Skip to main content

Home/ Indie Nation/ Group items tagged find

Rss Feed Group items tagged

John Lemke

YouTube Hurts Music Album Sales, Research Finds | TorrentFreak - 0 views

  • The researchers estimate that for the top albums the total in lost sales because of YouTube equals roughly $1 million per year. This is a significant percentage of the label’s total revenue. It is hard to say, however, that YouTube is hurting overall revenue, as the advertising revenue it receives from Google also brings in a significant sum of money.
  •  
    I am not so sure I agree but quoting the article, ""Our findings suggest that sales displacement effect can be real without a promotional effect. That is, the people listening on YouTube appear to be, to some extent people who would know about this album anyway, but may not buy it because of YouTube," the researchers conclude."
John Lemke

Man High On Bath Salts Calls Cops About Imaginary Intruders | Scene and Heard: Scene's ... - 0 views

  •  
    31-year-old Lucas Kocab called the cops around dinnertime on February 17 because there were 30 intruders in his house. The police arrived to find exactly zero intruders, but did find Kocab frantically running around and "acting paranoid." He told the cops that the intruders were intentionally blending in with chairs and trees, incognito-like, so that no one could see them. But he could see them. He knew they were there. Those 30 invisible ninjas weren't putting anything over on our brave hero.
John Lemke

File-Sharing Boosts Creation of New Hit Music, Research Finds | TorrentFreak - 0 views

  • It is clear that file-sharing encourages the distribution of existing music, and in a paper titled “A Case Study of File Sharing and Music Output” the professor examines what the connection is between music piracy and the creation of new music.
  • The paper provides empirical evidence that file sharing did not reduce the creation of new hit songs. Instead, more new music entered the hit charts, an effect that’s driven by existing artists.
  • The data shows that the output from existing artists increased, while new artists appeared less frequently in the hit charts. However, since the new material from existing artists was greater than the loss from new artists, the “creation” of new music increased overall.
  • ...1 more annotation...
  • “Specifically, the [result] suggests that the 58.92 percent decline in record sales would be associated with a net increase of 20.6 new songs in the study’s sample annually, all else constant,” Professor Lunney writes.
John Lemke

Beyond The Dawn - 0 views

shared by John Lemke on 09 Aug 11 - No Cached
  • Twitter Directory and Search, Find Twitter Followers : WeFollow wefollow.com - Find Twitter celebrities, actors, TV personalities, or new Twitter friends in your area. WeFollow is a directory of Twitter users organized by interests. Find likeminded friends today! davehennmusic davehennmusic Just added myself to the http://wefollow.com twitter directory under: #chicago_il #music #indie #songwriting #chicago #musician about 2 hours ago Reply Retweet Follow Unfollow Favorite Suicide Silence | Indienation.fm indienation.fm - At the RockStar Energy Mayhem Festival it was my great pleasure to sit down with Mark Heylmun the guitarist from Suicide Silence. If you have yet to hear their music, Suicide Silence performs an ex...
  • Suicide Silence | Indienation.fm indienation.fm - At the RockStar Energy Mayhem Festival it was my great pleasure to sit down with Mark Heylmun the guitarist from Suicide Silence. If you have yet to hear their music, Suicide Silence performs an ex...
John Lemke

Unique Mineral Discovered In Australia | Popular Science - 0 views

  •  
    "While dozens of new minerals are discovered each year, it is rare to find one that is unrelated to already-known substances."
John Lemke

Scientists May Have Decoded One of the Secrets to Superconductors | Science | WIRED - 0 views

