Saturday, February 6, 2010

Computer Maker Claims Apple stole its iPad design



Nautilus Science and Technology
February 6, 2010
By: Marco Ayllon

The Shenzhen Great Loong Brother Company of China has alleged the Apple iPad design that CEO Steve Jobs triumphantly unveiled last week is based on its own P88 tablet and is threatening Apple with an injunction.


Spanish newspaper El Mundo has reported that the Chinese company’s president, Xialong Wu, said that if Apple releases the iPad in March it will report the company and seek an injunction because of the effect the device will have on its sales.

Wu said the P88 is not based on the design of the smaller iPod touch and said the P88 has entirely different functions.

Apple has refused to comment on the allegations. But could such a legal action succeed?

Wu said he presented the P88 at the International Electronics Fair in Berlin six months ago.

The P88 uses a resistive touchscreen, not the multi-touch screen of the Apple iPad and uses a 250GB hard drive compared to the iPad’s flash memory.

Wu has admitted he would find it difficult to sue Apple in the United States but has threatened that if the iPad enters China he will go to town on Apple.

Microsoft Warns of Record Patch Tuesday



Nautilus Science and Technology
February 6, 2010
By; Marco Ayllon

January was an exceptionally light month for Microsoft security bulletins, with only one released on schedule on Patch Tuesday. However, revelations about an Internet Explorer zero-day exploit being used to launch attacks against Google and other companies in China led Microsoft to also issue an out-of-band update addressing the vulnerability in the Web browser.


Tyler Reguly, senior security engineer for nCircle expressed some "sticker shock". "As an information security professional, the first word that comes to mind when I see this advanced notice is "yikes!". nCircle VERT works all night to deliver local and remote detection to customers and this many bulletins means a long night requiring plenty of caffeine."

Reguly added "I'm most intrigued by bulletin number nine in the advanced notification. I'm curious to know what issue it is that plagues only Server 2008 and Server 2008 R2 in x64 configurations."

Jerry Bryant, senior security communications manager for Microsoft, described the upcoming Patch Tuesday in a blog post. "This month, we will be releasing 13 bulletins--five rated Critical, seven rated Important, and one rated Moderate--addressing 26 vulnerabilities. Eleven of the bulletins affect Windows and the remaining two affect Office."

Bryant's blog post also contains a table which lays out a grid describing Microsoft's guidance for urgency of deployment based on platform. Windows 2000 and Windows XP, the oldest operating systems tracked on the grid, are impacted the most by security issues rated as Critical.

Microsoft is scheduled to end all support for Windows 2000 and for Windows XP SP2 effective July 13, 2010. Bryant says "We encourage customers to upgrade to the latest versions of both Windows and Office. As this bulletin release shows, the latest versions are less impacted overall due to the improved security protections built in to these products."

Businesses still on Windows 2000 will be forced to upgrade to some other version of Windows, or an alternate operating system, or simply continue to rely on the archaic platform with the knowledge that Microsoft will no longer support or update it.

Companies that use Windows XP SP2 have a much easier solution because they can simply apply Service Pack 3. It is also worth noting that support for Windows Vista RTM ends April 13, 2010, so businesses that have deployed Windows Vista need to ensure systems are updated to Service Pack 1.

The Internet Explorer flaw identified in Microsoft Security Advisory 980088, released from Microsoft yesterday, will not be patched this month. Microsoft states in the security advisory that the vulnerability is not currently being exploited in the wild, and provides some steps to mitigate the threat and protect your systems pending an actual patch.

As Reguly suggested, IT administrators may want to start a pot of coffee and make sure the break room fridge is stocked with Mountain Dew. Next Tuesday will be the beginning of some long hours testing and patching.

Facebook Has Gotten Another Face-lift.




Nutilus Science and Technology News
By:Marco Ayllon
February 6,2010
Facebook Marks 6th Birthday With Redesign 05.02.2010
Popular social-networking site Facebook has spruced up its homepage again. A clever step to mark six years or a mid-life crisis comb-over?

