tsamsoniw writes "While research companies including IDC and Gartner deemed HP the PC leader for Q4 2012, Canalys has a different perspective. The analyst firm has declared Apple the top PC vendor for the past quarter, thanks in part to the booming success of the iPad and the iPad mini. By Canalys's reckoning, Amazon, too, now beats out the likes of Acer and Asus as leading PC vendors, having shipped 4.6 million Kindles in Q4."
Titus Andronicus writes "LibreOffice 4.0.0 has been released. Some of the changes are for developers: an improved API, a new graphics stack, migrating German code comments to English, and moving from Apache 2.0 to LGPLv3 & MPLv2. Some user-facing changes are: better interoperability with other software, some functional & UI improvements, and some performance gains."
Hugh Pickens writes writes "Embry-Riddle Aeronautical University has announced plans to launch the nation's first ever bachelor's degree in Commercial Space Operations to supply the commercial spaceflight industry with skilled graduates in the areas of space policy, operations, regulation and certification, as well as space flight safety, and space program training, management and planning. The rapid expansion of commercial spaceflight operations is fostered by NASA's commercial cargo and crew development programs and by entrepreneurs developing capabilities for suborbital spaceflight, orbital space habitats, space resource prospecting and other commercial ventures. 'Embry-Riddle's new Commercial Space Operations degree is one of the most innovative non-engineering degrees in the aerospace industry,' says program coordinator Lance Erickson, a professor of applied aviation sciences at Embry-Riddle. 'When we were planning this degree, our advisers from the commercial space industry said they couldn't wait to hire our graduates.'"
New submitter jdela writes "Finnish Minister for Justice Anna-Maja Henriksson backs expanding FInland's child pornography blocklist to also include websites with animal porn and largely-undefined 'violent pornography.' Her proposal does not have the unanimous backing of the Finnish government, with Minister of Interior Päivi Räsänen doubting the need to expand pornography blocks. Under current law, adopted in 2006, the Finnish NBI maintains a blocklist of foreign sites linked to child pornography. This blocklist is enforced on Finnish Internet users."
DavidGilbert99 writes "A leaked video of the purported Google Chromebook Pixel laptop has stirred quite a lot of interest but whether or not the laptop in the video is real, Google needs to launch it in order to kickstart the Chrome OS platform." A high-res screen would be welcome, but Google seems to be doing alright with Chromebook sales right now. Warning: IB Times has ads with autoplaying videos and sound; you have been warned.
chicksdaddy writes "To paraphrase a quote attributed to F. Scott Fitzgerald: 'Rich countries aren't like everyone else. They have less malware.' That's the conclusion of a special Security Intelligence Report from Microsoft, anyway. The special supplement, released on Wednesday, investigated the links between rates of computer infections and a range of national characteristics including the relative wealth of a nation, observance of the rule of law and the rate of software piracy. The conclusion: cyber security (by Microsoft's definition: low rates of malware infection) correlated positively with many characteristics of wealthy nations – high Gross Income Per Capita, higher broadband penetration and investment in R&D and high rates of literacy. It correlated negatively with characteristics common in poorer nations – like demographic instability, political instability and lower levels of education.'"
ananyo writes "How open do researchers want open-access papers to be? Apparently, not that open — when given a choice of licenses, most opt to limit the use of data and words in their open-access publications, according to figures released by the open-access journal Scientific Reports. Since July 2012 the journal has been offering researchers a choice of three types of license. The first, most liberal license, CC-BY, allows anyone, even commercial organizations, to re-use it. A more restrictive version, CC-BY-NC-SA, lets others remix, tweak and build on work if they give credit to the original author, but only for non-commercial (NC) purposes, and only if they license what they produce under the same terms (SA, or 'share-alike'). A third licence, CC-BY-NC-ND, is the most restrictive, allowing others to download and share work, but not to change it in any way (ND, 'no derivative works'), or use it commercially. The results from Scientific Reports shows that, for the 685 papers accepted by the journal, authors chose either of the more restrictive licences 95% of the time — and the most restrictive, CC-BY-NC-ND, 68% of the time."
