December 12th, 2012 12:24
writes “The humble pixel — the 2D picture element that has formed the foundation of just about every kind of digital media for the last 50 years — may soon meet its maker. Believe it or not, if a team of British are to be believed, the pixel, within five short years, will be replaced with vectors. If you know about computer graphics, or if you’ve ever edited or drawn an image on your computer, you know that there are two primary ways of storing image data: As a bitmap, or as vectors. A bitmap is quite simply a giant grid of pixels, with the arrangement and color of the pixels dictating what the image looks like. Vectors are an entirely different beast: In vector graphics, the image is described as a series of mathematical equations. To draw a bitmap shape you just color in a block of pixels; with vector graphics, you would describe the shape in terms of height, width, radius, and so on. At the moment, bitmaps are used almost exclusively in the realm of digital media — but that isn’t to say they don’t have their flaws. As display (and camera and cinema) resolution increases, so does the number of pixels. The obvious problem with this is that larger bitmaps are computationally more expensive to process, resulting in a slower (or more expensive) workflow. Pixel bitmaps don’t scale very gracefully; reduction is okay, but enlargement is a no-no. There is always the issue of a master format, too: With pixel bitmaps, conversions from one format to another, or changing frame rates, is messy, lossy business. Which finally leads us back to the innovation at hand: Philip Willis and John Patterson of the University of Bath in England have devised a video codec that replaces pixel bitmaps with vectors (PDF).”
Source: Vector Vengeance: British Claim They Can Kill the Pixel Within Five Years
Categories: slashdot bitmap, England, image, John Patterson, mdash, Philip Willis, picture element, Pixel, source vector, vector, vector graphics, video codec
November 28th, 2012 11:41
writes “Not many SSD controller manufacturers have been able to compete with the likes of SandForce and the myriad of SATA drives from various OEMs on the market that are based on their technology. However, OCZ took a different approach recently when they acquired SSD controller manufacturer Indilinx and PCI Express Switch maker PLX. Today the company took the wraps of their new Vector line of SSDs. The Vector is the first drive from OCZ to utilize only technologies developed by the unified Indilinx, PLX, and OCZ teams (except for the actual NAND flash), since the acquisitions. The Vector is based on the new INDILINK Barefoot 3 controller, which in terms of its features and specifications, looks competitive with some of the fastest drives on the market currently. In the benchmarks, the drive’s IOMeter and CrystalDiskMark scores line up well and OCZ is offering a 5 year warranty on the product.”
Source: OCZ Launches Vector Indilinx Barefoot 3 SSD, First All In-House Design
Via the H comes news of a possible remote attack vector
using the protocol handler installed by Valve’s Steam platform: “During installation, it registers the steam:// URL protocol which is capable of connecting to game servers and launching games … In the simplest case, an attacker can use this to interfere with the parameters that are submitted to the program. For example, the Source engine’s command line allows users to select a specific log file and add items to it. The ReVuln researchers say that they successfully used this attack vector to infect a system (PDF) via a batch file that they had created in the autostart folder. … In the even more popular Unreal engine, the researchers also found a way to inject and execute arbitrary code. Potential attackers would, of course, first have to establish which games are installed on the target computer. “
Source: Steam Protocol Opens PCs to Remote Code Execution
mikejuk writes “Support Vector Machines (SVMs) are fairly simple but powerful machine learning systems. They learn from data and are usually trained before being deployed. SVMs are used in security to detect abnormal behavior such as fraud, credit card use anomalies and even to weed out spam. In many cases they need to continue to learn as they do the job and this raised the possibility of feeding it with data that causes it to make bad decisions. Three researchers have recently demonstrated how to do this with the minimum poisoned data to maximum effect. What they discovered is that their method was capable of having a surprisingly large impact on the performance of the SVMs tested. They also point out that it could be possible to direct the induced errors so as to product particular types of error. For example, a spammer could send some poisoned data so as to evade detection for a while. AI based systems may be no more secure than dumb ones.”
Source: Poison Attacks Against Machine Learning
Shutterstock.com claims it is the first such venture to reach a total of 200 million downloads of licensed images of stock photography, vector graphics and other illustrations. “Searching the word ‘networking’ used to return images of handshakes and business contacts; now it’s all about online social networking,” says Jon Oringer, Founder and CEO of the company.
Yes, images about cats lead the way, no surprise with over 400,000 downloads, surpassing “only” 79,000 downloads of last year’s Royal Wedding. But what is interesting is that vector graphic downloads are on the increase, and vintage images are also up. Who knew the Internets could be so nostalgic?
Shutterstock has been providing licensed images to businesses, agencies and media organizations since 2004 and has more than 17 million images online.
Disclosure: ReadWriteWeb uses Shutterstock for some of its post illustrations.
Source: Infographic: ShutterStock Reaches 200 Million Image Downloads
Categories: readwriteweb com, infographic, Jon Oringer, networking, online, royal wedding, Shutterstock, stock photography, vector, vector graphics, vintage images
Source: Preserving Great Tech For Posterity — the 6502
September 30th, 2010 09:52
Orome1 writes “Infection via email, traditionally the most popular vector for spreading malware, has declined in favor of greater use of social media. These include clickjacking attacks using the Facebook “Like” button, fake Web pages positioned on search engines (BlackHat SEO), and zero-day vulnerability exploits. The rise in popularity of smart phones powered by Google’s Android operating system for smart phones has been accompanied by an increase in attacks targeting these devices. A number of different threats have appeared, primarily aimed at racking up phone bills or using the geolocalization function to transmit a user’s position to a third party.”
Source: Exploits Propagated Via Social Media Increase
Categories: slashdot Email, Facebook, fake web, google, infection, it, malware, Orome, party source, security, Social, vector, worms, zero day