NetHappenings Headlines and Resources

  • From: Educational CyberPlayGround <admin@xxxxxxxxxxxxxxx>
  • To: nethappenings@xxxxxxxxxxxxx
  • Date: Thu, 26 Jan 2006 11:09:02 -0500

<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>
NetHappenings Mailing List ©1993
Subscribe - Unsubscribe - EmailPreferences http://www.edu-cyberpg.com/Community/NetHappenings.html


Educational CyberPlayGround Community Mailing Lists http://www.edu-cyberpg.com/Community/
Advertise NetHappenings Guidlines
http://www.edu-cyberpg.com/Community/Subguidelines.html
<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>


Nethappenins Headlines and Resources


enjoy,

<Karen>

1)

Library to store records, movies in Cold War vault
http://www.fcw.com/article91968-01-13-06-Web
"Agencies prepare for Digital Age" [Federal Computer Week, Feb. 6, 2005]
"Digitizing groovy records" [FCW.com, May 7, 2004]
BY Aliya Sternstein Published on Jan. 13, 2006
The Library of Congress will soon begin transporting thousands of 45
rpm vinyl records for digitization and preservation at an underground,
Cold War-era facility.
The records will be the first of 2.7 million sound recordings and 1.1
million moving image items that the Library will move this year to
consolidate holdings it had been storing in several states.
The Culpeper, Va., site, a former Federal Reserve building that is now
called the National Audiovisual Conservation Center, will contain 57
miles of shelves for the Library's collection of movies, video and
recorded sound.
Early next month, trucks will start moving 80,000 records, the
Library's whole 45 rpm anthology, said Gene DeAnna, head of the
Library's recorded sound section. Logistics delayed the move, which
officials had hoped to start last summer.
The Library is retrofitting the facility that was built in the 1960s
and contained living quarters for staff and vaults for huge sums of
cash. "The idea was to have enough money to jump-start the economy
after an atomic attack," DeAnna said.

Find Free Databases
http://www.edu-cyberpg.com/Internet/search3.html


2)

How to Integrate Technology into the Classroom
with Web 2 Tech Tools and the Online Class

http://www.edu-cyberpg.com/Technology/HowToIntegrateTech.html


3)

Iris Scanning For New Jersey Grade School
http://news.yahoo.com/s/cmp/20060124/tc_cmp/177103003
By Laurie Sullivan TechWeb.com Mon Jan 23, 6:34 PM ET
When a parent arrives to pick up their child at one of three grade
schools in the Freehold Borough School District, they'll need to look into a
camera that will take a digital image of their iris. That photo will establish
positive identification to gain entrance into the school.
Funding for the project, more than $369,000, was made possibly by a
school safety grant through the National Institute of Justice, a research
branch of the U.S. Department of Justice. "The idea is to improve
school safety
for the children," said Phil Meara, superintendent, Freehold Borough School
District, on Monday. "We had a swipe-card system that operated the
doors, but the technology was obsolete."
Installation of the iris technology began in October. The system is now
operational after two months of testing. The Teacher-Parent
Authorization Security System (T-PASS), a software application
developed by Eyemetric
Identity Systems, was installed on the front office computers at each
of the three schools. snip

4)
Mac Users Report Strange Sound Coming From New iMacs.
http://www.crazyapplerumors.com/archives/000635.html#000635
As users receive the first batch of Intel-based iMacs, many are
reporting their reactions to the new machines online.
A growing number are reporting that, like other Macs in the past, the
Intel Core Duo iMacs suffer from a severe fan noise problem.
But Apple has gotten out in front of this charge, and says that the
sound users are complaining about is not the sound of the fan.
"To the untrained ear, it might sound like a high-pitched whine,
similar to the noise a fan might make," said Peter Mehring, head of
Apple hardware engineering. "But that's not at all what it is.
"It's the sound of the Intel processor having fun." snip

5)

Analog Hole Bill secret requirement
Veeck v. SBCCI is a 5th Circuit case that speaks to this.
http://tinyurl.com/dvg9m
There a private organization, SBCCI, had some model building codes
-- not secret, but under copyright and license agreement.  Two small
towns in North
Texas adopted the codes wholesale to be the law, and Veeck wanted to
make them freely publicly available.  The bottom line:
"Our short answer is that as
law, the model codes enter the public domain and are not subject to
the copyright holder's exclusive prerogatives.  As model codes,
however, the organization's works retain their protected status."
Which bodes well for any fight against the VEIL standard.  (Of
course, in the VEIL situation there may be differentiating if dubious
claims that the standard can't work if it's secret, and the holding
in Veeck applies only to the 5th Circuit.)  ...JZ

