CWmike writes "Google confirmed on Tuesday that it has ported part of QuickOffice to a technology baked into Chrome OS and the company's Chrome browser. The popular iOS and Android app substitute for Microsoft Office that Google acquired last year will run using 'Native Client,' a technology that lets developers turn applications written in C and C++ — originally intended to run in, say, Windows. With that it will execute entirely within a browser, specifically Google's own Chrome. Google claims that Native Client code runs almost as fast inside the browser as the original did outside. QuickOffice viewers come bundled with the $1,300 Chrome OS-based Chromebook Pixel notebook, and Google will add editing functionality in the next two to three months. Does this all make the Pixel make more sense?"
Trailrunner7 writes "In the current climate of continuous attacks and intrusions by APT crews, government-sponsored groups and others organizations, cryptography is becoming less and less important, one of the fathers of public-key cryptography said Tuesday. Adi Shamir, who helped design the original RSA algorithm, said that security experts should be preparing for a 'post-cryptography' world. 'I definitely believe that cryptography is becoming less important. In effect, even the most secure computer systems in the most isolated locations have been penetrated over the last couple of years by a series of APTs and other advanced attacks,' Shamir said during the Cryptographers' Panel session at the RSA Conference today. 'We should rethink how we protect ourselves. Traditionally we have thought about two lines of defense. The first was to prevent the insertion of the APT with antivirus and other defenses. The second was to detect the activity of the APT once it's there. But recent history has shown us that the APT can survive both of these defenses and operate for several years.""
New submitter ThatsNotPudding writes "The U.S. Supreme court has rejected pleas to allow any challenges to the FISA wiretapping law unless someone can prove they've been harmed by it. 'The Foreign Intelligence Surveillance Act, or FISA, was originally designed to allow spying on the communications of foreign powers. But after the September 11 attacks, FISA courts were authorized to target a wide array of international communications, including communications between Americans and foreigners. ... In this case, the plaintiffs' groups said their communications were likely being scooped up by the government's expanded spying powers in violation of their constitutional rights. Today's decision, a 5-4 vote along ideological lines by the nation's highest court, definitively ends their case. In an opinion (PDF) by Justice Samuel Alito, the court ruled that these groups don't have the right to sue at all, because they can't prove they were being spied on.'" Further coverage at SCOTUSblog.
dp619 writes "Penn State law professor Clark Asay has written an editorial on F/OSS patent risk, saying, '...under the current patent system, it's entirely possible to obtain a patent that reads on software that FOSS communities independently create. Consequently, FOSS communities and their users are vulnerable to third party patent claims, even absent any sort of wrongdoing or copying on their part.' He suggests that developers collaborate to prevent bad or frivolous patents from being issued in the first place. The ongoing work of Linux Defenders and Peer-to-Patent are cited as good examples of how the FOSS community's collaborative spirit can help it counteract potential legal threats."
astroengine writes "Helped by the extensive coverage of eyewitness cameras, CCTV footage and a fortuitous observation made by the Meteosat-9 weather satellite, Jorge Zuluaga and Ignacio Ferrin of the University of Antioquia in Medellin, Colombia, have been able to reconstruct the most likely orbit of the meteoroid that slammed into the atmosphere over the Russian Urals region on Feb. 15. What's more, they know what type of space rock it was — the Chelyabinsk-bound meteoroid originated from an Apollo-class asteroid (PDF). Apollo asteroids are well-known near-Earth asteroids that cross the orbit of Earth. Around 5,200 Apollo asteroids are currently known, the largest being 1866 Sisyphus — a 10 kilometer-wide monster that was discovered in 1972."
jfruh writes "More than a decade ago, the special effects artists working the Steven Spielberg film Minority Report synthesized experimental thinking about GUIs to produce a floating interface that Tom Cruise manipulated with his hands. In 2013, surrounded by iOS and Android and Windows 8 devices, we use stripped down versions of this interface every day — and commercial artist Christian Brown thinks that's a bad thing. Such devices may look cinematic, he argues, but they completely ignore the kinds of haptic and textured feedback that have defined how we interact with devices for centuries." Speaking of Minority Report interfaces — a new armband sensor using a gesture-based control scheme is the latest gadget to invoke references to the movie.
