puddingebola writes "From the article, "The Pentagon cleared Apple Inc. (AAPL) devices for use on its networks, setting the stage for the maker of iPhones and iPads to compete with Samsung Electronics Co. and BlackBerry for military sales. The Defense Department said in a statement today that it has approved the use of Cupertino, California-based Apple’s products running a version of the iOS 6 mobile platform. The decision eventually may spur a three-way fight for a market long dominated by Waterloo, Ontario-based BlackBerry.""Link to Original Source
sciencehabit writes "Archaeologists have long debated when early humans began hurling stone-tipped spears and darts at large prey. By throwing a spear, instead of thrusting it, humans could hunt buffalo and other dangerous game from a safe distance, with less risk of a goring or mauling. But direct evidence of this hunting technique in early sites has been lacking. A new study of impact marks on the bones of ancient prey shows that such sophisticated killing techniques go back at least 90,000 years ago in Africa and offers a new method of determining how prehistoric hunters made their kills."Link to Original Source
hypnosec writes "IBM is taking its COBOL server platform to the next level by updating the mainframe platform in a bid to extend and enable its mainframes to host cloud based applications and services. The latest update is looking to add XMLS Server as well as Java 7 capabilities to the System/z COBOL platform and this update would extend the overall lifespan of COBOL by taking it up a notch and gearing it towards the cloud computing arena."Link to Original Source
Velcroman1 writes "Just when you thought the strange story of John McAfee was over.The former island home of anti-virus software pioneer John McAfee burned down Thursday afternoon under circumstance he told FoxNews.com were “suspicious.” It’s an odd choice of words from a man whom the Belize police found suspicious, following the November 2012 murder of American expatriate Gregory Faull, a well-liked builder from Florida who was shot at his home in San Pedro Town on the island of Ambergris Caye. “I believe that there are a select few with great power in Belize that will go to great lengths to harm me,” McAfee said. “This fire was not just a strange coincidence.""Link to Original Source
Madwand writes "The NetBSD Project is pleased to announce NetBSD 6.1, the first feature update of the NetBSD 6 release branch. It represents a selected subset of fixes deemed important for security or stability reasons, as well as new features and enhancements.
NetBSD is a free, fast, secure, and highly portable Unix-like Open Source operating system. It is available for a wide range of platforms, from large-scale servers and powerful desktop systems to handheld and embedded devices. Its clean design and advanced features make it excellent for use in both production and research environments, and the source code is freely available under a business-friendly license. NetBSD is developed and supported by a large and vibrant international community. Many applications are readily available through pkgsrc, the NetBSD Packages Collection."Link to Original Source
girlmad writes "Despite moves by government to get Google, Amazon and Apple to admit they make sales in the UK and US, and therefore should pay tax on these earnings, this article argues these are empty threats and that any taxes paid will get returned to the tech giants in government grants and subsidies. Tough luck to the small firms out there."Link to Original Source
GoJays writes "An 18 year old from Saratoga California has won an international science fair for creating an energy storage device that can be fully juiced in 20 to 30 seconds.
The fast-charging device is a so-called supercapacitor, a gizmo that can pack a lot of energy into a tiny space, charges quickly and holds its charge for a long time.
What's more, it can last for 10,000 charge-recharge cycles, compared with 1,000 cycles for conventional rechargeable batteries, according to the inventor Eesha Khare."Link to Original Source
hypnosec writes "Unauthorized access attempt of Yahoo! Japan portal may have led to theft of up to 22 million user IDs, Yahoo has revealed. There has been no information about leaks of such a massive database of user IDs as yet and according to Yahoo, the information that was stolen didn’t have passwords or any other information that would allow unauthorized users to carry out user identity verification. Yahoo hasn’t ruled out the possibility of a leak though considering the volume of traffic it noticed flowing from its servers to external entities."Link to Original Source
benrothke writes "Title: Locked Down: Information Security for Lawyers
Authors: Sharon Nelson, David Ries, John Simek
Publisher: American Bar Association
Reviewer: Ben Rothke
Overview: Required reading for all lawyers
Had Locked Down: Information Security for Lawyersnot been published by the American Bar Association (ABA) and 2 of its 3 authors not been attorneys; one would have thought the book is a reproach against attorneys for their obliviousness towards information security and privacy. In numerous places, the book notes that lawyers are often clueless when it comes to digital security.
With that, the book is a long-overdue and valuable information security reference for anyone, not just lawyers.
Such a title is needed as the legal field has embraced digital technology for nearly every aspect of the legal field, has magazines and conferences about legal technology and much more. Wireless (often insecure) networks are pervasive in corporate offices throughout legal America.
The underlying problem is that while attorneys often know the intricacies of tort law, court proceedings and the like; they are utterly unaware of the information security and privacy risks surrounding the very technologies they are using. In many firms, the lawyers think that someoneis protecting their data, but don't understand theirrequirements around those areas of data protection.
