×
Books

Book Review: Assessing Vendors 27

benrothke writes "Every organization has external software, hardware and 3rd-party vendors they have to deal with. In many cases, these vendors will have direct access to the corporate networks, confidential and proprietary data and more. Often the software and hardware solutions are critical to the infrastructure and security of the organization. If the vendors don't have effective information security and privacy controls in place, your data is at risk. In addition, when selecting a product to secure your organization, how do you ensure that you are selecting the correct product? All of this is critical in the event of a breach. When the lawyers start circling, they will be serving subpoenas to your company, not your 3rd-party vendors." Keep reading for Ben's review.
Books

Judge Rules Apple Colluded With Publishers to Fix Ebook Prices 383

Despite many publishers themselves settling with the DOJ over allegations of price fixing ebooks, Apple held firm and recently went to trial. And now the verdict is in: Apple conspired with major publishers to control ebook prices in violation of anti-trust laws. A trial for damages has been ordered. Quoting Reuters: "The decision by U.S. District Judge Denise Cote in Manhattan is a victory for the U.S. government and various states, which the judge said are entitled to injunctive relief. ... Cote said the conspiracy resulted in prices for some e-books rising to $12.99 or $14.99, when Amazon had sold for $9.99. 'The plaintiffs have shown that the publisher defendants conspired with each other to eliminate retail price competition in order to raise e-book prices, and that Apple played a central role in facilitating and executing that conspiracy,' Cote said. 'Without Apple's orchestration of this conspiracy, it would not have succeeded as it did in the spring of 2010,' she added." Update: 07/10 16:36 GMT by U L : The ruling is now available (160 page PDF).
Movies

Orson Scott Card Pleads 'Tolerance' For Ender's Game Movie 1448

interval1066 writes "A story in Wired describes Orson Scott Card's quest for tolerance in response to a boycott for Gavin Hood's film adaption of Ender's Game, saying that 'The gay marriage issue is moot' in a statement to Entertainment Weekly. Card is a long time anti-gay and defense of marriage activist. 'His concern, ostensibly, is that someone might be petty enough not to see his movie simply because he spent years lobbying for laws that treated certain people as less than human. The fallacy he employs here — that calling out hate-speech is intolerance on par with curtailing the human rights of others — is a favorite fallback of cowards and bullies, and a way of evading responsibility for the impact of their words and actions.' I guess he didn't see this film and the box-office importance of wide appeal coming, did he?"
Books

Book Review: Programming PHP 3rd Edition 155

Michael Ross writes "As a hugely popular scripting language with an 18-year history, PHP has been the topic of countless computer language books. One of the most comprehensive offerings has been Programming PHP, published by O'Reilly Media. The first edition appeared in March 2002, and was written by Rasmus Lerdorf (the original developer of PHP) and Kevin Tatroe. A second edition was released in May 2006, and saw the addition of another co-author, Peter MacIntyre. With the many changes to the language during the past seven years, the book has again been updated, to cover all of the major new features made available in version 5 of PHP." Keep reading for the rest of Michael's review.
Books

The Price of Amazon 298

An anonymous reader writes "As physical book stores continue to struggle and disappear, the NY Times puts the changing book industry into perspective as a cost of the existence of Amazon. Further, it's a cost that hasn't been fully paid, as other effects of Amazon's ascendancy have yet to be felt. Quoting: 'One consequence of this shift is that soon no one will know what a book's "real" price is. Price will be determined by demand and perhaps by whim. The first seeds of this can be seen in the Justice Department's suit against the leading publishers, who felt that Amazon was pricing their e-books so low that it threatened their viability. The government accused the publishers of colluding to raise prices in an anti-consumer move. Amazon was not a party to the case, but it emerged the big winner.' Economists, publishers, and readers no longer have confidence that a book will cost the same amount this week as it did the last."
Books

