|thejournal.io | browse concepts or read more news|
|Naval Academy to honor computer scientist Grace Hopper|
ANNAPOLIS, Md. (AP) — The U.S. Naval Academy will name its future cyber building after Grace Hopper, a pioneering computer scientist and U.S. Navy rear admiral, the academy's superintendent announced Thursday.
-1 points by Arizona Daily Star | World War II Computer Computer science United States Navy United States Navy Reserve Computing Cryptography World War I
|Naval Academy to name its cyber building after woman who helped shape computer age|
The Naval Academy's new cybersecurity building will be named after Rear Adm. Grace Hopper, a computing pioneer who helped lay the foundations digital age through her work in the Navy during World War II. The $106 million building will be the first at any of the three military academies to be named...
-1 points by Baltimore Sun | Computer Harvard Mark I Computer security Grace Hopper Vassar College World War II United States Navy Information security
|Scientists attempt to teach robots human values|
Brooks HaysITHACA, N.Y., Sept. 8 (UPI) -- To keep computers behaving properly as they take on more responsibility and autonomy, researchers are working to instill their software with human values.
12 points by UPI | Artificial intelligence United Press International Decision making William Randolph Hearst International News Service Computer News World Communications Decision theory
|The world might not be ready for quantum computers|
The following editorial appears on Bloomberg View: Quantum mechanics, Carl Sagan once observed, is so strange that "common sense is almost useless in approaching it." Scientists still don't understand exactly why matter behaves as it does at the quantum level. Yet they're getting better at exploiting...
-1 points by Chicago Tribune | Computer RSA Computation Theoretical computer science Shor's algorithm Integer factorization Quantum information science Quantum entanglement
|Should ex-Philly cop suspected of sharing child porn be forced to divulge computer passwords?|
If police think someone has child pornography on his computer, should investigators be able to force him to provide his passwords - or would that violate his constitutional right against self-incrimination?
386 points by The Philadelphia Inquirer | Search and seizure Judge United States Constitution Supreme Court of the United States Fourth Amendment to the United States Constitution Police Computer Password
|Ex-appointees sue Macomb County clerk over firings|
Two former appointees of Macomb County Clerk Karen Spranger filed a civil rights and whistle-blower suit Friday
-1 points by The Detroit News | Pleading Whistleblower Local government in the United States Plaintiff First Amendment to the United States Constitution Computer Complaint Cause of action
|Apple’s achilles heel: CIA hacks MacBook computers with ‘Sonic Screwdriver’ |
WikiLeaks’ latest release of classified CIA documents has revealed the agency’s ability to bypass password protected Apple Macs while the laptop is booting up using a tool called “Sonic Screwdriver.” Monitoring and tracking tools can then be installed. Read Full Article at RT.com
-1 points by Russia Today | Digital audio player Hard disk drive Personal computer Macintosh Operating system Computer Central Intelligence Agency Extensible Firmware Interface
|AI can now identify objects it hasn’t seen before through ‘probability’|
Computers are edging ever-closer to mimicking human intelligence with new technology that allows them to recognize objects based on the probability of what they should look like rather than on comparisons to an actual match. Read Full Article at RT.com
48 points by Russia Today | Massachusetts Institute of Technology Technology Review Machine learning Artificial intelligence Computer Knowledge Alan Turing Psychology
|Defying gender stereotypes, Gary school pushes girls into science|
In 20 minutes, D'Jharea Joyce and her group needed to build a free-standing structure with limited materials able to withstand the weight of 11/2 boxes of spaghetti.When their triangular-shaped structure made from spaghetti and marshmallows held — unlike others in the room, she didn't believe...
951 points by Chicago Tribune | Mathematics Education Problem solving Computer Science Computer science Sex segregation Wm. Wrigley Jr. Company
|Feds: Ex-gymnastics doctor Nassar had computer files destroyed|
Federal prosecutors added a child pornography-related charge on Tuesday against Larry Nassar.
57 points by Detroit Free Press | Human sexual behavior Police Personal computer Federal Bureau of Investigation Sexual intercourse Child pornography Computer Solid-state drive
|The Latest: Man accused of hiding student's body extradited|
ALPINE, Texas (AP) — The Latest on the investigation of the death of a West Texas college student whose remains were found scattered around a remote shallow grave: (all times local):
-2 points by Arizona Daily Star | Sul Ross State University English-language films Black-and-white films Jack Lemmon Forced disappearance BAFTA Award for Best Film Computer Fred MacMurray
|Ex-CMU student gets federal probation for making malware|
Morgan Culbertson, a bright, young computer programmer who designed malware to allow users to control other people's Android phones, received probation today instead of prison for his crime.