  • “In the same way that a laser is a hell of a lot more powerful than a light bulb, room-temperature superconductivity would completely change how you transport electricity and enable new ways of using electricity,” said Louis Taillefer, a professor of physics at the University of Sherbrooke in Quebec.
  • ripples of electrons inside the superconductors that are called charge density waves. The fine-grained structure of the waves, reported in two new papers by independent groups of researchers, suggests that they may be driven by the same force as superconductivity. Davis and his colleagues directly visualized the waves in a study posted online in April, corroborating indirect evidence reported in February by a team led by Riccardo Comin, a postdoctoral fellow at the University of Toronto.
  • Taken together, the various findings are at last starting to build a comprehensive picture of the physics behind high-temperature superconductivity. “This is the first time I feel like we’re making real progress,” said Andrea Damascelli, a professor of physics at the University of British Columbia who led two recent studies on charge density waves. “A lot of different observations which have been made over decades did not make sense with each other, and now they do.”
  • ...4 more annotations...
  • The community remained divided until 2012, when two groups using a technique called resonant X-ray scattering managed to detect charge density waves deep inside cuprates, cementing the importance of the waves. As the groups published their findings in Science and Nature Physics, two new collaborations formed, one led by Damascelli and the other by Ali Yazdani of Princeton University, with plans to characterize the waves even more thoroughly. Finishing in a dead heat, the rival groups’ independent studies appeared together in Science in January 2014. They confirmed that charge density waves are a ubiquitous phenomenon in cuprates and that they strenuously oppose superconductivity, prevailing as the temperature rises.
  • y applying Sachdev’s algorithm to a new round of data, Davis and his group mapped out the structure of the charge density waves, showing that the d-wave distribution of electrons was, indeed, their source.
  • The waves’ structure is particularly suggestive, researchers say, because superconducting pairs of electrons also have a d-wave configuration. It’s as if both arrangements of electrons were cast from the same mold. “Until a few months ago my thought was, OK, you have charge density waves, who cares? What’s the relevance to the high-temperature superconductivity?” Damascelli said. “This tells me these phenomena feed off the same interaction.”
  • In short, antiferromagnetism could generate the d-wave patterns of both superconductivity and its rival, charge density waves.
John Lemke

Recent News | Automotive Grade Linux - 0 views

  •  
    This will likely be a topic on the next news show. Be sure to join #indination on geekshed.net IRC to find out how you can get on the air with us.
John Lemke

DDoS attacks on major US banks are no Stuxnet-here's why | Ars Technica - 0 views

  • More unusually, the attacks also employed a rapidly changing array of methods to maximize the effects of this torrent of data. The uncommon ability of the attackers to simultaneously saturate routers, bank servers, and the applications they run—and to then recalibrate their attack traffic depending on the results achieved—had the effect of temporarily overwhelming the targets."This very well could be a kid sitting in his mom's basement in Ohio launching these attacks." "It used to be DDoS attackers would try one method and they were kind of one-trick ponies," Matthew Prince, CEO and founder of CloudFlare, told Ars. "What these attacks appear to have shown is there are some attackers that have a full suite of DDoS methods, and they're trying all kinds of different things and continually shifting until they find something that works. It's still cavemen using clubs, but they have a whole toolbox full of different clubs they can use depending on what the situation calls for."
John Lemke

Snowden Keeps Outwitting U.S. Spies - The Daily Beast - 0 views

  • First, it assumes that Snowden’s master file includes data from every network he ever scanned. Second, it assumes that this file is already in or will end up in the hands of America’s adversaries. If these assumptions turn out to be true, then the alarm raised in the last week will be warranted. The key word here is “if.”
    • John Lemke
       
      The two asumptions
  • One U.S. intelligence official briefed on the report said the DIA concluded that Snowden visited classified facilities outside the NSA station where he worked in Hawaii while he was downloading the documents he would eventually leak to journalists Glenn Greenwald and Barton Gellman. On Tuesday, Clapper himself estimated that less than 10 percent of the documents Snowden took were from the NSA.
    • John Lemke
       
