Crime

FBI Prioritizes Copyright Over Missing Persons 372

An anonymous reader writes "The FBI has limited resources, so it needs to prioritize what it works on. However, it's difficult to see why dealing with copyright infringement seems to get more attention than identity theft or missing persons. In the past year, the FBI has announced a special new task force to fight intellectual property infringement, but recent reports have shown that both identity theft and missing persons have been downgraded as priorities by the FBI, to the point that there are a backlog of such cases."
Image

Beautiful Data Screenshot-sm 18

eldavojohn writes "Beautiful Data: The Stories Behind Elegant Data Solutions is an addition to six or so other books in the 'Beautiful' series that O'Reilly has put out. It is not a comprehensive guide on data but instead a glimpse into success stories about twenty different projects that succeeded in displaying data — oftentimes in areas where others have failed. While this provides, for the most part, disjointed stories, it is a very readable book compared to most technical books. Beautiful Data proves to be quite the cover-to-cover page turner for anyone involved in building interfaces for data or the statistician at a loss for the best way to intuitively and effectively relay knowledge when given voluminous amounts of raw data. That said, it took me almost two months to make it through this book, as each chapter revealed a data repository or tool I had no idea existed. I felt like a child with an attention deficit disorder trying my hand at nearly everything. While the book isn't designed to relay complete theory on data (like Tufte), it is a great series of short success stories revolving around the entire real world practice of consuming, aggregating, realizing and making beautiful data." Keep reading for the rest of eldavojohn's review.
Image

Plone 3 Multimedia Screenshot-sm 31

Trevor James writes "Plone 3 Multimedia is an excellent book focusing on adding multimedia including images, audio and video files to a Web site built using the Plone 3 CMS. Overall this book has a nice balance and mix of text, screenshots and code. I recommend the book for Plone power users including Plone developers and users who want to enhance and expand their core Plone multimedia arsenal. You'll get more out of this book if you already have a Plone site running but want to add more multimedia based capabilities to it." Read on for the rest of Trevor's review.
Earth

Quantifying, and Dealing With, the Deepwater Spill 343

Gooseygoose writes with a link to this analysis by Boston University professor Cutler Cleveland. "Some reports in the media attempt to downplay the significance of the release of oil from the Deepwater Horizon accident by arguing that natural oil seeps release large volumes of oil to the ocean, so why worry? Let's look at the numbers." Read on for a few more stories on the topic of the Deepwater Horizon spill.
Biotech

Stem Cell Patent Halts Hospital's Collection 223

eldavojohn writes "It's a classic case that comes up when dealing with patents. A hospital's research on the donated brains of deceased children has been in limbo for three years because of a challenge from a patent holder. The double-edged sword of patents that spurred investment into the field will also cause chilling effects on research like the case of the Children's Hospital of Orange County. They've now been forced to shift the money from the lab to lawyers in order to deal with this ongoing patent dispute over a technique that was developed to extract stem cells at the Salk Institute. Unfortunately the Salk Institute failed to patent the technology, so a company named StemCells happily had it approved. The real disheartening news is that CHOC's Dr. Philip H. Schwartz — the doctor collecting the cells — was one of the original researchers who helped developed this technique at the Salk Institute. Now he can't even use the technique he helped create. Schwartz has since been instructed not to publicly discuss the case further. Research interests are clashing with commercial interests in a classic case that causes one to wonder if patents surrounding medical techniques like this stretch too far. As for the people that donated their dead child's brain to research, those valuable stem cell cultures have been kept in storage instead of being disseminated to research labs (which desperately need them) across the country."
Image

Programming Clojure Screenshot-sm 109

eldavojohn writes "Programming Clojure by Stuart Halloway was very near to the perfect book for me. It covers many things common to many Lisp languages while highlighting in moderate detail the things that make Clojure unique and worthy of some attention. The book spends a large amount of time dealing with the intricacies of interfacing fluidly with Java (down to a package rewrite inside a large project). This fits me perfectly as a Java programmer, and I now feel ready to experiment with peppering functional language capabilities into an object oriented language. The book also strives to show how to simplify multithreading through functional programming, which is good because I find multithreading in Java a serious headache that few are good at. Programming Clojure, released in May 2009, is currently the only book out there devoted to Clojure, and the introduction is written by the language's creator, Rich Hickey, who says, 'What is so thrilling about Stuart's book is the extent to which he "gets" Clojure.' The book earns its place on the Pragmatic Bookshelf by guiding the user through rewriting a part of Ant into a new build tool called Lancet — adding to the project what you just learned about Clojure at the end of each chapter." Keep reading for the rest of eldavojohn's review.
The Internet

