If Slashdot is to be believed, Google and Microsoft have begun an “epic” hiring war. And nude coders have never been more in demand.

http://tech.slashdot.org/story/11/04/21/0312235/Google-Microsoft-In-Epic-Hiring-War?utm_source=rss1.0&utm_medium=feed via Byline

“Looking for a new job? Then Google and Microsoft have 6200 roles globally this quarter up for grabs, the first salvos in a costly war for talent. Google alone will hire 6200 engineers, executives and sales staff this year — its biggest intake ever. This story details where the biggest bucks and most fun jobs are to be had and how you can apply for them. There’s even a job for an Xbox PR person — fancy being paid to play with toys all day?”

Another company hiring is AVOS, run by the founders of YouTube, which just purchased the bookmarking site Delicious: http://www.AVOS.com/jobs

Of course, different companies have different…perks.

http://idle.slashdot.org/story/11/04/05/157229/Software-Firm-Looking-To-Hire-Naked-Coders?utm_source=rss1.0&utm_medium=feed via Byline

Nude House, a Buckinghamshire computer software and naturist company, is looking for coders who aren’t afraid to let a few Cheetos fall where no Cheetos have fallen before. The company would like to become the first all nude tech business. From the article: “Company spokesman Chris Taylor told The Register: ‘As far as I am aware this is not only the first UK office job for naturists in web-coding or web-selling, but is also the first worldwide facility for naturists to earn substantial sums of money from work that incidentally provides them with the capability to work entirely without clothes.

Reversing a trend to give corporations all the rights of humans, the US Supreme Court decided AT&T isn’t eligible for “personal privacy” when it comes to the release of embarrassing information submitted to the government. Meanwhile, Bolivia’s new law could give ecosystems the right to sue polluters.

http://feeds.wired.com/~r/wired/index/~3/0tNjh7HCWgo/ via Byline

Bolivia’s Law of Mother Earth is set to pass, and on Wednesday the United Nations will discuss a proposed treaty based on the Universal Declaration of the Rights of Mother Earth. Both mandate legal recognition of ecosystems’ right to exist.

Wired speculates that this could help deter ecological disasters.

http://feeds.wired.com/~r/wired/index/~3/QBuZq21YP1w/ via Byline

Hundreds of lawsuits have flowed from the Deepwater Horizon catastrophe, filed by citizens, states and the federal government. And someday, perhaps, the Gulf of Mexico’s ecosystems will also file suit.

While it’s surprising to hear this Supreme Court rule against corporations, maybe it’s just part of a conclusion by society in general that “privacy is so twentieth century.”

http://yro.slashdot.org/story/11/03/02/159242/Supreme-Court-Rules-On-Corporate-Privacy?from=rss via Byline

“The Supreme Court unanimously decided (PDF) Monday that AT&T can’t keep embarrassing corporate information that it submits to the government out of public view; “personal privacy” rights do not apply to corporations. “We trust that AT&T will not take it personally” concluded the ruling.”

The Pirate Party of Canada has threatened to unleash its anti-surveillance software on its own government, promising to let Canadian citizens browse safely under a Virtual Private Network.

http://yro.slashdot.org/story/11/04/23/0534222/Pirate-Party-of-Canada-Promises-VPN-For-Freedom?utm_source=rss1.0&utm_medium=feed via Byline

“The Pirate Party of Canada has announced that it will extend a VPN originally set up to allow people in Tunisia to browse freely while internet censorship was imposed there. Canada may soon be added to that list since the ruling Conservative Party has vowed to introduce a bill that would provide unprecedented systematic interception and monitoring of Canadians’ personal communications. So the Pirate Party of Canada has announced it will extend that service to Canadians.”

Read more of this story at Slashdot.

Meanwhile, back in north Africa…

http://mobile.slashdot.org/story/11/04/13/1326255/Engineers-Hijack-Libyan-Phone-Network-For-Rebels?utm_source=rss1.0&utm_medium=feed via Byline

“A team led by a Libyan-American telecom executive has helped rebels hijack Col. Moammar Gadhafi’s cellphone network and re-establish their own communications. The new network, first plotted on an airplane napkin and assembled with the help of oil-rich Arab nations, is giving more than two million Libyans their first connections to each other and the outside world after Col. Gadhafi cut off their telephone and Internet service about a month ago.”

