New submitter theclockworkcomputer writes "100 years ago tomorrow, Alan Turing was born. To celebrate, I wrote a Universal Turing Machine in 100 Punchcards. I've uploaded a video to explain a small part of the read head (the Jacquard). One needle is shown out of a total of 28. As this is about a program for a Turing Machine and not about a Turing Machine itself, I hope to be excused from the requirement of infinite tape."
Find out the latest on data centers with SlashDataCenter.
MojoKid writes "Microsoft's Surface isn't just an attempt to take on the iPad or an articulation of MS's independent design philosophy — it's a fundamental threat against the OEMs who've spent decades as Microsoft's partners and collectively destroyed the industry's perception of the PC as a high-value product. The adversarial roots run deep. Microsoft didn't tell its partners about Surface until three days before the event and gave only the most minimal details on the product. Only the largest vendors even got a phone call; Asus and Acer, the 4th and 5th largest PC manufacturers worldwide, have stated that they had no idea anything was coming. For OEMs who have spent decades working in lock-step with Redmond, that's deeply unsettling."
judgecorp writes "Iran has reported that its nuclear facilities are under a sustained cyber attack which it blames on the U.S., UK and Israel. America and Israel created Stuxnet, and have been accused of starting the Flame worm." And once a country admits that it's created such software, publicly deflecting such blame gets a lot harder.
An anonymous reader writes "Canonical has laid out their plans for handling UEFI SecureBoot on Ubuntu Linux. Similar to Red Hat paying Microsoft to get past UEFI restrictions, Canonical does have a private UEFI key. Beyond that they will also be switching from GRUB to the more liberal efilinux bootloader, and only require bootloader binaries be signed — and they want to setup their own signing infrastructure separate from Microsoft."
Trailrunner7 writes "PayPal is the latest company to join the ranks of software vendors and Web properties that offer bounties to security researchers who privately disclose new bugs to them. The company isn't saying how much it will pay for each bug, just that its security team will determine the severity of each flaw as well as the ultimate payout. PayPal's decision to offer financial incentives to researchers follows the establishment of similar programs by companies including Google, Mozilla, Facebook, Barracuda and others. Google's bug bounty program may be the most well-known and comprehensive, as it includes bugs not just in its software products such as Chrome, but also its Web properties. The company has paid out more than $400,000 in rewards to researchers since the program began and researchers who consistently find bugs in Google's products can make a nice side income off the program."
colinneagle writes "Among the eye-opening statements in his recent TED talk, Mozilla CEO Gary Kovacs said, 'Privacy is not an option, and it shouldn't be the price we accept for just getting on the Internet. Our voices matter and our actions matter even more.' After you download and install Collusion in Firefox, you can 'see who is tracking you across the Web and following you through the digital woods,' Kovacs stated. 'Going forward, all of our voices need to be heard. Because what we don't know can actually hurt us. Because the memory of the Internet is forever. We are being watched. It's now time for us to watch the watchers.' I've been using Collusion for some time now and it is jaw-dropping to watch all the sites that still stalk us across the web even with DNT and privacy add-ons. The Collusion page states: 'The Ford Foundation is supporting Mozilla to develop the Collusion add-on so it will enable users to not only see who is tracking them across the Web, but also to turn that tracking off when they want to.'"
sl4shd0rk writes "Federal Judge Richard Posner seems to be a man who gets the screwed up patent system in the U.S. As Apple pressed for more injunctions against Motorola regarding alleged patent infringement, Judge Posner has stressed the two companies should just 'get along' and pay each other royalties. A jury trial set to start last week was cancelled when Posner ruled that neither side could prove damages, and grilled Apple's legal team saying an injunction against Motorola would be 'contrary to the public interest.' Furthermore, as Apple tried to plead its injunction case concerning four patents, Posner called the U.S. patent system 'chaos' and said an order barring the sale of Motorola phones could have 'catastrophic effects.'"
First time accepted submitter thecoolstacks writes "Knockoff Apple Stores are one thing...but a knockoff Austrian village? That's some hardcore piracy right there, but we guess leave it China to do what it does best. From the article: 'After a year of construction and a price tag of $940 million dollars, the Chinese have successfully recreated the Austrian village of Hallstatt in its entirety over in the Southern Guangzhou Province. And let’s just say not every Austrian’s a fan of having their UNESCO heritage site ripped off. But since China is Austria’s second largest trading partner, what are you gonna do?'"
