dkd903 writes: "Sean Ryan, Director of Games partnership at Facebook says "Google has emulated aspects of our system, which is what they have the right to do. We just need to be better. Google is at 5% because they don't have any users.""
An anonymous reader writes: Security researchers have unearthed a piece of malware that mints a digital currency known as Bitcoins by harnessing the immense power of an infected machine's graphical processing units.
According to new research from antivirus provider Symantec, Trojan.Badminer uses GPUs to generate virtual coins through a practice known as minting. That's the term for solving difficult cryptographic proof-of-work problems and being rewarded with 50 Bitcoins for each per correct block.
Slags writes: The idea behind Fluidinfo is that read-only information is just not as useful as on the Web as openly writable information. Metadata is used routinely in the real world from name tags to post-it notes but it is much harder to apply metadata to information on the Internet. That is where Fluidinfo comes along. When information needs to be stored about an object the Fluidinfo database is queried. If the object exists in Fluidinfo, the information is appended to the object. If the object does not exist then it will be created and stored.
An anonymous reader writes: Bre Pettis is so busy right now he should print a replica of himself. Pettis is a co-founder of the Brooklyn-based consumer 3D printing wunderkind MakerBot. He's also one of the de facto spokesmen for "Maker" culture, whose acolytes design and print objects then post the results online. Pettis dreams of a rapidly prototyped utopia filled with objects custom made by people.He is also an entrepreneur who must deal with the vagaries of supply chains and the demands of his customer base. Txchnologist talked with him last week.
coondoggie writes: "Denizens of the malware underworld who sell access to compromised computers do so at varying rates depending on where the machines are located, researchers told the Usenix Security Symposium this week. The researchers followed what they called the pay-per-install (PPI) industry, which obtains infected machines from which malware can be launched and sells access to these machines to parties looking for someplace to execute malicious code. Sometimes the PPI sellers hire middlemen to supply the compromised machines, and the PPI dealer retails them."
zacharye writes: Google and Motorola Mobility have announced an agreement whereby Google will acquire Motorola for $12.5 billion. The acquisition price equates to $40 per share of Motorola stock, or a premium of 63% over Friday’s closing price. The move is considered to be an effort that will better-align Google to compete with Apple’s iPhone, which currently owns two-thirds of profits among the world’s top-8 smartphone vendors...
sfcrazy writes: The heart of the issue is the 'generic/broad' design of a tablet that Apple got approved as EC community design. One may wonder how such a generic design, which cover an entire range of product and overlaps with other already existing products be patented to one single company?
I lot of bloggers like Ken Hess and Apple fans are defending Apple. Ken has defended Apple for patenting the iPad design. The question is how unique is the iPad's design, are there prior arts?
Muktware has gather prior art examples which may make the iPad design patent invalid.
MojoKid writes: "The Federal Communications Commission has released the results of a year-long scientific study it conducted with regard to the upload and download speeds of thirteen American Internet service providers. Most of the ISPs hit 90 percent of their advertised upload speeds. Of the 13 providers tested, only four (or less than a third) averaged at or even above their advertised download speeds (Charter, Comcast, Cox, and Verizon Fiber). The tests were performed by a private firm that has run similar tests in the U.K. It measured performance at 6,800 "representative homes" nationally in March."
An anonymous reader writes: NASA has been tasked with landing astronauts on a space rock by 2025, and on the Red Planet by the mid 2030s. To reach those goals, the United States must develop a new heavy-lift rocket capable of traveling that far, and a capsule to bring people safely there and back again.
arisvega writes: DARPA attempted to fly the fastest aircraft ever built; the Agency’s Falcon Hypersonic Technology Vehicle 2 (HTV-2) is designed to fly anywhere in the world in less than 60 minutes. This capability requires an aircraft that can fly at 13,000 mph (~21000kph), while experiencing temperatures in excess of 3500F (~2000C). Program manager Air Force Maj. Chris Schulz does not see it as a failure; “We know how to boost the aircraft to near space. We know how to insert the aircraft into atmospheric hypersonic flight. We do not yet know how to achieve the desired control during the aerodynamic phase of flight. It’s vexing; I’m confident there is a solution. We have to find it.”
The research, which will be presented at the 20th USENIX Security Symposium in San Francisco, is the culmination of a nine month survey of Web search results for 218 drug-related queries. Fully one third of the search results collected in the survey was found to point back to one of 7,000 infected hosts, which in turn redirected visitors to just a few hundred pharmacy Web sites, according to a post by Tyler Moore, a postdoctoral fellow at the Center for Research on Computation and Society (CRCS) at Harvard University on the Cambridge University blog Light Blue Touchpaper.
Speaking in the House of Commons, Cameron said, "Everyone watching these horrific actions will be struck by how they were, organised via social media.
"Free flow of information can be used for good. But it can also be used for ill. So we are working with the police, the intelligence services and industry to look at whether it would be right to stop people communicating via these websites and services when we know they are plotting violence, disorder and criminality."