Ohm StudioAn “ohm” may be a measure of resistance, but I can’t see musicians resisting this latest stab at online music production. According to the promo video, anyway, Ohm helps you sharing tracks, find collaborators, and, ehem, sync asynchronously.

Did some bungler lay down bogus vocals on your killer bassline while you were asleep? No problem! Thanks to my favorite Ohm feature, you can roll back your song to a previous version stored in Ohm’s cloud.

If you try it, let us know if it delivers. Ohm Studio real time collaborative music workstation

Iphone Tracker Ippolito 2011 01 19Privacy advocates Alasdair Allan and Pete Warden have released a free visualization tool to demonstrate how the iPhone stores your movements in a file easily accessible by anyone with access to your phone or computer. (Shown here, my January 19th presence in the Philadelphia International Airport.)

Nothing like a good visualization of your own movements to give you the creeps.

Continue reading »

09orono lgh Perma may 03 illWant to try a helping of edible landscape? Mosey over to LongGreenHouse this Friday and Wednesday for a permaculture field day.

Continue reading »

Envisioning Technology 2011 02 25Point-and-shoot cameras and the music industry are dying, pundits say. So what’s to come? Pundits have the answer for that too–in fact they have a whole fancy infographic for it.

Continue reading »

NEW YORK CITY,  19 Nov 2010 —

MYFOXNY.COM – Some might say there is a ‘war on cars’ going on in New York City.
Continue reading »

Well, not exactly–but Steve “Woz” Wozniak did recently argue that American education should focus more on sustained long-term projects. The UMaine New Media department is doing its part by showcasing senior capstones at the Collins Center for the Arts on Tuesday 19 April from 7 to 9pm.

Press on this year’s capstones:

http://newmedia.umaine.edu/feature.php?id=957

A complete list:

http://nmdprojects.net/student_work/capstone_2011/

The word from Woz:

http://tech.slashdot.org/story/11/04/08/1927218/The-Dying-DVR-Box-and-Woz-Wisdom?utm_source=rss1.0&utm_medium=feed via Byline

“At SNW in Santa Clara this past week, a diverse group of techies shared insights into their industries….Steve Wozniak attacked the American education system, saying students should be graded on a single, long-term project rather than a short learning/testing cycle. ‘In school, intelligence is a measurement,’ he said. ‘If you have the same answer as everyone else in math or science, you’re intelligent.’”

DIY couture may not yet have hit the runways in Milan and Paris, but it’s alive and well in new media circles.

For her performance Cast, U-Me Intermedia MFA student Amy Pierce didn’t make her own wedding dress as much as invite others to make it for her. Her choice of material–a plaster body cast that required her to stand motionless for four hours–was a metaphor for the marriage contract that was particularly, well, “fitting.” (Like any good bride, she eventually fainted.)

Meanwhile designer Mary Huang has developed an application that turns drawings into dresses, courtesy of a handy mathematical algorithm.

http://idle.slashdot.org/story/11/03/24/1157201/An-App-That-Turns-Any-Drawing-Into-a-Dress?from=rss via Byline

“A new app by interactive designer Mary Huang called Continuum, lets you turn any drawing into a customized three-dimensional garment. From the article: ‘Huang dubs her software “D. dress”—the “D” stands for “Delaunay triangulation,” an algorithm she uses to deconstruct each dress into a series of triangular planes. Any adjustments in necklines, skirt lengths, or sleeve types are achieved by adding or subtracting triangles. “Lo-res triangular models are more abstract,” Huang admits, “but this abstraction prompts people to imagine what the resulting dress would look like rather than expect an exact rendition of the screen image. The triangulation also insures that almost any drawing will produce an interesting form.”’”

