Apple Acquires "Pandora For Books" Booklamp For $15 Million

Nate the greatest (2261802) writes with news made public Friday that Apple has acquired a little known ebook company called Booklamp, a small Idaho-based ebook startup which is best known for the Book Genome Project. First shown off to the world in 2008, this project was conceived by Booklamp founder and CEO Aaron Stanton as a way of analyzing a book’s pacing, dialog, perspective, genre, and other details in order to identify a book’s unique DNA. Booklamp has been using the tech to sell various services to publishers, tech companies, and the like, but Booklamps’s existing contracts were apparently cancelled earlier this year. According to one industry insider the deal happened in April, but Apple managed to keep the news under wraps until just last night. No one knows for sure how Apple will use booklamp but there is speculation that Apple could launch an ebook subscription service similar to the week-old Kindle Unlimited, or they could just use Booklamp to drive ebook recommendations in what some are speculating is the world’s second largest ebookstore. Read more of this story at Slashdot.

See the article here:
Apple Acquires "Pandora For Books" Booklamp For $15 Million

Supercomputing center in a beautiful, deconsecrated church

Allison writes, “The Barcelona Supercomputing Center is not only gorgeous with its soaring ceilings, it also was an instrumental site for developing modern microchip technology.” Read the rest

View post:
Supercomputing center in a beautiful, deconsecrated church

TwoFactorAuth Lists All the Sites with Two-Factor Authentication

Two-factor authentication is critical for protecting your online accounts, but sadly, not every site supports it (even, shockingly, many banks ). TwoFactorAuth.org is a new site that all the sites that do or do not support two-factor authentication. Read more…        

More here:
TwoFactorAuth Lists All the Sites with Two-Factor Authentication

Visualizing How Sorting Algorithms Work Is as Good as Any Art

We don’t need to tell you that data can be beautiful—but the process of putting it in order can look pretty darn good, too. A new site called SORTING aims to make people aware of just how elegant some of computer science’s most fundamental algorithms can be. Read more…        

More:
Visualizing How Sorting Algorithms Work Is as Good as Any Art

The Math Behind the NSA’s Email Hacks

We’re all outraged by the NSA’s invasions of privacy, sure—but we don’t perhaps understand exactly how it managed it. This video explains the maths behind the agency’s surveillance. Read more…        

Read this article:
The Math Behind the NSA’s Email Hacks

More Students Learn CS In 3 Days Than Past 100 Years

theodp writes “Code.org, backed by Bill Gates and Mark Zuckerberg, boasts in a blog post that thanks to this week’s Hour of Code, which featured a Blockly tutorial narrated by Gates and Zuckerberg, ‘More students have participated in computer science in U.S. schools in the last three days than in the last 100 years.’ Taking note of the impressive numbers being put up on the Hour of Code Leaderboards (’12, 522, 015 students have done the Hour of Code and written 406, 022, 512 lines of code’), the Seattle Times adds that ‘More African American and Hispanic kids learned about the subject in two days than in the entire history of computer science, ‘ and reports that the cities of Chicago and New York have engaged Code.org to offer CS classes in their schools. So, isn’t it a tad hyperbolic to get so excited over kids programming with blocks? ‘Yes, we can all agree that this week’s big Hour of Code initiative is a publicity stunt, ‘ writes the Mercury News’ Mike Cassidy, ‘but you know what? A publicity stunt is exactly what we need.'” Read more of this story at Slashdot.

See more here:
More Students Learn CS In 3 Days Than Past 100 Years

Austrian Professor Creates Kindle E-Book Copier With Lego Mindstorms

An anonymous reader writes “Using a Lego Mindstorms set, a Mac, and optical character recognition, Austrian professor Peter Purgathofer created a makeshift ebook copier. From the article: ‘It’s sort of a combination of high tech meets low. The scanning is done by way of the Mac’s iSight camera. The Mindstorms set does two things: Hits the page-advance button on the Kindle (it appears to be an older model, like the one in the picture above), then mashes the space bar on the Mac, causing it to take a picture.’ Purgathofer calls the creation a ‘reflection on the loss of long established rights.’ Check out the Vimeo video for a demonstration.” Read more of this story at Slashdot.