Telecom Plan To Take Over the Internet Isn't Real 89

wiredog writes "The Telcos' Secret Anti-Net Neutrality Strategy is actually a student project. The 'No Net Brutality' campaign idea was one of the four finalists created as an assignment for a two-and-a-half week 'think tank MBA' program. The other finalists were a project promoting free speech in Venezuela, one supporting education reform in Poland, and one dealing with sales tax rates in Washington, DC. ('No Net Brutality' came in third. The Polish reform idea won.)"
Google

Google Attorney Slams ACTA Copyright Treaty 157

Hugh Pickens writes "CNET reports that Daphne Keller, a senior policy counsel at Google, says ACTA has 'metastasized' from a proposal to address border security and counterfeit goods to a sweeping international legal framework for copyright and the Internet that could increase the liability for Internet intermediaries such as, perhaps, search engines. 'You don't want to play Russian roulette with very high statutory damages.' One section of ACTA says that Internet providers 'disabling access' to pirated material and adopting a policy dealing with unauthorized 'transmission of materials protected by copyright' would be immune from lawsuits but if they choose not to do so, they could face legal liability. Both the Obama administration and the Bush administration had rejected requests for the text of ACTA, with the White House last year even indicating that disclosure would do 'damage to the national security.'"
Image

The Laidoff Ninja Screenshot-sm 237

walmass writes "My first reaction on seeing the book was, 'Oh no, another book with "Ninja" in the title.' But in this case, the authors have established a case for that: they explained that the first ninjas were peasants who could not take the abuse from the samurai anymore and how they used everyday objects as weapons." Keep reading to see what walmass has to say.
Crime

Starting an International Cybersecurity Conversation 51

crimeandpunishment writes "Every government in the world is dealing with cybercrime, but they're all doing it on their own. In the context of 'cyberwar' saber-rattling on all sides, getting governments to share information is a challenge. But an international security conference this week in Dallas is aimed at doing just that — even if only on an informal basis."
Programming

Joomla! 1.5 Multimedia 36

Sparky Anduril writes "In this book author Allan Walker writes to inform Joomla! website administrators and developers how to enrich their websites with the inclusion of multimedia. And be in no doubt, this book is not for novices. A decent understanding of Joomla! will be required for you to benefit from this book. But all-in-all, whether you are an experienced Joomla! administrator but fear to go where multimedia gremlins tread, or someone with knowledge of video and audio but having little idea how to integrate that into your Joomla! website, this book will give you a solid understanding and ability to enable you to embed multimedia in your website using a range of techniques and Joomla! extensions." Read on for the rest of Sparky's review.
Censorship

Google Enumerates Government Requests 216

D H NG writes "In the aftermath of Google's exit from mainland China, it had sought to be more open about what it censors. Google has launched a new tool to track the number of government requests targeted at Google and YouTube. These include both requests for data and requests to take down data. A quick look at the tool shows that Brazil is the top country in both categories (largely because Orkut is popular there), and information for China cannot be disclosed because 'Chinese officials consider censorship demands as state secrets.' As part of its four-part plan, Google hopes to change the behavior of repressive governments, establish guiding principles for dealing with issues of free expression, build support online to protest repression, and better provide resources and support for developing technology designed to combat and circumvent Internet censorship."
GUI

What Is the Future of Firewalls? 414

jlmale0 writes "When I mess with my WAP/router at home or coordinate with the network team at work, it seems like I'm stuck in 1995. We're still manually listing IP address/port combinations for our firewall rules. There's a certain simplicity to this when dealing with a single system, but there are firewalls everywhere these days. What's available for managing complex firewall arrangements? What's being developed? Can I take a Visio diagram, run it through a script, and get a list of firewall rules? What about a GUI that illustrates the current system configuration and then lets me drag and drop systems across firewalls, and have the individual firewall ports automatically configured? What about tying a firewall into an authentication system so that when jdoe logs in, only then are the firewalls opened to pass her traffic? What about managing distributed firewalls so that one repository of rules opens up your system's firewalls, the DMZ firewall, and the public firewall all at once? Let's get a conversation started. What cool projects do I need to know about? What cool management features would you like to see? What's next for firewall management?"
Censorship

