High WSJ: Court to Hear Microsoft Appeal in Patent Case
High Court to Hear Microsoft Appeal in Patent Case Read more: http://online.wsj.com/article/SB10001424052748704584804575644633158363078.html#ixzz16kA350cO
High Court to Hear Microsoft Appeal in Patent Case Read more: http://online.wsj.com/article/SB10001424052748704584804575644633158363078.html#ixzz16kA350cO
Android Froyo based ROM for the HTC EVO 4G by Hero_Over.
Note: I don’t have time to complete this posting right now, so it’s in a draft format. I just wanted to briefly document my findings before I forget. Back to studying for the Patent Bar… I finally pony up the Benjamins and got myself an Android handset, wait for it – the Sprint HTC EVO 4G! You may not share my enthusiasm, but finally ditching my HTC Mogul (running WinMo 6.1) and moving into an even more open platform opens…
German researcher Karsten Nohl has cracked the encryption used for GSM. His team has made information and tools needed to replicate the attack with a somewhat modest set up. The A5/1’s 64-bit encryption key used in GSM is simply too short for the kind of computing power widely available today. Considering that the technology is over 20 years old, however, it’s robustness is still remarkable. Here’s the A5/1 Cracking Project’s website.
An interesting report by CNET News. How do you define evil? I suppose one way to not do evil is to write the code so that it consumes less resources, either in terms of CPU cycles or memory (or both if you can!), thus reducing the power dissipated in millions or billions of CMOS Flip-Flops. Just think about the implications of wasted charges/discharges and unnecessarily-spent batteries. Wait, maybe I’m getting off topic…
This course will introduce basic concepts needed to understand, design, and implement wireless distributed embedded systems. Topics include: a) design implications of energy, and otherwise resource-constrained nodes; b) network self-configuration and adaptation; c) data routing and transport; c) applications; and e) software design issues. The course will be heavily project based. Working knowledge of C programming in the UNIX environment (particularly GNU/Linux) is assumed.
The Department of Defense CIO office has released a new guideline which is aimed at easing open source software adoption. Department of Defense CIO David Wennergren’s revised guidance (PDF)