New submitter mynameiskhan writes "Major internet service providers today will start monitoring the internet traffic to their customers' computers and will warn them if they download copyrighted materials using peer to peer network. The article says, 'A person will be given up to six opportunities to stop before the Internet provider will take more drastic steps, such as temporarily slowing their connection, or redirecting Internet traffic until they acknowledge they received a notice or review educational materials about copyright law.' Furthermore, if you appeal the warning you will be required to pay $35 to state your case. Have the ISPs have had enough of RIAA pestering, or are they siding with RIAA?"
Nerval's Lobster writes "The Apache Hadoop open-source framework specializes in running data applications on large hardware clusters, making it a particular favorite among firms such as Facebook and IBM with a lot of backend infrastructure (and a whole ton of data) to manage. So it'd be hard to blame Intel for jumping into this particular arena. The chipmaker has produced its own distribution for Apache Hadoop, apparently built 'from the silicon up' to efficiently access and crunch massive datasets. The distribution takes advantage of Intel's work in hardware, backed by the Intel Advanced Encryption Standard (AES) Instructions (Intel AES-NI) in the Intel Xeon processor. Intel also claims that a specialized Hadoop distribution riding on its hardware can analyze data at superior speeds—namely, one terabyte of data can be processed in seven minutes, versus hours for some other systems. The company faces a lot of competition in an arena crowded with other Hadoop players, but that won't stop it from trying to throw its muscle around."
New submitter jollyrgr3 writes "If William Shatner gets his wish, one of Pluto's two new moons will be named Vulcan. The two small moons were discovered recently, and the SETI Institute launched an online poll to let people choose names. Captain Kirk himself suggested the names Vulcan and Romulus. Vulcan was accepted as a candidate, and Shatner exhorted his Twitter followers to vote. Vulcan ended up winning by a landslide, taking 174,000 of the 450,000 total responses. The next highest was Cerberus at just shy of 100,000. The names still have to be approved by the International Astronomical Union, as they have the final say. Leonard Nimoy approves."
Google Hangout interview with Keith Bergelt, Chief Executive Officer of the Open Invention Network (OIN), which was jointly founded by IBM, NEC, Novell, Philips, Red Hat, and Sony to share their relevant patents with all Linux and Open Source developers and users in order to prevent patent troll attacks on FOSS, such as the famous SCO vs. IBM lawsuits that hampered Linux adoption during the early 2000s. It costs nothing to become a an OIN licensee, and over 500 companies have done so. Few people know, however, that individual developers and FOSS users can become OIN licensees; that you are welcome to do so, and it costs nothing. Read their license agreement, sign it, and send it in. That's all it takes. They also buy patents and accept patent donations. And "...if your company is being victimized by any entity seeking to assert its patent portfolio against Linux, please contact us so that we can aid you in your battle with these dark forces." This OIN service is called Linux Defenders 911. We hope you never need to use it, but it's good to know it's there if you do need it.
AstroPhilosopher writes "In a move not far removed from the model T-101, U.S. researchers have succeeded in re-animating a dead sparrow. Duke scientists were studying male behavior aggression among sparrows. They cleverly decided to insert miniaturized robotics into an empty sparrow carcass and operate it like a puppet (abstract). It worked; they noticed wing movements were a primary sign of aggression. Fortunately the living won out this time. The experiment stopped after the real sparrows tore off the robosparrow's head. But there's always a newer model on the assembly-line. Good luck sparrows." Bad Horse has not yet made a decision on the researchers' application.
rtoz writes "Code.org has released infographics and a video to explain why students should be taught to code in school. They've gathered support from leaders in politics and the tech industry. Mark Zuckerberg says, 'Our policy at Facebook is literally to hire as many talented engineers as we can find. There just aren't enough people who are trained and have these skills today.' Former U.S. President Bill Clinton adds, 'At a time when people are saying, "I want a good job – I got out of college and I couldn't find one," every single year in America, there is a standing demand for 120,000 people who are training in computer science.' Bill Gates said, 'Learning to write programs stretches your mind, and helps you think better, creates a way of thinking about things that I think is helpful in all domains.' Google's Eric Schmidt is looking beyond first-world countries: 'For most people on Earth, the digital revolution hasn't even started yet. Within the next 10 years, all that will change. Let's get the whole world coding!'" Part of the standing demand for computer science jobs may be influenced by bad policies from tech companies, like Yahoo's ban on working from home.
