Barrett Brown He has spent over a year in FCI Seagoville federal prison and at one time faced over a hundred more as he awaited trial on an assortment of seventeen charges filed in three indictments that include sharing an HTTP link to information publicly released during the 2012 Stratfor email leak, and several counts of conspiring to publicize restricted information about an FBI agent. Between September 2013 and April 2014 he was held under an agreed gag order prohibiting him from discussing his case with the media. Early life and education He attended the private Episcopal School of Dallas for high school but dropped out after his sophomore year. Plug-in electric vehicle A plug-in electric vehicle (PEV) is any motor vehicle that can be recharged from any external source of electricity, such as wall sockets, and the electricity stored in the rechargeable battery packs drives or contributes to drive the wheels. PEV is a superset of electric vehicles that includes all-electric or battery electric vehicles (BEVs), plug-in hybrid vehicles (PHEVs), and electric vehicle conversions of hybrid electric vehicles and conventional internal combustion engine vehicles. Plug-in cars have several benefits compared to conventional internal combustion engine vehicles. They have lower operating and maintenance costs, and produce little or no local air pollution. They reduce dependence on petroleum and may reduce greenhouse gas emissions from the onboard source of power, depending on the fuel and technology used for electricity generation to charge the batteries.
Is the Computer Fraud and Abuse Act the 'worst law in technology'? Is the Computer Fraud and Abuse Act the "worst law in technology", as Columbia Law School's Tim Wu calls the statute? I think there are worse laws for the technology industry and its customers, but the CFAA is more than bad enough – a vague, outdated and Draconian law, abused by the government in several high-profile cases – to have spurred calls for repeal. As Wu and many others (including me) have pointed out over the years, the vagueness of the CFAA has given prosecutors a tool that should worry everyone. This is because the government contends that the statute's ban on "unauthorized access" to someone else's computer is a felony, period, with potential penalties you'd associate with serious violent crime.
Jean de Mailly Jean Pierier of Mailly, called Jean de Mailly, was a Dominican chronicler working in Metz in the mid-13th century. In his Latin chronicle of the Diocese of Metz, Chronica universalis Mettensis, the fable of Pope Joan first appears in written form. He is also the compiler of the Abbreviatio in gestis sanctorum, a collection of legends about the saints which is an important forerunner of the Golden Legend. Notes Editions Jean de Mailly, Abbreviatio in gestis et miraculis sanctorum. Supplementum hagiographicum.
How to Become Virtually Immortal It’s not enough that Internet companies have entered every corner of human existence—now, some are starting to cater to non-existence. In recent years, Google and Facebook have created systems to deal with death, such as suspending inactive accounts and allowing people to bequeath their data to a surviving friend or relative. The newest entry in the e-death industry is a small start-up called Eterni.me, which is taking end-of-life services to Asimovian extremes. “We all pass away sooner or later, leaving only a few memories behind for family, friends and humanity—and eventually we are all forgotten,” the Web site reads.
Ted Bundy Theodore Robert "Ted" Bundy (born Theodore Robert Cowell; November 24, 1946 – January 24, 1989) was an American serial killer, rapist, kidnapper, and necrophile who assaulted and murdered numerous young women and girls during the 1970s and possibly earlier. After more than a decade of denials, he confessed shortly before his execution to 30 homicides committed in seven states between 1974 and 1978; the true total remains unknown, and could be much higher. Bundy was regarded as handsome and charismatic by his young female victims, traits he exploited in winning their trust. He typically approached them in public places, feigning injury or disability, or impersonating an authority figure, before overpowering and assaulting them at more secluded locations.
Obama's Computer Security Solution is a Mishmash of Old, Outdated Policy Solutions The Obama Administration is on a roll with proposing legislation that endangers our privacy and security. Over the course of two days, President Obama proposed a cybersecurity bill that looks awfully similar to the now infamous CISPA (with respect to information sharing), a computer crime bill that is the opposite of our own proposed computer crime reform, and a data breach law weaker than the current status quo. All three of the bills are recycled ideas that have failed in Congress since their introduction in 2011. They should stay on the shelf. Zombie Bill Dead in 2013, Stumbles from the Grave in 2015
Anastasius Bibliothecarius Anastasius Bibliothecarius or Anastasius the Librarian (c. 810 – c. 878) was bibliothecarius (literally "librarian") and chief archivist of the Church of Rome and also briefly an Antipope. Family and education He was a nephew of Bishop Arsenius of Orte, who executed important commissions as Papal legate. Anastasius learned the Greek language from Eastern Roman monks and obtained an unusual education for his era, such that he appears to be the most learned ecclesiastic of Rome in the barbaric period of the 9th century. Abbot of Santa Maria and secretary of Nicholas I During the pontificate of Pope Nicholas I (858–867) Anastasius was abbot of Santa Maria in Trastevere on the farther side of the Tiber.
Murder in virtual reality should be illegal You start by picking up the knife, or reaching for the neck of a broken-off bottle. Then comes the lunge and wrestle, the physical strain as your victim fights back, the desire to overpower him. You feel the density of his body against yours, the warmth of his blood. Now the victim is looking up at you, making eye contact in his final moments. Science-fiction writers have fantasised about virtual reality (VR) for decades.
Automotive industry in China The automotive industry in China has been the largest in the world measured by automobile unit production since 2008. Since 2009 annual production of automobiles in China exceeds that of the European Union or that of the United States and Japan combined. Of the automobiles produced, 44.3% were local brands (including BYD, Dongfeng Motor, FAW Group, SAIC Motor, Lifan, Chang'an (Chana), Geely, Chery, Hafei, Jianghuai (JAC), Great Wall and Roewe), and the rest were produced by joint ventures with foreign car makers such as Volkswagen, General Motors, Hyundai, Nissan, Honda, Toyota, Mitsubishi etc. While most of the cars manufactured in China are sold within China, exports reached 814,300 units in 2011. China's home market provides its automakers a solid base and Chinese economic planners hope to build globally competitive auto companies. The main industry group for the Chinese automotive industry is the China Association of Automobile Manufacturers (中国汽车工业协会). History
Secret US cybersecurity report: encryption vital to protect private data A secret US cybersecurity report warned that government and private computers were being left vulnerable to online attacks from Russia, China and criminal gangs because encryption technologies were not being implemented fast enough. The advice, in a newly uncovered five-year forecast written in 2009, contrasts with the pledge made by David Cameron this week to crack down on encryption use by technology companies. In the wake of the Paris terror attacks, the prime minister said there should be no “safe spaces for terrorists to communicate” or that British authorites could not access.