8 Yelp Reviewers Hit With $1.2 Million Defamation Suits

New submitter goodboi writes: A Silicon Valley building contractor is suing 8 of its critics over the reviews they posted on Yelp. The negative reviews were filtered out by Yelp’s secretive ranking system, but in court documents filed earlier this month, Link Corporation claims that the bad publicity cost over $165, 000 in lost business. Read more of this story at Slashdot.

Continued here:
8 Yelp Reviewers Hit With $1.2 Million Defamation Suits

Malwarebytes Offers Pirates Its Premium Antimalware Product For Free

An anonymous reader writes: If you have a cracked or pirated version of Malwarebytes Anti-Malware (MBAM) product the company has debuted an Amnesty program for you. Venturebeat reports: “If you pirated Malwarebytes Anti-Malware, purchased a counterfeit version of the software, or are having problems with your key in general, the company is offering a free replacement key.” CEO Marcin Kleczynski explained the program and his statement reads in part: “When I started Malwarebytes, I absolutely had no idea how successful we would be today. I am extremely grateful for all of the support from everyone and how fast we’ve grown. That being said, I picked a very insecure license key algorithm and as such, generating a pirated key was, and is, very simple. The problem with pirated keys is that they may collide with a legitimate key just by the sheer numbers. For example, Larry may generate a pirated key that matches the exact key that I already bought. Yes, this is silly, and yes, this is literally the first thing a professional software company thinks of when building license key generation, but when you think you’re building a product for just a few people you don’t hash out these details. Now we’ve grown up, and we’ve got a new licensing system that we’ve rolled out in stages. The only problem is that we have millions of users that we’ve sold keys to, or a reseller has sold keys to, or we’ve given out keys to without keeping track. It is a mess, and you as a consumer have every right to be upset. Read more of this story at Slashdot.

Read the original post:
Malwarebytes Offers Pirates Its Premium Antimalware Product For Free

AMD’s Project Quantum Gaming PC Contains Intel CPU

nateman1352 links to an article at Tom’s Hardware which makes the interesting point that chip-maker AMD will offer Intel — rather than AMD — CPUs in their upcoming high-end gaming PC. (High-end for being based on integrated components, at least.) From the article: Recently, AMD showed off its plans for its Fiji based graphics products, among which was Project Quantum – a small form factor PC that packs not one, but two Fiji graphics processors. Since the announcement, KitGuru picked up on something, noticing that the system packs an Intel Core i7-4790K “Devil’s Canyon” CPU. We hardly need to point out that it is rather intriguing to see AMD use its largest competitor’s CPU in its own product, when AMD is a CPU maker itself. Read more of this story at Slashdot.

See the original article here:
AMD’s Project Quantum Gaming PC Contains Intel CPU

How Etak Built a Car Navigation System In 1985

harrymcc writes: Thirty years ago, a startup called Etak released the Navigator, an in-car navigation system. It provided turn-by-turn driving directions despite the fact that GPS did not exist, and stored its maps–which Etak had to create itself–on cassette tapes. And some of its data and technologies are still in use in today’s navigation apps. Over at Fast Company, Benj Edwards tells this amazing story. I remember reading about (and lusting over) this system back then, in the much-missed DAK catalog. Read more of this story at Slashdot.

Taken from:
How Etak Built a Car Navigation System In 1985

New Manufacturing Technique Halves Cost of Lithium-Ion Batteries

An anonymous reader writes: Experts in materials science at MIT have developed a new process for creating lithium-ion batteries that will drop the associated production costs by half. The researchers say fundamental battery construction techniques have been refined over the past two decades, but not re-thought. “The new battery design is a hybrid between flow batteries and conventional solid ones: In this version, while the electrode material does not flow, it is composed of a similar semisolid, colloidal suspension of particles. Chiang and Carter refer to this as a ‘semisolid battery.’ This approach greatly simplifies manufacturing, and also makes batteries that are flexible and resistant to damage, says Chiang. … Instead of the standard method of applying liquid coatings to a roll of backing material, and then having to wait for that material to dry before it can move to the next manufacturing step, the new process keeps the electrode material in a liquid state and requires no drying stage at all. Using fewer, thicker electrodes, the system reduces the conventional battery architecture’s number of distinct layers, as well as the amount of nonfunctional material in the structure, by 80 percent.” Read more of this story at Slashdot.