This time, the redesign plants more of Facebook's core features and settings on the homepage, in order to prevent users from having to jump from page to page to access their favourite items.


The first group of Facebook members would have noticed the redesign on Thursday night - the day Facebook marked its sixth anniversary.

Facebook has another fix-up in the works, as well. The company is reportedly also ready to revamp its internal e-mail program and replace it with a full-featured web mail application.

The new e-mail system will support both POP and IMAP, so users can use it outside Facebook and be able to set up their own Facebook vanity URL as their address, for example, joe.smith@facebook.com.

The popular social-networking site has tweaked its home page yet again. This time around, the redesign puts more of Facebook's core features and settings right on the home page. The goal is to spare users from having to jump from one page to another to access their favorite features.

The redesign was rolled out to the first group of users on Thursday, Facebook's 6th birthday. As of Thursday evening, 80 million out of Facebook's 400 million customers should have received the new home page, according to Inside Facebook.

The top menu of the Facebook home page now displays icons for requests, messages, and other notifications. The icons turn into red bubbles when you've got new requests waiting for your attention. Just click on one of the icons, and a drop-down menu appears showing you all the items in that list.

The right side of the top menu now displays links that take you home or to your profile page. A new account menu lets you quickly access your account settings, help center, and related pages.

In the middle of the top menu is a new search field, through which you can find names, subjects, and other items of interest. Type the name of a friend, for example, and you'll find recent posts, photos, and other content for that person. Type the name of a subject, such as Haiti earthquake, and you'll also find groups and pages devoted to that cause.

The left side of the new home page offers links to your news feed, messages, friends, and photos. But there's a twist here as well. Click on the Friends link, and the Friends page pops up in the center. Click on the Photos link, and your own photo albums and those of your friends appear. The center of the home page essentially stays the same by displaying your news feed, though you can now bounce between top news and most recent news.

But a home page redesign isn't the only thing on Facebook's mind. The company is reportedly also ready to jettison its internal e-mail program and replace it with a full-featured Web mail application, according to TechCrunch.

Known internally as Project Titan, the new e-mail effort could please many Facebook users who have complained about the limitations and clumsiness of the current e-mail feature. TechCrunch says the new e-mail system will support both POP and IMAP, so you can use it outside of Facebook.

Thursday, July 30, 2009

Song Swapper Faces $5.5m Fine for Doing: 'What Kids Do'



By: Marco A. Ayllon
Science and Technology News
July 30, 2009

The major recording labels in the US are again going after an individual for swapping songs through file-sharing networks such as Kazaa.

In the previous case, in Minnesota, a single mother of four was fined more than $2 million for copyright infringement.

Tenenbaum is accused of downloading and distributing songs from bands such as Green Day and Aerosmith. The case centres on 30 shared songs, though the recording companies say he distributed many more than that.

The court heard that Tenenbaum was "a kid who did what kids do and loved technology and loved music".

The industry has typically offered to settle cases for about $US5000, though it has said that it stopped filing such lawsuits last August and is instead working with internet service providers to fight the worst offenders. However, cases already filed are proceeding to trial.

Charles Nesson, a Harvard Law School professor representing Tenenbaum, said his client - a graduate student in physics - started downloading music as a teenager, taking advantage of file-sharing networks that make it possible for computer users to share digital files with a network of strangers.

"He was a kid who did what kids do and loved technology and loved music," Nesson said in opening statements.

Nesson said the recording companies enjoyed decades of success but were slow to adapt to the advancements of the internet.

"The internet was not Joel's fault," Nesson said. "The internet sweeps in like the way the automobile swept into the buggy industry."

But Tim Reynolds, one of the lawyers representing the recording industry, said song-swappers such as Tenenbaum took a significant toll on the recording industry's revenues and on back-up singers, sound engineers and other people who make a living in music.