13 points by Pittsburgh Post-Gazette | Carnegie Mellon University Pittsburgh Andrew Carnegie Carnegie Institute of Technology Leave of absence Allegheny County Pennsylvania Leave Computer
|‘Breaking Bad’-loving Grindr cannibal commits suicide in prison|
A devil-worshipping “Breaking Bad” fan has committed suicide in a London prison two months after he was convicted of killing and dismembering a police officer in a high-profile case, according to reports Monday. The body of cannibal killer Stefano Brizzi, 50, was discovered Sunday inside Belmarsh Prison in Thamesmead, England, The Sun reported. Further details...
303 points by New York Post | Breaking Bad Morgan Stanley Death Suicide Jury The Guest Computer Prosecutor
|Microsoft’s OneDrive wants your files, but here’s how to change the default save location to your PC|
Windows 10 is set up to save documents and photos to OneDrive instead of your PC. But you can change that setting, and we'll show you how. (Just be sure you
4 points by The Denver Post | Personal computer Want Server Microsoft Need Operating system Computer File system
|Boulder’s NCAR boasts powerful new supercomputer at Wyoming site|
Key projects at Boulder's National Center for Atmospheric Research will now be supported by a powerful new supercomputer capable of more than three times the amount of scientific computing performed by its predecessor.
4 points by The Denver Post | Weather Sun Meteorology Computer Wind Science Solar System Extreme weather
|Researchers at Tenn. lab set record for communications speed|
Work from Oak Ridge National Laboratory could have implications for Internet and technology companies.
13 points by USA Today | Qubit Quantum information science Optical fiber Quantum information Quantum entanglement Computer Fiber-optic communication Quantum computer
|Quantum supercomputer could ‘change life completely’|
Physicists have produced the first-ever blueprints for a large-scale quantum computer that could herald a technological revolution in computing. Read Full Article at RT.com
3624 points by Russia Today | Computer Quantum computer Computation Computing Qubit Quantum Turing machine Electrical engineering Nuclear magnetic resonance
|Anne Arundel school board backs initiative to track retirement revenue|
Takes no position on proposal to re-constitute school board
-2 points by Baltimore Sun | Teacher Standardized test Computer Proposal Proposals School High school Private school
|Capuchin Soup Kitchen robbed again|
Glass was smashed as thieves gained entry to On The Rise Bakery Cafe around 4:45 a.m. at 8900 Gratiot, police said
-2 points by The Detroit News | American films Types of restaurants English-language films Addiction Crime Cash Theft Computer
|Microsoft wants to ‘solve’ cancer within decade by turning cells into computers |
Microsoft says it will be able to “solve” cancer by treating the disease in the same way as a computer virus. The company considers it highly possible to “reprogram” diseased cells once they are turned into “living computers.” Read Full Article at RT.com
598 points by Russia Today | Cancer Cell division Computer DNA Gene Computing Computational science Organism
|We're generating more digital fingerprints than ever before, cybercrime director Ovie Carroll tells Federal Bar Association|
"What would it tell me about you if we could look up your Google searches over the past year?" asked Ovie Carroll, director of the Cybercrime Lab at the U.S. Department of Justice's Computer Crime and Intellectual Property Section. Being able to look up someone's Google searches is like sliding open the door into their most private thoughts. CLEVELAND, Ohio -- Every time we check our phones, log into our email, swipe a loyalty or credit card, or use a wireless fitness tracker, we produce a bit of data. And all that data, combined with all the other morsels of information we leave around our homes, offices, or along our daily commutes, generates a veritable - and trackable - trail of information that most people don't even realize they're producing. But someone who knows how to unearth that data, and has the ability to connect the dots, or even access what we've "secretly" stored in the cloud, can discover more details about our behavior and private lives than we can imagine. That's what makes Ovie Carroll's job as director of the Cybercrime Lab at the U.S. Department of Justice's Computer Crime and Intellectual Property Section, both easier than ever and nearly impossible. Easier because people are producing more digital fingerprints than ever before. And harder because the sheer volume of what's being generated, multiplied times the number of people producing it, is almost unfathomable. During a presentation for federal judges, attorneys, and others about the future of digital evidence at the recent Federal Bar Association's convention in Cleveland, Carroll shared how much the internet and interconnectivity have changed criminal investigations. "We are living in a digital world," Carroll told the audience, and the ability to identify, preserve and analyze data has never been more critical. Consider the fact that 8 zettabytes of data were created or replicated worldwide in 2015. If a gigabyte is like the information on a stack of paper 1,000 feet tall, and a terabyte is 1,024 gigabytes, a zettabyte is like a stack of papers 1.66 trillion miles high, or 226 round trips from the Sun to Pluto. Three billion computers and 6 billion phones in the world have changed everything about the way we the way we communicate, as well as how we live and socialize, he said. A whopping 1.65 billion people are now using Facebook; and spending about 19.7 hours a month updating their Facebook statuses. On Twitter, people are sending 500 million twitter messages a day, all of which are still being catalogued by the Library of Congress. "There's something about the Internet that gives us a sense of anonymity, because we say and do things we would not ever do in public," Carroll said. For example, people launched 15 million Google searches a month in 1999. But last month alone, the number of Google searches ballooned to 