porsche911 (64841) writes "The Wall Street Journal has an interesting article about how the data from Implanted health devices is managed and the limitations patients run into when they want to see the data. Companies like Medtronic plan to sell the data but won't provide it to the person who generated it." Link to Original Source top
porsche911 (64841) writes ""The jury decided Google did make use of Oracle's Java interfaces, but was unable to reach a decision on whether that was protected under the so-called fair-use doctrine.
The jury did find separately that Google infringed a minimal amount of Java source code as it developed its Android mobile phone software, though the judge overseeing the case indicated Oracle would only be entitled to statutory damages as a result. "" Link to Original Source top
porsche911 (64841) writes "Cringely has a series of blogs about IBMs plans going up this week. The first one talks about plans to double Earnings per Share by moving everything but Sales off-shore (i.e., India). Some great and still very applicable quotes from the late Steve Jobs about what happens when "content" people get pushed out by "marketing" and "accounting" folks." Link to Original Source top
porsche911 (64841) writes "Interesting article from The Economist on the bifurcation of jobs in America. "While employment in retail trade is down by more than 300,000 jobs over the past decade, employment in "computer systems design and related services" is up nearly 400,000 jobs."" Link to Original Source top
porsche911 (64841) writes "As usual, Rands nails the discussion in his bolt "Hacking is Important".
"Failure to create some form of predictability will result in chaos. Failure to create some sort of well-maintained Barbaric chaos inside the company guarantees that a fast-moving, ambitious, risk-taking and ruthless someone else — someone outside the company will invade, because they know what you forgot: hacking is important."" Link to Original Source top
porsche911 (64841) writes "Great article in Spiegel about the future with computers and the social impacts. "the power of computers is growing so quickly that they will be capable of operating with absolutely no human involvement at some point in the future. Ford believes that 75-percent unemployment is a possibility before the end of the century."" Link to Original Source top
porsche911 (64841) writes "http://tinyurl.com/6wuetg3 A good opinion piece about Bell Labs and how our current style of innovation doesn't create the massive new industries that the Labs model started. When AT&T shutdown the labs, one of my friends made the comment that "the executives who closed Bell Labs so they could spend the money on advertising should be put in prison."" Link to Original Source top
porsche911 (64841) writes ""Steve Kordek, who revolutionized the game of pinball in the 1940s by designing what became the standard two-flipper machine found in bars and penny arcades around the world, died on Sunday at a hospice in Park Ridge, Ill. He was 100."
“Steve’s impact would be comparable to D. W. Griffith moving from silent films through talkies and color and CinemaScope and 3-D with computer-generated graphics,” Mr. Sharpe said. “He moved through each era seamlessly.”"" Link to Original Source top
porsche911 (64841) writes "" The researchers whimsically titled their paper “Ron Was Wrong, Whit Is Right,” a reference to two pioneers in public key cryptography, Ron Rivest and Whitfield Diffie."
It appears that there is a new flaw in the standard encryption algorithms being used that causes about 2 out of every 1,000 keys to be nonrandom.
"“This comes as an unwelcome warning that underscores the difficulty of key generation in the real world,” said James P. Hughes, an independent Silicon Valley cryptanalyst who worked with a group of researchers led by Arjen K. Lenstra, a widely respected Dutch mathematician who is a professor at the École Polytechnique Fédérale de Lausanne in Switzerland. “Some people may say that 99.8 percent security is fine,” he added. That still means that approximately as many as two out of every thousand keys would not be secure.
The researchers examined public databases of 7.1 million public keys used to secure e-mail messages, online banking transactions and other secure data exchanges. The researchers employed the Euclidean algorithm, an efficient way to find the greatest common divisor of two integers, to examine those public key numbers. They were able to produce evidence that a small percentage of those numbers were not truly random, making it possible to determine the underlying numbers, or secret keys, used to generate the public key."" Link to Original Source top
porsche911 (64841) writes "The Wall Street Journal is reporting that suspected Chinese hackers had control over Nortel's computers as far back as 2000 but the extent wasn't known until 2009. "Using seven passwords stolen from top Nortel executives, including the chief executive, the hackers—who appeared to be working in China—penetrated Nortel's computers at least as far back as 2000 "" Link to Original Source top
porsche911 (64841) writes "Good article comparing the innovation strategies of Google and Apple.
“There is nothing democratic about innovation,” says Paul Saffo, a veteran technology forecaster in Silicon Valley. “It is always an elite activity, whether by a recognized or unrecognized elite.”" Link to Original Source top
porsche911 (64841) writes "Forbes blog about "Access Controlled" from the Open Net Initiative describes the next generation information control techniques being developed. Pointers to the book and more background. Basically the open net we've all grown to know and love may be a very different place in the future if these techniques become common." Link to Original Source