An anonymous reader writes "It appears that two weeks ago my email address got into the wrong database. Since that time there have been continuing attempts to access my accounts and create new accounts in my name. I have received emails asking me to click the link below to confirm I want to create an account with Twitter, Facebook, Apple Games Center, Facebook mobile account, and numerous pornographic sites. I have not attempted to create accounts on any of these services. I have also received 16 notices from Apple about how to reset my Apple ID. I am guessing these notices are being automatically generated in response to too many failed login attempts. At this point I have no reason to believe any of my accounts have been compromised but I see no good response."
concealment writes "Many of us have had the experience of going to Amazon to buy one thing but checking out with a huge shopping cart of items that we didn't initially seek—or even know were available. Amazon's merchandising often benefits Amazon's customers, but trademark owners who lose sales to their competition due to it aren't as thrilled. Fortunately for Amazon, a California federal court recently upheld Amazon's merchandising practices in its internal search results."
An anonymous reader writes "Internet Explorer 10 for Windows 7 is out. Windows 8 may suck but now you can at least enjoy (most of) that version's Internet Explorer. IE10 for Win7, originally not planned, has seen the light of day after all — four months after it debuted in Windows 8. It is available via Windows Update as an optional update; however, if you've already installed a pre-release version, it will be updated automatically as an 'important' update. IE10 on Win7 requires a platform update to bring some Windows 8 APIs to the more mature Windows, and it will not feature embedded Adobe Flash as the Windows 8 version does (use the plug-in version from Adobe, as usual, instead)."
Hugh Pickens writes "UPI reports that for the first time in the history of Nobel Prize, one of the Nobel Prize medals, along with the diploma presented by the Nobel committee, is on auction — with an opening bid of $250,000. Awarded to Francis Crick, who along with James Watson and Maurice Wilkins won the Nobel Prize for medicine in 1962 'for their discoveries concerning the molecular structure of nucleic acids and its significance for information transfer in living material,' the medal will be auctioned off in New York City, by Heritage Auctions. The medal has been kept in a safe deposit box in California since Crick's widow passed away in 2007 and a portion of the proceeds will go to the Francis Crick Institute of disease research scheduled to open in London in 2015. '"By auctioning his Nobel it will finally be made available for public display and be well looked after. Our hope is that, by having it available for display, it can be an inspiration to the next generation of scientists," says Crick's granddaughter, Kindra Crick. "My granddad was honored to have received the Nobel Prize, but he was not the type to display his awards; his office walls contained a large chalkboard, artwork and a portrait of Charles Darwin."'"
An anonymous reader writes "The team at Duo Security figured out how to bypass Google's two-factor authentication, abusing Google's application-specific passwords. Curiously, this means that application-specific passwords are actually more powerful than users' regular passwords, as they can be used to disable the second factor entirely to gain control of an account. Duo [publicly released this exploit Monday] after Google fixed this last week — seven months after initially replying that this was expected behavior!"
Dr. Tom writes "The U.S. has deployed more than 11,000 military drones, up from fewer than 200 in 2002. They carry out a wide variety of missions while saving money and American lives. Within a generation they could replace most manned military aircraft, says John Pike, a defense expert at the think tank GlobalSecurity.org. Pike suspects that the F-35 Lightning II, now under development by Lockheed Martin, might be 'the last fighter with an ejector seat, and might get converted into a drone itself.' The weakest link is the pilot. A jet could pull 15 Gs, out-turning any conventional aircraft, except it would kill the pilot. Is it time to stop spending billions on obsolete aircraft?"
