Apr 18 2009

Robo-Arm Signatures Are Legal, Gov’t Buys One

AndreV writes “It’s endlessly comforting to know a recently designed and implemented long-distance robotic signing arm can produce signatures legal in both the US and Canada. The aptly named LongPen replicates the handwriting from a person writing in a remote location — with the unique speed, cadence and pressure of a human pen-stroke. It started as an idea from author Margaret Atwood to help free her from grueling, multi-city, multi-country book tours, but the hard stuff was done by a bunch of Canadian haptic gurus, whose design took into consideration many factors of the human arm and how we write. How it works: from the author-end, data protocols are set up, and the pen pressure is measured on a special tablet. The data streams to the robot, while algorithms smooth out all the missed points. Complex math operations were used to help the mechatronic limb repeat the hand’s motions without unnecessary jerking, and programmers had to ‘scale time’ or ‘stretch time’ by breaking down the movements, essentially tricking the eyes into thinking the robot is writing fast. It was recently adopted by the Ontario Government to sign official documents. It helps criminals sign books, too.”

Read more of this story at Slashdot.

Share

Apr 17 2009

Philosophies and Programming Languages

evariste.galois writes “Wikipedia has a special section called, ‘Language Philosophy,’ in every article for a programming language. This section looks at the motivation and the basic principles of the language design. What if we investigate further than that? What deeper connections between philosophies and programming languages exist? By considering the most influential thinkers of all time (e.g. Plato, Descartes, Kant) we can figure out which programming language fits best with aspects of their philosophy (Did you know that Kant was the first Python programmer)? The list is not exhaustive, but this is a funny and educative start.”

Read more of this story at Slashdot.

Share

Apr 17 2009

Brendan Eich Explains ECMAScript 3.1 To Developers

VonGuard writes “On April 9, ECMA International produced the final draft for the first major update to JavaScript since 1999. It’s called ECMAScript 3.1, but will soon be known as ECMAScript, Fifth Edition. You’ll know it as JavaScript, the Next Generation. Mozilla will begin implementing these features after Firefox 3.5, and Microsoft is already showing prototypes behind closed doors. The question, however, is what this will change for JavaScript coders. To get those answers, I tracked down Brendan Eich, Mozilla’s CTO and the creator of JavaScript. I transcribed the interview without any editorial since he explains, perfectly, what’s changing for programmers. Long story short: Json will be safer, getters and setters will be standard, and strict mode will make things easier to debug.”

Read more of this story at Slashdot.

Share

Apr 17 2009

The Secret History of the FBI’s Classified Spyware

An anonymous reader writes “A sophisticated FBI-produced spyware program has played a crucial behind-the-scenes role in federal investigations into extortion plots, terrorist threats and hacker attacks in cases stretching back at least seven years, according to newly declassified documents obtained by Wired.com. The so-called ‘computer and internet protocol address verifier,’ or CIPAV, is delivered through links to websites controlled by the FBI, and it silently reports back to a government server in Virginia. Among other cases, the FBI used it to track a Swedish hacker responsible for cracking thousands of computers at national labs and NASA’s JPL in 2005.”

Read more of this story at Slashdot.

Share

Apr 16 2009

Victoria's disappearance on 'Most Wanted' website – CTV.ca


Globe and Mail

Victoria's disappearance on 'Most Wanted' website
CTV.ca
The case of a missing Woodstock, Ont. girl has caught the attention of "America's Most Wanted," a well-known US television program dedicated to tracking down missing children and dangerous fugitives.
America's Most Wanted takes up case of missing Ont. girl CBC.ca
Gossip galls Tori's mother Toronto Star
Globe and Mail – CTV.ca – Toronto Star – Globe and Mail
all 894 news articles
Share

Apr 15 2009

Subverting PIN Encryption For Bank Cards

An anonymous reader sends in a story at Wired about the increasingly popular methods criminals are using to bypass PIN encryption and rack up millions of dollars in fraudulent withdrawals. Quoting: “According to the payment-card industry … standards for credit card transaction security, [PINs] are supposed to be encrypted in transit, which should theoretically protect them if someone intercepts the data. The problem, however, is that a PIN must pass through multiple HSMs across multiple bank networks en route to the customer’s bank. These HSMs are configured and managed differently, some by contractors not directly related to the bank. At every switching point, the PIN must be decrypted, then re-encrypted with the proper key for the next leg in its journey, which is itself encrypted under a master key that is generally stored in the module or in the module’s application programming interface, or API. ‘Essentially, the thief tricks the HSM into providing the encryption key,’ says Sartin. ‘This is possible due to poor configuration of the HSM or vulnerabilities created from having bloated functions on the device.'”