How Copyright Makes Books and Music Disappear 128

An anonymous reader writes "A new study of books and music for sale on Amazon shows how copyright makes works disappear. The research is described in the abstract: 'A random sample of new books for sale on Amazon.com shows three times more books initially published in the 1850's are for sale than new books from the 1950's. Why? A sample of 2300 new books for sale on Amazon.com is analyzed along with a random sample of 2000 songs available on new DVDs. Copyright status correlates highly with absence from the Amazon shelf. Second, the availability on YouTube of songs that reached number one on the U.S., French, and Brazilian pop charts from 1930-60 is analyzed in terms of the identity of the uploader, type of upload, number of views, date of upload, and monetization status. An analysis of the data demonstrates that the DMCA safe harbor system as applied to YouTube helps maintain some level of access to old songs by allowing those possessing copies (primarily infringers) to communicate relatively costlessly with copyright owners to satisfy the market of potential listeners.'"
Privacy

To Counter Widespread Surveillance, Stealth Clothing 104

In Paul Theroux's dystopian novel O-Zone, wearing masks in public is simply a fact of life, because of the network of cameras that covers the inhabited parts of earth. Earthquake Retrofit writes with a story at the New York Times describing a life-imitating-art reaction to the perception (and reality) that cameras are watching more of your life than you might prefer: clothing that obscures your electronic presence. "[Adam Harvey] exhibited a number of his stealth-wear designs and prototypes in an art show this year in London. His work includes a series of hoodies and cloaks that use reflective, metallic fabric — like the kind used in protective gear for firefighters — that he has repurposed to reduce a person’s thermal footprint. In theory, this limits one’s visibility to aerial surveillance vehicles employing heat-imaging cameras to track people on the ground. He also developed a purse with extra-bright LEDs that can be activated when someone is taking unwanted pictures; the effect is to reduce an intrusive photograph to a washed-out blur. In addition, he created a guide for hairstyling and makeup application that might keep a camera from recognizing the person beneath the elaborate get-up. The technique is called CV Dazzle — a riff on 'computer vision' and 'dazzle,' a type of camouflage used during World War II to make it hard to detect the size and shape of warships."
Education

L.A. School District's 30,000 iPads May Come With Free Lock-In 232

lpress writes "The Los Angeles Unified School District will spend $30 million over the next two years on iPads for 30,000 students. Coverage of the announcement has focused on Apple winning over other tablets, but that is not the key point. The top three proposals each included an app to deliver Pearson's K-12 Common Core System of Courses along with other third-party educational apps. The Common Core curriculum is not yet established, but many states are committed to it, starting next year. The new tablets and the new commitment to the Common Core curriculum will arrive around the same time, and busy faculty (and those hired to train them) will adopt the Pearson material. The tablets will be obsolete in a few years and the hardware platform may change, but lock-in to Pearson's default curriculum may last for generations."
Books

Nook Failure, Lack of Foot Traffic Could Spell Doom For Barnes & Noble 330

tripleevenfall sends in a story at Yahoo Finance forecasting the end of Barnes & Noble. Quoting: "The last nationwide book retailer may be writing its final chapter. Barnes & Noble's latest quarterly results show a 7.4% drop in revenues and a $122 million loss for the fourth-quarter of its fiscal year. B&N's disastrous focus on making Nook e-Readers is weighing heavily on the chain's operations. A 17% drop in Nook revenues and stunning $475 million loss for the device division in 2013 are hobbling the company's ability to keep its stores afloat. B&N appears to be cannibalizing itself with branded tablets and cross-platform e-reader applications, which render the stores increasingly irrelevant."
Books

Science Fiction and Fantasy Author Richard Matheson Dead At 87 57

New submitter no bloody nickname writes "The BBC reports that well-known U.S. author Richard Matheson has passed away. He was 87 years old. Mathesons prolific career lasted for more than 60 years and his works include the novels Hell House, The Shrinking Man, A Stir of Echoes, and I am legend. Matheson also wrote for television and cinema. Among the screenplays he wrote were the Spielberg movie Duel as well as multiple episodes of The Twilight Zone. Several of his novels have also been adapted into movies. In the case of I Am Legend this was done not just once but three times. Matheson continued to write books until recently and his most recently published book Generations was released in 2012." Adds reader Dave Knott: "Richard Matheson was a recipient of lifetime achievement recognition in both fantasy (World Fantasy Awards, 1984) and horror (Bram Stoker Awards, 1991), and was inducted into the Science Fiction Hall of Fame in 2010. Matheson passed away on Sunday at his home in Los Angeles."
Books

