51489459
submission
jcatcw writes:
A recent study shows that a single random up-vote, randomly chosen, created a herding behavior in ratings that resulted in a 25% increase in the ratings but the negative manipulation had no effect. An intuitive explanation for this asymmetry is that we tend to go along with the positive opinions of others, but we tend to be skeptical of the negative opinions of others, and so we go in and correct what we think is an injustice. The third major result was that these effects varied by topic. So in business and society, culture, politics, we found substantial susceptibility to positive herding, whereas in general news, economics, IT, we found no such herding effects in the positive or negative direction.
36648291
submission
jcatcw writes:
While a tech camping event might sound like an oxymoron, hackers, makers, breakers and shakers assembled at the northwestern tip of the USA for ToorCamp and dispelled the notion that all hackers avoid sunshine and the great outdoors. As you would expect from a hacker conference, there were workshops like the one for lock picking and a plethora of presentations from “hacking computers to brain hacking, from brewing soda to fighting robots, from civil rights to lightning guns.” Then unique aspects of this cool hacker camp get more bizarre . . like the laser that was so bright it required FAA clearance to deploy it, the ShadyTel community 'payphone,' the Temple of Robotron, an RFID implantation station, bike jousting, dancing robots and of course campfires. Need an even stranger adventure that's also in the ToorCon family of hacking conferences? There's the upcoming WorldToor, the first ever hacker conference in Antarctica.
15080688
submission
jcatcw writes:
A university network is brought down when two network cables are plugged into the wrong hub. An employee is injured after an ill-timed entry into a data center. Overheated systems are shut down by a thermostat setting changed from Fahrenheit to Celsius. And, of course, Big Red Buttons. These are just a few of the data center disasters caused by human folly.
10857936
submission
jcatcw writes:
Schools and libraries are hurting students by setting up heavy-handed Web filtering. The problem goes back for years. A filter blocked the Web site of former House Majoirty Leader Richard Armey because it detected the word "dick," according to a 2001 study from the Brennan Center of Justice. The purpose of schools should be to teach students to live in a democratic society, and that means teaching critical thinking and showing students controversial Web sites, says Craig Cunningham, a professor at National-Louis University. He quoted from a National Research Council study, "Swimming pools can be dangerous for children. To protect them, one can install locks ... [or] teach them to swim." Web filtering also leads to inequities in education based on household income. Students from more affluent areas have access to Internet at home and, often, more enlightened parents who can let them access information blocked in schools and libraries. Poorer students without home access don't have those opportunities
3167001
submission
jcatcw writes:
Steven J. Vaughan-Nichols reports that CAPTCHA cracking isn't that difficult these days. It has even become a business. For example, DeCaptcher.com will solve CAPTCHAs for your spamming needs at a rate of $2 per 1,000 successfully cracked CAPTCHAs. In response, newer systems are in development. Both Carnegie Mellon and Penn State (is there something about the water in PA?) are working on image-based systems. ESP-PIX and SQ-PIX both require the viewer to interpret pictures. Imagination CAPTCHA from Penn has the user find the center of an image. The idea is that humans are better at image recognition that computers, but humans can legitimately disagree on their interpretations and some humans are color blind. Problems remain. For now, sites would be well advised to look at reCAPTCHA — the system that works with Google Books and the Internet Archive to digitize printed texts — which comes with a wide variety of application and programming plug-ins and an open API.
1160657
submission
jcatcw writes:
Steven J. Vaughan-Nichols reports that Mark Shuttleworth, CEO of Canonical, is using his millions to improve the Linux user experience., hiring people to work on X, OpenGL, Gtk, Qt, GNOME and KDE. He had doubted that desktop Linux could ever equal the smooth, graceful integration of the Mac OS. Now, between the driving pace of open-source development, and Shuttleworth's millions, it might be happening. Why not? After all, Mac OS itself is based on FreeBSD. Desktop Linux's future is starting to look brighter.
783503
submission
jcatcw writes:
Quick, incremental updates, along with heavy user involvement, are key characteristics of the emerging software development methods championed by a new generation of Web 2.0 start-ups. A survey conducted for Computerworld showed that an overwhelmingly majority of the respondents said that traditional corporate development teams could benefit from Web 2.0 techniques, specifically the incremental feature releases, quick user feedback loops and quality assurance programs that include users. Fifty seven percent of the respondents said that problem-solving and analytical skills will be key requirements for next generation developers. The bottom-line: corporate development teams need to get to know their users.
727927
submission
jcatcw writes:
Brian Nadel's ThinkPad R50 just hit its fifth birthday, and the years haven't been kind to it. When it was new, the notebook was reliable and fast. Now it's slow and prone to annoying shutdowns. Is it a good investment to revamp a notebook that's worth about $350? It sure is, because this old notebook will get a new lease on life for about $125 — a bargain, considering what it could cost to replace.
661580
submission
jcatcw writes:
Scott McPherson, CIO for the Florida House of Representatives and Computerworld blogger, says we don't need al Qaida to blow us up. We are perfectly capable of lighting the fuse ourselves, courtesy of our inability to share information. He has a story to tell about what happened in Florida that had direct bearing on 9/11, could have even stopped 9/11, and still is not taken as seriously as it should. It starts with the fact that Mohammed Atta was a terrible driver. It concludes that since 9/11, nothing of real substance has apparently changed in the data-sharing arena.
657554
submission
jcatcw writes:
Steven J. Vaughan-Nichols considers the dissimilarities between maleware of yore and current infiltrations as we approach the 20th anniversary of the William Morris worm. Modern malware apps curl up and make themselves at home in your system, where they wait for a chance to snatch an important password or a credit card number. Welcome to the era of capitalist hacking. Any self-respecting malware program today is polymorphic, making signature-based av approaches difficult. Heuristics and virtual sandboxes offer alternatives, but all such methods are reactive. Unfortunately, montoring lists and networks is about the only current alternative.
566264
submission
jcatcw writes:
By 2011, there will be 1.8 zettabytes of electronic data stored in 20 quadrillion files, packets or other containers because of, among other things, the massive growth rate of social networks, and digital equipment such as cameras, cell phones and televisions, according to
a new study by IDC. Data is growing by a factor of 10 every five years. According to John Gantz, IDC's lead analyst, "at some point in the life of every file, or bit or packet, 85% of that information somewhere goes through a corporate computer, website, network or asset," meaning any given corporation becomes responsible for protecting large amounts of data that it and its customers may not have created. The study, which coincided with the launch of a "
digital footprint" calculator, also found that as the world changes over to digital televisions, analog sets and obsolete set-top boxes and DVDs "will be heaped on the waste piles, which will double by 2011."
552146
submission
jcatcw writes:
Computerworld has reviewed seven USB drives that use either encryption or a physical keypad to protect stored data, and found big differences in I/O speeds, ease of use and strength of security. In the case of the drive using a key pad, the editors were able to break open the device and access the data, bypassing the PIN security. They also state that there is little difference between 128-bit and 256-bit AES encryption because neither has been broken yet. The drives reviewed were the SanDisk Cruzer, the Lexar JumpDrive, the Kingston DataTraveler, the Imation Pivot Plus, the Corsair Survivor, the Corsair Padlock and the IronKey Secure USB Drive. The editors chose the IronKey as the most secure.