Mar 24 2009

Lounge brings a rich Twitter client to iPhone and Mac OS X

Lounge is a Twitter client that spans both Mac OS X and the iPhone. Offering a powerful, consistent user interface that will soon synchronize various features between the two platforms, Lounge seems like a great choice for using Twitter on-the-go.

Share

Mar 24 2009

New Service Aims To Replace Consoles With Cloud Gaming

ThinSkin writes “Imagine playing bleeding-edge games, yet never again upgrading your hardware. That’s the ambitious goal of OnLive’s Internet delivered gaming service. Using cloud computing, OnLive’s goal is to ‘make all modern games playable on any system,’ thanks in large part to OnLive’s remote servers that do all the heavy lifting. With a fast enough Internet connection, gamers can effectively stream and play games using a PC, Mac, or a ‘MicroConsole,’ ‘a dedicated gaming client provided by OnLive that includes a game controller.’ Without ever having to worry about costly hardware upgrades or the cost of a next-gen console, gamers can expect to fork over about yearly just for the service. If this thing takes off, this can spell trouble for gaming consoles down the road, especially if already-established services like Steam and Impulse join the fray.”

Read more of this story at Slashdot.

Share

Mar 24 2009

Court Says USPTO Can Change Patent Rules

bizwriter writes “Many large companies have been closely monitoring the Tafas v. Doll lawsuit over whether the US Patent and Trademark Office has the power to change the patent application process in significant ways, so as to restrict the scope of patents and the chances of getting one. The US Court of Appeals for the Federal Circuit has finally spoken, with a split court ruling that the USPTO does have the necessary authority. The case stems from a court challenge to four new rules the USPTO put in place in 2007. A number of tech companies including Microsoft, IBM, Oracle, Apple, and Intel have supported the rule changes, which would strengthen their positions and make it more difficult for small companies to create, protect, and bring to market disruptive technology. These companies didn’t have it all their way, as the appeals court said that one of the four rules conflicts with existing patent law and sent the other three back to a lower court for further review. If the decision is sustained by a full review of all 12 Federal Circuit appeals judges, it could be a blow to biotech and pharmaceutical companies, which depend on being able to obtain large numbers of patents. Expect further appeals on this one, and for the only beneficiaries in the short run to be the lawyers.”

Read more of this story at Slashdot.

Share

Mar 23 2009

25 Years of Mac: Classic Macs Still at Work

The machines are rare examples of aging Macs that are still in daily use. They are a testament to the utility and longevity of the Mac, which celebrates its 25th anniversary on Sunday.

Share

Mar 23 2009

Social Security Administration Launches E-Health Info Exchange

Lucas123 writes “In what could be the start of a national health information exchange system, the Social Security Administration became the first federal agency to go live with a public-private electronic health records information exchange that will cut wait time for 2.6 million Americans who apply for benefits each year by weeks or months. The electronic exchange runs on a database operated by a non-profit organization in Virginia and open-source software deployed at the Social Security Administration. ‘The goal of the NHIN effort is to enable secure access to health care data and real-time information sharing among physicians, patients, hospitals, laboratories, pharmacies and federal agencies … regardless of location or the applications that are being used.'”

Read more of this story at Slashdot.

Share

Mar 23 2009

Researchers Demo BIOS Attack That Survives Disk Wipes

suraj.sun writes “A pair of Argentinian researchers have found a way to perform unveil a BIOS level malware attack capable of surviving even a hard-disk wipe. Alfredo Ortega and Anibal Sacco from Core Security Technologies — used the stage at last week’s CanSecWest conference to demonstrate methods for infecting the BIOS with persistent code that will survive reboots and re-flashing attempts. The technique includes patching the BIOS with a small bit of code that gave them complete control of the machine. The demo ran smoothly on a Windows machine, a PC running OpenBSD and another running VMware Player.”

Read more of this story at Slashdot.

Share

Mar 21 2009

Report: Apple leaks 17-inch iMac for $899?

An Italian blog site notices a mention of a 9 iMac on Apple’s education site. Currently, Apple is offering only iMacs in 20- and 24-inch screen sizes, starting at ,199. But it’s unclear whether the 17-incher is really new or not.

Share

Mar 21 2009

Ballmer Scorns Apple As a $500 Logo

theodp writes “Speaking at a conference in NYC, Microsoft CEO Steve Ballmer did his best to refan the flames of the Mac vs. PC rivalry: ‘Now I think the tide has really turned back the other direction [against Apple],’ Ballmer said. ‘The economy is helpful. Paying an extra 0 for a computer in this environment — same piece of hardware — paying 0 more to get a logo on it? I think that’s a more challenging proposition for the average person than it used to be.'”

Read more of this story at Slashdot.

Share

Mar 21 2009

Researchers Ponder Conficker’s April Fool’s Activation Date

The Narrative Fallacy writes “John Markoff has a story at the NY Times speculating about what will happen on April 1 when the Conficker worm is scheduled to activate. Already on an estimated 12 million machines, conjectures about Conficker’s purpose ranges from the benign — an April Fool’s Day prank — to far darker notions. Some say the program will be used in the ‘rent-a-computer-crook’ business, something that has been tried previously by the computer underground. ‘The most intriguing clue about the purpose of Conficker lies in the intricate design of the peer-to-peer logic of the latest version of the program, which security researchers are still trying to completely decode,’ writes Markoff. According to a paper by researchers at SRI International, in the Conficker C version of the program, infected computers can act both as clients and servers and share files in both directions. With these capabilities, Conficker’s authors could be planning to create a scheme like Freenet, the peer-to-peer system that was intended to make Internet censorship of documents impossible. On a darker note, Stefan Savage, a computer scientist at the University of California at San Diego, has suggested the possibility of a ‘Dark Google.’ ‘What if Conficker is intended to give the computer underworld the ability to search for data on all the infected computers around the globe and then sell the answers,’ writes Markoff. ‘That would be a dragnet — and a genuine horror story.'”

Read more of this story at Slashdot.

Share

Mar 20 2009

Wayback Machine Gets Massive 2 Petabyte Upgrade

The Wayback Machine, the digital time capsule that stores 85 billion archived versions of web pages online dating back to 1996, is getting a new 2 petabyte data center.

Share