      Seems not many of the documents were actually NSA documents.
  • assume
  • ...10 more annotations...
  • DIA director Gen. Michael Flynn put it this way on Tuesday in testimony before the House Permanent Select Committee on Intelligence: “We
  • that Snowden, everything that he touched, we assume that he took, stole.”
  • The U.S. intelligence official briefed on the report said the DIA was able to retrace the steps Snowden took inside the military’s classified systems to find every site where he rummaged around. “Snowden had a very limited amount of time before he would be detected when he did this, so we
  • assume
  • he zipped up the files and left,” this official said.
  • Bruce Schneier, a cybersecurity expert and cryptographer who Greenwald has consulted on the Snowden archive, said it was prudent to
  • assume
  • that lest some of Snowden’s documents could wind up in the hands of a foreign government.
  • In June, Greenwald told the Daily Beast that he did not know whether or not Snowden had additional documents beyond the ones he gave him. “I believe he does. He was clear he did not want to give to journalists things he did not think should be published.”
    • John Lemke
       
      He is not willing to release stuff he felt that journalist should not publish...
  • Snowden, however, has implied that he does not have control over the files he took. “No intelligence service—not even our own—has the capacity to compromise the secrets I continue to protect,” he wrote in July in a letter to former New Hampshire Republican senator Gordon Humphrey. “While it has not been reported in the media, one of my specializations was to teach our people at DIA how to keep such information from being compromised even in the highest threat counter-intelligence environments (i.e. China). You may rest easy knowing I cannot be coerced into revealing that information, even under torture.”
John Lemke

Yahoo webcam images from millions of users intercepted by GCHQ | World news | theguardi... - 0 views

  • Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.
  • between 2008 and 2010
  • Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012, according to an internal GCHQ wiki page accessed that year.The system, eerily reminiscent of the telescreens evoked in George Orwell's 1984, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs
  • ...1 more annotation...
  • Optic Nerve was based on collecting information from GCHQ's huge network of internet cable taps, which was then processed and fed into systems provided by the NSA. Webcam information was fed into NSA's XKeyscore search tool, and NSA research was used to build the tool which identified Yahoo's webcam traffic.
John Lemke

RapidGator Wiped From Google by False DMCA Notices | TorrentFreak - 0 views

  • File-hosting service RapidGator has had nearly all of its search results wiped from Google, including many clearly non-infringing pages. The URLs in question were removed by the search engine after a DMCA notice from several copyright holders. RapidGator is outraged and says the overbroad censorship is hurting its business, warning that the same could happen to others. “If it happens to us, it can happen to MediaFire or Dropbox tomorrow,” they state.
  • Thus far this has resulted in more than 200 million URLs being removed from Google’s search engine. While many of these takedown claims are legit, some are clearly false, censoring perfectly legitimate webpages from search results. File-hosting service RapidGator.net is one site that has fallen victim to such overbroad takedown requests. The file-hosting service has had nearly all its URLs de-listed, including its homepage, making the site hard to find through Google. Several other clearly non-infringing pages, including the FAQ, the news section, and even the copyright infringement policy, have also been wiped from Google by various takedown requests.
  • “Our robots.txt forbids search engines bots to index any file/* folder/ URLs. We only allow them to crawl our main page and the pages we have in a footer of the website. So most of the URLs for which Google gets DMCA notices are not listed in index by default,” RapidGator’s Dennis explains.
  •  
    Quoting the article: "File-hosting service RapidGator has had nearly all of its search results wiped from Google, including many clearly non-infringing pages. The URLs in question were removed by the search engine after a DMCA notice from several copyright holders. RapidGator is outraged and says the overbroad censorship is hurting its business, warning that the same could happen to others. "If it happens to us, it can happen to MediaFire or Dropbox tomorrow," they state." This is, sooner or later, going to have to be addressed... It totally works against the concept of the cloud. I can not believe that more people are using the cloud for illegal uses than legit.
John Lemke

NSA collects nearly 5 billion cellphone location records per day | Ars Technica - 0 views

  • The Washington Post added another noteworthy finding to the growing pile of information leaked by former NSA contractor Edward Snowden: the NSA is collecting nearly five billion cellphone location records per day from across the world.
  • This gigantic data collection feeds a database that stores information on "hundreds of millions of devices," according to the documents obtained by
  • 27 terabytes
  • ...1 more annotation...
  • The paper spoke with an intelligence lawyer who continued to emphasize that this program focuses beyond the US, which seems to prevent the data from falling under the Fourth Amendment (unreasonable search and seizures).
John Lemke