6)

HIGH-DEF FORCED TO DOWN-CONVERT
In deal reached by eight-company consortium
By Paul Sweeting  1/23/2006
http://www.dvdexclusive.com/article.asp?articleID=2657
Some buyers of HD DVD and Blu-ray Disc players might not get
everything they bargained for.
In a deal reached this week after tense negotiations, the
eight-company consortium behind the Advanced Access Content System,
created for use by both high-def formats to prevent unauthorized
copying, has agreed to require hardware makers to bar some high-def
signals from being sent from players to displays over analog
connections, sources said.
Instead, the affected analog signal must be "down-converted" from the
full 1920x1080 lines of resolution the players are capable of
outputting to 960x540 lines--a resolution closer to standard DVDs
than to high-def. Standard DVDs are typically encoded at 720
horizontal by 480 vertical lines of resolution.
The 960x540 standard stipulated in the AACS agreement represents 50%
higher resolution than standard-def, but only one-quarter the
resolution of full high-def. Whether a particular movie is
down-converted will be up to the studio.

**************************************************************
Educational CyberPlayGround
Admins, Parents & Teachers Learn How to Keep Your Child
Safe on the Interent -- Trouble Areas for Kids
Find out what your kids have put up online, their names,
address, pictures, what they think. This needs to be
supervised and you won't be able to keep up with
what is going on here. Chat Rooms, Blogs, Instant
Messaging, IRC, Newsgroups - they don't understand
that they have gone public and have lost their privacy.
http://www.edu-cyberpg.com/morestuff4.html
RSS NEWS FEEDS Updated Daily Area
http://www.edu-cyberpg.com/news/
**************************************************************

7)

China will pass US in Broadband Lines by late 2006
The Bandwidth Report by Andy King at Web Site Optimization
http://www.websiteoptimization.com/bw/0601/
At its current growth rate of over 90% per year, China will pass the
US in total broadband subscribers by late 2006 to become the largest
broadband country in the world. The US has fallen to 19th overall in
household broadband penetration, and is in danger of being passed by
Slovenia in early 2007. Israel leads all Middle Eastern and African
countries, and is the third country overall in broadband penetration.
Hong Kong leads the Pacific Rim, with a broadband penetration rate of
over 73%. Meanwhile, in December 2005 the US passed 65% in broadband
penetration among active Internet users.

8)

Google  simultaneously fighting the COPA subpoena while
China made censorship a condition of Google doing business in the
country. Find out how other US business cooperate in censorship.
http://www.edu-cyberpg.com/Technology/censor.html


9)

Anonymous Blogging Guide in Multiple Languages
Saturday, January 14, 2006 at 11:07 AM EST
 Spirit of America Releases Anonymous Blogging Guides in English,
Arabic, Chinese and Persian
Spirit of America Has Launched the BlogSafer Wiki, Available at
http://www.blogsafer.org
LOS ANGELES--(BUSINESS WIRE)--Jan. 10, 2006--
BlogSafer Contains a Series of Guides on How to Blog Under Difficult
Conditions in Countries That Discourage Free Speech
Spirit of America's BlogSafer wiki hosts a series of targeted
guides to anonymous blogging, each of which outline steps a blogger in a
repressive regime can take, and tools to use, to avoid identification
and arrest. These range from common sense actions such as not
providing identifying details on a blog to the technical, such as the use of
proxy servers.
"A repressive regime trying to still free speech first goes after and
shuts down independent print and broadcast media," said Curt Hopkins,
project director of Spirit of America's Anonymous Blogging Campaign.
"Once that is done, it turns its attentions to online news sites. As
these outlets disappear, dissent migrates to blogs, which are
increasing geometrically in number and are simple to set up and operate."
In the past several years at least 30 people have been arrested,
many of whom have been tortured, for criticizing their governments. This trend
is likely to increase in the coming year. SNIP

10)

