Forgot your password?
typodupeerror

Submission + - DIA Polygraph Countermeasure Case Files Leaked

George Maschke writes: AntiPolygraph.org (of which I am a co-founder) has published a set of leaked Defense Intelligence Agency polygraph countermeasure case files along with a case-by-case analysis. The case files, which include polygraph charts and the exact questions used, suggest that the only people being "caught" trying to beat the polygraph are those using crude, unsophisticated methods that anyone who actually understood polygraph procedure and effective countermeasures (like, say, a real spy, saboteur, or terrorist) would ever use. AntiPolygraph.org has previously published polygraph community training materials on countermeasures that indicate they lack the ability to detect countermeasures like those described in our free book, The Lie Behind the Lie Detector (PDF) or in former police polygraph examiner Doug Williams' manual, How to Sting the Polygraph . Williams, who was indicted last year after teaching undercover federal agents how to pass a polygraph, is scheduled to stand trial on May 12 in Oklahoma City.

Submission + - How Publishing Upstart Mendeley Weathered Revolt And Became Part Of The Paywall (fastcompany.com)

Lashdots writes: At Fast Company, Tina Amritha writes about the controversial rise of reference manager startup Mendeley, which inspired revolt among its users when it announced in 2013 it was being acquired by scholarly publishing conglomerate Elsevier.

"Seeing that some of our most vocal advocates thought we had sold them out felt awful," CEO Victor Henning said recently over a tea in Amsterdam, where Elsevier, Mendeley's parent company, is headquartered. "I had steeled myself for some pretty violent reactions beforehand. After all, I was aware of Elsevier's reputation and the mistakes they had made."...

Elsevier, like other large publishers, loathed Mendeley's open model; In 2013, it had forced Mendeley to remove its titles from its database. The thinking behind its acquisition of Mendeley—for a sum rumored to between $69 million and $100 million—was simple: to squash the threat Mendeley posed to its traditional subscription model, and to own the ecosystem that Mendeley had constructed, with its valuable data on the behavior of millions of researchers.

But Henning contends, “We’ve kept the promises we made when we began."


Math

Submission + - MIT Student disproves Stephen Wolfram

Richard Pritches writes: MIT errata expert, Evangelos Georgiadis, attains a milestone by actually disproving 44 conjectures set by Dr Wolfram (owner of the Makers of Mathematica and owner of the new kind of cult ANKS). Paper was published in the latest issue of the Journal of Cellular Automata and has also appeared free of charge at Prof Edwin Clark's Collection of Wolfram's NKS Reviews at the following link http://www.math.usf.edu/~eclark/jca_georgiadis.pdf I believe that this is a nice Xmas present for the ANKOS spirit. Richard
Government

Submission + - Swiss DMCA quietly adopted (boingboing.net)

roady writes: We have seen a lot of talk about the Canadian DMCA. But few know about the Swiss version recently adopted by law makers, not even the Swiss people. The government and media have been very quiet, probably to avoid a referendum. Indeed, Switzerland is a direct democracy and if 50'000 citizens sign a referendum, the whole country will have a chance to vote against the new copyright law. In this version of the DMCA, sharing a file on P2P networks will land you one year in jail, even though the law mandates a levy on blank media. The history of the law can be read here.
Biotech

Submission + - HP Skin Patch May Replace Needles (tfot.info)

Iddo Genuth writes: "HP and Crospon have developed a skin patch which uses microneedles that barely penetrate the skin. The microneedles can replace conventional injections and deliver drugs through the skin without causing any pain. The skin patch technology also enables delivery of several drugs by one patch and the control of dosage and of administration time for each drug. It has the potential to be safer and more efficient than injections."
Censorship

Submission + - creationists violate copyright (blogspot.com)

