Mar 26 2009

How a Brainy Worm Might Jack the World’s PCs on April 1

It’s lurking in millions of PCs around the world. It’s incredibly sophisticated and resilient, with built-in p2p and digital code-signing technology. It revels in killing security software. On April 1, the Conficker worm will activate.

Share

Mar 24 2009

Court Says USPTO Can Change Patent Rules

bizwriter writes “Many large companies have been closely monitoring the Tafas v. Doll lawsuit over whether the US Patent and Trademark Office has the power to change the patent application process in significant ways, so as to restrict the scope of patents and the chances of getting one. The US Court of Appeals for the Federal Circuit has finally spoken, with a split court ruling that the USPTO does have the necessary authority. The case stems from a court challenge to four new rules the USPTO put in place in 2007. A number of tech companies including Microsoft, IBM, Oracle, Apple, and Intel have supported the rule changes, which would strengthen their positions and make it more difficult for small companies to create, protect, and bring to market disruptive technology. These companies didn’t have it all their way, as the appeals court said that one of the four rules conflicts with existing patent law and sent the other three back to a lower court for further review. If the decision is sustained by a full review of all 12 Federal Circuit appeals judges, it could be a blow to biotech and pharmaceutical companies, which depend on being able to obtain large numbers of patents. Expect further appeals on this one, and for the only beneficiaries in the short run to be the lawyers.”

Read more of this story at Slashdot.

Share

Mar 23 2009

20 Years After Cold Fusion Debut, Another Team Claims Success

New Scientist is reporting that twenty years to the day since the initial announcement of a cold fusion discovery another Utah-based team is trying again. This announcement is being taken a little more seriously than the original, although some might say it is just more available wishful thinking. “Some researchers in the cold fusion field agree. ‘In my view [it’s] a cold fusion effect,’ says Peter Hagelstein, also at the Massachusetts Institute of Technology. Others, though, are not convinced. Steven Krivit, editor of the New Energy Times, has been following the cold fusion debate for many years and also spoke at the ACS conference. ‘Their hypothesis as to a fusion mechanism I think is on thin ice … you get into physics fantasies rather quickly and this is an unfortunate distraction from their excellent empirical work,’ he told New Scientist. Krivit thinks cold fusion remains science fiction. Like many in the field, he prefers to categorize the work as evidence of ‘low-energy nuclear reactions,’ and says it can be explained without relying on nuclear fusion.”

Read more of this story at Slashdot.

Share

Mar 23 2009

The Age of Speed

enactd writes “I feel life is a constant juggle, for every task in hand you have another to react to or let drop. The Age of Speed helps you chart your tasks to keep the important goals in sight while recognizing and reacting to distractions. Being a geek on the cutting edge of technology gets one acquainted with speed quickly, but being able to handle it is another matter and streamlining is an ongoing effort. The goal of the book is to help you decide what is important in your life and extract as much pleasure from those things while minimizing the time spent on the mundane.” Keep reading for the rest of Chris’s review.

Read more of this story at Slashdot.

Share

Mar 22 2009

Places Where the World’s Tech Pools, Despite the Internet

Slatterz writes “A decade ago people were talking about the death of distance, and how the internet would make physical geography irrelevant. This has not come to pass; there are still places around the world that are hubs of technology just as there are for air travel, product manufacturing or natural resource exploitation. This list of the ten best IT centres of excellence includes some interesting trivia about Station X during the Second World War, why Romania is teeming with software developers, Silicon Valley, Fort Meade Maryland, and Zhongguancun in China, where Microsoft is building its Chinese headquarters.”

Read more of this story at Slashdot.

Share

Mar 22 2009

Body 2.0 — Continuous Monitoring of the Human Body

Singularity Hub has a story about the development of technology that will some day allow for the constant, real-time monitoring of your medical status, and they take a look at current technological advances to that end. Quoting: “Did you ever stop to think how silly and also how dangerous it is to live our lives with absolutely no monitoring of our body’s medical status? Years from now people will look back and find it unbelievable that heart attacks, strokes, hormone imbalances, sugar levels, and hundreds of other bodily vital signs and malfunctions were not being continuously anticipated and monitored by medical implants. … The huge amounts of data that would be accumulated from hundreds of thousands of continuously monitored people would be nothing short of a revolution for medical research and analysis. This data could be harvested to understand the minute by minute changes in body chemistry that occur in response to medication, stress, infection, and so on. As an example, the daily fluctuations in hormone levels of hundreds of thousands of individuals could be tracked and charted 24/7 to determine a baseline from which abnormalities and patterns could be extracted. The possibilities are enormous.”

Read more of this story at Slashdot.

Share

Mar 22 2009

New Bill Could Shift Federal Cybersecurity Work From DHS To White House

CNet reports on legislation currently being drafted that would transfer federal cybersecurity responsibilities away from the Department of Homeland Security. Instead, they would fall under the authority of the Executive Office of the President, creating an Office of the National Cybersecurity Advisor. A tech commission recommended relieving the DHS of cybersecurity responsibilities late last year, saying it simply wasn’t prepared to deal with organized online threats. More recently, the director of the DHS’s National Cybersecurity Center resigned, citing interference from the NSA. The new legislation would “put the White House National Cybersecurity Advisor in charge of coordinating cyber efforts within the intelligence community and within civilian agencies, as well as coordinating the public sector’s cooperation with the private sector. The adviser would have the authority to disconnect from the Internet any federal infrastructure networks — or other networks deemed to be ‘critical’ — if found to be at risk of a cyberattack. The private sector will certainly speak out if this provision is included in the final draft of the bill, a representative of the technology industry who spoke on condition of anonymity said.”

Read more of this story at Slashdot.

Share

Mar 21 2009

DC Fires Tech Contractors, Puts Employees On Leave

theodp writes “After Gov. Tim Kaine intervened on his behalf, Vivek Kundra was quietly reinstated to his Federal CIO post on Tuesday after a brief leave following an FBI raid on Kundra’s former DC office (Kundra was not implicated). Now, the Washington Post reports that the City of DC plans to fire 23 Technology Office contractors and place 4 employees on leave in the aftermath of the arrests of a Security manager and contractor on bribery charges last week. Another government employee has since been arrested for his role in the scam, and the mayor has promised that the tech office will undergo a ‘full and formal review.'”

Read more of this story at Slashdot.

Share

Mar 18 2009

Social Search Reveals 700 Comcast Customer Logins

nandemoari writes “When educational technology specialist Kevin Andreyo recently read a report on people search engines, he decided to conduct a little ‘people search’ on himself. Andreyo did not expect to find much — so, imagine the surprise when he uncovered the user name and password to his Comcast Internet account, put out there for the entire online world to see. In addition to his personal information, Andreyo also discovered a list that exposed the user names and passwords of (what he believed) to be 8,000 other Comcast customers. Andreyo immediately contacted both Comcast and the FBI, hoping to find the ones responsible for divulging such personal information to the public. While the list is no longer available online, analysts fear that the document still lives on in various cache and online history services.”

Read more of this story at Slashdot.

Share

Mar 18 2009

Digg’s Rose and Adelson Talk About Diggbar, New Features

Jay and Kevin talked about the new technology they’re rolling out, like a new Digg toolbar, integration with Facebook Connect and OpenID, an updated search tool and more customization features.

Share