106,127,500,000. "What would it tell me about you if we could look up your Google searches over the past year?" he asked. Being able to look up someone's Google searches is like sliding open the door into their most private thoughts. In some cases, investigators have found, aspiring criminals actually research what they're about to do before they do it. After they've done it, they keep searching Google for it, to see if the police know what they did or if the media have found out about it. Sometimes, they try to become their own attorneys and type in "What crime did I commit when I..." One of the greatest collectors of data is our smart phones. Carroll pulled out his iPhone and showed how under Settings, Privacy, and Frequent Locations, his phone had been keeping track of all the places he frequents, recent trips he had made, even the hotels he had stayed at, and the restaurants he had eaten in. When someone in the audience called out, "But what about 'Clear history'?" Carroll replied that even deleting something never makes it entirely disappear. "It just makes you feel better," he said, as the audience members laughed. "How long dies it keep that info? Forever. The never-ending goal of every aspect of the internet is to collect, analyze, manipulate, and monetize our behavior," he said. He showed an advertisement for new Under Armor running shoe that has location devices embedded inside the soles. "This is awesome," he told his bosses at the Department of Justice's Computer Crime Lab. "We should get this shoe!" "Everybody who's making anything is strapping sensors to it," he said. He's even seen sports bras that monitor the wearer's temperature, heart rate, and intensity of workouts. Someone -- Carroll is convinced it was a lawyer -- discovered that the user agreement that came with his Samsung smart TV mentions that its smart TVs record your living room chatter. The more people use web-based email accounts, and the more they synchronize their electronic devices, the more digital evidence they leave behind for investigators. He says his Amazon Echo, a voice-activated all-in-one controller that lets him check the weather and traffic, turn off the lights, or turn up the thermostat, "remembers every command I ever gave it." A new wrinkle in cybercrime investigation is online file storage, which gives users the ability to store data beyond the memory on their phones. Investigators once asked Yahoo to freeze the contents of an email account until they could get a search warrant. Within three days of their request, someone from an IP address from China had asked the server to delete 986 emails from that very account. The average computer has 6 gigabytes of short-term memory, roughly equal to a stack of paper 6,000 feet high. That memory not only captures evidence, but user attribution, he said. "How many people have heard about Google analytics?" he asked. "Google analytics is running on 50 percent of the websites in the world." That means that every time you log onto a device, it takes a digital snapshot of website you looked at, what browser you used to get there, the first time you logged on to that site, the second-from-the-last time you logged on, and your most recent visit. All of which provides "significantly more digital evidence about our activity," he said. Combine those details with the size of hard drives in modern computers, and that's even more data that anyone imagined, available to anyone conducting a full, forensic analysis of that computer. He compared it to the leaving his fingerprints on the podium in the banquet hall, arriving with pet hairs on his suit, or going home with carpet fibers in his shoe. The more we inadvertently tell our devices, the more evidence we leave behind about when and where we've been, he said.
22 points by The Plain Dealer | E-mail Twitter Names of large numbers Google Computer Orders of magnitude Data Computer crime
|Maine school buys computer program to replace language teacher|
How do you say “humans are no longer necessary” in French? In binary code?
110 points by Daily News | Education Computer Computer software School High school Computer program Teacher Application software
|Maine school purchases computer program to serve as teacher|
MADISON, Maine (AP) - A Maine high school has turned to a computer program to educate its students after being unable to fill a vacant position for a foreign language teacher. With money already earmarked for the job, The Morning Sentinel reports (http://bit.ly/2cJzmJL ) Madison Area Memorial High School opted ...
2 points by The Washington Times | Education School High school Teacher English-language films Rosetta Stone Foreign language Computer
|Cybersecurity and the hospitality industry|
50 points by Las Vegas Review-Journal | Computer security Hotel Security Computer Restaurant PCI DSS Information security Credit card
|Pentagon’s new “Rebel Alliance” chief is fighting bureaucracy from the inside|
Defense Secretary Ash Carter has vowed to yank the Pentagon fully into the 21st century — moving increasingly toward cloud services, modernizing computer systems and adding more mobile products
2 points by The Denver Post | United States Department of Defense Federal government of the United States Washington D.C. Government agency Computer The Pentagon Iraq War
|Orlando group seeks volunteers to crunch data in Zika fight|
ORLANDO, Fla. (AP) - An Orlando nonprofit is recruiting volunteers to process data for researchers studying the Zika virus. Hands On Orlando matches volunteers to group projects such as sorting donations at food banks. Executive Director Chris Allen also enlists people whose computers, tablets and phones can help create a ...
1 points by The Washington Times | Orlando Sentinel Orlando Florida Computer Tribune Company Pulitzer Prize for Editorial Writing John Bersia
|Part of Queens street named for girl, 14, hit with bullet on bus|
A section of a Queens street was renamed Friday after a 14-year-old girl who was killed by a stray bullet while riding a city bus.
435 points by Daily News | Queens Murder Life imprisonment Computer Bus Victim Prison Suspect