The_Rook writes: the discovery institute copied Harvard University's BioVisions video, "The Inner Life of the Cell", stripped out Harvard's copyright notice, credits, and narration, and inserted their own creationist friendly narration and renamed the video "The Cell as an automated city". pretty insidious, as suggesting that a cell is like a city is to suggest that it was designed rather than evolved. it should also be of interest because the discovery institute, really more of a lawyer mill than a scientific institution, engaged in a particularly egregious example of copyright infringement.
Linux Business

Submission + - A Review of the $200 Wal-Mart Linux PC (lightandmatter.com)

bcrowell writes: "Wal-Mart's new $200 Linux PC has generated a lot of buzz among geeks. Although they're sold out of stores, I bought one for my daughter via mail order, and have written up a review of the system. The hardware seems fine for anyone but a hardcore gamer, but the preinstalled gOS flavor of Ubuntu has a lot of rough edges."
Microsoft

Submission + - Microsoft admits XP has same bug as Windows 2000 (computerworld.com.au)

Arashtamere writes: Microsoft admitted late Tuesday that the recently discovered encryption flaw that Israeli researchers discovered in Windows 2000 exists in XP, its most popular product. According to the report "as recently as last Friday, Microsoft hedged in answering questions about whether XP and Vista could be attacked in the same way, saying only that later versions of Windows "contain various changes and enhancements to the random number generator." Yesterday, however, Microsoft responded to further questions and acknowledged that Windows XP is vulnerable to the complex attack that Pinkas, Gutterman and Dorrendorf (the Israeli researchers) laid out in their paper, which was published earlier this month. Apparently Microsoft and Pinkas have argued over whether the flaw was a security vulnerability, with the former denying the bug met the definition and the latter claiming it is a serious problem that — while it needs to piggyback on another, more common kind of exploit — is far from just a theoretical threat. Tuesday, even as it conceded that XP also had a weak PRNG, Microsoft continued to downplay the possibility of an attack. "If an attacker has already compromised a victim machine, a theoretical attack could occur on Windows XP," a company spokeswoman said in an e-mail. To exploit the PRNG's flaws, an attacker must have administrative rights to the PC, something that's easily obtained by most run-of-the-mill attacks, Pinkas noted."
Privacy

Submission + - Japan to start fingerprinting foreigners again

rabiddeity writes: "If you're planning to visit Japan sometime in the near future, you may want to reconsider. Last year, Japan's parliament passed a measure requiring foreigners to submit their fingerprints when entering the country. The measures, which apply to all foreigners over 16 regardless of visa status, take effect tomorrow. The worst part: the fingerprints are stored in a national database for an "unspecified time", and will be made available to both domestic police and foreign governments."
Software

Submission + - Comcast goes to Zimbra

tenchiken writes: Zimbra, an Open Source enterprise messaging app, just scored a major win. Comcast will be moving mail services for all of their customers to Zimbra. Zimbra has been picking up steam for a while now, and appears to really be challenging Microsoft in a area that Exchange has been dominated in. Add in support for Samba Domain Controllers and Linux Authentication, Offline Access and Evolution Support and we might finally have our long desired Open Source exchange killer.
Networking

Submission + - EU Weighs Copyright Law

Braedley writes: Members of the European IT industry are rightfully unhappy with a proposed law that would penalize various parties, from software companies to ISPs, to even some hardware manufactures, but not the end users for infringing on intellectual property. Penalties for this aiding and abetting could include jail time for employees if found guilty.

From the article:
"The proposed directive switches the onus from end users to the technological conduits, which could include ISPs (Internet service providers), mobile phone operators, instant-messaging services, video- and music-sharing Web sites such as YouTube, as well as open-source software producers.
The controversial draft law has sparked an outcry, uniting rivals within the IT industry, ranging from free and open-source software advocates, the Foundation for a Free Information Infrastructure, at one end to a lobbyist for the world's biggest software companies, the Business Software Alliance (BSA), at the other."

Slashdot Top Deals

The computer is to the information industry roughly what the central power station is to the electrical industry. -- Peter Drucker

Working...