NSA Is Tracking Mobile Phone Location On So Many People It Can't Handle The Data Storag... - 0 views

  • The NSA cannot know in advance which tiny fraction of 1 percent of the records it may need, so it collects and keeps as many as it can — 27 terabytes, by one account, or more than double the text content of the Library of Congress’s print collection.
  • NSA defends the program by saying that it uses the location data to find "unknown associates of known intelligence targets." Basically, it's tracking where everyone goes, just in case people end up spending time with people the NSA deems as being terrorists.
  • Elsewhere in the article, they quote NSA officials repeatedly saying that the program is "tuned to be looking outside the United States," but not saying it only collects info outside the US. Also, they make clear, once a person leaves the US, the NSA no longer believes the 4th Amendment applies to them, so their location is fair game in this giant database.. Asked for specific numbers, an NSA person said:
  • ...1 more annotation...
  • It’s awkward for us to try to provide any specific numbers..."
    • John Lemke
       
      Sad day when accountability becomes awkward.
    • John Lemke
       
      Sad day when accountability becomes awkward.
John Lemke

Lawsuit Claims Accidental Google Search Led To Years Of Government Investigation And Ha... - 0 views

  • Jeffrey Kantor, who was fired by Appian Corporation, sued a host of government officials, including Attorney General Eric Holder, Director of National Intelligence James Clapper, CIA Director John Brennan, Defense Secretary Chuck Hagel and Secretary of State John Kerry in Federal Court, alleging civil rights violations, disclosure of private information and retaliation… He also sued Secretary of Energy Ernest Moniz, Acting Secretary of Homeland Security Rand Beers, Treasury Secretary Jacob Lew, EPA Administrator Regina McCarthy and U.S. Office of Personnel Management Director Katherine Archuleta.
  • "In October of 2009, Kantor used the search engine Google to try to find, 'How do I build a radio-controlled airplane,'" he states in his complaint. "He ran this search a couple weeks before the birthday of his son with the thought of building one together as a birthday present. After typing, 'how do I build a radio controlled', Google auto-completed his search to, 'how do I build a radio controlled bomb.'" From that point on, Kantor alleges coworkers, supervisors and government investigators all began "group stalking" him. Investigators used the good cop/bad cop approach, with the "bad cop" allegedly deploying anti-Semitic remarks frequently. In addition, his coworkers at Appian (a government contractor) would make remarks about regular people committing murder-suicides (whenever Kantor expressed anger) or how normal people just dropped dead of hypertension (whenever Kantor remained calm while being harassed)
  • Kantor also claims he was intensely surveilled by the government from that point forward.
    • John Lemke
       
      Our story begins with auto-complete and, once suspected, always monitored. has an interesting loophole. 
  • ...2 more annotations...
  • the law says that the timeline is based on when the citizen had a reasonable chance to discover the violation. Since the PRISM program was only declassified in July of 2013, these earlier violations should not be time-barred.
  • All in all, the filing doesn't build a very credible case and comes across more as a paranoiac narrative than a coherent detailing of possible government harassment and surveillance. Here are just a few of the highlights.
  •  
    Wait till you see how many and who are involved.
John Lemke

NSA reportedly 'piggybacking' on Google advertising cookies to home in on surveillance ... - 0 views

  • US surveillance agency may be using Google's advertising cookies to track and "pinpoint" targets for government hacking and location-tracking. According to Snowden's leaked presentation slides, both the NSA and the British equivalent, the GCHQ, are using a Google-specific ad cookie (know as "PREF") as a way of homing in on specific surveillance targets. While Google's cookie doesn't contain personal information like a name or email address, it does contain numeric codes that uniquely identify a user's browser.
  • The report notes that the NSA doesn't use this technique to find suspicious activity amidst the massive flood of internet communication that takes place every day — instead, it uses it to home in on targets already under suspicion.
John Lemke

