Europe's Largest IT Company To Ban Internal Email

Hugh Pickens writes writes “Thierry Breton, CEO of Atos, Europe’s Largest IT Company, wants a ‘zero email’ policy to be in place in 18 months, arguing that only 10 per cent of the 200 electronic messages his employees receive per day on average turn out to be useful, and that staff spend between 5-20 hours handling emails every week. ‘The email is no longer the appropriate (communication) tool,’ says Breton. ‘The deluge of information will be one of the most important problems a company will have to face (in the future). It is time to think differently.’ Instead Breton wants staff at Atos to use chat-type collaborative services inspired by social networking sites like Facebook or Twitter as surveys show that the younger generation have already all but scrapped email, with only 11 per cent of 11 to 19 year-olds using it. For his part Breton hasn’t sent a work email in three years. ‘If people want to talk to me, they can come and visit me, call or send me a text message. Emails cannot replace the spoken word.'”

Read more of this story at Slashdot.

Originally posted here:
Europe's Largest IT Company To Ban Internal Email

Amazon Releases Kindle Source Code

MackieChan writes with a piece of news that slipped past earlier this month: “Barnes & Noble receives a lot of credit from the slashdot community for standing up to Microsoft and for allowing the nook to be so easy to root, but perhaps Amazon releasing the source code to the Kindle will help it gain back supporters it lost after remotely removing ebooks.”

Read more of this story at Slashdot.

Read More:
Amazon Releases Kindle Source Code

Can Hackers Really Use Your HP Printer to Steal Your Identity and Blow Up Your House? [Printers]

A team of Columbia researchers say they’ve discovered an exploit involving the embedded systems found in printers in which hackers can gain control of the device and rewrite the firmware without anyone knowing, and then use that to steal information or potentially cause printers to catch fire. More »


Read More:
Can Hackers Really Use Your HP Printer to Steal Your Identity and Blow Up Your House? [Printers]

Study Hints That Wi-Fi Near Testes Could Decrease Male Fertility

Pierre Bezukhov submits news of a report that “a laptop connected wirelessly to the internet on the lap near the testes may result in decreased male fertility,” writing
“‘[The scientists who conducted the research] placed healthy sperms under a laptop running a Wi-Fi connection. After four hours, the Wi-Fi exposed sperms showed ‘a significant decrease in progressive sperm motility and an increase in sperm DNA fragmentation’ compared to healthy sperms stored for the same time in the same temperature away from the computer. That is, the sperms exposed to Wi-Fi were less capable of moving towards an egg to fertilize it and less capable of passing on the male’s DNA if it does fertilize an egg.’ The scientists blamed the damage on non-thermal electromagnetic radiation generated by the Wi-Fi.”

However, the experiment was based on sperm outside the body; the researchers (here’s the abstract from their study) note that “Further in vitro and in vivo studies are needed to prove this contention.”

Read more of this story at Slashdot.

View article:
Study Hints That Wi-Fi Near Testes Could Decrease Male Fertility

iTether app skirts carrier tethering plans, sets up shop in iOS App Store

Ready to share your iPhone’s data plan with your laptop without springing for the requisite tethering plan? No, it’s not another brightly colored, data smuggling easter egg, it’s iTether, a USB tethering app that has apparently made its way through Apple’s approval process. The data sharing newcomer promises to pipe your existing data plan to your PC via a companion desktop application. If history is anything to go by, this $15 app won’t be available for long, so you’d better get while the getting’s good — it seems that high demand has already taken Tether’s website down.

[Thanks to everyone who sent this in]

iTether app skirts carrier tethering plans, sets up shop in iOS App Store originally appeared on Engadget on Tue, 29 Nov 2011 02:25:00 EDT. Please see our terms for use of feeds.

Permalink MacRumors, 9to5Mac | sourceiTunes, Tether | Email this | Comments

Read More:
iTether app skirts carrier tethering plans, sets up shop in iOS App Store

Insert Coin: Prototype peripherals incorporate no moving parts, multitouch functionality and freaking lasers

When in doubt, strip out the moving parts and see what you wind up with. This is the idea inventor Jason Giddings is following as he turns to Kickstarter to help fund the prototype creation for a glass keyboard and mouse, both sporting multitouch functionality. The design uses the same biometric systems that currently capture fingerprints on assorted trackpads and keyboards, and uses a technique known as Frustrated Total Internal Reflection — which incorporates a series of LEDs on the bottom of a device — to bounce infrared light beams around the inside of the glass. This process is interrupted when a finger touches the glass, wherein a simple embedded camera captures the event, processes where the keystroke, mouse click or gesture took place and relays the signal to the computer.

Continue reading Insert Coin: Prototype peripherals incorporate no moving parts, multitouch functionality and freaking lasers

Insert Coin: Prototype peripherals incorporate no moving parts, multitouch functionality and freaking lasers originally appeared on Engadget on Mon, 28 Nov 2011 16:38:00 EDT. Please see our terms for use of feeds.

