Feed aggregator
VIDEO: Oysters flourish again in Swansea
VIDEO: Snowstorm survivor 'led 150 to safety'
Icebergs off the Florida coast?
“Snowbirds” they are called—people who escape snowy winters in the northern US by seasonally migrating to second homes in Florida. Probably about the last thing they would like to see while walking along the beach is the ice following them south. At certain times just a handful of millennia ago, it turns out, they might have been surprised to find icebergs floating by the beaches.
When Earth’s climate was colder and an ice sheet covered Canada, impressive flotillas of icebergs were occasionally launched into the Atlantic during incidents known as “Heinrich events.” Each time a batch of icebergs and glacial meltwater were vomited out, the area around the North Atlantic experienced climatic consequences. It’s thought that the infusion of freshwater gummed up the conveyor belt of Atlantic Ocean circulation, disrupting the transport of heat throughout the entire ocean basin.
Heinrich events are usually seen in ocean sediment cores as layers of gritty sediment dropped from melting icebergs onto the fine mud of the seafloor. That’s even been seen as far south as Bermuda. Closer to North America’s eastern coast, trenches carved by the undersides of large icebergs have been spotted in the mud off Nova Scotia, New Jersey, and even the Carolinas.
Read 9 remaining paragraphs | Comments
Ex-Google lawyer nominated as patent office director
Michelle Lee, formerly Google's chief patent lawyer and currently acting director of the US Patent and Trademark Office, has been nominated by the Obama administration to be the next permanent USPTO director. Lee will be the first head of the patent office to have a background at an Internet company.
Lee's nomination comes months after the administration floated the name of Philip Johnson, a lawyer at Johnson & Johnson who was an outspoken opponent of patent reform. The idea of nominating Johnson evaporated after a negative response from tech companies.
Choosing Lee has won praise all around, although the pro-reform forces are likely happier than the anti-reform forces given her background at Google. Lee was one of the first corporate lawyers to be vocal about the problem posed by "non-practicing entities," also known as patent trolls.
Read 4 remaining paragraphs | Comments
Non-Linux FOSS: Remember Burning ISOs?
I was chatting with a Windows-using friend recently, and he wanted to try Linux on one of his older computers. I always like those sorts of conversations, and so I kept chatting, walking him through setting up Unetbootin to create a USB installer and so on and so on. Unfortunately, he wasn't able to get the USB drive to boot. more>>
From The Wirecutter: The best budget laptop you can buy
This post was done in partnership with The Wirecutter, a list of the best technology to buy.
Read the original full article below at TheWirecutter.com.
After considering all the major laptops in its price range, I decided that if I had to buy a Windows laptop for $600 or less, I’d get the ~$580 version of the Lenovo IdeaPad Flex 2 14.
Read 15 remaining paragraphs | Comments
VIDEO: 'We live with the threat of IS'
Secrets become history: Edward Snowden on film as Citizenfour
Citizenfour is filmmaker Laura Poitras' account of the first meetings between herself, Glenn Greenwald, and Edward Snowden. It was first shown publicly last Friday, and it will open in theaters in New York, Los Angeles, and San Francisco on October 24.
For those who have followed the news around the Snowden documents, even in small doses, Citizenfour isn't full of revelations (though there are a few surprises). But for viewers interested in surveillance, or the future of the Internet, or journalism—it won't matter. The film is riveting, and its power is in its source material.
Poitras filmed Snowden for 20 hours over eight days in his Hong Kong hotel, and her film has now given the world an unfiltered portrait of the man who, in the course of the year, became the West’s most wanted dissident.
Read 29 remaining paragraphs | Comments
Opening an Internet time capsule—Internet in a Box for Win95
A few days ago, my wife messaged me a photo from a thrift shop with the question, "You want?" The picture was of a box of software still in shrinkwrap—SPRY Inc.'s Internet in a Box for Windows 95.
The answer was an obvious "OMG YES." I reviewed Internet in a Box back in 1993 when it was first released as an early adopter of independent local Internet dialup (using David Troy's Toad.Net). I spent endless hours connected with the software and my very first laptop PC, pulling down Hubble Telescope images from the Space Telescope Science Institute's Gopher server and raging at Usenet posts. Just the sight of the logo caused a wave of nostalgia to wash over me. It was a simpler time, a somewhat less user-friendly time. CompuServe was still a thing.