Thailand Cracks Down On Twitter, Facebook, Etc. 130

An anonymous reader writes "The ongoing poitical turmoil in Thailand has inspired the country's Ministry of Information, Computers, and Telecommunications to issue a stern warning that all users of the Internet in Thailand must 'use the internet in the right way or with appropriate purpose and avoid disseminating information that could create misunderstanding or instigate violent actions among the public', that 'all popular websites and social networks such as facebook, twitter, hi5 and my space [sic] will be under thorough watch,' and that 'Violators will be prosecuted by law with no compromise.' Thailand has draconian anti-lèse majesté laws which are routinely abused in order to settle political scores and silence dissent, and recently implemented a so-called 'Computer Crimes Act' which appears to be almost solely focused on thoughtcrimes and censorship, rather than dealing with, you know, actual crime. Several Web forums have recently been shut down, their operators charged because they failed to delete 'harmful posts' quickly enough to suit the Thai authorities."
Image

AdvancED Flash On Devices Screenshot-sm 34

chuckbatfuturewaredc writes "Flash's ubiquity is in its presence on the vast majority of PC desktops, laptops and netbooks. It is also in a surprising, and growing, percentage of mobile devices. Software developers who want to tap this rapidly expanding market face many challenges that have not existed in the PC world for quite some time. This book is virtually encyclopedic in its review of the pitfalls and dangers for mobile development and how they can be avoided, even for the iPhone. It provides rich information detail on how to address mobile software development now, along with a preview of how it can be done more easily when what is in the oven finishes baking." Keep reading for the rest of chuckbatfuturewaredc's review.
Crime

Why Lenders Overlook Warning Signs of ID Theft 225

Hugh Pickens writes "Despite all the new fraud alert tools and increased awareness of the perils of identity theft, incidence of the crime remains at 2003 levels, with about 10 million Americans falling victim every year. Now the NY Times reports that there may be a simple reason for the persistence of ID theft: lenders are too willing to extend credit to just about anybody, even when there are big red flags that indicate fraud. Chris Jay Hoofnagle at UC Berkeley worked with a small sample of six ID theft victims and delved into how they were defrauded. Of 16 applications presented by imposters to obtain credit or medical services, almost all were rife with errors that should have suggested fraud — yet in all 16 cases, credit or services were granted anyway. 'Identity theft remains so prevalent because it is less costly to tolerate fraud,' writes Hoofnagle. 'Adopting more aggressive and expensive anti-fraud measures is extremely costly and jeopardizes customer acquisition efforts.' Hoofnagle says business decisions leave individuals and merchants with some of the externalities of identity theft as victims spend their own money, and more often, valuable personal time dealing with the problem. Hoofnagle suggests that lenders contribute to a fund that will compensate victims for the loss of their time in resolving their ID theft problems."
Image

British Prisons Help Addicts Relapse Before Re-Entering Society Screenshot-sm 44

A new government "retoxification" program is helping formerly drug-addicted inmates get hooked back on drugs before being released to help avoid accidental overdoses. From the article: "Thirty-three prisons across England offer highly addictive heroin substitutes like methadone to inmates, even if their sentences mean they are effectively drug-free at the time of their release. Supporters claim it gets former addicts' bodies used to drugs again by building up tolerance and slashing the risk of overdose deaths. Critics blast it as 'state-sponsored' drug dealing." I'm surprised they don't give robbers a complimentary get-away car upon release to help alleviate future auto thefts.
The 2000 Beanies

Battlefield Earth Screenwriter Accepts Razzie 295

An anonymous reader writes "The New York Post has a story about J.D. Shapiro, and his gracious acceptance of a Razzie award for writing Battlefield Earth. He first offers an apology to anyone who has seen it, then he offers a funny, outsider's perspective of dealing with Scientologists, and the subsequent mangling of his script for what was once allegedly referred to by John Travolta as 'The Schindler's List of Sci-Fi.'"
Government

Every British Citizen To Have a Personal Webpage 313

Hugh Pickens writes "The Telegraph reports that British Prime Minister Gordon Brown is about to announce that within a year everyone in Great Britain will be given a personalized webpage for accessing Government services as part of a plan to save billions of pounds by putting all public services online. The move could see the closure of job centers and physical offices dealing with tax, vehicle licensing, passports and housing benefits within 10 years as services are offered through a single digital gateway. [This] 'saves time for people and it saves money for the Government — the processing of a piece of paper and mailing it back costs many times more than it costs to process something electronically,' says Tim Berners-Lee, an advisor to the Prime Minister. However, the proposals are coming under fire from union leaders who complain that thousands of public sector workers would be made jobless and pointed to the Government's poor record of handling personal data. 'Cutting public services is not only bad for the public who use services but also the economy as we are pushing people who provide valuable services on the dole,' says one union leader."

Slashdot Top Deals