Permalink Gizmodo | sourceKickstarter | Email this | Comments

Originally posted here:
Insert Coin: Prototype peripherals incorporate no moving parts, multitouch functionality and freaking lasers

AMD’s getting into the DRAM game, isn’t afraid to shoot the outside J

Don’t you wish every component in your computer were made by the same company? That’s AMD’s thinking behind a range of desktop DRAM — leaping into bed with VisionTek and Patriot Memory who will build the branded modules to Sunnyvale’s specifications, tweaked for speed with OverDrive tuning tools. You’ll be able to pick up DIMMs in 2GB, 4GB and 8GB flavors — a low-end “entertainment” model running at 1333MHz and 1600MHz, “performance” edition also at 1600MHz and a Radeon-branded unit that will top the family at 1866MHz. The stuff will be available from retailers like Amazon, Fry’s and Best Buy Canada, but we don’t know when nor how much it’ll cost to bring this level of branding harmony to the inside of your case.

Continue reading AMD’s getting into the DRAM game, isn’t afraid to shoot the outside J

AMD’s getting into the DRAM game, isn’t afraid to shoot the outside J originally appeared on Engadget on Mon, 28 Nov 2011 13:54:00 EDT. Please see our terms for use of feeds.

Permalink PC World | sourceAMD | Email this | Comments

Read the article:
AMD’s getting into the DRAM game, isn’t afraid to shoot the outside J

CIA threat-tracking technology is fascinating, creepy

Palantir is security software that helps CIA analysts take innocuous events (man comes to U.S. on temporary visa, man takes flight training classes, man buys one-way ticket from Boston to California) and put them into a context where potential threats can become more apparent (the one man is actually several, and they’re all on the same flight).

The technology is based on a system developed by PayPal, and it’s interesting because it’s one of the few examples of counter-terrorism work that is actually proactive. Instead of adding increasingly elaborate airport security rules that are merely responses to the most recently exposed plot, a program like Palantir has the potential to spot plots in the making with less hassle to the general public. That could make it a good thing. On the other hand, Palantir comes with plenty of its own privacy and civil rights concerns. This Bloomberg BusinessWeek story is pretty “rah rah rah” in tone, ironically cheering on all the things that make Palantir seem rather creepy to me. But it is a great example of why countering terrorism is really just one long string of incredibly difficult choices. What matters more, who makes that call, and how do we balance a reasonable desire for safety with a reasonable desire to not be creeped the hell out by our own government?

In October, a foreign national named Mike Fikri purchased a one-way plane ticket from Cairo to Miami, where he rented a condo. Over the previous few weeks, he’d made a number of large withdrawals from a Russian bank account and placed repeated calls to a few people in Syria. More recently, he rented a truck, drove to Orlando, and visited Walt Disney World by himself. As numerous security videos indicate, he did not frolic at the happiest place on earth. He spent his day taking pictures of crowded plazas and gate areas.

None of Fikri’s individual actions would raise suspicions. Lots of people rent trucks or have relations in Syria, and no doubt there are harmless eccentrics out there fascinated by amusement park infrastructure. Taken together, though, they suggested that Fikri was up to something. And yet, until about four years ago, his pre-attack prep work would have gone unnoticed. A CIA analyst might have flagged the plane ticket purchase; an FBI agent might have seen the bank transfers. But there was nothing to connect the two. Lucky for counterterror agents, not to mention tourists in Orlando, the government now has software made by Palantir Technologies, a Silicon Valley company that’s become the darling of the intelligence and law enforcement communities.

The day Fikri drives to Orlando, he gets a speeding ticket, which triggers an alert in the CIA’s Palantir system. An analyst types Fikri’s name into a search box and up pops a wealth of information pulled from every database at the government’s disposal. There’s fingerprint and DNA evidence for Fikri gathered by a CIA operative in Cairo; video of him going to an ATM in Miami; shots of his rental truck’s license plate at a tollbooth; phone records; and a map pinpointing his movements across the globe. All this information is then displayed on a clearly designed graphical interface that looks like something Tom Cruise would use in a Mission: Impossible movie.

As the CIA analyst starts poking around on Fikri’s file inside of Palantir, a story emerges. A mouse click shows that Fikri has wired money to the people he had been calling in Syria. Another click brings up CIA field reports on the Syrians and reveals they have been under investigation for suspicious behavior and meeting together every day over the past two weeks. Click: The Syrians bought plane tickets to Miami one day after receiving the money from Fikri. To aid even the dullest analyst, the software brings up a map that has a pulsing red light tracing the flow of money from Cairo and Syria to Fikri’s Miami condo. That provides local cops with the last piece of information they need to move in on their prey before he strikes.

Fikri isn’t real—he’s the John Doe example Palantir uses in product demonstrations that lay out such hypothetical examples. The demos let the company show off its technology without revealing the sensitive work of its clients.


See the original post:
CIA threat-tracking technology is fascinating, creepy

FBI Scolds NASDAQ Over Out of Date Patches

DMandPenfold writes “NASDAQ’s aging software and out of date security patches played a key part in the stock exchange being hacked last year, according to the reported preliminary results of an FBI investigation. Forensic investigators found some PCs and servers with out-of-date software and uninstalled security patches, Reuters reported, including Microsoft Windows Server 2003. The stock exchange had also incorrectly configured some of its firewalls. NASDAQ, which prides itself on running some of the fastest client-facing systems in the financial world, does have a generally sound PC and network architecture, the FBI reportedly found. But sources close to the investigation told Reuters that NASDAQ had been an ‘easy target’ because of the specific security problems found. Investigators had apparently expressed surprise that the stock exchange had not been more vigilant.”

Read more of this story at Slashdot.

Read More:
FBI Scolds NASDAQ Over Out of Date Patches