Two recent visions suggest that Augmented Reality in the wild could be more fun than the portable shopping mall promised by most AR startups. Mattias Wozniak and Bjorn Svensson’s design concept of an AR visor lets users play a virtual game with other passersby, like bouncing a virtual ball against a bus stop. Not to be outdone, zoologists have figured out how to keep their eye on the ball–er, zebra–by tracking its stripes like a barcode.

Continue reading »

Anonymous Wikileaks LogoUS security consultants may have been conspiring in secret to bring WikiLeaks down, but Britain’s former intelligence chief links WikiLeaks with the downfall of oppressive regimes in the Middle East. And then there’s WikiLeak’s staunchest supporter, Anonymous, which caught said security consultants with their pants down (and may have even erased their CEO’s iPad).

Continue reading »

EFF logoThe downside: no pay. The upside: save the Internet. Apply by 22 April.

Continue reading »

Anonymous video artists have projected onto the Maine State House the mural by artist Judy Taylor originally installed to commemorate Maine’s labor history. The mural’s removal by Maine’s new governor Paul LePage has provoked outcries of censorship from artists and educators.

Continue reading »

So we know from NMDnet that cell phones are privacy disasters–but what are they good at? How about detecting cancer, getting drivers out of speeding tickets, and blowing up terrorists, for starters?

http://mobile.slashdot.org/story/11/03/11/1847248/Smartphone-Device-Detects-Cancer-In-an-Hour?from=rss via Byline

“Scientists at the Center for Systems Biology at Massachusetts General Hospital have integrated a microNMR device that accurately detects cancer cells and integrates with a smartphone (abstract). Though just a prototype, this device enables a clinician to extract small amounts of cells from a mass inside of a patient, analyze the sample on the spot, acquire the results in an hour, and pass the results to other clinicians and into medical records rapidly. How much does the device cost to make? $200. Seriously, smartphones just got their own Samuel L. Jackson-esque wallet.” Reader Stoobalou points out other cancer-related news that Norwegian researchers have found a group of genes that increase a person’s risk to develop lung cancer.

Of course, cell phones have also been accused of causing cancer. Well, how about getting out of a speeding ticket?

http://yro.slashdot.org/story/11/02/26/021218/Smart-Phone-Gets-Driver-Out-of-a-Speeding-Ticket?from=rss

“Sahas Katta writes in Skattertech that a traffic cop pulled him over while driving home and gave him a speeding ticket but thanks to his Android, he ended up walking out of traffic court without having to pay a fine or adding a single point to his record. “I fortunately happened to have Google Tracks running when an officer cited me for speeding while heading back home from a friend’s place,” writes Katta. “The speed limit in the area was a mere 25 miles per hour and the cop’s radar gun shockingly clocked me driving over 40 miles per hour.” Once in court Katta asked the officer the last time he attended radar gun training, when the device was last calibrated, or the unit’s model number — none of which the officer could answer. “I then presented my time stamped GPS data with details about my average moving speed and maximum speed during my short drive home. Both numbers were well within the posted speed limits,” says Katta. “The judge took a moment and declared that I was not guilty, but he had an unusual statement that followed. To avoid any misinterpretations about his ruling, he chose to clarify his decision by citing the lack of evidence on the officer’s part. He mentioned that he was not familiar enough with GPS technology to make a decision based on my evidence, but I can’t help but imagine that it was an important factor.”"

Not impressed? How about the ability to blow up suicide bombers before they get to you ?

http://idle.slashdot.org/story/11/01/28/1228241/Spam-Text-Prematurely-Blows-Up-Suicide-Bomber?from=rss via Byline

“A suicide bomber’s plan to detonate explosives in Central Moscow on New Year’s Eve was foiled when she received an unexpected spam text message that caused her deadly payload to blow up too early. A message wishing her a happy new year came hours before the unnamed woman was to set off her suicide belt near Red Square, an act of terrorism that could have killed hundreds of people. Islamist terrorists in Russia often use mobile phones as detonators. The bomber’s handler, who is usually watching his charge, sends the bomber a text message to set off the explosive belt at the moment when it is thought they can inflict maximum casualties.”