Reynolds said Tenenbaum used a computer in his parents' house in Providence and then at Goucher College in Baltimore, where he was a student, to download and distribute digital files.


He was flagged in August 2004 by MediaSentry, a private investigation company that was used by the recording industry to identify illegal song distribution.

Reynolds said that Tenenbaum continued distributing songs even after he had been confronted about it and that the defendant blamed his sister, friends and a foster child who had lived at the house.

"This defendant knew what he was doing was wrong at each step of the way," Reynolds said.

Under federal law, the recording companies are entitled to $US750 to $US30,000 per infringement but the law allows the jury to raise that to as much as $150,000 per track if it finds the infringements were wilful.

In the Minnesota case, the jury ruled Jammie Thomas-Rasset, 32, wilfully violated the copyrights on 24 songs and awarded damages of $US80,000 per song.

Nesson urged the jury to "find the minimum number of infringements" by Tenenbaum, if any at all.

The recording companies involved in the case are subsidiaries of Universal Music, Warner Music and Sony.


There's no subterfuge with Joel Tenenbaum.

The graduate student accused of copyright violations admitted in court on Thursday that he shared files and knew others were downloading the music he made available on Kazaa, according to a Twitter post from blogger Ben Sheffner.

Sheffner, a copyright lawyer who is covering the story from the courtroom, wrote "(Music industry) attorney getting scores of admissions from Tenenbaum. Joel doesn't resist."

The four major music labels, Universal Music Group, Warner Music Group, EMI and Sony Music filed the copyright suit against Tenenbaum and in previous statements he denied sharing, according to Sheffner.

By admitting guilt, it appears Tenenbaum is going to take his chances that his attorney, Prof. Charles Nesson can convince the jury that sharing unauthorized music files doesn't cause that much harm and ordering defendants to pay big damages isn't justified.


Tenenbaum, along with Jammie Thomas-Rasset, are the only people accused of illegal file sharing that have taken their cases before a jury. In June, Thomas was found liable of copyright infringement and ordered to pay nearly $2 million.

Computer Scientists Worry Machines May Outsmart Man





By: Marco A. Ayllon
Science and Technology News
July 30, 2009

A robot that can open doors and find electrical outlets to recharge itself. Computer viruses that no one can stop. Predator drones, which, though still controlled remotely by humans, come close to a machine that can kill autonomously.

Impressed and alarmed by advances in artificial intelligence, a group of computer scientists is debating whether there should be limits on research that might lead to loss of human control over computer-based systems that carry a growing share of society’s workload, from waging war to chatting with customers on the phone.

Their concern is that further advances could create profound social disruptions and even have dangerous consequences.

As examples, the scientists pointed to a number of technologies as diverse as experimental medical systems that interact with patients to simulate empathy, and computer worms and viruses that defy extermination and could thus be said to have reached a “cockroach” stage of machine intelligence.

While the computer scientists agreed that we are a long way from Hal, the computer that took over the spaceship in “2001: A Space Odyssey,” they said there was legitimate concern that technological progress would transform the work force by destroying a widening range of jobs, as well as force humans to learn to live with machines that increasingly copy human behaviors.

The researchers — leading computer scientists, artificial intelligence researchers and roboticists who met at the Asilomar Conference Grounds on Monterey Bay in California — generally discounted the possibility of highly centralized superintelligences and the idea that intelligence might spring spontaneously from the Internet. But they agreed that robots that can kill autonomously are either already here or will be soon.

They focused particular attention on the specter that criminals could exploit artificial intelligence systems as soon as they were developed. What could a criminal do with a speech synthesis system that could masquerade as a human being? What happens if artificial intelligence technology is used to mine personal information from smart phones?

The researchers also discussed possible threats to human jobs, like self-driving cars, software-based personal assistants and service robots in the home. Just last month, a service robot developed by Willow Garage in Silicon Valley proved it could navigate the real world.