Read more of this story at Slashdot.

Share

Apr 15 2009

60 Beautiful Fractals Created with Apophysis:Part 1

Fractals are becoming more and more popular between designers and they have a good reason for it -with programs like Apophysis such fractal creation isn’t tiresome process, just play with settings, variables, scripts, plugins and get unbelievable results.

Share

Apr 14 2009

Tyler Bell On Yahoo’s Open Location API

blackbearnh writes “Yahoo! has been working for a while to promote a unified system for referring to places, through their Where On Earth IDs. Using a WOEID, you can query Yahoo’s publicly available APIs to find out things like what cities are in a county, or what counties border each other. In an interview for O’Reilly Radar, Tyler Bell, the product lead for the Yahoo Geo Technology Group, talks about their Open Location program (not to be confused with openlocation.org, a different group altogether.) He also talks about how privacy concerns interact with the increasing use of personal geotracking, and the troublesome problem of what to call places. ‘I’m not even going to tell you about the problems we had when we accidentally called Constantinople Byzantium, just slipping back about 800 years there accidentally. That’s a very sensitive issue. Any company dealing with geography is going to have to address it somehow. So I’ll be very candid in how Yahoo addresses this. I mean first, our stated goal is to capture the world’s geography as it is used by the world’s people. We don’t see ourselves as the definitive authority on how a place should be called.'”

Read more of this story at Slashdot.

Share

Apr 14 2009

Microsoft Won’t Vouch For Linux

theodp writes “Gov. Christine Gregoire applauded Microsoft’s job training partnership with WA state and county government agencies, which calls for the distribution of 30,625 training vouchers statewide during the next 90 days. ‘This program [Elevate America] is all about equipping people with the new skills they’ll need to get a job in the changing economy,’ said Microsoft Counsel Brad Smith, who also made it very clear that getting ‘workforce ready’ won’t involve acquiring any Linux skills. At least this offer appears to be no-cost, unlike the Microsoft requested in an e-mail come-on for ‘The Stimulus Package for Your Career’ (so much for Smith’s and Gregoire’s war on spam).”

Read more of this story at Slashdot.

Share

Apr 14 2009

Ponzi Schemes Multiply On YouTube

Hugh Pickens writes “While it’s probably not true that P. T. Barnum was the originator of the saying ‘there’s a sucker born every minute,’ the proliferation of nearly 23,000 Ponzi schemes on YouTube, with an astounding 59,192,963 views, proves that the sentiment is still alive and well. The videos usually don’t ask for money directly, but send viewers to web sites where they are urged to sign up for the ‘gifting program,’ usually for fees ranging from 0 to ,000. One of the videos recently added on YouTube featured Bible quotes, pictures of stacks of money and a testimonial from a man who said he not only got rich from cash gifting, but also found true happiness and lost 35 pounds. ‘They make it seem like it’s legal and an easy way to make money, but it’s nothing more than a pyramid scheme,’ says Better Business Bureau spokeswoman Alison Southwick. Some of the videos claim that because it’s ‘gifting,’ it’s somehow legal. ‘They talk about “cash leveraging,” whatever that means, and other vague marketing talk,’ says Southwick, but the basic scheme is that participants are told to recruit more people who will put in more money. ‘It’s just money changing hands,’ says Southwick, ‘and it always goes to people at the top of the pyramid.’ A spokesman for YouTube, which is owned by Google Inc., said the company doesn’t comment on individual videos.”

Read more of this story at Slashdot.

Share