An anonymous reader writes "I have two kids, 7 and 8. I would love to allow them internet access on a regular basis. The problem is what's out there: I really don't want them to deal with porn ads and such, but making either a blacklist or a whitelist myself would take months. So I figured I would ask you: what free software would you use with preferably prebuilt lists to protect your kids online? What is out there with fairly easy configuration ability (to allow for game servers — they love Minecraft), but secure enough they can't just bypass it using a Google search?"
An anonymous reader writes "The second of the two controversial bird flu studies once considered too risky to publish in fears that they would trigger a potentially devastating global influenza epidemic was published Thursday. The study describes how scientists created H5N1 virus strains that could become capable of airborne transmission between mammals. Scientists said that the findings, which had been censored for half a year, could help them detect dangerous virus strains in nature."
snydeq writes "Law professor Tim Wu sheds light on a growing legal concern: the extent to which computers have a constitutional right to free speech. 'This may sound like a fanciful question, a matter of philosophy or science fiction. But it's become a real issue with important consequences,' Wu writes. First it was Google defending — and winning — a civil suit on grounds that search results are constitutionally protected speech. Now it is doubling down on the argument amidst greater federal scrutiny. 'Consider that Google has attracted attention from both antitrust and consumer protection officials after accusations that it has used its dominance in search to hinder competitors and in some instances has not made clear the line between advertisement and results. Consider that the "decisions" made by Facebook's computers may involve widely sharing your private information. ... Ordinarily, such practices could violate laws meant to protect consumers. But if we call computerized decisions "speech," the judiciary must consider these laws as potential censorship, making the First Amendment, for these companies, a formidable anti-regulatory tool.'"
itwbennett writes "Thanks to a new feature approved this week by the Fedora Engineering Steering Committee, you won't hear Fedora 18 users bragging about systems that have been running continuously for months on end. 'Fedora's new Offline System Update feature will change the current system to something that is more Windows- and OS X-like: while many updates can still be made on the fly, certain package updates will require the system to be restarted so the patches can be applied in a special mode, according to the Fedora wiki page on the feature,' writes blogger Brian Proffitt."
hapworth writes "Eugene Kaspersky, founder and CEO of cybersecurity firm Kaspersky Lab, has warned that one of the greatest cyber threats facing the world is the lack of effective online voting systems, claiming that unless young people can vote online they won't bother at all and the whole democratic system will collapse. Not everyone is buying that theory, however (and there's reason to suspect Kaspersky has a vested interest in online voting, which may need his firm's cybersecurity products). As producer James Lambie writes, 'Ultimately, the digital native's disenchantment with voting is based less on a lack of suitable technology and more on disillusionment with the craven and anemic political choices they are presented with.'"
derekmead writes "How, exactly, did Reddit get so big? Well, according to Reddit cofounder Steve Huffman, in the early days the Reddit crew just faked it 'til they made it.' In a video for Udacity, Huffman describes how the first Redditors populated the site's content with tons of fake accounts. These days, with the site's users are wary of people using expendable accounts to try to seed their own content. But early on, Huffman said that using fake accounts driven by the founders was key to building the tone they wanted to the site. Early on the Reddit crew could shape the discourse of the site in the direction they wanted, and as the real user base grew, those standards held allowing the fake accounts to fade away."
First time accepted submitter moj0joj0 writes "Two days after YouTube-MP3.org, a site that converts songs from music videos into MP3 files, was blocked from accessing YouTube, the RIAA has asked CNET to remove software from Download.com that performs a similar function. The RIAA focused its criticism on software found at Download.com called YouTubeDownloader. The organization also pointed out that there are many other similar applications available at the site, 'which can be used to steal content from CBS, which owns Download.com.' CNET's policy is that Download.com is not in any position to determine whether a piece of software is legal or not or whether it can be used for illegal activity." For a sufficiently broad definition of "steal," you could argue that all kinds of software (from word processors to graphics programs to security analysis tools) could be implicated.