one, so my first question is what resources do you recommend to learn how to write one? And even after I write it, I can't expect to be published by Science or other high-profile publications. So where should I send it to make it known by people in the respective fields and be taken seriously?"
Competition Pro, what else? OK, there was the blue one with silver buttons, but it never lived up to the original red/black one...
It was during my traEMS education, around 1996 that I was told to always squeeze the umbilical cord between two fingers in order to empty it and transfer all blood in it to the child before clamping and cutting it...
agrif writes "Shorah b'shemtee! Uru Live has been released for free, as a first step towards opening its source. This game, an MMO released by the makers of Myst and Riven in 2003, has been canceled, zombified, resurrected, canceled again, and is now about to be released as open source to its dedicated fan base. Massively has written a brief newbie guide if you're unfamiliar with the game."
darthcamaro writes "Remember Conficker? April first doom and gloom and all? Well apparently after infecting over five million IP addresses, it's now an autonomous botnet working on its own without any master command and control. Speaking at the Black Hat/Defcon Hat security conference in Las Vegas, Mikko Hypponen, chief research officer at security firm F-Secure, was told not to talk in detail about the Conficker gang — the problem is that not all researchers were under the same gag order. Just ask Roel Schouwenberg, senior anti-virus researcher at security firm Kaspersky, who says 'The Conficker botnet is autonomous; that is very strange in itself that they made Conficker replicate by itself. Now it seems like the authors have abandoned the project, but because it is autonomous, it can do whatever it wants and it keeps on trying to find new hosts to infect.'"
A week after Microsoft agreed to include a browser ballot screen in Windows 7 systems sold in Europe, then announced that those systems would initially include no browser at all — specifically, no Internet Explorer — Microsoft has changed its mind again and dropped talk of a European Windows 7 E edition. Here is the official Microsoft blog announcement, which includes a screen shot of the proposed ballot screen. The browsers are listed left-to-right in order of market share, with IE therefore having pride of place. PC Pro notes that, since the ballot screen would not appear if IE were not pre-installed, Microsoft's proposal opens the door for Google to work with PC manufacturers to get Chrome on new machines. Note that the browser ballot screen has not yet been accepted by the EU, though the initial reaction to it was welcoming.
metrix007 points out a story in the Sunday Express with more surveillance-camera madness from the UK, where the government now wants to place 20,000 CCTV cameras to monitor families ("the worst families in England") within their own homes, to make sure that "kids go to bed on time and eat healthy meals and the like. This is going too far, and hopefully will not pass. Where will it end?"
mattOzan writes with this excerpt from H-online: "At Black Hat USA 2009, Austrian IT security specialist Peter Kleissner presented a bootkit called Stoned which is capable of bypassing the TrueCrypt partition and system encryption. The bootkit uses a 'double forward' to redirect I/O interrupt 13h, which allows it to insert itself between the Windows calls and TrueCrypt."
Anonymouse writes with this excerpt from SemiAccurate: "Apple keyboards are vulnerable to a hack that puts keyloggers and malware directly into the device's firmware. This could be a serious problem, and now that the presentation and code (PDF) is out there, the bad guys will surely be exploiting it. The vulnerability was discovered by K. Chen, and he gave a talk on it at Black Hat this year (PDF). The concept is simple: a modern Apple keyboard has about 8K of flash memory, and 256 bytes of working RAM. For the intelligent, this is more than enough space to have a field day. ... The new firmware can do anything you want it to. Chen demonstrated code which, when you put in a password and hit return, starts playing back the last five characters typed in, LIFO. It is a rudimentary keylogger; a proof of concept more than anything else. Since there is about 1K of flash free in the keyboard itself, you can log quite a few keystrokes totally transparently."
The underlying problem with this law is not limited to Germany: The list of what's to be censored is secret and solely controlled by the German federal police. No one can see this list (after all, it contains links to CP). This is almost the same as the french HADOPI law, where no judge was to be asked and no judgement necessary, before they cut your internet connection (while obliging you to still pay for it)...
TheTinyToon writes that by a vote of 389 to 128, "the proposed censorship law to block child porn has been passed by the German government. Not surprisingly, a member of the conservative party (CDU) announced plans to also check if the law could be extended to include so-called 'killer games' like Counterstrike, only two hours after the law was passed. More [in German] on netzpolitik.org."
An anonymous reader writes "Michael Geist summarizes an important new study on file sharing from economists Felix Oberholzer-Gee and Koleman Strumpf. The Harvard Business School working paper finds that given the increase in artistic production along with the greater public access conclude that 'weaker copyright protection, it seems, has benefited society.' The authors point out that file sharing may not result in reduced incentives to create if the willingness to pay for 'complements' such as concerts or author speaking tours increases."
lothos and several other readers let us know that the Public Interest Registry has announced the key-signing key to validate the signatures on the ORG zone. A few more details are on the PIR DNSSEC page. PC World interviewed PIR CEO Alexa Raad and writes: "On June 2, PIR will announce that it is signing the .org domain with NSEC3 and that it has begun testing DNSSEC with a handful of registrars using first fake and then real .org names. PIR plans to keep expanding its testing over the next few months until the registry is ready to support DNSSEC for all .org domain name operators. Raad says she expects full-blown DNSSEC deployment on the .org domain in 2010."
el americano writes "Flight Simulator community website Avsim has experienced a total data loss after both of their online servers were hacked. The site's founder, Tom Allensworth, explained why 13 years of community developed terrains, skins, and mods will not be restored from backups: 'Some have asked whether or not we had back ups. Yes, we dutifully backed up our servers every day. Unfortunately, we backed up the servers between our two servers. The hacker took out both servers, destroying our ability to use one or the other back up to remedy the situation.'"