Posts Tagged ‘vector’

Vector Vengeance: British Claim They Can Kill the Pixel Within Five Years

December 12th, 2012 12:24 admin View Comments


MrSeb writes “The humble pixel — the 2D picture element that has formed the foundation of just about every kind of digital media for the last 50 years — may soon meet its maker. Believe it or not, if a team of British are to be believed, the pixel, within five short years, will be replaced with vectors. If you know about computer graphics, or if you’ve ever edited or drawn an image on your computer, you know that there are two primary ways of storing image data: As a bitmap, or as vectors. A bitmap is quite simply a giant grid of pixels, with the arrangement and color of the pixels dictating what the image looks like. Vectors are an entirely different beast: In vector graphics, the image is described as a series of mathematical equations. To draw a bitmap shape you just color in a block of pixels; with vector graphics, you would describe the shape in terms of height, width, radius, and so on. At the moment, bitmaps are used almost exclusively in the realm of digital media — but that isn’t to say they don’t have their flaws. As display (and camera and cinema) resolution increases, so does the number of pixels. The obvious problem with this is that larger bitmaps are computationally more expensive to process, resulting in a slower (or more expensive) workflow. Pixel bitmaps don’t scale very gracefully; reduction is okay, but enlargement is a no-no. There is always the issue of a master format, too: With pixel bitmaps, conversions from one format to another, or changing frame rates, is messy, lossy business. Which finally leads us back to the innovation at hand: Philip Willis and John Patterson of the University of Bath in England have devised a video codec that replaces pixel bitmaps with vectors (PDF).”

Source: Vector Vengeance: British Claim They Can Kill the Pixel Within Five Years

OCZ Launches Vector Indilinx Barefoot 3 SSD, First All In-House Design

November 28th, 2012 11:41 admin View Comments

Data Storage

MojoKid writes “Not many SSD controller manufacturers have been able to compete with the likes of SandForce and the myriad of SATA drives from various OEMs on the market that are based on their technology. However, OCZ took a different approach recently when they acquired SSD controller manufacturer Indilinx and PCI Express Switch maker PLX. Today the company took the wraps of their new Vector line of SSDs. The Vector is the first drive from OCZ to utilize only technologies developed by the unified Indilinx, PLX, and OCZ teams (except for the actual NAND flash), since the acquisitions. The Vector is based on the new INDILINK Barefoot 3 controller, which in terms of its features and specifications, looks competitive with some of the fastest drives on the market currently. In the benchmarks, the drive’s IOMeter and CrystalDiskMark scores line up well and OCZ is offering a 5 year warranty on the product.”

Source: OCZ Launches Vector Indilinx Barefoot 3 SSD, First All In-House Design

Steam Protocol Opens PCs to Remote Code Execution

October 17th, 2012 10:02 admin View Comments


Via the H comes news of a possible remote attack vector using the protocol handler installed by Valve’s Steam platform: “During installation, it registers the steam:// URL protocol which is capable of connecting to game servers and launching games … In the simplest case, an attacker can use this to interfere with the parameters that are submitted to the program. For example, the Source engine’s command line allows users to select a specific log file and add items to it. The ReVuln researchers say that they successfully used this attack vector to infect a system (PDF) via a batch file that they had created in the autostart folder. … In the even more popular Unreal engine, the researchers also found a way to inject and execute arbitrary code. Potential attackers would, of course, first have to establish which games are installed on the target computer. “

Source: Steam Protocol Opens PCs to Remote Code Execution

Poison Attacks Against Machine Learning

July 22nd, 2012 07:33 admin View Comments


mikejuk writes “Support Vector Machines (SVMs) are fairly simple but powerful machine learning systems. They learn from data and are usually trained before being deployed. SVMs are used in security to detect abnormal behavior such as fraud, credit card use anomalies and even to weed out spam. In many cases they need to continue to learn as they do the job and this raised the possibility of feeding it with data that causes it to make bad decisions. Three researchers have recently demonstrated how to do this with the minimum poisoned data to maximum effect. What they discovered is that their method was capable of having a surprisingly large impact on the performance of the SVMs tested. They also point out that it could be possible to direct the induced errors so as to product particular types of error. For example, a spammer could send some poisoned data so as to evade detection for a while. AI based systems may be no more secure than dumb ones.”

Source: Poison Attacks Against Machine Learning

Infographic: ShutterStock Reaches 200 Million Image Downloads

February 7th, 2012 02:32 admin View Comments claims it is the first such venture to reach a total of 200 million downloads of licensed images of stock photography, vector graphics and other illustrations. “Searching the word ‘networking’ used to return images of handshakes and business contacts; now it’s all about online social networking,” says Jon Oringer, Founder and CEO of the company.

Yes, images about cats lead the way, no surprise with over 400,000 downloads, surpassing “only” 79,000 downloads of last year’s Royal Wedding. But what is interesting is that vector graphic downloads are on the increase, and vintage images are also up. Who knew the Internets could be so nostalgic?


Shutterstock has been providing licensed images to businesses, agencies and media organizations since 2004 and has more than 17 million images online.

Disclosure: ReadWriteWeb uses Shutterstock for some of its post illustrations.

Source: Infographic: ShutterStock Reaches 200 Million Image Downloads

Preserving Great Tech For Posterity — the 6502

January 6th, 2011 01:50 admin View Comments

trebonian writes “For great old hardware products like the MOS 6502 (used in the Apple II, the C64, the Nintendo NES), the details of the designs have been lost or forgotten. While there have been great efforts to reverse engineer the 6502 from the outside, there has not been the hardware equivalent of the source code — until now. As Russell Cox states: ‘A team of three people accumulated a bunch of 6502 chips, applied sulfuric acid to them to strip the casing and expose the actual chips, used a high-resolution photomicroscope to scan the chips, applied computer graphics techniques to build a vector representation of the chip, and finally derived from the vector form what amounts to the circuit diagram of the chip: a list of all 3,510 transistors with inputs, outputs, and what they’re connected to. Combining that with a fairly generic (and, as these things go, trivial) “transistor circuit” simulator written in JavaScript and some HTML5 goodness, they created an animated 6502 web page that lets you watch the voltages race around the chip as it executes. For more, see their web site’”

Source: Preserving Great Tech For Posterity — the 6502

Exploits Propagated Via Social Media Increase

September 30th, 2010 09:52 admin View Comments

Orome1 writes “Infection via email, traditionally the most popular vector for spreading malware, has declined in favor of greater use of social media. These include clickjacking attacks using the Facebook “Like” button, fake Web pages positioned on search engines (BlackHat SEO), and zero-day vulnerability exploits. The rise in popularity of smart phones powered by Google’s Android operating system for smart phones has been accompanied by an increase in attacks targeting these devices. A number of different threats have appeared, primarily aimed at racking up phone bills or using the geolocalization function to transmit a user’s position to a third party.”

Source: Exploits Propagated Via Social Media Increase