A report from the conference, which took place in private on Feb. 25, is to be issued later this year. Some attendees discussed the meeting for the first time with other scientists this month and in interviews.

The conference was organized by the Association for the Advancement of Artificial Intelligence, and in choosing Asilomar for the discussions, the group purposefully evoked a landmark event in the history of science. In 1975, the world’s leading biologists also met at Asilomar to discuss the new ability to reshape life by swapping genetic material among organisms. Concerned about possible biohazards and ethical questions, scientists had halted certain experiments. The conference led to guidelines for recombinant DNA research, enabling experimentation to continue.

The meeting on the future of artificial intelligence was organized by Eric Horvitz, a Microsoft researcher who is now president of the association.

Dr. Horvitz said he believed computer scientists must respond to the notions of superintelligent machines and artificial intelligence systems run amok.

The idea of an “intelligence explosion” in which smart machines would design even more intelligent machines was proposed by the mathematician I. J. Good in 1965. Later, in lectures and science fiction novels, the computer scientist Vernor Vinge popularized the notion of a moment when humans will create smarter-than-human machines, causing such rapid change that the “human era will be ended.” He called this shift the Singularity.

This vision, embraced in movies and literature, is seen as plausible and unnerving by some scientists like William Joy, co-founder of Sun Microsystems. Other technologists, notably Raymond Kurzweil, have extolled the coming of ultrasmart machines, saying they will offer huge advances in life extension and wealth creation.

“Something new has taken place in the past five to eight years,” Dr. Horvitz said. “Technologists are providing almost religious visions, and their ideas are resonating in some ways with the same idea of the Rapture.”

The Kurzweil version of technological utopia has captured imaginations in Silicon Valley. This summer an organization called the Singularity University began offering courses to prepare a “cadre” to shape the advances and help society cope with the ramifications.

“My sense was that sooner or later we would have to make some sort of statement or assessment, given the rising voice of the technorati and people very concerned about the rise of intelligent machines,” Dr. Horvitz said.

The A.A.A.I. report will try to assess the possibility of “the loss of human control of computer-based intelligences.” It will also grapple, Dr. Horvitz said, with socioeconomic, legal and ethical issues, as well as probable changes in human-computer relationships. How would it be, for example, to relate to a machine that is as intelligent as your spouse?

Dr. Horvitz said the panel was looking for ways to guide research so that technology improved society rather than moved it toward a technological catastrophe. Some research might, for instance, be conducted in a high-security laboratory.

The meeting on artificial intelligence could be pivotal to the future of the field. Paul Berg, who was the organizer of the 1975 Asilomar meeting and received a Nobel Prize for chemistry in 1980, said it was important for scientific communities to engage the public before alarm and opposition becomes unshakable.

“If you wait too long and the sides become entrenched like with G.M.O.,” he said, referring to genetically modified foods, “then it is very difficult. It’s too complex, and people talk right past each other.”

Tom Mitchell, a professor of artificial intelligence and machine learning at Carnegie Mellon University, said the February meeting had changed his thinking. “I went in very optimistic about the future of A.I. and thinking that Bill Joy and Ray Kurzweil were far off in their predictions,” he said. But, he added, “The meeting made me want to be more outspoken about these issues and in particular be outspoken about the vast amounts of data collected about our personal lives.”

Despite his concerns, Dr. Horvitz said he was hopeful that artificial intelligence research would benefit humans, and perhaps even compensate for human failings. He recently demonstrated a voice-based system that he designed to ask patients about their symptoms and to respond with empathy. When a mother said her child was having diarrhea, the face on the screen said, “Oh no, sorry to hear that.”

A physician told him afterward that it was wonderful that the system responded to human emotion. “That’s a great idea,” Dr. Horvitz said he was told. “I have no time for that.”