This particular box of software was, however, especially endearing. I used version 1.0 for several years before Toad.Net partnered with Covad and ran one of Baltimore's very first DSL connections into my house—allowing me to give up the dual ISDN connection I had for my connection to my employer. This was a bundle designed to bring the masses to the Internet, along with their photos, in 1995. Attached to the box was a Seattle FilmWorks one-use 35mm film camera, emblazoned with the CompuServe logo.
Read 7 remaining paragraphs | Comments
Report: Cybercrime costs US $12.7M a year
Cyber attacks on large US companies result in an average of $12.7 million in annual damages, an increase of 9.7 percent from the previous year, according to the fifth Cost of Cybercrime report published by the Ponemon Institute on Wednesday.
The report, sponsored this year by Hewlett Packard’s Enterprise Security division, found that business disruption and information loss account for nearly three-quarters of the cost of cybercrime incidents. The study also confirmed that companies that make security a priority have lower costs associated with security incidents during the year. In particular, companies that use technology that helps flag potential intrusions into critical systems have lower costs, by an average of $2.6 million.
“Business disruption, information loss and the time it takes to detect a breach collectively represented the highest cost to organizations experiencing a breach,” Larry Ponemon, chairman and founder of the Ponemon Institute, said in a statement.
Read 5 remaining paragraphs | Comments
Man sues Comcast, claims ISP got him fired over billing dispute
The California man who publicly accused Comcast of getting him fired from his job at PriceWaterhouseCoopers (PWC) after he complained to the highest levels of Comcast about his year’s worth of billing errors, has made good on his threat to sue his former ISP. The lawsuit was filed in federal court in San Francisco late Thursday.
Among other accusations, Conal O’Rourke is suing Comcast on allegations of violating the Cable Communications Act by disclosing his personal information to his employer, defamation, breach of contract, emotional distress, and unfair business practices.
“We don’t normally comment on pending litigation and as we have said, there were clear deficiencies in the customer service that we delivered to Mr. O’Rourke," Jenni Moyer, a Comcast spokesperson, told Ars in a statement.
Read 16 remaining paragraphs | Comments
Mysterious campaign appears to be latest salvo in net neutrality battle [Updated]
This piece originally appeared in Pro Publica.
This story has been updated to include a comment from the National Cable and Telecommunications Association.
On a recent Monday evening, two bearded young men in skinny jeans came to a parklet in San Francisco's trendy Hayes Valley neighborhood and mounted what looked like an art installation. It was a bright blue, oversized "suggestion box" for the Internet.
Read 30 remaining paragraphs | Comments
The Battle of Bay Trail-D: GIGABYTE J1900N-D3V and ASUS J1900I-C Reviewed
All the recent talk of Haswell-E and high-end refreshes has obscured the more casual computing market. The Bay Trail platform uses Intel’s Atom based Silvermont cores and competes directly against AMD’s Kabini for integrated computing, digital signage and cheap computing models. Today we compare two mini-ITX Celeron J1900 based motherboards: the GIGABYTE J1900N-D3V at $85 and the ASUS J1900I-C at $92, as well as the SoC itself.
VIDEO: Activists blockade Australian port
VIDEO: Activists blockade Australian port
VIDEO: Hurricane Gonzalo nears Bermuda
AUDIO: Science shines light on dark matter
Google’s product strategy: Make two of everything
Have you ever heard the expression, "Don't put all your eggs in one basket"? It's a saying that extolls the virtues of diversification—always have a "Plan B." Judging by Google's messy and often-confusing product line, it's something the company takes to heart. Google likes to have multiple, competing products that go after the same user base. That way, if one product doesn't work out, hopefully the other one will.
The most extreme case of this has been Google's instant messaging solutions. At one point there were four different ways to send a text message on Android: Google Talk, Google+ Messenger, Messaging (Android's SMS app), and Google Voice. Google Hangouts came along and eventually merged everything into a single instant messaging platform.
Mercifully, Google has a single, unified instant messaging program now, and all further IM efforts will be poured into this, right? Wrong. A report from The Economic Times of India says that Google is working on a fifth instant messaging program. This one reportedly won't require a Google account and will be aimed at Whatsapp. In KitKat Google removed the stock SMS app and used Hangouts for SMSes, but in Lollipop it is adding back an SMS client, so soon we could potentially be back up to three texting clients. The unified Hangouts update also added a second dialer app to Android, so now there is the main Google Dialer that was introduced in KitKat and a new Hangouts Dialer that makes VOIP calls. Users went from needing IM unity, having it, then chaotically clamoring for dialer unity.
Read 32 remaining paragraphs | Comments