Mar 18 2009

First rule of Internet censorship: Hide the block list

Like many countries, Australia currently runs a blacklist of child porn sites. And like many countries, it doesn’t want that list published. It doesn’t even want other countries’ lists published, and is in fact banning such links.

Share

Mar 18 2009

20+ Extremely Useful Twitter Tools

Twitter is one unique web service which is facilitating different people to connect with each other.This article will focus on explaining the cool tools that litterally & awesomely extend features offered by Twitter.

Share

Mar 18 2009

IBM In Talks To Buy Sun Microsystems

The buyout would bolster IBM’s heft on the Internet, in software and in finance and telecommunications markets.

Share

Mar 18 2009

Linux Foundation Asks Who Says "I’m Linux" Best

An anonymous reader writes “Everyone has seen Apple’s clever ‘I’m a Mac’ ads, and Microsoft’s attempted responses, first with Jerry Seinfeld, and next with ‘I’m a PC.’ The Linux Foundation tries to fire back with its community-generated ‘We’re Linux’ video contest: all of the eligible videos have now been submitted and are ready to be voted on. Thankfully, the quality of Linux is much higher than the quality of some of these entries: entries range from the hilarious but inappropriate, to the well-made but creepy, to the ‘I’m sure it sounded good in your head.’ Thankfully, there are one or two that could actually be real commercials.”

Read more of this story at Slashdot.

Share

Mar 18 2009

The Emerging Science of DNA Cryptography

KentuckyFC writes “Since the mid 90s, researchers have been using DNA to carry out massively parallel calculations which threaten encryption schemes such as DES. Now one researcher says that if DNA can be used to attack encryption schemes, it can also protect data too. His idea is to exploit the way information is processed inside a cell to encrypt it. The information that DNA holds is processed in two stages in a cell. In the first stage, called transcription, a DNA segment that constitutes a gene is converted into messenger RNA (mRNA) which floats out of the nucleus and into the body of the cell. Crucially, this happens only after the noncoding parts of the gene have been removed and the remaining sequences spliced back together.” (More below.)

Read more of this story at Slashdot.

Share

Mar 18 2009

Flying Car Passes First Flight Test

waderoush writes “Terrafugia — the Massachusetts company building a ‘roadable aircraft’ (that’s flying car to you and me) — revealed at a press conference Wednesday that the Transition vehicle has been taken aloft for its maiden flight. The craft, which can fly up to 460 miles at 115 mph and then fold up its wings for 65-mph highway driving, was the subject of two hotly debated Slashdot posts on May 8 and May 13 of last year. The company said the first flight took place in Plattsburgh, NY; retired Air Force Colonel Phil Meteer was at the controls.”

Read more of this story at Slashdot.

Share

Mar 18 2009

EPIC Urges FTC To Investigate Google Services

snydeq writes “The Electronic Privacy Information Center filed a 15-page complaint asking the FTC to force Google to stop offering online services that collect data until the presence of adequate privacy safeguards is verified. The EPIC also wants Google to disclose all data loss or breach incidents, citing several incidents where data held by Google was at risk, the most recent of which occurred earlier this month with its Google Docs. The EPIC complaint [PDF] also listed other security flaws in Gmail and Google Desktop, a desktop indexing program, and urged Google to donate million to a public fund that will support research into technologies such as encryption, data anonymization and mobile location privacy.” EPIC has raised privacy concerns about Google before, and about Windows XP as well.

Read more of this story at Slashdot.

Share

Mar 18 2009

Beginning GIMP: From Novice to Professional 2nd Ed

r3lody writes “An extremely large amount of the information we get on a daily basis comes from what we see. Imagery is therefore very important to those who want to communicate with us. When computers had advanced enough to be able to process images in a digital fashion, the market opened up for programs that could manipulate them in many ways. While many professionals would opt for the paid programs, there is a free alternative: GIMP (Gnu Image Manipulation Program). The only stumbling block is learning how to use it properly. That is where Beginning GIMP: From Novice to Professional, Second Edition by Akkana Peck comes in.” Read below for the rest of Ray’s review.

Read more of this story at Slashdot.

Share

Mar 18 2009

Believable Stupidity In Game AI

Gamasutra is running a feature written by Mick West, co-founder of Neversoft, about creating game AI that is dumb enough to defeat, yet intelligent enough that its “mistakes” are similar to those a real player would make, thus preserving the illusion that the AI is not just throwing the game. “The simplest way to introduce stupidity into AI is to reduce the amount of computation that it’s allowed to perform. Chess AI generally performs billions of calculations when deciding what move to make. … The problem with this approach is that it decreases the realism of the AI player. When you reduce the amount of computation, the AI will begin to make incredibly stupid mistakes — mistakes that are so stupid, no human would ever make them. The artificial nature of the game will then become apparent, which destroys the illusion of playing against a real opponent. … By reducing the amount of computation, we create an AI opponent that is trying to win, but has been crippled in a way that leads to unrealistic gameplay.”

Read more of this story at Slashdot.

Share

Mar 18 2009

Digg’s Rose and Adelson Talk About Diggbar, New Features

Jay and Kevin talked about the new technology they’re rolling out, like a new Digg toolbar, integration with Facebook Connect and OpenID, an updated search tool and more customization features.

Share