3-D Printing Will Soon Become a Routine Manufacturing Tool

Additive manufacturing—the industrial version of 3-D printing—is already used to make some niche items, such as medical implants, and to produce plastic prototypes for engineers and designers. But the decision to mass-produce a critical metal-alloy part to be used in thousands of jet engines is a significant milestone for the technology. And while 3-D printing for consumers and small entrepreneurs has received a great deal of publicity, it is in manufacturing where the technology could have its most significant commercial impact

via 3-D Printing Will Soon Become a Routine Manufacturing Tool | MIT Technology Review.

Kim Dotcom Threatens To Sue Google, Facebook And Twitter Over 2-Factor Authentication Patent If They Don’t Help Him

So, a lot of people are talking about Kim Dotcom’s latest gambit, which was to point out that he holds a patent (US 6,078,908 and apparently others in 12 other countries as well) that covers the basics of two-factor authentication, with a priority date of April of 1997. While interesting, he goes on to point out that he’s never sued over the patent because “I believe in sharing knowledge and ideas for the good of society.”

via Kim Dotcom Threatens To Sue Google, Facebook And Twitter Over 2-Factor Authentication Patent If They Don’t Help Him | Techdirt.

Reporters use Google, find breach, get branded as “hackers”

Call it security through absurdity: a pair of telecom firms have branded reporters for Scripps News as “hackers” after they discovered the personal data of over 170,000 customers—including social security numbers and other identifying data that could be used for identity theft—sitting on a publicly accessible server. While the reporters claim to have discovered the data with a simple Google search, the firms’ lawyer claims they used “automated” means to gain access to the company’s confidential data and that in doing so the reporters violated the Computer Fraud and Abuse Act with their leet hacker skills.

via Reporters use Google, find breach, get branded as “hackers” | Ars Technica.

Verizon Taps AlcaLu & Ericsson for 4G Small Cells

Verizon is calling 4G small cells a “complement” to its existing LTE network and distributed antenna system deployments in hard-to-cover areas like building basements. The operator currently has 497 live LTE markets, which represents 95 percent coverage of its existing 3G footprint.

via Light Reading – Verizon Taps AlcaLu & Ericsson for 4G Small Cells.

Think your Skype messages get end-to-end encryption? Think again

With the help of independent privacy and security researcher Ashkan Soltani, Ars used Skype to send four Web links that were created solely for purposes of this article. Two of them were never clicked on, but the other two—one beginning in HTTP link and the other HTTPS—were accessed by a machine at 65.52.100.214, an IP address belonging to Microsoft.

via Think your Skype messages get end-to-end encryption? Think again | Ars Technica.

Yahoo: Expect Ads On Tumblr To Ramp Up Significantly In 2014

In the conference call, Mayer made an early reference to how Tumblr would be able to make good use of Yahoo’s advertising technology, in ways that fit Tumblr’s so-far successful, image-based, quick-blogging, youth-oriented format — what she called “native advertising formats.”

via Yahoo: Expect Ads On Tumblr To Ramp Up Significantly In 2014 | TechCrunch.

When should you open source your code

As an organization or even individual there always seem to be questions when considering whether or not to make your project or code snippet open source. Many times, it starts with trying to figure out which license to use. But there are many other things to consider. We derived a list for you the next time you ask yourself: Should I open source my code?

via When should you open source your code? | opensource.com.