Sunday, November 14, 2010


Sort of a follow-up.

http://www.bespacific.com/mt/archives/025738.html

November 13, 2010

NYT Magazine: The Great Cyberheist

Follow up to Major International Hacker Pleads Guilty For Massive Attack On U.S. Retail And Banking Networks, this Sunday New York Times cover article, The Great Cyberheist, details the remarkable double life of a young man who received the "longest sentence ever handed down to an American for computer crimes."

http://www.nytimes.com/2010/11/14/magazine/14Hacker-t.html?_r=1&ref=magazine



The Economics of the Internet.

http://tech.slashdot.org/story/10/11/13/1758242/The-Monopolies-That-Dominate-the-Internet?from=rss

The Monopolies That Dominate the Internet

Posted by kdawson on Saturday November 13, @03:58PM

Tim Wu has a piece up at the Wall Street Journal pointing out that the free-market, open Internet — "competition in its purest form" — has evolved to be dominated by monopolies. Wu argues that this is nothing new, and that each wave of information technology in the US has followed a similar pattern.

"Today's Internet borders will probably change eventually, especially as new markets appear. But it's hard to avoid the conclusion that we are living in an age of large information monopolies. Could it be that the free market on the Internet actually tends toward monopolies? Could it even be that demand, of all things, is actually winnowing the online free market — that Americans, so diverse and individualistic, actually love these monopolies? ... Info-monopolies tend to be good-to-great in the short term and bad-to-terrible in the long term."


(Related) ...or is this just a sales pitch?

http://blogs.technet.com/b/microsoft_on_the_issues/archive/2010/11/11/the-economic-impact-of-the-cloud.aspx

Economics of the Cloud

… Our analysis uncovers economies of scale for cloud that are much greater than commonly thought. We believe that large clouds could one day deliver computing power at up to 80% lower cost than small clouds.




http://www.bespacific.com/mt/archives/025737.html

November 13, 2010

Chair Lecture: The Path of Legal Information John Palfrey

Chair Lecture: The Path of Legal Information (abstract) - John Palfrey, Henry N. Ess Professor of Law and Vice Dean for Library and Information Resources at Harvard Law School & Berkman Center Faculty Co-Director. Please note the links at the end of the article, which include live blogging and photos.

[From the abstract:

I propose a path toward a new legal information environment that is predominantly digital in nature.




For my Ethical Hackers. Thanks for bringing your phones to “show & tell”

http://mobile.slashdot.org/story/10/11/14/0115255/Android-Holes-Allow-Secret-Installation-of-Apps?from=rss

Android Holes Allow Secret Installation of Apps

Posted by timothy on Saturday November 13, @10:36PM

CheerfulMacFanboy writes with a link to Heise Online which says

"'Security researchers have demonstrated two vulnerabilities that allow attackers to install apps on Android and its vendor-specific implementations without a user's permission. During normal installation, users are at least asked to confirm whether an application is to have certain access rights. Bypassing this confirmation request reportedly allows spyware or even diallers to be installed on a smartphone.' One vulnerability was identified when a security specialist analysed HTC devices and found that the integrated web browser has the right to install further packages (used to automatically update its Flash Lite plug-in). Attackers can exploit this if they have found another browser hole. 'Android specialist Jon Oberheide demonstrated another hole which involved misusing the Account Manager to generate an authentication token for the Android Market and obtaining permission to install further apps from there. However, this initially requires a specially crafted app to be installed on the smartphone. Nothing could be easier: Oberheide released the allegedly harmless "Angry Birds Bonus Levels" app into the Android Market and, upon installation, this app downloaded and installed three further apps ("Fake Toll Fraud," "Fake Contact Stealer," and "Fake Location Tracker") without requesting the user's permission.'"




For my students: And do try the Easter Eggs.

http://www.hplusmagazine.com/articles/ai/users-guide-wolframalpha

A Users Guide to WolframAlpha


No comments: