<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>
NetHappenings Mailing List ©1993
Subscribe - Unsubscribe - EmailPreferences
http://www.edu-cyberpg.com/Community/NetHappenings.html
Educational CyberPlayGround Community Mailing Lists
http://www.edu-cyberpg.com/Community/
Advertise NetHappenings Guidlines
http://www.edu-cyberpg.com/Community/Subguidelines.html
<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>
Nethappenins Headlines and Resources
enjoy,
<Karen>
1)
Library to store records, movies in Cold War vault http://www.fcw.com/article91968-01-13-06-Web "Agencies prepare for Digital Age" [Federal Computer Week, Feb. 6, 2005] "Digitizing groovy records" [FCW.com, May 7, 2004] BY Aliya Sternstein Published on Jan. 13, 2006 The Library of Congress will soon begin transporting thousands of 45 rpm vinyl records for digitization and preservation at an underground, Cold War-era facility. The records will be the first of 2.7 million sound recordings and 1.1 million moving image items that the Library will move this year to consolidate holdings it had been storing in several states. The Culpeper, Va., site, a former Federal Reserve building that is now called the National Audiovisual Conservation Center, will contain 57 miles of shelves for the Library's collection of movies, video and recorded sound. Early next month, trucks will start moving 80,000 records, the Library's whole 45 rpm anthology, said Gene DeAnna, head of the Library's recorded sound section. Logistics delayed the move, which officials had hoped to start last summer. The Library is retrofitting the facility that was built in the 1960s and contained living quarters for staff and vaults for huge sums of cash. "The idea was to have enough money to jump-start the economy after an atomic attack," DeAnna said.
Find Free Databases http://www.edu-cyberpg.com/Internet/search3.html
2)
How to Integrate Technology into the Classroom with Web 2 Tech Tools and the Online Class
http://www.edu-cyberpg.com/Technology/HowToIntegrateTech.html
3)
Iris Scanning For New Jersey Grade School http://news.yahoo.com/s/cmp/20060124/tc_cmp/177103003 By Laurie Sullivan TechWeb.com Mon Jan 23, 6:34 PM ET When a parent arrives to pick up their child at one of three grade schools in the Freehold Borough School District, they'll need to look into a camera that will take a digital image of their iris. That photo will establish positive identification to gain entrance into the school. Funding for the project, more than $369,000, was made possibly by a school safety grant through the National Institute of Justice, a research branch of the U.S. Department of Justice. "The idea is to improve school safety for the children," said Phil Meara, superintendent, Freehold Borough School District, on Monday. "We had a swipe-card system that operated the doors, but the technology was obsolete." Installation of the iris technology began in October. The system is now operational after two months of testing. The Teacher-Parent Authorization Security System (T-PASS), a software application developed by Eyemetric Identity Systems, was installed on the front office computers at each of the three schools. snip
4) Mac Users Report Strange Sound Coming From New iMacs. http://www.crazyapplerumors.com/archives/000635.html#000635 As users receive the first batch of Intel-based iMacs, many are reporting their reactions to the new machines online. A growing number are reporting that, like other Macs in the past, the Intel Core Duo iMacs suffer from a severe fan noise problem. But Apple has gotten out in front of this charge, and says that the sound users are complaining about is not the sound of the fan. "To the untrained ear, it might sound like a high-pitched whine, similar to the noise a fan might make," said Peter Mehring, head of Apple hardware engineering. "But that's not at all what it is. "It's the sound of the Intel processor having fun." snip
5)
Analog Hole Bill secret requirement Veeck v. SBCCI is a 5th Circuit case that speaks to this. http://tinyurl.com/dvg9m There a private organization, SBCCI, had some model building codes -- not secret, but under copyright and license agreement. Two small towns in North Texas adopted the codes wholesale to be the law, and Veeck wanted to make them freely publicly available. The bottom line: "Our short answer is that as law, the model codes enter the public domain and are not subject to the copyright holder's exclusive prerogatives. As model codes, however, the organization's works retain their protected status." Which bodes well for any fight against the VEIL standard. (Of course, in the VEIL situation there may be differentiating if dubious claims that the standard can't work if it's secret, and the holding in Veeck applies only to the 5th Circuit.) ...JZ
6)
HIGH-DEF FORCED TO DOWN-CONVERT In deal reached by eight-company consortium By Paul Sweeting 1/23/2006 http://www.dvdexclusive.com/article.asp?articleID=2657 Some buyers of HD DVD and Blu-ray Disc players might not get everything they bargained for. In a deal reached this week after tense negotiations, the eight-company consortium behind the Advanced Access Content System, created for use by both high-def formats to prevent unauthorized copying, has agreed to require hardware makers to bar some high-def signals from being sent from players to displays over analog connections, sources said. Instead, the affected analog signal must be "down-converted" from the full 1920x1080 lines of resolution the players are capable of outputting to 960x540 lines--a resolution closer to standard DVDs than to high-def. Standard DVDs are typically encoded at 720 horizontal by 480 vertical lines of resolution. The 960x540 standard stipulated in the AACS agreement represents 50% higher resolution than standard-def, but only one-quarter the resolution of full high-def. Whether a particular movie is down-converted will be up to the studio.
************************************************************** Educational CyberPlayGround Admins, Parents & Teachers Learn How to Keep Your Child Safe on the Interent -- Trouble Areas for Kids Find out what your kids have put up online, their names, address, pictures, what they think. This needs to be supervised and you won't be able to keep up with what is going on here. Chat Rooms, Blogs, Instant Messaging, IRC, Newsgroups - they don't understand that they have gone public and have lost their privacy. http://www.edu-cyberpg.com/morestuff4.html RSS NEWS FEEDS Updated Daily Area http://www.edu-cyberpg.com/news/ **************************************************************
7)
China will pass US in Broadband Lines by late 2006 The Bandwidth Report by Andy King at Web Site Optimization http://www.websiteoptimization.com/bw/0601/ At its current growth rate of over 90% per year, China will pass the US in total broadband subscribers by late 2006 to become the largest broadband country in the world. The US has fallen to 19th overall in household broadband penetration, and is in danger of being passed by Slovenia in early 2007. Israel leads all Middle Eastern and African countries, and is the third country overall in broadband penetration. Hong Kong leads the Pacific Rim, with a broadband penetration rate of over 73%. Meanwhile, in December 2005 the US passed 65% in broadband penetration among active Internet users.
8)
Google simultaneously fighting the COPA subpoena while China made censorship a condition of Google doing business in the country. Find out how other US business cooperate in censorship. http://www.edu-cyberpg.com/Technology/censor.html
9)
Anonymous Blogging Guide in Multiple Languages Saturday, January 14, 2006 at 11:07 AM EST Spirit of America Releases Anonymous Blogging Guides in English, Arabic, Chinese and Persian Spirit of America Has Launched the BlogSafer Wiki, Available at http://www.blogsafer.org LOS ANGELES--(BUSINESS WIRE)--Jan. 10, 2006-- BlogSafer Contains a Series of Guides on How to Blog Under Difficult Conditions in Countries That Discourage Free Speech Spirit of America's BlogSafer wiki hosts a series of targeted guides to anonymous blogging, each of which outline steps a blogger in a repressive regime can take, and tools to use, to avoid identification and arrest. These range from common sense actions such as not providing identifying details on a blog to the technical, such as the use of proxy servers. "A repressive regime trying to still free speech first goes after and shuts down independent print and broadcast media," said Curt Hopkins, project director of Spirit of America's Anonymous Blogging Campaign. "Once that is done, it turns its attentions to online news sites. As these outlets disappear, dissent migrates to blogs, which are increasing geometrically in number and are simple to set up and operate." In the past several years at least 30 people have been arrested, many of whom have been tortured, for criticizing their governments. This trend is likely to increase in the coming year. SNIP
10)
Ameriprise Notifies Clients of Data Theft - Jan 25, 2006 10:54 PM (AP Online) http://finance.lycos.com/home/news/story.asp?story=55067057 By STEVE KARNOWSKI Associated Press Writer MINNEAPOLIS (AP) -- Ameriprise Financial Inc. said Wednesday it has notified about 226,000 people that their names and other personal data were stored on a laptop computer that was stolen from an employee's vehicle. Ameriprise said it has alerted 68,000 current and former financial advisers whose names and Social Security numbers were also stored on the same computer. About 158,000 clients had only their names and internal account numbers exposed. The company says it has more than 2 million customers and about 10,500 current financial advisers. Minneapolis-based Ameriprise said it had received no reports that the data lost in the theft had been used improperly. Ameriprise is the name of the former American Express Financial Advisors division, which New York-based American Express Co. spun off last fall.
11)
When Data Goes Missing: Will You Even Know? <http://www.computerworld.com/managementtopics/management/story/0,10801,107967,00.html> Advice by Jack Gold JANUARY 23, 2006 COMPUTERWORLD Recent reports of company-compiled personal data gone missing (such as Marriott losing many thousands of vacation club records), while clearly important, is really just the tip of the iceberg. What customers really need to ask of companies is, What other data has been lost? And in all likelihood, there is absolutely no way for the companies to know. The truth of the matter is, reported cases of massive data loss are just the ones they know about. And this problem will only grow with the proliferation of tiny personal mass-storage devices of dramatically increasing capacity. How many people currently own flash memory drives? Tens of millions. And how many companies control the use of flash drives? You can count them on one hand. I travel a lot, and on a recent trek through airport security, I found a flash drive that had fallen under the security table. This lost drive had no distinguishing characteristics -- no labels to tell me who owned it or where he worked. With some time to kill before my flight, I decided to see if I could track down the owner. I had to invade the owner's privacy to see what I could discover from the content of the files. Turns out the files contained fairly innocuous content -- some project plans and a short PowerPoint in draft form -- but no way to identify the owner. (As a result of this experience, I have put a small .txt file on my devices with my name and address, and I figure an address label on the outside can't hurt either.)
12) DHS vows to protect info on national database http://www.washingtontechnology.com/news/1_1/daily_news/27812-1.html By Alice Lipowicz Staff Writer 01/24/06 The Homeland Security Department has stepped up assurances that it will maintain the confidentiality of critical infrastructure information submitted to the National Asset Database, according to the newly revised draft National Infrastructure Protection Plan Base Plan version 2.0. DHS will evaluate all requests to view the database and will grant access only to select DHS employees and others on a "tightly controlled, need-to-know" basis, the revised plan states. The new language is set forth in the 234-page national infrastructure protection plan distributed by DHS this week. The plan was delivered by e-mail via NIPP@xxxxxxxx
13) Linux struck by major security hole http://www.techworld.com/security/news/index.cfm?NewsID=5217 By Matthew Broersma Techworld 23 January 2006 Linux vendors have warned of a serious security flaw affecting the KDE desktop environment, one of the two main graphical user interfaces used on Linux and Unix operating systems. The bug, the worst to hit KDE in nearly a year, affects kjs, a Javascript interpreter used by the Konqueror Web browser and other parts of KDE, KDE developers said in an advisory. An incorrect bounds check in the interpreter allows a heap based buffer overflow when decoding maliciously crafted URI sequences encoded with UTF-8. An attacker could supply Javascript code that will crash programs using kjs, such as Konqueror, and execute malicious code, potentially gaining complete control of the system, developers said. Versions 3.2.0 to 3.5.0 of kjs are affected.
The single phrase below is the copyright notice to be used when reproducing any portion of this report, in any format:
EDUCATIONAL CYBERPLAYGROUND http://www.edu-cyberpg.com
NetHappenings copyright
http://www.edu-cyberpg.com/Community/NetHappenings.html
FREE EDUCATION VENDOR DIRECTORY LISTING http://www.edu-cyberpg.com/Directory/
HOT LIST REGISTRY OF K12 SCHOOLS ONLINE http://www.edu-cyberpg.com/Schools/ <>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>