Brazil passes an Internet 'Bill of Rights' - San Jose Mercury News - 0 views

  • It also makes Internet service providers not liable for content published by their users and requires them to comply with court orders to remove offensive material.
  • "Our legislation can influence the worldwide debate aimed at finding a way to guarantee real rights in a virtual world,"
John Lemke

'Walking Dead' Season 5 Episode 2 Spoilers Put Father Gabriel in Danger | The Stir - 0 views

  • the facility where Beth is being held
    • John Lemke
       
      What, when did we find out she was being held.
John Lemke

Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks | Ars Technica - 0 views

  • Since some time in the second half of 2014, a different state-sponsored group had been casing their corporate network using malware derived from Stuxnet, the highly sophisticated computer worm reportedly created by the US and Israel to sabotage Iran’s nuclear program.
  • the malware was more advanced than the malicious programs developed by the NSA-tied Equation Group that Kaspersky just exposed. More intriguing still, Kaspersky antivirus products showed the same malware has infected one or more venues that hosted recent diplomatic negotiations the US and five other countries have convened with Iran over its nuclear program.
  • We see this battle or arms race emerging and now it involves some kind of confrontation between the security industry and nation-state sponsored spies
  • ...3 more annotations...
  • Kaspersky officials first became suspicious their network might be infected in the weeks following February's Security Analyst Summit, where company researchers exposed a state-sponsored hacking operation that had ties to some of the developers of Stuxnet. Kaspersky dubbed the highly sophisticated group behind the 14-year campaign Equation Group. Now back in Moscow, a company engineer was testing a software prototype for detecting so-called advanced persistent threats (APTs), the type of well-organized and highly sophisticated attack campaigns launched by well-funded hacking groups. Strangely enough, the developer's computer itself was having unusual interactions with the Kaspersky network. The new APT technology under development, it seemed, was one of several things of interest to the Duqu attackers penetrating the Kaspersky fortress. "For the developer it was important to find out why" his PC was acting oddly, Kamluk said. "Of course, he did not consider that machine could be infected by real malware. We eventually found an alien module that should not be there that tried to mask behind legitimate looking modules from Microsoft. That was the point of discovery."
  • What they found was a vastly overhauled malware operation that made huge leaps in stealth, operational security, and software design. The Duqu actors also grew much more ambitious, infecting an estimated 100 or so targets, about twice as many as were hit by the 2011 version.
  • So the Duqu 2.0 attackers pulled an audacious feat that Kaspersky researchers had never seen before. Virtually all of the malware resided solely in the memory of the compromised computers or servers. When one of them was restarted, the infection would be purged, but as the rebooted machine reconnected to the network, it would be infected all over again by another compromised computer in the corporate network. The secret lynchpin making this untraceable reinfection scheme possible was the Windows vulnerability Microsoft patched only Tuesday, which has been designated
John Lemke

BBC News - Deep sea 'mushroom' may be new branch of life - 0 views

  • The authors of the article note several similarities with the bizarre and enigmatic soft-bodied life forms that lived between 635 and 540 million years ago - the span of Earth history known as the Ediacaran Period.
  • The authors of the paper recognise two new species of mushroom-shaped animal: Dendrogramma enigmatica and Dendrogramma discoides.
  • The new organisms are multicellular but mostly non-symmetrical, with a dense layer of gelatinous material between the outer skin cell and inner stomach cell layers. The researchers did find some similarities to other animal groupings, such as the Cnidaria - the phylum that comprises corals and jellyfish - and the Ctenophora, which includes the marine organisms known as comb jellies. But the new organisms did not fulfil all the criteria required for inclusion in either of those categories.
  • ...1 more annotation...
  • One way to resolve the question surrounding Dendrogramma's affinities would be to examine its DNA, but new specimens will need to be found. The original samples were first preserved in formaldehyde and later transferred to 80% alcohol, a mode of treatment that prevents analysis of genetic material.
1 - 20 of 23 Next ›
Showing 20 items per page