Archive for April, 2010

Bio-Inspired Computer Networks Self-Organise and Learn

Powerful computers made up of physically separate modules, self-organising networks, and computing inspired by biological systems are three hot research topics coming together in one European project. European researchers have developed an innovative computing platform. At the heart of the system are many small modules, each made from chips with an inbuilt ability to learn. A self-configuring wireless network connects […]

iPad: The Disneyland of Computers

iPad: The Disneyland of Computers

Tech commentators have a love/hate relationship with Apple’s new iPad. Those who try it tend to like it, but many dislike its locked-down App Store which only allows Apple-approved apps. Some people even see the iPad as the dawn of a new relationship between people and computers. To me, the iPad is Disneyland. I like Disneyland. It’s clean, safe, and […]

Open Source and Computer Science Education

In his March 2006 column in the Communications of the ACM, ACM President David Patterson urged Computer Science (CS) educators to “Join the open source movement.” Despite the widespread use of the open source development model in the software industry, Patterson observed that “most schools still teach ‘write programs from a blank piece of paper’ programming.” Patterson noted that students […]

Privacy Risks from Geographic Information

In today’s world more geographic information is being collected about us, such as where we live, where the clinic we visited is located, and where we work. Web sites are also collecting more geographic information about their users. This location information makes it easier to identify individuals, which can raise privacy concerns when location is coupled with basic demographics and […]

Using OpenCL with Qt

Using OpenCL with Qt

Recently we have been experimenting with OpenCL and Qt, to see what Qt needs to make it easier to use OpenCL and to see what Qt could use it for internally.  In this post we are going to give an introduction to OpenCL, the QtOpenCL wrapper library, show how to write your first QtOpenCL program, and tell you where to […]

Removing the RSA Security 1024 V3 Root

There’s been confusion today about the work we’re doing on our root store, the set of trusted certificate authorities shipped with Mozilla products. The short story is this: we’re removing the “RSA Security 1024 V3″ root from that list. Its owners have confirmed that it is not in use, and not covered by current audits. We regularly check for roots […]

Enforcement of the GNU GPL in Germany and Europe

A. Rationale for enforcement of the GPL – At present, the enforcement of the GPL license conditions is driven by single developers and organizations supporting Free Software. Most famous is Mr. Harald Welte, former maintainer of the Netfilter/Iptables project, who is running the enforcement project gpl-violations.org. Some years ago, Mr. Welte became aware of the fact that many manufacturers use […]

Opening up the MeeGo development

Opening up the MeeGo development

Today is the culmination of a huge effort by the worldwide Nokia and Intel teams to share the MeeGo operating system code with the open source community. This is the latest step in the full merger of Maemo and Moblin, and we are happy to open the repositories and move the ongoing development work into the open – as we […]

Google Squeezes Flash into Chrome

Google Squeezes Flash into Chrome

Adobe’s Flash Player has come under fire from developers and companies who question its necessity, but the plug-in has just received a big vote of confidence from Google. This week, Google announced that its Chrome browser will come with Flash built in. And Google, Adobe, and another browser maker, Mozilla, have revealed plans to improve the way plug-ins interface with […]

How Android Security Stacks Up

How Android Security Stacks Up

Today’s smart phones have all the speed, storage, and network connectivity of desktop computers from a few years ago. Because of this, they’re a treasure trove of personal information–and likely the next battleground for computer security. What makes smart phones attractive–the ability to customize them by downloading applications–is what makes them dangerous. Apps make the mobile phone a real computer, […]