Read More:
Austrian Professor Creates Kindle E-Book Copier With Lego Mindstorms

Anatomy of a password-crack, part II

Ars Technica’s Nate Anderson Dan Goodin follows up on Nate Anderson’s excellent piece on the nuts and bolts of password cracking with a further attempt to decrypt an encrypted password file leaked from LivingSocial, this time with the aid of experts. The password file they were working on was encrypted with the relatively weak (and now deprecated) SHA1 hashing algorithm, and they were only attacking it with a single GPU on a commodity PC, and were able to extract over 90% of the passwords in the file. The discussion of the guesswork and refinement techniques used in extracting passwords is absolutely fascinating and really is a must-read. However, the whole exercise is still a bit inconclusive — in the end, we know that a badly encrypted password file is vulnerable to an underpowered password-cracking device. But what we need to know is whether a well-encrypted password file will stand up to a good password-cracking system. The specific type of hybrid attack that cracked that password is known as a combinator attack. It combines each word in a dictionary with every other word in the dictionary. Because these attacks are capable of generating a huge number of guesses—the square of the number of words in the dict—crackers often work with smaller word lists or simply terminate a run in progress once things start slowing down. Other times, they combine words from one big dictionary with words from a smaller one. Steube was able to crack “momof3g8kids” because he had “momof3g” in his 111 million dict and “8kids” in a smaller dict… What was remarkable about all three cracking sessions were the types of plains that got revealed. They included passcodes such as “k1araj0hns0n,” “Sh1a-labe0uf,” “Apr!l221973,” “Qbesancon321,” “DG091101%,” “@Yourmom69,” “ilovetofunot,” “windermere2313,” “tmdmmj17,” and “BandGeek2014.” Also included in the list: “all of the lights” (yes, spaces are allowed on many sites), “i hate hackers,” “allineedislove,” “ilovemySister31,” “iloveyousomuch,” “Philippians4:13,” “Philippians4:6-7,” and “qeadzcwrsfxv1331.” “gonefishing1125” was another password Steube saw appear on his computer screen. Seconds after it was cracked, he noted, “You won’t ever find it using brute force.” Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”        

See the article here:
Anatomy of a password-crack, part II

Imagine Carl Sagan, Stephen Hawking and Arthur C. Clarke together in conversation. It happened.

Back in 1988, Magnus Magnusson (best name ever) somehow managed to bring three of the 20th Century’s most fascinating personalities together to discuss God, the Universe, and Everything Else . In the hour-long program, the three talked about the Big Bang theory, the connection between science and scifi, the rise of computer science, extraterrestrial intelligence, and the puzzle that is human existence. More »

See the article here:
Imagine Carl Sagan, Stephen Hawking and Arthur C. Clarke together in conversation. It happened.

How an algorithm came up with Amazon’s KEEP CALM AND RAPE A LOT t-shirt

You may have heard that Amazon is selling a “KEEP CALM AND RAPE A LOT” t-shirt. How did such a thing come to pass? Well, as Pete Ashton explains, this is a weird outcome of an automated algorithm that just tries random variations on “KEEP CALM AND,” offering them for sale in Amazon’s third-party marketplace and printing them on demand if any of them manage to find a buyer. The t-shirts are created by an algorithm. The word “algorithm” is a little scary to some people because they don’t know what it means. It’s basically a process automated by a computer programme, sometimes simple, sometimes complex as hell. Amazon’s recommendations are powered by an algorithm. They look at what you’ve been browsing and buying, find patterns in that behaviour and show you things the algorithm things you might like to buy. Amazons algorithms are very complex and powerful, which is why they work. The algorithm that creates these t-shirts is not complex or powerful. This is how I expect it works. 1) Start a sentence with the words KEEP CALM AND. 2) Pick a word from this long list of verbs. Any word will do. Don’t worry, I’m sure they’re all fine. 3) Finish the sentence with one of the following: OFF, THEM, IF, THEM or US. 4) Lay these words out in the classic Keep Calm style. 5) Create a mockup jpeg of a t-shirt. 6) Submit the design to Amazon using our boilerplate t-shirt description. 7) Go back to 1 and start again. There are currently 529,493 Solid Gold Bomb clothing items on Amazon. Assuming they survive this and don’t get shitcanned by Amazon I wouldn’t be at all surprised if they top a million in a few months. It costs nothing to create the design, nothing to submit it to Amazon and nothing for Amazon to host the product. If no-one buys it then the total cost of the experiment is effectively zero. But if the algorithm stumbles upon something special, something that is both unique and funny and actually sells, then everyone makes money. Dictionary + algorithm + PoD t-shirt printer + lucrative meme = rape t-shirts on Amazon

Continue Reading:
How an algorithm came up with Amazon’s KEEP CALM AND RAPE A LOT t-shirt