An anonymous reader writes "All software has bugs, but this one is a particularly odd one. If you type "File:///" (no quotes) into almost any app on your Mac, it will crash. The discovery was made recently and a bug report was posted to Open Radar. First off, it’s worth noting that the bug only appears to be present in OS X Mountain Lion and is not reproducible in Lion or Snow Leopard. That’s not exactly good news given that this is the latest release of Apple’s operating system, which an increasing number of Mac users are switching to. ... A closer look shows the bug is inside Data Detectors, a feature that lets apps recognize dates, locations, and contact data, making it easy for you to save this information in your address book and calendar."
Slashdot Deals: Prep for the CompTIA A+ certification exam. Save 95% on the CompTIA IT Certification Bundle ×
johnsnails writes "Around 60 students at Harvard University have been suspended and others disciplined in a mass cheating scandal at the elite college, the campus newspaper reports. The Harvard Crimson quoted an email from Faculty of Arts and Sciences dean Michael Smith that said more than half of the cases heard by administrators in the scandal, which erupted last year, had resulted in suspension orders. 'After professor Matthew B. Platt reported suspicious similarities on a handful of take-home exams in his spring course Government 1310: “Introduction to Congress,” the College launched an investigation that eventually expanded to involve almost half of the 279 students enrolled in the course.'"
tsu doh nimh writes "A sophisticated cyberattack targeted The Washington Post in an operation that resembled intrusions against other major American news organizations and that company officials suspect was the work of Chinese hackers, the publication acknowledged on Friday. The disclosure came just hours after a former Post employee shared information about the break-in with ex-Postie reporter Brian Krebs, and caps a week marked by similar stories from The New York Times and The Wall Street Journal. Krebs cites a former Post tech worker saying that the publication gave one of its hacked servers to the National Security Agency for analysis, a claim that the Post's leadership denies. The story also notes that the Post relied on software from Symantec, the same security software that failed to detect intrusions at The New York Times for many months."
New submitter Flozzin writes with news of some resolution to the long-standing dispute that some French publishers have had with Google for republishing snippets of news reports without sharing revenue earned from the ads run alongside. Now, reports the BBC, "Google has agreed to create a 60m euro ($82m; £52m) fund to help French media organisations improve their internet operations. It follows two months of negotiations after local news sites had demanded payment for the privilege of letting the search giant display their links. The French government had threatened to tax the revenue Google made from posting ads alongside the results."
An anonymous reader writes "Today Steven Chu, U.S. Secretary of Energy, released a letter indicating he won't continue to hold the job for President Obama's second term. He'll continue until the ARPA-E Summit at the end of February, and then perhaps a bit longer until a replacement is found. MIT's Technology Review sums up his contributions thus: 'Under his leadership, the U.S. Department of Energy has changed the way it does energy research and development. He leaves behind new research organizations that are intently focused on solving specific energy problems, particularly the Advanced Research Projects Agency for Energy as well as several Innovation Hubs. The latter were modeled closely on Chu's experience working at the legendary Bell labs, where researchers solving basic problems rubbed shoulders with engineers who knew how to build things. At one Innovation Hub, for example, researchers who are inventing new materials that can absorb sunlight or split water are working together with engineers who are building prototypes that could use those materials to generate fuel from sunlight. Chu also brought an intense focus on addressing climate change through technical innovation, speaking clearly and optimistically about the potential for breakthroughs to change what's possible.'"
redletterdave points out work from Japanese researchers who produced an incredible visualization of how a brain perceives its environment. Studying zebrafish larvae, the scientists were able to observe neuronal signals in real time as the zebrafish saw and identified is prey, a paramecium. The results are illustrated in a brief video posted to YouTube, and in a longer video abstract hosted at Current Biology. (Direct download). The work is important because it demonstrates direct mapping of external stimuli to internal neuron activity in the optic tectum.
An anonymous reader writes "Facebook has brought back its photo Tag Suggestions feature to the U.S. after temporarily suspending it last year to make some technical improvements. Facebook says it has re-enabled it so that its users can use facial recognition 'to help them easily identify a friend in a photo and share that content with them.' Facebook first rolled out the face recognition feature across the U.S. in late 2010. The company eventually pushed photo Tag Suggestions to other countries in June 2011, but in the US there was quite a backlash. Yet Facebook doesn't appear to have made any privacy changes to the feature: it's still on by default."