Book Review: Puppet 3 Beginner's Guide 81

sagecreek writes "If you are in charge of a small network with just a few servers, you may still be doing configuration management primarily by hand. And you may take particular pride in maintaining that 'artisan' role. After all, it's mostly up to you to set up new users and their machines, fix current problems, manage the servers and their software, create databases and their user accounts, and try to keep the network and user configurations as uniform as possible despite running several different brands--and vintages--of hardware and software. However, warns infrastructure consultant John Arundel, '[b]eyond ten or so servers, there simply isn't a choice. You can't manage an infrastructure like this by hand. If you're using a cloud computing architecture, where servers are created and destroyed minute-by-minute in response to changing demand, the artisan approach to server crafting just won't work.' In his new book, Puppet 3 Beginner's Guide, Arundel emphasizes: 'Manual configuration management is tedious and repetitive, it's error-prone, and it doesn't scale well. Puppet is a tool for automating this process.'" Read below for the rest of sagecreek's review.
Privacy

Wikileaks Aiding Snowden - Chinese Social Media Divided - Relations Strained 629

cold fjord writes "Despite the US cancelling his passport, Edward Snowden continues his travels aided by Wikileaks, and is leaving a trail of strained diplomatic relations in his wake. It appears China gifted the issue to Russia. From Yahoo: 'Lawyer Albert Ho, ... a Hong Kong legislator ... told reporters he was approached by Snowden several days ago, and that the American had sought assurances ... whether he could leave the city freely if he chose to do so... Snowden later told Ho an individual claiming to represent the Hong Kong government had contacted him and indicated he should leave the city, and wouldn't be stopped ... Ho said he believed the middleman was acting on Beijing's orders.' From the NYT: Julian Assange, ...said in an interview ... 'that he had raised Mr. Snowden's case with Ecuador's government and that his group had helped arrange the travel documents.' From WSJ: 'Edward Snowden has generated more than a million posts on one of China's biggest social media platforms... Sina Weibo, a popular Chinese microblogging service, exploded with activity on Sunday as Mr. Snowden left ... Mr. Snowden was hailed as a hero ... last week, but posts on Sunday and Monday were divided... "All crows are black," said a number of users, citing an Chinese old saying, to describe both American and Chinese government's surveillance programs. ... "Snowden has helped China so much. Why did we let him go?" said one ... Some suggested that China should keep Mr. Snowden as a weapon against repeated accusations of China hacking U.S. companies. More extreme users complained that China is "too soft on the U.S." "Russia is a real strong country to accept him," ... Another popular term: "hot potato," reflecting relief that Hong Kong wouldn't have to stand against U.S. efforts to take him into custody. Some users criticized Mr. Snowden for fleeing.' From the Guardian: 'Snowden's escape from Hong Kong infuriated US politicians, while China focused on condemning Washington over his latest disclosures, which suggested the NSA had hacked into Chinese mobile phone companies ... Moscow was also drawn into the controversy after it emerged that Snowden's passport had been revoked before he left Hong Kong and he did not have a visa for Russia. But Russia appeared indifferent to the uproar, with one official saying Snowden was safe from the authorities as long as he remained in the transit lounge at the city's Sheremetyevo airport. Dmitry Peskov, spokesman for the Russian president, Vladimir Putin, said: "I know nothing."' From ABC: Snowden registered for the flight to Havana that leaves Moscow on Monday..."
Books

Book Review: The Ingenious Engine of Reality 19

gregrolan writes "Evans's Trousers Of Reality series attempts to understand the interplay between neurology, psychology, and sociology in the context of finding a better path through working life. I previously reviewed the first book in the series, Working Life a few years ago, and the second volume The Ingenious Engine Of Reality has now been published. While the first volume outlined the themes for the series and focused on work-life balance, this second volume digs deeper into the science behind knowledge, learning, and mental models.It then uses this background to explore the relationship between knowledge, behavior, and process in a software project setting." Keep reading for the rest of Greg's review.
DRM