colinneagle writes "Open Source guy Bryan Lunduke has experienced the difficulties of migrating a successful closed source project to an open license first-hand, but still believes — or at least wants to believe — that it can be done. He writes: 'Occasionally, someone makes a go of it, to take a good piece of closed source software and release the source code under a nice, open license. In fact, I did just that about a year ago. I tried to take a software development tool (along with some video games) that I had developed (and was earning a good living from) and migrate them to the GPL with continued development funded via donations. The results were...disastrous. Within a very short period of time of going Open Source, the total funding for the projects fell to less than 20% of what was being brought in via sales when the software was Closed Source, which almost completely impeded the ability to fund continued development. Luckily, I was able to recover and get things back on track, but it was definitely not a fun experience.'" How viable is migrating a closed source project to something open?
tad001 writes "CNET is reporting 'Discovered last night within a freshly jailbroken iPad: a set of buttons and code references for "radio," a feature found in iTunes on Macs and PCs, but not on the iPad or iPhone.' ... 'The buttons hint at Apple's much-rumored radio service, a product that will let people stream music much like they do on the popular Pandora service, but with deep ties to Apple's iTunes library.' ... 'The discovery follows a high-profile jailbreak of iOS 6.1, the updated system software Apple released just last week. A team of developers came up with a tool that gives users deep system-level access to do things like install applications from third-party app stores, change the look and feel of iOS, and add new software features.'"
sciencehabit writes "Left to its own devices, a bubble will weaken and pop as the fluid sandwiched between two thin layers of soap succumbs to gravity and drains toward the floor. But when researchers trapped a bubble between two platinum electrodes and cranked up the voltage, the fluid reversed direction and actually flowed up, against the force of gravity. The newly strong and stable bubbles could live for hours, and even visibly change colors as their walls grew fatter. Because soap film is naturally only nanometers thick, this whimsical experiment could help scientists create more efficient labs-on-chips, the mazes of nanotunnels that can diagnose disease based on the movements of a miniscule drop of blood."
MojoKid writes "Sony's next-generation PS4 unveil is just two weeks away, which means leaks concerning both it and Microsoft's next-generation Xbox Durango (sometimes referred to as the Xbox 720), are at an all-time high as well. Rumors continue to swirl that the next iteration of Xbox will lock out used games entirely and require a constant Internet connection. New games would come with a one-time activation code to play. Use the code, and the game is locked to the particular console or Xbox Live account it's loaded on. Physical games will still be sold (the Durango reportedly supports 50GB Blu-ray Discs), but the used game market? Kiboshed. If this is true, it's an ugly move on Microsoft's part. Not only does it annihilate the right of first sale, it'll eviscerate any game store or business that depends on video game rentals for revenue."
jfruh writes "The MPAA and other entertainment industry groups have been locked for years in a legal struggle against Newzbin2, a Usenet-indexing site. Since Newzbin2 profited from making it easier for users to find pirated movies online, the MPAA contends they can sue to take those profits on behalf of members who produced that content in the first place. But a British court has rejected that argument."
hackingbear writes "The New York Times reports the story of a Chinese blogger named Zhu Ruifeng who has become an overnight celebrity in China. He posted a secretly recorded video of an 18-year-old woman having sex with a 57-year-old official from the southwestern municipality of Chongqing. The official, along with 10 others, lost their jobs and are now under investigation. Mr. Zhu says ordinary citizens have come to rely on the Internet for retribution, even if it often amounts to mob justice. 'We used to say that when you have a problem, go to the police,' he said. 'Now we say when you have a problem, go to the netizens.' He has become a litmus test of how committed China's new leaders are in their battle against corruption — and whether they can tolerate populist crusaders like Mr. Zhu."
An anonymous reader writes "Joachim Kempin, former vice president of Windows Sales, has explained how the original Xbox came to be. It turns out it was Sony's fault, simply because the Japanese company wasn't very friendly towards Microsoft, and Microsoft eventually decided they had to 'stop Sony.' Apparently, long before the Xbox was even an idea, Microsoft was trying to collaborate with Sony in a number of areas they thought there was overlap. That collaboration was sought before even Sony had a games console coming to market, and would have focused on products for the entertainment sector."
alphadogg writes "The developers of many SSL libraries are releasing patches for a vulnerability that could potentially be exploited to recover plaintext information, such as browser authentication cookies, from encrypted communications.The patching effort follows the discovery of new ways to attack SSL, TLS and DTLS implementations that use cipher-block-chaining (CBC) mode encryption. The new attack methods were developed by researchers at the University of London's Royal Holloway College. The men published a research paper and a website on Monday with detailed information about their new attacks, which they have dubbed the Lucky Thirteen. They've worked with several TLS library vendors, as well as the TLS Working Group of the IETF, to fix the issue."