Wikipedia Mining Algorithm Reveals the Most Influential People In History
Wikipedia is very slanted towards recent and Eurocentric events.
Yes, this is somewhat explainable in terms of how much literature has been produced over time, and how much literature is accessible online. Wikipedia isn't the problem here, the problem is that the authors didn't acknowledge this issue, let alone attempt to account for it in their computation. (though it's a long paper, so I might have missed where it was discussed)
Disney Algorithm Builds High-Res 3D Models From Ordinary Photos
3D scanning is really important. Whenever we figure out how to do it faster/cheaper/easier, that's important. 3D scanning is useful for all kinds of future activities, from the maker movement (3D printer + 3D scanner = 3D copier), to gaming (eg. Kinect), to driving (eg. DARPA Grand Challenge), to mobile devices (eg. Google Glasses).
In a Security Test, 3-D Printed Gun Smuggled Into Israeli Parliament
whose idea was it to use metal detectors as gun detectors? Time & technology change... and detection methods must change with them.
If non-metallic guns were truly viable, they would have been used 20 years ago to sneak past metal detectors and kill judges and politicians and airplane pilots. Plastic manufacturing has been around for a long time, the only thing 3D printers do is reduce the cost. There are well-funded spy agencies and a few individuals who would have paid hundreds of thousands of dollars for a single gun. And yet none has materialized:   
In Praise of Hackerspaces
I can only speak to how my local hackerspace handles it, I don't know how others do.
At this one, most power tools are owned by individual members. If someone gets hurt and wants to sue someone, the only person they can sue is the individual owner. On one hand, this sucks because it puts all the burden on individuals' shoulders. On the other hand, it decreases the chance that someone tries to pay legal fees from prospective damage awards, because damages are likely to be very small, so it reduces the chance someone will lawyer up.
Our hackerspace hasn't had any incidents yet, so I don't know how well this plays out in practice.
Student Expelled From Montreal College For Finding "Sloppy Coding"
Shooting the messenger does nothing to solve the underlying problem. Thanks to the fourth estate and the Streisand effect, shooting the messenger is likely to get you more attention, not less.
DARPA Wants Wireless Devices That Can Blast Through the Noise
The goal is to "engineer software-based radios that transmit data faster than a competitor using identical hardware".
The goal isn't to develop fancy new hardware, or to use an overwhelming amount of power. The goal is to develop fancy new software.
With frequency-hopping and time-hopping techniques, if you can intelligently adapt to the local interference, and transmit in the time and frequency gaps where the interference doesn't occur, then you can transmit more data for the same amount of power. That's the goal.
ElcomSoft Tool Cracks BitLocker, PGP, TrueCrypt In Real-Time
This tool extracts the keys from RAM dumps. There are free tools that do this too, of course.
But isn't it difficult to get a RAM dump, you say? Not really:
- Hibernating a computer writes this data to disk. Starting in Windows 8, "shutdown" actually writes some hibernate data by default.
- VMs also have their own suspend functionality that does a RAM dump, as well as non-SAN VM migration.
- Firewire ports actually allow devices to scan RAM of the machine they're connected to.
- Obviously, if you have access to a live machine, you can get the keys directly from RAM.
100km/h Sailboat Sets Speed Record
Interesting fact — There's an 85% fatality rate for the speed record for any boat. This sport is extremely dangerous.
The sailing speed record is 80% slower than the overall boat record, so the sailing record is a little safer. Nonetheless, one of the SailRocket crashes led to the pilot having a broken helmet.
Running Netflix On Linux
Netflix runs fine on ChromeOS on x86, which is Linux-based too.
Yet Another "People Plug In Strange USB Sticks" Story
The Teensy is a little too wide, and has the wrong USB connector, to fit in a flash-drive shell. Here is a list of others that DO fit within a flash-drive shell. Ones that definitely fit include:
AVR-Stick, by Reusch Elektronik
US Warns of Problems In Chinese SCADA Software
"DCS is commonly used to handle operations on a single locale, while SCADA is preferred for applications that are spread over a wide geographic location."
The term "SCADA" is specifically used for industrial processes that have to be connected by long-distance networking.
Upscaling Retro 8-Bit Pixel Art To Vector Graphics
PDF mirror is here
VMware Causes Second Outage While Recovering From First
If I saw a Madagascar button in a datacenter with a sign on it that said "DO NOT PRESS THIS! It will SHUT DOWN EVERYTHING!", I would probably remove that key from the keyboard.
Predator Outdoes Kinect At Object Recognition
It may not really be open source. The author says it's available under the GPLv3. But the author also says something completely contradictory:
Using XSS & Google To Find Physical Location
Wrong, wrong. A default password means you ARE vulnerable. It's such a problem that ISPs are willing to do questionable things to fix it.
(it's a slight variant of your #2, though "compromising" in this case doesn't mean a full compromise, it means mildly abusing the DNS spec to work around XSS restrictions)
Chernobyl Area Survey Finds Lasting Problems For Wildlife
This isn't a chicken-and-egg problem. Scavengers existed before humans evolved.
A New Take On the Fermi Paradox
If you're at all intellectually honest, you'll have to admit that there's a rather substantial difference between HIV/AIDS and religion.
Only a matter of degree. Compare it to the common cold instead. For most people, it drains their energy that could be used elsewhere, but they otherwise live fine. In its most virulent form, it does kill a few people (inter-religious violence, anti-medicine beliefs, etc).
Mom Arrested After Son Makes Dry Ice "Bombs"
And if the cops ask you to delete photos, play along, because recovering the deleted photographs is trivial compared to what can happen when arguing with a cop.
After the cop leaves, swap out the memory card for another. Make sure you set the card aside and don't take any more pictures on it, because taking new pictures could potentially overwrite some of the deleted data. When you get home, download and run PhotoRec (it's GPL/open source, available on multiple platforms, and runs almost without regard to what the underlying filesystem is).
Tattoos For the Math and Science Geek?
Tattoos are (nearly) eternal, so you you want to choose a tattoo that will keep its meaning and significance for a long time. Physics equations are ideal because, not only are they unlikely to change, but they've been in effect long before they were discovered by humans. They're older than diamonds -- something else that people like to adorn themselves with because they're important and "timeless".
Schools, Filtering Companies Blocking Google SSL
It's not necessarily the wrong way to do it. If you work at a military/defense company, where they have separate classified and unclassified networks, this is the solution they use.
But you're right, it does have notable downsides -- mainly, that when employees log into banking/finance sites, there's one box on your network that sees ALL of their passwords. If that one box were ever to be compromised, you have serious issues on your hands.
interiot hasn't submitted any stories.
interiot has no journal entries.