Star Wars: Episode VII coming December 18, 2015

Star Wars: Episode VII will be released December 18, 2015. “We’re very excited to share the official 2015 release date for Star Wars: Episode VII, where it will not only anchor the popular holiday filmgoing season but also ensure our extraordinary filmmaking team has the time needed to deliver a sensational picture,” announced Walt Disney Studios chairman Alan Horn over at StarWars.com . JJ Abrams is of course directing and also writing the script with Lawrence Kasdan (Raiders of the Lost Ark, The Empire Strikes Back, and Return of the Jedi.) Importantly, John Williams will score the new film!        

See more here:
Star Wars: Episode VII coming December 18, 2015

Why AOL’s chief fired a man in front of 1,000 colleagues

Nicholas Carlson, at Business Insider , on the day AOL’s CEO briefly interrupted a motivational post-layoffs session with staff to fire one of them on-the-spot —and the business pressures that led to it. The impulsive firing on the heels of this statement made Armstrong sound unhinged — “schizophrenic in his thinking” is how a source close to him later described it. Several days later, Armstrong apologized privately to Abel Lenz and then publicly to AOL employees. But, by then, mainstream outlets including Yahoo and the Daily Mail had picked up the news. Some people viewed the public firing as a bad-ass CEO move, the kind of thing that a famously demanding executive like Steve Jobs or Larry Ellison might have done. But most people across the country and world saw it as gratuitous and humiliating: What’s wrong with Tim Armstrong, people wondered? What kind of CEO fires some poor guy in front of all his colleagues? What did this say about what was going on at AOL?        

More:
Why AOL’s chief fired a man in front of 1,000 colleagues

Archive.org’s scanning center destroyed by fire

Rick Prelinger writes, “Early this morning a fire whose origin is still unknown destroyed the book, film and microfilm scanning center located next door to Internet Archive’s office in San Francisco’s Richmond District. Thankfully, no one was hurt. While power interruptions caused some sporadic outages on archive.org, no data has been lost. Eight workers who staffed the scanning center will temporarily relocate to our Physical Archive facility across the Bay. The current estimated value of scanning equipment lost in the fire is $600,000. Brewster Kahle, the Archive’s founder, has posted more detail about the fire on the Archive’s blog. A call is out for donations to help rebuild the scanning facility, and for new digitization work to keep employees affected by the fire busy at our alternate location. ( Thanks, Rick ! )        

Read More:
Archive.org’s scanning center destroyed by fire

California School District Hires Firm To Monitor Students’ Social Media

An anonymous reader writes “A suburban Los Angeles school district is taking a novel approach to tackling the problem of cyber-bullying. It’s paying a company to snoop on students’ social media pages. ‘The district in Glendale, California, is paying $40, 500 to a firm to monitor and report on 14, 000 middle and high school students’ posts on Twitter, Facebook and other social media for one year. Though critics liken the monitoring to government stalking, school officials and their contractor say the purpose is student safety. As classes began this fall, the district awarded the contract after it earlier paid the firm, Geo Listening, $5, 000 last spring to conduct a pilot project monitoring 9, 000 students at three high schools and a middle school. Among the results was a successful intervention with a student “who was speaking of ending his life” on his social media, said Chris Frydrych, CEO of the firm.'” Read more of this story at Slashdot.

More:
California School District Hires Firm To Monitor Students’ Social Media

Salesforce.com To Cut 200 Jobs Despite Its Expectations To Make More Money

Dawn Kawamoto writes “Sometimes, making more money is not enough. Just ask Salesforce.com. The SaaS company announced it would cut 200 jobs, during its second quarter earnings call. The cuts are coming, despite the company raising its revenue forecast for its fiscal year. Salesforce.com says it’s initiating the cuts to reduce overlapping roles and to (you guessed it) gain ‘synergy’, following its effort to meld its cloud marketing platform company ExactTarget with its social media market suite Marketing Cloud. And apparently this isn’t the first time Salesforce has tried to squeeze out those nebulous ‘synergies.’ It reportedly cut 100 jobs in October, when it merged its social media platform companies Radian6 and Buddy Media.” Read more of this story at Slashdot.