Ameriprise Notifies Clients of Data Theft
- Jan 25, 2006 10:54 PM (AP Online)
http://finance.lycos.com/home/news/story.asp?story=55067057
By STEVE KARNOWSKI Associated Press Writer
MINNEAPOLIS (AP) -- Ameriprise Financial Inc. said Wednesday it has
notified about 226,000 people that their names and other personal
data were stored on a laptop computer that was stolen from an
employee's vehicle.
Ameriprise said it has alerted 68,000 current and former financial
advisers whose names and Social Security numbers were also stored on
the same computer. About 158,000 clients had only their names and
internal account numbers exposed. The company says it has more than 2
million customers and about 10,500 current financial advisers.
Minneapolis-based Ameriprise said it had received no reports that the
data lost in the theft had been used improperly. Ameriprise is the
name of the former American Express Financial Advisors division,
which New York-based American Express Co. spun off last fall.

11)

When Data Goes Missing: Will You Even Know?
<http://www.computerworld.com/managementtopics/management/story/0,10801,107967,00.html>
Advice by Jack Gold JANUARY 23, 2006 COMPUTERWORLD
Recent reports of company-compiled personal data gone missing (such as
Marriott losing many thousands of vacation club records), while
clearly important, is really just the tip of the iceberg. What
customers really need to ask of companies is, What other data has been
lost? And in all likelihood, there is absolutely no way for the
companies to know. The truth of the matter is, reported cases of
massive data loss are just the ones they know about. And this problem
will only grow with the proliferation of tiny personal mass-storage
devices of dramatically increasing capacity.
How many people currently own flash memory drives? Tens of millions.
And how many companies control the use of flash drives? You can count
them on one hand. I travel a lot, and on a recent trek through airport
security, I found a flash drive that had fallen under the security
table. This lost drive had no distinguishing characteristics -- no
labels to tell me who owned it or where he worked. With some time to
kill before my flight, I decided to see if I could track down the
owner. I had to invade the owner's privacy to see what I could
discover from the content of the files. Turns out the files contained
fairly innocuous content -- some project plans and a short PowerPoint
in draft form -- but no way to identify the owner. (As a result of
this experience, I have put a small .txt file on my devices with my
name and address, and I figure an address label on the outside can't
hurt either.)

12)
DHS vows to protect info on national database
http://www.washingtontechnology.com/news/1_1/daily_news/27812-1.html
By Alice Lipowicz Staff Writer 01/24/06
The Homeland Security Department has stepped up assurances that it
will maintain the confidentiality of critical infrastructure
information submitted to the National Asset Database, according to the
newly revised draft National Infrastructure Protection Plan Base Plan
version 2.0.
DHS will evaluate all requests to view the database and will grant
access only to select DHS employees and others on a "tightly
controlled, need-to-know" basis, the revised plan states.
The new language is set forth in the 234-page national infrastructure
protection plan distributed by DHS this week. The plan was delivered
by e-mail via NIPP@xxxxxxxx

13)
Linux struck by major security hole
http://www.techworld.com/security/news/index.cfm?NewsID=5217
By Matthew Broersma Techworld 23 January 2006
Linux vendors have warned of a serious security flaw affecting the KDE
desktop environment, one of the two main graphical user interfaces
used on Linux and Unix operating systems.
The bug, the worst to hit KDE in nearly a year, affects kjs, a
Javascript interpreter used by the Konqueror Web browser and other
parts of KDE, KDE developers said in an advisory. An incorrect bounds
check in the interpreter allows a heap based buffer overflow when
decoding maliciously crafted URI sequences encoded with UTF-8.
An attacker could supply Javascript code that will crash programs
using kjs, such as Konqueror, and execute malicious code, potentially
gaining complete control of the system, developers said. Versions
3.2.0 to 3.5.0 of kjs are affected.

<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>
Copyright statements to be included when reproducing
annotations from NetHappenings the largest
and oldest K12 Education Mailing List exploring and using the World Wide Web.



The single phrase below is the copyright notice to be used when reproducing any portion of this report, in any format:

EDUCATIONAL CYBERPLAYGROUND http://www.edu-cyberpg.com
NetHappenings copyright
http://www.edu-cyberpg.com/Community/NetHappenings.html

FREE EDUCATION VENDOR DIRECTORY LISTING http://www.edu-cyberpg.com/Directory/

HOT LIST REGISTRY OF K12 SCHOOLS ONLINE
http://www.edu-cyberpg.com/Schools/
<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>

Other related posts: