An anonymous reader writes "Apple co-founder Steve Wozniak says that Apple and other tech companies' patent hoarding could prevent entrepreneurs doing the same thing that he and Steve Jobs did in starting a computer company in a garage. Woz also says the jury is still out on Tim Cook as the right CEO to lead Apple forward after Steve Jobs." He still gives Apple a bit of a break: "'Apple is the good guy on the block of all of them,' he says. 'It is creating so much and is so successful and it is not just following the formulas of other companies – [Apple is] totally establishing new markets that didn't exist.'"
Find out the latest on data centers with SlashDataCenter.
An anonymous reader writes "An IBM patent issued in March describes multitouch floors that detect who is in the home and what they're doing – perfect for detecting intruders and falls, notes MSNBC. CEPro.com suggests the technology also could be used to replace cameras and sensor arrays typically required for gesture control, and could detect staggering teens and 'unregistered' boyfriends. The floors could have 'tremendous implications for home health technology.'"
In the wake of the Trayvon Martin tragedy in February, many publications posted articles about "the talk" — a phrase denoting the conversation many black parents have at some point with their children to explain the realities of racism. Last Thursday, writer John Derbyshire penned an article titled "The Talk: Nonblack Version," which codified a similar set of lessons he had given to his children over the years. Unfortunately, those lessons turned out to be horribly racist themselves. "The remarkably long list of how to teach children to stay safe by avoiding black people goes on for two pages and Derbyshire contends is a true lifesaver. There is no irony or clarification that, perhaps, this is a joke, no matter how much you may want to find a disclaimer after you’re done reading." Reader concealment writes to point out that the internet and the media vocalized their disgust quickly and at length, and now Derbyshire has been fired from his position at the conservative National Review magazine (the offending article appeared in a different publication called Taki's Magazine).
SolKeshNaranek tips a story at TorrentFreak about an ongoing copyright case that revolves around how much effort websites need to expend to block repeat infringers after responding to DMCA requests. In 2011, a judge ruled that a website embedding videos from third parties had correctly removed links to infringing videos after receiving a DMCA request, but failed to do anything to police users who had created these links multiple times. For this, the judge said, the website would be required to adopt a number of measures to prevent repeat infringement. Google and Facebook wrote an amicus brief opposing the ruling, as did Public Knowledge and the EFF. Now the MPAA has, unsurprisingly, come out in favor. They wrote, "Contrary to the assertions of myVidster and amici Google and Facebook, search engines and social networking sites are not the only businesses that desire certainty in a challenging online marketplace. MPAA member companies and other producers of creative works also need a predictable legal landscape in which to operate. ... Given the massive and often anonymous infringement on the internet, the ability of copyright holders to hold gateways like myVidster liable for secondary infringement is crucial in preventing piracy."
netbuzz writes "Marking the latest escalation in the technology industry's intellectual-property arms race, Microsoft is paying AOL a shade over $1 billion for 800 patents, the cream of which AOL CEO Tim Armstrong has described as 'beachfront property in East Hampton.' Armstrong insists they haven't left the cupboard bare: 'We continue to hold a valuable patent portfolio as highlighted by the license we entered into with Microsoft. The combined sale and licensing arrangement unlocks current dollar value for our shareholders and enables AOL to continue to aggressively execute on our strategy to create long-term shareholder value.'"
Taco Cowboy writes "Here comes a chip that can pinpoint you in-door and out, it can even tell others on which floor of a building you are located. It's the Broadcom 4752 chip. It takes signals from global navigation satellites, cell phone towers, and Wi-Fi hot spots, coupled with input from gyroscopes, accelerometers, step counters, and altimeters The company calls abilities like this 'ubiquitous navigation,' and the idea is that it will enable a new kind of e-commerce predicated on the fact that shopkeepers will know the moment you walk by their front door, or when you are looking at a particular product, and can offer you coupons at that instant."
New submitter Cazekiel writes "If you think your boss is a fearless, miserable beast whose only worries lie in how well his company or business competes, think again. The 'Business Video Behavior Project' survey conducted by Qumu reveals that those in-charge are growing more and more paranoid about something the Average Joe fears just walking down the street nowadays: employees who will 'secretly film him with his metaphorical pants down and then post the footage for public delectation.' It would seem that it doesn't matter if you're powerful, wealthy and lording over hundreds of cubicles; they know the internet exists, everyone has a cell phone camera and thick wallets don't make discarded banana peels magically move out of their path." The company that paid for the study, note, promises to "securely distribute business video simultaneously over multiple Edge routes," so they probably don't mind some workplace paranoia.