More:
Salesforce.com To Cut 200 Jobs Despite Its Expectations To Make More Money

Holy Cow: Researchers Discover Plants Can Communicate With Each Other Through the Soil

In James Cameron’s Avatar , the lush moon known as Pandora is covered in a “neural network” of roots, enabling the plants to communicate with each other—the interplant, if you will. But if Pandora’s ecology is anything like Earth’s, Cameron has got it wrong. Plants on Earth don’t communicate via root-to-root connections: They communicate through the soil, if a University of Aberdeen study is to be believed. The study, led by researcher Dr. David Johnson , found that plants could communicate with nearby plants using soil fungus as the messenger. The experiment which suggests this was following up the discovery, made in 2010 by a Chinese team, that when a tomato plant gets infected with leaf blight, nearby plants start activating genes that help ward the infection off–even if all airflow between the plants in question has been eliminated. The researchers who conducted this study knew that soil fungi whose hyphae are symbiotic with tomatoes (providing them with minerals in exchange for food) also form a network connecting one plant to another. They speculated, though they could not prove, that molecules signalling danger were passing through this fungal network. While plants don’t have much to “LOL” and “WTF” each other about, Dr. Johnson looked at the Chinese study’s “danger” warnings and set up a similar experiment to see if they’d warn each other of other kinds of trouble. Broad-bean plants are often feasted on by aphids, and to defend themselves, the plants then release a chemical that attracts wasps, who come around and deliver smackdowns on the aphids. Johnson set up ways to isolate potential methods for the plants to “contact” each other (i.e., through some unknown airborne means) and discovered that, yep, when one plant got attacked by aphids, it sent out signals to nearby plants using the local soil fungus. With the message received, the plant’s neighbors would also start releasing the wasp-attracting chemicals. This is pretty mind-blowing, and doubters who need to read more specifics on the study can click here . But what me and every city dweller has got to be thinking is: Can AT&T tap into this network, so we can finally get a cell signal out in the countryside? “I think the mushrooms are capping our download speeds.” Via The Economist (more…)        

See the article here:
Holy Cow: Researchers Discover Plants Can Communicate With Each Other Through the Soil

Facebookers beware: Profile posts can get you job rejections

A new study shows that one in ten people from the ages 16 to 34 have been turned down from potential employment because of something they posted on social media. [Read more]        

Read More:
Facebookers beware: Profile posts can get you job rejections

Anatomy of a password-crack, part II

Ars Technica’s Nate Anderson Dan Goodin follows up on Nate Anderson’s excellent piece on the nuts and bolts of password cracking with a further attempt to decrypt an encrypted password file leaked from LivingSocial, this time with the aid of experts. The password file they were working on was encrypted with the relatively weak (and now deprecated) SHA1 hashing algorithm, and they were only attacking it with a single GPU on a commodity PC, and were able to extract over 90% of the passwords in the file. The discussion of the guesswork and refinement techniques used in extracting passwords is absolutely fascinating and really is a must-read. However, the whole exercise is still a bit inconclusive — in the end, we know that a badly encrypted password file is vulnerable to an underpowered password-cracking device. But what we need to know is whether a well-encrypted password file will stand up to a good password-cracking system. The specific type of hybrid attack that cracked that password is known as a combinator attack. It combines each word in a dictionary with every other word in the dictionary. Because these attacks are capable of generating a huge number of guesses—the square of the number of words in the dict—crackers often work with smaller word lists or simply terminate a run in progress once things start slowing down. Other times, they combine words from one big dictionary with words from a smaller one. Steube was able to crack “momof3g8kids” because he had “momof3g” in his 111 million dict and “8kids” in a smaller dict… What was remarkable about all three cracking sessions were the types of plains that got revealed. They included passcodes such as “k1araj0hns0n,” “Sh1a-labe0uf,” “Apr!l221973,” “Qbesancon321,” “DG091101%,” “@Yourmom69,” “ilovetofunot,” “windermere2313,” “tmdmmj17,” and “BandGeek2014.” Also included in the list: “all of the lights” (yes, spaces are allowed on many sites), “i hate hackers,” “allineedislove,” “ilovemySister31,” “iloveyousomuch,” “Philippians4:13,” “Philippians4:6-7,” and “qeadzcwrsfxv1331.” “gonefishing1125” was another password Steube saw appear on his computer screen. Seconds after it was cracked, he noted, “You won’t ever find it using brute force.” Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”        

See the article here:
Anatomy of a password-crack, part II

The Tech That Helped Take Down Marathon Bombing Suspect Dzhokar Tsarnaev

The second suspect in the brutal Boston Marathon bombings has been apprehended , after five days of uncertainty and fear. And while all credit for Dzhokar Tsarnaev’s capture goes to the men and women of the many, many agencies that spent the last week tracking him down, technology played as prominent a role as it ever has in a time of national crisis. More »        

Read the original post:
The Tech That Helped Take Down Marathon Bombing Suspect Dzhokar Tsarnaev