“Scholars at the University of California, Berkeley have uncovered and authenticated a cache of stories written by Mark Twain when he was a 29-year-old newspaperman in San Francisco. Read the rest
“Scholars at the University of California, Berkeley have uncovered and authenticated a cache of stories written by Mark Twain when he was a 29-year-old newspaperman in San Francisco. Read the rest
Maker Ben Saks of KinetiGear is crowdfunding BoXZY , a desktop fabricator bringing micromanufacturing to the masses. Users can shape wood, plastics, and many metals using most commercial CAM programs. Read the rest
See the article here:
BoXZY all-in-one 3D printer, CNC mill, & laser engraver
Well played, Ben Burst . Well played. For those of you who aren’t tweens, boy pop band One Direction lost a member yesterday: Zayn Malik. This abrupt breakup hit their fans right in the feels. [via Reddit ]
Visit link:
Guy creates video mocking grief of One Direction fans after Zayn Malik quits. CBS airs it as real.
“We are just there to lend our support and grow contractually obligated beards, ” says Mark Hamill on filming Star Wars: Episode 7. ( BBC News )
View original post here:
Mark Hamill on the new Star Wars
Aurich Lawson In an age of smartphones and social networking, e-mail may strike many as quaint. But it remains the vehicle that millions of people use every day to send racy love letters, confidential business plans, and other communications both sender and receiver want to keep private. Following last week’s revelations of a secret program that gives the National Security Agency (NSA) access to some e-mails sent over Gmail, Hotmail, and other services—and years after it emerged that the NSA had gained access to full fiber-optic taps of raw Internet traffic—you may be wondering what you can do to keep your messages under wraps. The answer is public key encryption, and we’ll show you how to use it. The uses of asymmetry The full extent of the cooperation between the NSA and various technology companies is unclear. It will probably remain that way for the foreseeable future. For the time being, however, it seems likely that the standard cryptographic tools used to secure data “in flight”—that is to say, the SSL that protects data traveling between machines on the Internet—remain secure as long as certain best practices are used. Read 55 remaining paragraphs | Comments
See the original post:
Encrypted e-mail: How much annoyance will you tolerate to keep the NSA away?
iOS 7 looks lovely, but it’s not all about appearances; the new operating system is bringing some nice new features as well. But even if you get the upgrade, you might not get all the fun stuff that comes with it . Read more…
View post:
The Prettiest Way to Find Out What iOS 7 Features Your iPhone Won’t Get
Aurich Lawson / Thinkstock Starting late last year, hundreds of US businesses began to receive demand letters from secretive patent-holding companies with six-letter gibberish names: AdzPro, GosNel, and JitNom. The letters state that using basic office equipment, like scanners that can send files to e-mail, infringes a series of patents owned by MPHJ Technologies. Unless the target companies make payments—which start at around $9,000 for the smallest targeted businesses but go up from there—they could face legal action. In a world of out-there patent claims, MPHJ is one of the most brazen yet. It’s even being talked about in Congress. Rep. Peter DeFazio (D-OR), who has sponsored the anti-troll SHIELD Act, cited the operation as a perfect example of why the system needs reform. After publishing a story on the scanner-trolling scheme , Ars heard from letter recipients and their lawyers from around the country—Idaho and Texas, California and South Dakota. Before the AdzPros and GosNels took over, the patents were owned by an entity called Project Paperless, which threatened dozens of businesses in Virginia and Georgia. Project Paperless ultimately filed two lawsuits, prosecuted by lawyers at Hill, Kertscher, and Wharton, an Atlanta firm with complex connections to the patents. In late 2012, Project Paperless sold the patents to MPHJ Technology Investments. Today, the anonymous owner of MPHJ operates GosNel, AdzPro, JitNom, and at least a dozen other shell companies now targeting small businesses around the country. Read 65 remaining paragraphs | Comments
More:
Meet the nice-guy lawyers who want $1,000 per worker for using scanners
49ers CTO Kunal Malik (left) and Senior IT director Dan Williams (right) stand in front of Santa Clara Stadium. Jon Brodkin When the San Francisco 49ers’ new stadium opens for the 2014 NFL season, it is quite likely to have the best publicly accessible Wi-Fi network a sports facility in this country has ever known. The 49ers are defending NFC champions, so 68,500 fans will inevitably walk into the stadium for each game. And every single one of them will be able to connect to the wireless network, simultaneously , without any limits on uploads or downloads. Smartphones and tablets will run into the limits of their own hardware long before they hit the limits of the 49ers’ wireless network. A model of Santa Clara Stadium, with a wall painting visible in the background. Jon Brodkin Jon Brodkin Until now, stadium executives have said it’s pretty much impossible to build a network that lets every single fan connect at once. They’ve blamed this on limits in the amount of spectrum available to Wi-Fi, despite their big budgets and the extremely sophisticated networking equipment that largesse allows them to purchase. Even if you build the network perfectly, it would choke if every fan tried to get on at once—at least according to conventional wisdom. Read 69 remaining paragraphs | Comments
More here:
The 49ers’ plan to build the greatest stadium Wi-Fi network of all time
Aurich Lawson / Thinkstock “See! That shit keeps popping up on my fucking computer!” says a blond woman as she leans back on a couch, bottle-feeding a baby on her lap. The woman is visible from thousands of miles away on a hacker’s computer. The hacker has infected her machine with a remote administration tool (RAT) that gives him access to the woman’s screen, to her webcam, to her files, to her microphone. He watches her and the baby through a small control window open on his Windows PC, then he decides to have a little fun. He enters a series of shock and pornographic websites and watches them appear on the woman’s computer. The woman is startled. “Did it scare you?” she asks someone off camera. A young man steps into the webcam frame. “Yes,” he says. Both stare at the computer in horrified fascination. A picture of old naked men appears in their Web browser, then vanishes as a McAfee security product blocks a “dangerous site.” Read 65 remaining paragraphs | Comments
Aurich Lawson When you buy a Raspberry Pi, the $35 computer doesn’t come with an operating system. Loading your operating system of choice onto an SD card and then booting the Pi turns out to be pretty easy. But where do Pi-compatible operating systems come from? With the Raspberry Pi having just turned one year old , we decided to find out how Raspbian —the officially recommended Pi operating system—came into being. The project required 60-hour work weeks, a home-built cluster of ARM computers, and the rebuilding of 19,000 Linux software packages. And it was all accomplished by two volunteers. Like the Raspberry Pi itself, an unexpected success story Although there are numerous operating systems for the Pi, the Raspberry Pi Foundation recommends one for the general populace. When the Pi was born a year ago, the recommended operating system was a version of Red Hat’s Fedora tailored to the computer’s ARM processor. But within a few months, Fedora fell out of favor on the Pi and was replaced by Raspbian. It’s a version of Debian painstakingly rebuilt for the Raspberry Pi by two volunteers named Mike Thompson and Peter Green. Read 53 remaining paragraphs | Comments
Read the article:
How two volunteers built the Raspberry Pi’s operating system