Juha Saarinen writes: US researchers have trained machine learning algorithms to accurately predict the next batch of female models to grace the worldâ(TM)s top fashion runways.
In a paper to be presented at CSCW 2016 early next year, three Indiana University academics used data from the 2015 spring/summer season to help the machine learning algorithms learn what made female models successful in their careers â" and predict who would next achieve success.
Bismillah writes: Graduated response regimes that warn and then penalise users for infringing file sharing do not appear to work, new research from Monash University in Australia has found. The paper studied "three strikes" laws in France, New Zealand, South Korea, Taiwan and the UK, as well as other anti-filesharing regimes in the US and Ireland, but found scant evidence that they're effective.
AlbanX writes: Chrome and Firefox are storing users' saved passwords in plain text within the browser, allowing anyone with access to that user's computer the ability to clearly see any passwords that user has saved.
When told about the deliberate feature offered by Google and Mozilla, one security expert could only say — "shit a brick".
littlekorea writes: Open source advocates have successfully waged a campaign to halt voting on a proposed geospatial standard sponsored by mapping giant Esri. Protestors claimed that designating the 'GeoServices REST API' as an industry standard would have guaranteed further dominance for Esri's industry-leading ArcGIS server and replicated existing open standards. The unfolding case smacks of Microsoft's efforts to have the OOXML format approved as an ISO/IEC standard — only in this case, it appears Esri has backed down, while the Open Geospatial Consortium (OGC) does some soul searching on what a standard should achieve.
mask.of.sanity writes: Twitter, Linkedin, Yahoo! and Hotmail accounts are open to hijacking thanks to a flaw that allows cookies to be stolen and reused. Attackers need to intercept cookies while the user is logged into the service because the cookies expire on log-out ( except LinkedIn which keeps cookies for three months). The server will still consider them valid. For the Twitter attack, you need to grab the auth_token string and insert it into your local Twitter cookies. Reload Twitter, and you'll be logged in as your target (video here). Not even password changes will kick you out.