itwbennett writes "Last year, Rackspace planned to support third-party OpenStack distributions as part of its private cloud offering. That was then. 'Things have evolved quickly as enterprises start evaluating their options in the cloud generally and the OpenStack market specifically,' said Jim Curry, general manager of Rackspace Private Cloud. Customers, it seems, want to run a cloud model internally that 'looks and feels like what Rackspace delivers in the public cloud. To deliver that experience, we needed to develop software that deploys an OpenStack cloud that Rackspace can operate and support.'"
pigrabbitbear writes "It always sounded like a hoax, didn't it? Silk Road: an Internet website where you can buy any drug in the world? Yeah, right. But it's real. It was almost two years ago that we first heard about the site, which hosts everything from Adderall to Ketamine, LSD to MDMA and tons and tons of weed. After it started to pick up a ton of press and exposure, we all thought that certainly the Silk Road would get shut down. It's super illegal to sell drugs or even to help people sell drugs. But it didn't. Silk Road survives to this day. However, with the arrival this week of the first conviction of a Silk Road-related crime, you have to wonder if Silk Road's days might be numbered after all. The trouble is brewing in Australia, where a guy named Paul Leslie Howard is facing as many as five years in prison for selling drugs on Silk Road. We're not talking millions of dollars worth of drugs, but we are talking about thousands of dollars worth. And just as Silk Road natives had feared, Howard was one of those Silk Road n00bs who read a newspaper article about the site and decided to try it out for himself."
New submitter Matt Slaybaugh writes "John Foley at InformationWeek has an editorial saying that the missing piece in the new gun control legislation is adequate data management. 'President Obama introduced 23 executive orders on Jan. 16 aimed at reducing gun violence through a combination of tougher regulation and enforcement, research, training, education and attention to mental healthcare. Several of the proposed actions involve better information sharing, including requiring federal agencies to make relevant data available to the FBI's background check system and easing legal barriers that prevent states from contributing data to that system.' But concrete plans are needed now to improve the current poor system of data collection and sharing. Federal CIO Steven VanRoekel's Digital Government Strategy, introduced in May, 'defines an IT architecture and processes for sharing digitized content securely, using Web APIs and with attention to protecting privacy. ... Unfortunately, on top of the data quality issues identified by the White House, and the FBI's and ATF's outdated IT systems, there's a lack of transparency about the systems used to enforce federal gun-control laws.'"
Dangerous_Minds writes "On Wednesday, we discussed news that RIANZ convicted its first file-sharer under the New Zealand three strikes law. While the fine totaled $616.57, a New Zealand Herald report points out that in order to get that fine, RIANZ had to spend $250,000. Freezenet makes an interesting point that HADOPI (France's version of the three strikes law) faced similar problems when the Socialist party commented that 12 million euros was a lot of money to pay 60 agents to send out 1 million e-mails. The question raised is whether or not this money pit trend will continue when the Copyright Alert System starts processing strike notices in the United States."
anavictoriasaavedra writes "A unique show is taking place on Kamchatka these days: Four separate but nearby volcanoes are erupting simultaneously on the Russian peninsula. A Moscow film crew has produced an awe-inspiring 360-degree video of the natural fireworks." The video is well worth watching and panning around in. There are also a bunch of high-res still photo panoramas.
An anonymous reader writes in with news that IBM's Jeopardy winning supercomputer is going back to school"A modified version of the powerful IBM Watson computer system, able to understand natural spoken language and answer complex questions, will be provided to Rensselaer Polytechnic Institute in New York, making it the first university to receive such a system. IBM announced Wednesday that the Watson system is intended to enable upstate New York-based RPI to find new uses for Watson and deepen the systems' cognitive computing capabilities - for example by broadening the volume, types, and sources of data Watson can draw upon to answer questions."
wiredmikey writes "The popular belief is that security risks increase as the user engages in riskier and shadier behavior online, but that apparently isn't the case, Cisco found in its 2013 Annual Security report. It can be more dangerous to click on an online advertisement than an adult content site these days, according to Cisco. For example, users clicking on online ads were 182 times more likely to wind up getting infected with malware than if they'd surfed over to an adult content site, Cisco said. The highest concentration of online security targets do not target pornography, pharmaceutical, or gambling sites as much as they affect legitimate sites such as search engines, online retailers, and social media. Users are 21 times more likely to get hit with malware from online shopping sites and 27 more times likely with a search engine than if they'd gone to a counterfeit software site, according to Cisco's report (PDF). There is an overwhelming perception that people get compromised for 'going to dumb sites,' Mary Landesman, senior security researcher at Cisco, told SecurityWeek."
mikejuk writes "It is reported that Microsoft has sent an email to DirectX/XNA MVPs which informs them that they are no longer needed because XNA and DirectX are no longer evolving. What does this mean? If you don't need MVPs then presumably you anticipate nothing to support in the future."