Video About:Self-Improving Artificial Intelligence:


Video About: New Version Amazing Robot Asimo:

Tuesday, March 31, 2009

Unpaid Uills? Good Luck Starting Future Laptops


By: Marco A. Ayllon
Nautilus Science and Techology News
March 31, 2009

As wireless carriers begin to subsidize computers that come with wireless Internet access, they're faced with a quandary: What do they do if the buyer stops paying his bills?



The company can cut off the computer's wireless access, but the carrier would still be out a couple of hundred dollars. The buyer would be left with a computer that's fully usable except for cellular broadband.


LM Ericsson AB, the Swedish company that makes many of the modems that go into laptops, announced Tuesday that its new modem will deal with this issue by including a feature that's virtually a wireless repo man. If the carrier has the stomach to do so, it can send a signal that completely disables the computer, making it impossible to turn on.


"We call it a `kill pill,'" said Mats Norin, Ericsson's vice president of mobile broadband modules.


The module will work on AT&T Inc.'s U.S. third-generation network, and on many other 3G networks overseas.


AT&T late last year started subsidizing small laptops known as "netbooks," which normally cost about $400, so that RadioShack Corp. can sell them for $100. The buyer commits to paying $60 per month for two years for AT&T's wireless broadband access. Such offers have become very common in Europe.


It's unlikely that carriers would resort to wielding the "kill pill." But the technology, developed with Intel Corp., has other uses. For instance, a company could secure its data by locking down stolen laptops wirelessly. Lenovo Group Ltd. has said it will build this sort of feature into its laptops.


The new Ericsson modem can also stay active while a computer is off, listening for wireless messages. That means it could wake up and alert the user when it receives an important e-mail, or if someone is calling with a conferencing application like Skype.


Laptop makers that use Ericsson modules include LG Electronics Inc., Dell Inc., Toshiba Corp. and Lenovo.

Monday, March 30, 2009

FBI: Cyber Crime Escalates in 2008


By: Marco A. Ayllon
Nautilus Technology News
March 30, 2009

Cyber crimes hit record numbers last year, according to a new report (pdf) released today by Internet Crime Complaint Center (IC3). IC3, a partnership between the FBI and the National White Collar Crime Center (a Glen Allen, Va., congressionally funded nonprofit that trains law enforcement on how to investigate financial and cyber crimes), says that in 2008 it received 275,284 complaints (up 33 percent from 2007's total of 206,884) of cyber fraud, computer hacks, spam, child pornography and other online offenses—and that cyber scams costs consumers an estimated $265 million, 10 percent more than the $239.09 million reported lost in 2007.


Online transactions in which either the goods or the payment wasn't received accounted for 33 percent of complaints that the feds received last year (up 32 percent from 2007). Auction fraud (think eBay transactions gone bad) actually dipped from 28.6 percent in 2007 to 25.5 percent last year. Ponzi schemes, computer fraud, and check fraud complaints represented 19.5 percent of all IC3 complaints. Overall, fraud victims reporting average losses of $931 each.

Some 74 percent of those who contacted authorities said they had communicated with the scam artists via e-mail. Ironically, one of the year's biggest e-mail scams involved bogus e-mails, supposedly sent by the FBI, soliciting personal information, such as a bank account numbers, by falsely claiming that it needed such info to investigate an "impending financial transaction." Some of the bogus e-mails even claimed to have come directly from FBI Director Robert Mueller, Deputy Director John S. Pistole, or some other high ranking official or investigative unit within the bureau. (The report notes that the FBI does not contact U.S. citizens regarding personal financial matters through unsolicited e-mails.)

Another common scam reported to the IC3 in 2008 involved hackers who broke into personal e-mail accounts (read more on how this can be done), enabling them to send out e-mails to people in the victims' address books asking for money. Posing as the e-mail account holders, fraudsters claim that they are stranded in Nigeria (or some other country), where they were allegedly robbed and now need $1,000 or some other sum to cover hotel bills and travel expenses.