39929491
submission
Dainsanefh writes:
Advanced Micro Devices has hired JPMorgan Chase & Co to explore options, which could include a potential sale, as the chipmaker struggles to find a role in an industry increasingly focused on mobile and away from traditional PCs, according to three sources familiar with the situation.
39924909
submission
arrow3D writes:
A new startup in Norway is focused on design and fabrication at the level and quality of nature. Using pure mathematical volumes, rather than surfaces or voxels, they are developing a new generation of 3D modelling tools specifically aimed at high resolution 3D printing, to "support the future of design and manufacturing". Their software was recently used to create the multi-material Minotaur Helmet by Neri Oxman from MIT, as featured in Wired UK last month. An interesting thought (as recently illustrated in Dilbert) is the idea of a Physical Turing Test for synthetic objects and that both Turing Tests may require each other — i.e. only by designing and building at the resolution of nature can we achieve the intelligence of natural objects. Their software platform is still very much under development but they've started trying to "save the world from polygons" with a KickStarter campaign that's live now.
39924127
submission
Mephistophocles writes:
A chilling article by Darkreading's Kelly Jackson Higgins describes how the growing accessibility of hacking tools like RAT's (Remote Access Trojans) have made cyber-espionage possible for more than just those financially backed by large nation-states, and speculates on what the implications of this may be:
"Researchers at Norman Security today revealed that they recently analyzed malware used in phishing emails targeting Israeli and Palestinian targets and found that attackers used malware based on the widely available Xtreme RAT crimeware kit. The attacks, which first hit Palestinian targets, this year began going after Israeli targets, including Israeli law enforcement agencies and embassies around the world. Norman says the same attacker is behind the attacks because the attacks use the same command-and-control (C&C) infrastructure, as well as the same phony digital certificates.
This attack campaign just scratches the surface of the breadth and spread of these types of attacks around the world as more players have been turning to cyberspying. "We're just seeing the tip of the iceberg," says Einar Oftedal, deputy CTO at Norman."
39921225
submission
eldavojohn writes:
Professor Gerald "Jerry" Crabtree of Stanford's Crabtree Laboratory published a paper (PDF warning) that has appeared in two parts in "Trends in Genetics." The paper opens with a very controversial suggestion, 'I would be willing to wager that if an average citizen from Athens of 1000 BC were to appear suddenly among us, he or she would be among the brightest and most intellectually alive of our colleagues and companions' and from there speculates we're on the decline of human intelligence and we have been for at least a couple millennia. His argument seems to suggest that agriculture and, following from that, cities have allowed us to break free of such environmental forces on competitive genetic mutations — a la Mike Judge's theory. However, the conclusion of the paper urges humans to keep calm and carry on as any attempt to fix this genetic trend would almost certainly be futile and disturbing.
39919165
submission
jemenake writes:
A friend of mine teaches electronic media (Photoshop, Premiere, etc.) at a local high-school. Right now, they're doing Photoshop, and each chapter in the book starts with an "end result" file which shows what they're going to construct in that chapter, and then, given the basic graphical assets (background textures, photos, etc.), the students need to duplicate the same look in the final-result file.
The problem, of course, is that some students just grab the final-result file and rename it and turn it in. Some are a little less brazen and they rename a few layers, maybe alter the colors on a few images, etc. So, it becomes time-consuming for her to open each file alongside the final-result file to see if it's "too perfect".
When I first discovered that she was doing this, my first reaction was that there's got to be some automated way of catching the cheaters. Of course, my first idea of just doing MD5 hashes of each file won't work, since most kids alter the file a little bit.
A second idea I had was to alter the final-result file in a way that isn't obvious, like removing someone's shoelace, mis-spelling a word in the background, or removing/adding some dust-specks. (I know map publishers and music transcribers use this trick to catch copiers). But this still requires that she look for the alteration in each file. I'd think that Photoshop, after all these years, would have some kind of scripting language which also supports some digital watermarking, but I've just never dabbled in that realm.
And, of course, I guess another solution would be for her to not provide the end-result file in Photoshop format, but to export it as a flat image. But I'm still intrigued by the notion of being able to "fuzzily" compare two photoshop files or images to find the ones which are too similar in certain aspects (color histograms, where the edges are, level of noise, whatever).
Anybody else have any clever ideas for this?
39918707
submission
Zothecula writes:
Researchers at the CNRS-AIST Joint Robotics Laboratory (a collaboration between France's Centre National de la Recherche Scientifique and Japan's National Institute of Advanced Industrial Science and Technology) are developing software that allows a person to drive a robot with their thoughts alone. The technology could one day give a paralyzed patient greater autonomy through a robotic agent or avatar.
39912565
submission
Artefacto writes:
The Ksplice team has made available a git repository with the changes Red Hat made to the kernel broken down. They are calling this project RedPatch.
This comes in response to a policy change Red Hat had operated in early 2011 with the goal of undercutting Oracle and other vendor's strategy of poaching RedHat's customers. The Ksplice team says they've doing the work they're now making available since the policy was implemented; they claim to be now making it public because they "feel everyone in the Linux community can benefit from the work".
For Ksplice, we build individual updates for each change and rely on source patches that are broken-out, not a giant tarball. Otherwise, we wouldn’t be able to take the right patches to create individual updates for each fix, and to skip over the noise — like a change that speeds up bootup — which is unnecessary for an already-running system. We’ve been taking the monolithic Red Hat patch tarball and breaking it into smaller commits internally ever since they introduced this change.
At Oracle, we feel everyone in the Linux community can benefit from the work we already do to get our jobs done, so now we’re sharing these broken-out patches publicly.