How to keep these apps from wasting your phone battery? Throw one of these in your backpack.

http://feeds.wired.com/~r/wired/index/~3/6k03KlR8C0w/ via Byline

Put this tubular object in your backpack, and you can generate juice for your cellphone — just by walking around.

Remember that meme going around a few years back where certain dance beats could hack teen brains? Well, apparently it works for cars.

http://it.slashdot.org/story/11/03/12/0114219/Hacking-a-Car-With-Music?from=rss via Byline

“Researchers at the University of California, San Diego, and the University of Washington have identified a handful of ways a hacker could break into a car, including attacks over the car’s Bluetooth and cellular network systems, or through malicious software in the diagnostic tools used in automotive repair shops. But their most interesting attack focused on the car stereo. By adding extra code to a digital music file, they were able to turn a song burned to CD into a Trojan horse. When played on the car’s stereo, this song could alter the firmware of the car’s stereo system, giving attackers an entry point to change other components on the car. This type of attack could be spread on file-sharing networks without arousing suspicion, they believe. ‘It’s hard to think of something more innocuous than a song,’ said Stefan Savage, a professor at the University of California.”

So next time your car doesn’t start or insists on turning right instead of left, blame those tunes you downloaded from Limewire.

In seemingly unrelated news, the music industry is suing Limewire for 75 trillion dollars. I imagine if the RIAA got wind of professor Savage’s research, they would up the number into the quadrillions.

http://yro.slashdot.org/story/11/03/23/1930238/Limewire-Being-Sued-For-75-Trillion?from=rss via Byline

“13 record companies are trying to sue Limewire for $75 Trillion. The NYC judge in the case thinks it is ‘absurd’. Its almost like these media companies are their worst enemy trying to make themselves look ridiculous. From the article: “The record companies, which had demanded damages ranging from $400 billion to $75 trillion, had argued that Section 504(c)(1) of the Copyright Act provided for damages for each instance of infringement where two or more parties were liable. For a popular site like Lime Wire, which had thousands of users and millions of downloads, Wood held that the damage award would be staggering under this interpretation. ‘If plaintiffs were able to pursue a statutory damage theory predicated on the number of direct infringers per work, defendants’ damages could reach into the trillions,’ she wrote. ‘As defendants note, plaintiffs are suggesting an award that is more money than the entire music recording industry has made since Edison’s invention of the phonograph in 1877.’”

How do photojournalists get paid if their traditional business model is drying up? A story from the front lines of crowdfunding, plus a photographer applies a technique from a New Media capstone to traverse the Appalachian Trail in four minutes.

http://feeds.wired.com/~r/wired/index/~3/89mLw4IOQdY/ via Byline

A month after the launch of the new crowd-funding platform for photojournalism, Emphas.is, one of its users reports from the road. Belgian photographer and Emphas.is fundraiser Tomas van Houtryve tells us about the good, the bad and the future of a work in progress….

The pressure of time has been the hardest challenge for van Houtryve, “I would not recommend tight schedules where one has to juggle shooting, fundraising and a withering travel schedule. It’s been very intense keeping all the elements on track.”

Despite travails, van Houtryve sees a lot of promise. “It’s an intuitive model,” he says. “Backers have started to pose relevant questions. As my project proposal has made its way through social networks and attracted support from strangers, I’ve made some really fruitful new connections. In addition to generous funding contributions, several individuals have stepped forward with key contacts and very precise and helpful advice. I have already managed to make stronger photos due to their input. This is a pleasant shift over the lone-wolf existence.”

Meanwhile, on the Appalachian Trail photographers are documenting their trek using a technique that sounds a lot like NMD alumnus Sam Lynch’s iGlasses:

http://feeds.wired.com/~r/wired/index/~3/uhDLuMVI0AM/ via Byline

Kevin Gallagher spent six months hiking the 2,200 miles of the Appalachian Trail. Then he compiled his 4,000 still photos taken along the way and turned them into an amazing 4-minute video travelog.

© 2011 UMaine NMDNet Suffusion theme by Sayontan Sinha