An anonymous reader writes "The Utah Department of Health has been hacked. 181,604 Medicaid and CHIP recipients have had their personal information stolen. 25,096 had their Social Security numbers (SSNs) compromised. The agency is cooperating with law enforcement in a criminal investigation. The hackers, who are believed to be located in Eastern Europe, breached the server in question on March 30, 2012."
Presto Vivace writes "When the Australian Financial Review published its series on News Corp's pay TV pirates, it asked DocumentCloud to host the internal NDS emails which documented the allegations. Last week DocumentCloud was forced to take down the emails when NDS threatened legal action and the Financial Review declined to indemnify it. The Financial Review reports that: 'DocumentCloud is a free service operated by journalism organization Investigative Reporters and Editors at the University of Missouri. It aims to enable newspapers, websites and broadcasters to host documents supporting investigative reports. The website uses open source – or community developed – technologies to scan and index information, allowing users to quickly search hundreds or even thousands of pages for references to people, places, dates,company names and key terms.' The NDS emails are available as zip files at the Financial Review's server. Because DocumentCloud uses open source software, 'any news organization — or anyone else — is free to use DocumentCloud's code to build its own hosted version, on its own secure server, with many of the same capabilities, Aron Pilhofer, DocumentCloud's co-founder told me. Pilhofer, who is also interactive news editor at The New York Times, said that provides a little bit of breathing room for news organizations whose lawyers may be wary of exposing newspapers to risk through partnering with a third-party.'"
An anonymous reader writes with this excerpt from Wired: "Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world's communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails — parking receipts, travel itineraries, bookstore purchases, and other digital 'pocket litter.' It is, in some measure, the realization of the 'total information awareness' program created during the first term of the Bush administration — an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans' privacy."
An anonymous reader writes "The U.S. Navy is paying a company six figures to hack into used video game consoles and extract sensitive information. The tasks to be completed are for both offline and online data. The organization says it will only use the technology on consoles belonging to nations overseas, because the law doesn't allow it to be used on any 'U.S. persons.'" Should be a doddle.
Krystalo writes "The hacktivist group Anonymous today hacked multiple UK government websites over the country's 'draconian surveillance proposals' and 'derogation of civil rights.' At the time of writing, the following websites were taken down: homeoffice.gov.uk, number10.gov.uk, and justice.gov.uk. The group is not pleased with the UK government's plans to monitor Internet users."
An anonymous reader writes "Facebook already shares its Law Enforcement Guidelines publicly, but we've never actually seen the data Menlo Park sends over to the cops when it gets a formal subpoena for your profile information. Now we know. This appears to be the first time we get to see what a Facebook account report looks like. The document was released by the The Boston Phoenix as part of a lengthy feature titled 'Hunting the Craigslist Killer,' which describes how an online investigation helped officials track down Philip Markoff. The man committed suicide, which meant the police didn't care if the Facebook document was published elsewhere, after robbing two women and murdering a third."
An anonymous reader writes "As congressmen in Washington consider how to handle the ongoing issue of cyberattacks, some legislators have lent their support to a new act that, if passed, would let the government pry into the personal correspondence of anyone of their choosing. This is SOPA being passed in smaller chunks... 'H.R. 3523, a piece of legislation dubbed the Cyber Intelligence Sharing and Protection Act (or CISPA for short) has vague definitions that could allow Congress to circumvent existing exemptions to online privacy laws and essentially monitor, censor and stop any online communication that it considers disruptive to the government or private parties.'"
New submitter BBCS writes "The National Copyright Administration of the People's Republic of China ('NCAC') is seeking public comments on a controversial draft amendment to China's copyright law. A number of recording artists and musicians have reacted strongly against this proposed amendment because it appears to encourage using others works without compensation. The amendments that have drawn particular ire are article 46 & 48. Per Article 46, one does not need consent to make recordings of another person's musical work if 3 months have passed since such work was published. Per Article 48, to use such person's musical work, one must contact the NCAC, identify the published material and its author, and within 1 month of use, submit a usage fee as per the NCAC, to facilitate the distribution of payment to applicable parties. I wonder what happens when someone applies to make use of Chinese Democracy by Guns N' Roses." What would you do, if copyright were so strongly time-limited?