Legal IT systems are a treasure trove of personal data. Many small law firms are extremely attractive to identity thieves gives their systems have significant amount of personal information via social security numbers, credit card information, birth dates, financial information and much more. Small law firms are notorious for weak information security controls and attackers will scan those systems and networks for vulnerabilities.
A pervasive aspect of the book is ABA rule 1.6 regarding the confidentiality of information regarding client-lawyer relationships. The rule requires that a lawyer not reveal information relating to the representation of a client unless the client gives informed consent. The lawyer though can reveal information relating to the representation of a client to the extent the lawyer reasonably believes necessary. The myriad details of 1.6 can be left to the bar association to enforce, suffice to say that a lawyer can find themselves on the wrong side of the law if they are not careful with information security controls.
The authors note that although lawyers are all well aware of rule 1.6, the challenge is how to keep client data secure in the digital age. In a world of paper, things were much easier and cheaper This is why the authors note that so many otherwise competent layers fails so miserably in reference to their duty to maintain the confidentiality of digital client data.
The book quotes an ABA 2011 technology survey in which 21% of large law firms reported that their firm had experiences some sort of security breach, and 15% of all firms reported that they suffered a security breach. It is figures like those which show that attorneys really need to read this book and take the information to heart.
The books 17 chapters are in a readable 150 pages, with an additional 120 pages of appendices. Written in an easily understandable style and non-technical for the technologically challenge lawyer.
When it comes to the security of client data, in chapter 4 the authors write that encryption is a topic that most attorneys don't want to touch with a ten-foot pole. But it has reached a point where attorneys must understand how and when encryption should be used. Just as important, they need to know about key managements, and what good encryption is. The chapter provides a high-level detail on what needs to be done regarding encryption.
Chapter 13 is on secure disposal, is an important topic to everyone, and not just lawyers. Digital media needs to be effectively disposed of; and for many lawyers, they often think that means reformatting a hard drive or simply erasing files. The chapter effectively details the issues and offers numerous valuable hardware and software-based solutions.
Chapter 14 on outsourcing and cloud computingis an area where too many attorneys are oblivious to of the security and privacy risks. For example, the authors advise attorneys against the use of the free Gmail service since the terms of service allow Google to do anything it wants with the data. That opens a Pandora's Box when it comes to securing client data. The authors advise to use premium Google business versions, so attorneys can stay in control of their data with added security and privacy features.
Two omissions in chapters 13 and 14 are that the authors don't reference NAID(National Association for Information Destruction) or the CSA(Cloud Security Alliance (CSA).
Firms that outsource their digital disposal to non-NAID certified firms run the risk of having a glorified recycler do their work. As to NAID, it is an international trade association for companies providing information destruction services. NAIDs mission is to promote the information destruction industry and the standards and ethics of its member companies; while the mission of the CSA is to promote the use of best practices for providing security assurance within cloud computing and to provide education on the uses of cloud computing to help secure all other forms of computing.
The authors include many real-world stories and case law to reinforce their point.
The book closes with a number of appendices on various rules from the FTC, state information protection regulations, the SANS Institute glossary of security terms and more.
For the lawyer looking for an easy to read introduction to nearly everything they need to know about information security and privacy, the bookis a great resource.
The book closes with the note that since lawyers have an ethical duty to protect their client's data, they have no choice but to keep themselves as well educated as possible.
For the attorney that wants to ensure their requirements remain current and are looking for an easy to read introduction about information security and privacy Locked Down: Information Security for Lawyersshould be considered required reading.
About the reviewer: Ben Rothke."
russotto writes "Despite all the talk of "skills gap" and "tech worker shortage", wages for the software industry are falling, not rising. Wages fell 2% to $99,000 in 2012. Correct me if I'm wrong, but doesn't basic economics state that if wages are falling, there must be a surplus, not a shortage?"Link to Original Source
Nerval's Lobster writes "While many data center managers and administrators are paying lip service to being “green,” i.e. doing everything they can to reduce power consumption and costs, the fact is most are still not stepping up to be accountable. That’s the findings of a survey from the Uptime Institute, released this week at the group’s Symposium conference in Santa Clara, Calif., which suggests something it calls “green fatigue” is setting in when it comes to making data centers greener. “Green fatigue” is exactly as it sounds: managers are getting tired of the increasingly difficult race to chop their PUE, or Power Usage Effectiveness. The PUE is a measure of a data center’s efficiency. The lower the PUE, the better—and Microsoft and Google, with nearly limitless resources, have set the bar so high (or low, depending on your perspective) that it’s making less-capitalized firms frustrated. Just a few years ago, the Uptime Institute estimated that the average PUE of a data center was around 2.4, which meant for every dollar of electricity to power a data center, $1.4 dollars were spent to cool it. That dropped to 1.8 recently, an improvement to be sure. But then you have companies such as Google and Microsoft building data centers next to rivers for cheap hydroelectric power in remote parts of the Pacific Northwest and reporting insanely low PUEs (below 1.1 in some cases). The Institute latest survey of data center operators shows only 50 percent of respondents in North America said they considered energy efficiency to be very important to their companies, down from 52 percent last year and 58 percent in 2011."Link to Original Source