New submitter OlivierB writes "I am moving to a new house in the UK. The house will have very fast broadband but there is only one TV/cable aerial to plug into which is also very inconveniently located in the property. The cable TV provider can move it (for a high fee), but the biggest issue is that their channel packages are just too expensive and not appealing to me. Ideally, I would like access to the UK Freeview channels, and maybe a few extras such as Discovery Channel, Eurosport etc. All of this content would be available via IPTV, which I could watch from an HTPC or simple set-top boxes. Do you have any ideas to share with me?"
An anonymous reader writes with this news (excerpted from IT World) that follows up on the report of pressure put on Sweden's Pirate Party for its connection to The Pirate Bay: "The Pirate Bay has opened two new gateways to its internal network in order to shield its current Internet provider, the Swedish Pirate Party, which had been threatened with legal action if it did not stop providing Internet access to the torrent search site by Tuesday. The Swedish Pirate Party had provided bandwidth to The Pirate Bay for about three years because it was hard for the site to find anyone else who would do so. But last Tuesday the Rights Alliance, an organization that represents the film industry, gave it an ultimatum: The Pirate Party had to cut off Internet access to the torrent search site or face legal action. The Pirate Bay's administrators said in a post on Facebook that, because of the legal threat and the potential cost of fighting it, 'We've taken the decision to move on to Norway and Spain.'"
chicksdaddy writes "The security firm Bit9 released a more detailed analysis of the hack of its corporate network was part of a larger operation that was aimed a firms in a 'very narrow market space' and intended to gather information from the firms. The analysis, posted on Monday on Bit9's blog is the most detailed to date of a hack that was first reported on February 8 by the blog Krebsonsecurity.com, but that began in July, 2012. In the analysis, by Bit9 Chief Technology Officer Harry Sverdlove said 32 separate malware files and malicious scripts were whitelisted in the hack. Bit9 declined to name the three customers affected by the breach, or the industry segment that was targeted, but denied that it was a government agency or a provider of critical infrastructure such as energy, utilities or banking. The small list of targets — just three — and the fact that one malware program was communicating with a system involved in a recent 'sinkholing operation' raises the specter that the hack of Bit9 may have played a part in the recent attacks on Facebook, Twitter and Apple, though Bit9 declined to name the firms or the market they serve."
coondoggie writes "West Virginia wasted millions in federal grant money when it purchased 1,164 Cisco routers for $24 million in 2010, a state audit concluded. A report issued this month by the West Virginia Legislative Auditor found the state used a 'legally unauthorized purchasing process' when awarding the router contract, paid for with federal stimulus funds, to Cisco. The auditor also found Cisco 'showed a wanton indifference to the interests of the public' in recommending the investment in its model 3945 branch routers, the majority of which were 'oversized' for the requirements of the state agencies using them, the report (PDF) stated."
An anonymous reader writes "Google is working on identifying Chrome tabs that are currently playing audio (or recording it). The feature is expected to show an audio animation if a tab is broadcasting or recording sound. François Beaufort spotted the new feature, a part of which is already available in the latest Chromium build."
Billy the Mountain writes "A small UK company is bringing new technology online that could reduce the prices of tantalum and titanium ten-fold. According to this piece in The Economist: A tantalising prospect, the key is a technique similar to smelting aluminum with a new twist: The metallic oxides are not melted as with aluminum but blended in powder form with a molten salt that serves as a medium and electrolyte. This technology is known as the FFC Cambridge Process. Other metals include Neodymium, Tungsten, and Vanadium."
carmendrahl writes "Photos used to be second-class citizens in the art world, not considered as prestigious as paintings or sculpture. But that changed in the 1990s. As daguerrotypes and the like started selling for millions of dollars, fakes also slipped in. Unfortunately, the art world didn't have good ways of authenticating originals. Cultural heritage researchers had to play catch-up, and quickly. Two fraud cases, one involving avant garde photographer Man Ray, turned photo conservation from a niche field into a mature science."