Worlds Inc. Files Patent Infringement Lawsuit Against Activision Blizzard, Inc., Blizzard Entertainment, Inc., and Activision Publishing, Inc.
Worlds Inc. owns US patents numbers 8,082,501, 7,493,558, 7,945,856 and 7,181,690 titled “System and Method for Enabling Users to Interact in a Virtual Space” and has additional continuation claims in process before the U.S Patent & Trademark Office (USPTO). These patents relate to computer architecture for three-dimensional graphical multi-user interactive virtual world systems. Such systems are utilized in Massive Multi-Player Online Role-Playing Games (MMORPG).
Jevons paradox
In economics, the Jevons paradox (sometimes Jevons effect) is the proposition that technological progress that increases the efficiency with which a resource is used, tends to increase (rather than decrease) the rate of consumption of that resource.[1] In 1865, the English economist William Stanley Jevons observed that technological improvements that increased the efficiency of coal-use led to the increased consumption of coal in a wide range of industries. He argued that, contrary to common intuition, technological improvements could not be relied upon to reduce fuel consumption.[2]
Fault Tolerant Design, True Privacy and Efficient Versioning
Fault Tolerant Design, True Privacy and Efficient Versioning – SpiderOak.com.
Speaking simply in terms of technical proficiency, there exists a dramatic difference between SpiderOak and other back up systems – both online backup and offline solutions. Below we highlight these differences through a discussion of our philosophy and approach.
- True Privacy
- Fault Tolerant Design
- Storage Redundancy Savings
- Efficient Versioning
- Multi-Device – Real Time
- Instant Access from Anywhere
- Sharing… With Safety
- Cross Platform: Mac, Windows, Linux
- Reliability via Comprehensive Test Coverage
- Open Source?
- Encryption Specifications
- User Authentication Process
- Storage Infrastructure
Oracle thinks you can copyright a programming language, Google disagrees
Google then goes on to explain that “a given set of statements or instructions may be protected, but the protection does not extend to the method of operation or system — the programming language — by which they are understood by the computer.” Google is arguing that a computer language is “inherently a utilitarian, nonprotectable means by which computers operate” and merely provides the structure, selection and organization of the software.
via Oracle thinks you can copyright a programming language, Google disagrees | The Verge.
Voxer
Turn your phone into a Walkie Talkie
Hmmmm. Again with the walkie talkies.
Voxer is a Walkie Talkie application for smartphones. Voxer lets you send instant audio, text and photo messages to your friends (one or more!). Messages stream live as you talk and your friends join you live or listen later.
Voxer is available for iPhone, iPod touch, iPad and Android devices.
.epub eBooks Tutorial – Part 1: Format Your Source Content
Speaking of CSS, that’s where you want to do all your styling. It’s the preferred way to stylize things in both XHTML and the ePub standard. (There are a very few reader programs out there that won’t recognize CSS. Mot of them do by now though, and if you keep the HTML to the basics, the book will still be readable if the reader program doesn’t recognize CSS.
via .epub eBooks Tutorial – Part 1: Format Your Source Content.
Mosh: the mobile shell
Remote terminal application that allows roaming, supports intermittent connectivity, and provides intelligent local echo and line editing of user keystrokes.
Mosh is a replacement for SSH. It’s more robust and responsive, especially over Wi-Fi, cellular, and long-distance links.
Mosh is free software, available for GNU/Linux, FreeBSD, and Mac OS X.
HP Ships Network Switches With Malware Infected Flash Cards
HP has warned of a security vulnerability associated with its ProCurve 5400 zl switches that contain compact flash cards that the company says may be infected with malware. The company warned that using one of the infected compact flash cards in question on computer could result in the system being compromised.
via HP Ships Network Switches With Malware Infected Flash Cards | SecurityWeek.Com.
In March 2012, a consortium of experts published a preview of standards meant to improve the security of the global supply chain for commercial software and hardware products. The standards are the work of The Open Group, and are supported by companies ranging from Boeing to Oracle to IBM. The document has been dubbed the Open Trusted Technology Provider Standard (O-TTPS) Snapshot. The standards are being aimed at providers, suppliers and integrators with the goal of enhancing the security of the supply chain and allowing customers to differentiate between providers who adopt the standard’s practices and those who don’t.