Verdict Overturned in Favor of Research In Motion in Mformation Patent Case

After considering motions presented by both parties, as well as the jury verdict (which was announced by RIM on July 14, 2012), the Judge determined that RIM had not infringed on Mformation’s patent. In granting RIM’s motion, the Judge also vacated the $147.2 million jury award, which means that RIM is not required to make any payment to Mformation. Mformation has the right to appeal the Judge’s ruling; however if Mformation successfully appeals the ruling, the jury verdict would not be reinstated and instead a new trial would occur.

via Verdict Overturned in Favor of Research In Motion in Mformation Patent Case – MarketWatch.

Digia to acquire Qt from Nokia

Helsinki, Finland and Santa Clara, US – August 9th 2012, Digia, the software powerhouse listed on the NASDAQ OMX Helsinki exchange (DIG1V), today announced that it has signed an agreement to acquire Qt software technologies and Qt business from Nokia. Following the acquisition Digia becomes responsible for all the Qt activities formerly carried out by Nokia. These include product development, as well as the commercial and open source licensing and service business. Following the acquisition, Digia plans to quickly enable Qt on Android, iOS and Windows 8 platforms.

via Digia to acquire Qt from Nokia.

Open-source movements butt heads over logo

The gear logo is backed by the Open Source Hardware Association (OSHWA), which was formally established earlier this year to promote hardware innovation and unite the fragmented community of hackers and do-it-yourselfers. The gear mark is now being increasingly used on boards and circuits to indicate that the hardware is open-source and designs can be openly shared and modified.

via Open-source movements butt heads over logo.

OSI has now informed OSHWA, which is acting on behalf of the open-source hardware community, that the logo infringes on its trademark.

Debian Now Defaults To Xfce Desktop

The default desktop task has been changed from GNOME to Xfce within the Tasksel Git. While one might assume the change is due to the criticism expressed by many GNOME users since the 3.x series — with some saying it’s losing its relevance on the Linux desktop — the main reason expressed within the Git commit comes down to Xfce being able to fit entirely on the first Debian CD.

via [Phoronix] Debian Now Defaults To Xfce Desktop.

Researchers Identify Four BlackBerry Zitmo Variants

Zitmo refers to a version of the Zeus malware that specifically targets mobile devices. Previous Zitmos variants masqueraded as banking security applications or security add-ons to circumvent out-of-band authentication systems used by some financial institutions by intercepting one-time passwords sent via text message and forwarding it to a another cell number that acted as a command-and-control device.

via Researchers Identify Four BlackBerry Zitmo Variants | SecurityWeek.Com.

Collaborating on research is important because the vulnerability doesn’t have to be within BlackBerry’s code to compromise the platform, Stone noted. For example, researchers exploited issues in the open source browser engine Webkit to hack a BlackBerry last year’s CanSecWest Pwn2Own contest. It’s about “protecting the ecosystem,” as one vulnerability identified in one platform can easily exist in another platform, Stone said.

Our Planned Approach to Secure Boot

At the implementation layer, we intend to use the shim loader originally developed by Fedora – it’s a smart solution which avoids several nasty legal issues, and simplifies the certification/signing step considerably. This shim loader’s job is to load grub2 and verify it; this version of grub2 in turn will load kernels signed by a SUSE key only. We are currently considering to provide this functionality with SLE11 SP3 on fresh installations with UEFI Secure Boot present.

via Our Planned Approach to Secure Boot | SUSE Blogs.

The underground economy of social networks

In a new study, Barracuda Labs analyzed a random sampling of more than 70,000 fake Twitter accounts that are being used to sell fake Twitter followers.

via The underground economy of social networks.

This underground economy consists of dealers who create and sell the use of thousands of fake social accounts, and Abusers who buy follows or likes from these fake accounts to boost their perceived popularity, sell advertising based on their now large social audience or conduct other malicious activity.

Content-Centric Networking

CCN directly routes and delivers named pieces of content at the packet level of the network, enabling automatic and application-neutral caching in memory wherever it’s located in the network. The result? Efficient and effective delivery of content wherever and whenever it is needed.  Since the architecture enables these caching effects as an automatic side effect of packet delivery, memory can be used without building expensive application-level caching services.

via Content-Centric Networking – PARC, a Xerox company.

This is What Wall Street’s Terrifying Robot Invasion Looks Like

HFT affects all investors to an extent, because stocks are now priced differently than in the past. The market used to consist mostly of investors analyzing cash flows and balance sheets, trying to calculate a company’s fair value. HFTs, on the other hand, react to movements in stock prices alone. That is not necessarily a bad thing, but since HFTs are responsible for two-thirds of the trading volume, we have the strange situation where they can set the price based on what they perceive others’ perceptions to be.

via This is What Wall Street’s Terrifying Robot Invasion Looks Like | Motherboard.