mat.power writes: After all the various court battles launched by Apple over protecting their own patents, including silly design patents like rounded corners, Apple complains about Samsung's own patents which leads to an anti-trust investigation by the Korean Fair Trade Commission.
From the article: "We are reviewing whether allegations in the complaint lodged by Apple are true," said a Fair Trade Commission official, who declined to be named because they weren't authorized to speak to the press. "Apple filed a complaint earlier this year that Samsung is breaching fair trade laws," the official said.
casals writes: Another crowdfunding site came up, this time using a bounty-based approach: it's called Freedom Sponsors (www.freedomsponsors.com). Individuals (developers) register and are paid to solve tasks — issues related to open-source projects. Seems a nice way to get paid for short-term projects and at the same time to speed up issue solving on open source projects (since there are already a lot of companies that already use open source libraries/frameworks).
bs0d3 writes: In Holland, a major ISP known as KPN has found a major security flaw for their customers. It seems that all customers have had the same default password of 'welkom01'. Up to 140,000 customers had retained their default passwords. Once inside attackers could have found bank account and credit card numbers. KPN has since changed all the passwords of the 140,000 customers with weak passwords. They also do not believe anyone has actually been burglarized since discovering this weak spot in security.
Optic7 writes: Many gamers have probably dreamed about the idea of an old favorite game or other no longer supported or developed commercial software being converted to an open-source license so that it could be updated to add new features, support new hardware, other operating systems, etc. However, this type of change of license seems exceedingly rare, unless the copyright holder itself decides on its own that it would be beneficial. The only examples I could think of or was able to find in a brief internet search were Blender (3D animation software that had its source code bought from creditors after a crowd-funding campaign) and Warzone 2100 (Game that had its source code released after a successful petition). With those two examples of different strategies in mind, have any of you ever participated in any efforts of this kind, and what did you learn from it that may be useful to someone else attempting the same thing? Even if you have not participated, do you have any suggestions or ideas that may be useful to such an effort?
skipkent writes: Pentagon-funded researchers have come up with a new plan for busting leakers: Spot them by how they search, and then entice the secret-spillers with decoy documents that will give them away.
Computer scientists call it it “Fog Computing” — a play on today’s cloud computing craze. And in a recent paper for Darpa, the Pentagon’s premiere research arm, researchers say they’ve built “a prototype for automatically generating and distributing believable misinformation and then tracking access and attempted misuse of it. We call this ‘disinformation technology.’”
zacharye writes: Microsoft has a long and storied history of leadership in the tech industry, and the company has driven innovation for decades. In recent years, however, Microsoft has fallen behind the times in several key industries; the company’s mobile position has deteriorated and left it with a low single-digit market share, and Microsoft won’t launch Windows RT, its response to Apple’s three-year-old iPad, until later this year...
Doofus writes: New Scientist has an interesting story about a Japanese effort to reach the Earth's mantle. While some mantle material has been recovered from volcanoes, no pure mantle material has been obtained. (We have moon rocks, but nothing from a few km beneath our feet!) Accompanying the article is a gallery of previous attempts at drilling farther and farther into the Earth's crust.
colinneagle writes: Analysis of spam samples suggests that a malicious application could be using Android devices to spread spam messages, in what Microsoft researcher Terry Zink has called "the next evolution in the cat-and-mouse game that is email security."
Zink believes the botnet was created by a malicious app most likely found in an insecure market. After analyzing the IP addresses that were stamped in the headers of the messages, a routine practice of Yahoo Mail, Zink found that the IPs connected to servers in Chile, Indonesia, Lebanon, Oman, Philippines, Russia, Saudi Arabia, Thailand, Ukraine, and Venezuela.
Because downloading a malicious app from the Android Market is highly unlikely, Zink says, the fact that the messages stem largely from developing countries where Android's app community has yet to establish an ecosystem indicates that the devices were infected by an illegitimate app downloaded elsewhere
snydeq writes: "Bob Lewis offers advice for IT departments dealing with one of the worst business diseases: a top-down contagion of Steve Jobs wannabes. These 'Great Dictators' have 'all of Steve Jobs' worst characteristics (except, perhaps, his poor hygiene) without any of his saving graces: the supreme certainty that they're right, without actually being right often enough to justify their high opinions of themselves. Because business culture flows downhill, arrogant autocracy is the company's standard leadership model,' and with everyone thinking they're an 'internal customer,' IT will be on the receiving end of orders from every petty dictator in the company.' The key, of course, is to avoid falling prey to the cowering toadyism that these petty dictators come to expect as the preferred way for folks in IT to 'manage up.'"
jones_supa writes: The France's aviation authority, BEA, has released a final crash report on the Air France over the Atlantic in June 2009. The document blames the Airbus A330's ergonomics as well as inappropriate action by the pilots. Going through the events, the disaster began with the malfunctioning of speed sensors known as Pitots during a period of turbulence. The captain was taking a rest break and the co-pilots were in control at the time. The captain returned to the flight deck but was unable to reverse the catastrophic course of events. One of the mistakes of the crew was to point the nose of the aircraft upwards after it stalled, instead of down. 'The crew was in a state of almost total loss of control of the situation,' BEA chief investigator Alain Bouillard summed. The report makes 25 new safety recommendations on top of the 25 called for in a preliminary report last year.
cygnwolf writes: "Another salvo is fired in the Apple vs Google war. Apple revealed yesterday that they filed for and have been granted a patent on a Head Mounted Display that bears a curious resemblance to Google Glass
From the article: The United States Patent and Trademark Office on Tuesday granted Apple's application for a patent describing head-mounted display technology that is tangentially related to see-through, or augmented reality, units like Google's Project Glass."
myles1965 writes: "Purchases of digital goods and services--including movie streaming, cloud-computing, e-books and IT applications--would no longer be subject to special state and local taxes and other discriminatory levies, under bipartisan-supported legislation advancing on Capitol Hill."