Altering Text In eBooks To Track Pirates 467

wwphx writes "According to Wired, 'German researchers have created a new DRM feature that changes the text and punctuation of an e-book ever so slightly. Called SiDiM, which Google translates to 'secure documents by individual marking,' the changes are unique to each e-book sold. These alterations serve as a digital watermark that can be used to track books that have had any other DRM layers stripped out of them before being shared online. The researchers are hoping the new DRM feature will curb digital piracy by simply making consumers paranoid that they'll be caught if they share an e-book illicitly.' I seem to recall reading about this in Tom Clancy's Patriot Games, when Jack Ryan used this technique to identify someone who was leaking secret documents. It would be so very difficult for someone to write a little program that, when stripping the DRM, randomized a couple of pieces of punctuation to break the hash that the vendor is storing along with the sales record of the individual book."
Books

Book Review: The Chinese Information War 139

benrothke writes "It's said that truth is stranger than fiction, as fiction has to make sense. Had The Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States Interests been written as a spy thriller, it would have been a fascinating novel of international intrigue. But the book is far from a novel. It's a dense, well-researched overview of China's cold-war like cyberwar tactics against the US to regain its past historical glory and world dominance." Read below for the rest of Ben's review.
Books

Book Review: Core HTML5 Canvas 72

eldavojohn writes "Core HTML5 Canvas is a book that focuses on illuminating HTML5 game development for beginning and intermediate developers. While HTML and JavaScript have long been a decent platform for displaying text and images, Geary provides a great programming learning experience that facilitates the canvas element in HTML5. In addition, smatterings of physics engines, performance analysis and mobile platform development give the reader nods to deeper topics in game development." Read below for the rest of eldavojohn's review.
Books

Iain Banks Dies of Cancer At 59 141

An anonymous reader writes "BBC News is reporting that Iain Banks, best known for his Culture series novels and The Wasp Factory, has died of cancer aged 59. It had been announced several months ago that he was suffering from bladder cancer, and he had stated his intentions to spend his remaining time visiting places which meant a lot to him after marrying his partner."
Movies

Google Loves The Internship; Critics Not So Much 103

theodp writes "It was the best of movies; it was the worst of movies. GeekWire reports that The Internship — the new comedy starring Vince Vaughn and Owen Wilson as two 40-something guys who get internships at Google — is getting high praise from Googlers but low marks from movie critics. Google CEO Larry Page called the movie 'a lot of fun' in his Google+ post, while fellow Google exec Vic Gundotra gushed, 'I laughed a lot while watching this movie!' After screening a sneak preview with Google companions, Wired's Steven Levy wrote, 'From Google's point of view, the movie could not possibly be better.' USA Today's take, on the other hand, is that 'Google has never looked lamer thanks to The Internship.' And the NY Daily News calls the movie 'an unfunny valentine to Google.' But perhaps the unkindest cut of all comes from the NY Post, who suggests that 'maybe The Internship was secretly funded by Bing.' Ouch." Update: 06/07 20:02 GMT by T : Peter Wayner saw the movie (a "harmless bit of summer fluff"), and his full-length take below takes on some of the tech-company misconceptions that the film-makers gleefully adopted as script material.
Books

Book Review: Exploding the Phone 64

benrothke writes "Phil Lapsley calls his book 'the untold story of the teenagers and outlaws who hacked Ma Bell.' The story is an old one, going back to the early 1960's. Lapsley was able to track down many of the original phone phreaks and get their story. Many of them, even though the years have passed, asked Lapsley not to use their real names." Read below for the rest of Ben's review.
Encryption

Seeking Fifth Amendment Defenders 768

Bennett Haselton writes with his take on a case going back and forth in U.S. courts right now about whether a defendant can be ordered to decrypt his own hard drives when they may incriminate him. "A Wisconsin defendant in a criminal child-pornography case recently invoked his Fifth Amendment right to avoid giving the FBI the password to decrypt his hard drive. At the risk of alienating fellow civil-libertarians, I admit I've never seen the particular value of the Fifth Amendment right against self-incrimination. So I pose this logical puzzle: come up with a specific, precisely defined scenario, where the Fifth Amendment makes a positive difference." Read on for the rest of Bennett's thoughts.

Slashdot Top Deals