See the article here:
New Manufacturing Technique Halves Cost of Lithium-Ion Batteries

WiFi Offloading is Skyrocketing

dkatana writes: WiFi Offloading is skyrocketing. This is the conclusion of a new report from Juniper Research, which points out that the amount of smartphone and tablet data traffic on WiFi networks will will increase to more than 115, 000 petabytes by 2019, compared to under 30, 000 petabytes this year, representing almost a four-fold increase. Most of this data is offloaded to consumer’s WiFi by the carriers, offering the possibility to share your home internet connection in exchange for “free” hotspots. But this article on InformationWeek Network Computing also warns that “The capacity of the 2.4GHz band is reaching its limit. the growing number of WiFi devices using unlicensed bands is seriously affecting network efficiency. Capacity is compromised by the number of simultaneously active devices, with transmission speeds dropping as much as 20% of the nominal value. With the number of IoT and M2M applications using WiFi continuously rising, that could become a serious problem soon.” Read more of this story at Slashdot.

See more here:
WiFi Offloading is Skyrocketing

NIST Workshop Explores Automated Tattoo Identification

chicksdaddy writes: Security Ledger reports on a recent NIST workshop dedicated to improving the art of automated tattoo identification. It used to be that the only place you’d commonly see tattoos was at your local VA hospital. No more. In the last 30 years, body art has gone mainstream. One in five adults in the U.S. has one. For law enforcement and forensics experts, this is a good thing; tattoos are a great way to identify both perpetrators and their victims. Given the number and variety of tattoos, though, how to describe and catalog them? Clearly this is an area where technology can help, but it’s also one of those “fuzzy” problems that challenges the limits of artificial intelligence. The National Institute of Standards and Technology (NIST) Tattoo Recognition Technology Challenge Workshop challenged industry and academia to work towards developing an automated image-based tattoo matching technology. Participating organizations in the challenge used a FBI -supplied dataset of thousands of images of tattoos from government databases. They were challenged to develop methods for identifying a tattoo in an image, identifying visually similar or related tattoos from different subjects; identifying the same tattoo image from the same subject over time; identifying a small region of interest that is contained in a larger image; and identifying a tattoo from a visually similar image like a sketch or scanned print. Read more of this story at Slashdot.

More:
NIST Workshop Explores Automated Tattoo Identification

Linux 4.1 Kernel Released With EXT4 Encryption, Performance Improvements

An anonymous reader writes: The Linux 4.1 kernel has been announced and its release brings expanded features for the Linux kernel including EXT4 file-system encryption, open-source GeForce GTX 750 support, performance improvements for Intel Atom / Bay Trail hardware, RAID 5/6 improvements, and other additions. Read more of this story at Slashdot.

Read more here:
Linux 4.1 Kernel Released With EXT4 Encryption, Performance Improvements

Facebook’s Absurd Pseudonym Purgatory

An anonymous reader sends a story from a writer whose Facebook account was locked because somebody reported it as using a pseudonym. It doesn’t, but Facebook demands a look at identification documents before releasing control over the account. Anyone whose name doesn’t sound “real” to Facebook is at risk for this, and the social network doesn’t even have a consistent stance on what an “authentic” name is. “Aside from the complexity of identity, the policy is haphazardly enforced at best. At worst, it’s dangerous and discriminatory, and has demonstrably and repeatedly been used to target people who often already are marginalized and vulnerable.” Matt Cagle, attorney for the ACLU, says, “By controlling the identity of the speaker with this policy, Facebook has the effect of both reducing speech and eliminating speakers from the platform altogether. This is a particularly concerning move to the ACLU because forums like Facebook serve as the modern-day equivalent of the public square for a lot of communities. Read more of this story at Slashdot.

Excerpt from:
Facebook’s Absurd Pseudonym Purgatory

Amazon Is Only Going To Pay Authors When Each Page Is Read

An anonymous reader writes: Amazon has a new plan to keep self-published authors honest: they’re only going to pay them when someone actually reads a page. Peter Wayner at the Atlantic explores how this is going to change the lives of the authors — and the readers. Fat, impressive coffee table books are out if no one reads them. Thin, concise authors will be bereft. Page turners are in. Read more of this story at Slashdot.

Link:
Amazon Is Only Going To Pay Authors When Each Page Is Read