They only wanted to show their disapproval. Friends eager to counterbalance all those Facebook “Likes” rushed to “Download the official DISLIKE button now” as received in a message. But, sadly, no dislike button was in store. Instead, installing the application provided users with several surveys and left their profiles vulnerable to spammer control. If there was ever a time to unleash their Dislike, this was it.
Yet, as Graham Cluley of the security firm Sophos told the BBC–mentioning a similar ploy that offered Facebookers the chance to see an anaconda vomiting up a hippo–such “survey scam” applications are nothing new:
“Anyone can write a Facebook app–these scams are constantly springing up.”
Perhaps Facebook should take note: Users were willing to sacrifice their security for the mere power to express negative feedback. Or, at least, the mere power to express negative feedback without typing.
Perhaps a compromise is in order? Unfortunately, a new Meh button application seems to need some tweaking. As in the Atlantic Wire:
Turns out, every time you click the “meh” button it registers your vote—allowing an individual user to “meh” something 10,000 times or more. That’s a lot of indifference.
Related Content:
Discoblog: Teen Sues Mom for Hacking His Facebook Account
Discoblog: Bulgarian Politician Punished for Playing Farmville During Budget Meetings
Discoblog: Are Happy Facebook Pics Proof That You Aren’t Depressed?
Discoblog: Desperate For Facebook Friends? Buy Some!
Discoblog: Computer Program Can “Out” Gay Facebook Users
Image: Facebook

In early 2010, some scientists offered their predictions for the new decade which this blog covered in the post, “

Though the smudge alone can’t confirm the exact passcode, the study’s authors hint that it may help an attacker rule out possibilities. In the paper, the authors describe the three by three number grid of “contact points” that some earlier Android phones employed for entering passcodes. The team assumed three limitations on smudge patterns using this grid: it must have four or more contact points; it cannot use any contact point more than once; and if there is any contact point between two others on a smudge trail, then it must also be a contact point. They calculate that using just the last of these restrictions, an attacker could reduce the number of possible patterns from 1 million to 389,112 patterns–a way to reduce a phone lockout during hacking.
Cadavers and mummies as therapeutic means
This morning, astronauts at the 

To the left you see a map of the distribution of languages and language families in Europe. Language is arguably the most salient cultural feature of our species, as well as one of the most obviously 
There are two parallel threads throughout Ostler’s narrative: description and prediction. The latter is not prediction as a physicist would predict, rather, it is as a historical scientist might. Taking the data and producing models which can plausibly explain the phenomena we describe. Let’s take a look at the top 20 languages in the world. It seems that there are two primary ways that the speakers of a language can become numerous: rice & empire. Such a generalization is a bit glib, as many Mandarin speakers do not live by the “rice bowl,” but the big picture is that some languages gained adherents through “brute force,” pushing inexorably against the Malthusian possibilities of primary production and reproduction and assimilating smaller groups on the wave of advance of the speakers. The Asian languages on this list fall into that category. In contrast, you have the languages which spread with empire, exploration, and colonialism. English and Spanish are the exemplars of this class. Of the hundreds of millions of English and Spanish speakers a majority can not be accounted for simply by demographic expansion of the home countries. Rather, these languages colonized new lands, and acquired new speakers, rather rapidly over the past 500 years. Turkish is almost certainly in this category, though the transition from Greek, Armenian and Kurdish speech in Anatolia is less clearly understood because of thinner textual records of the process.






"NASA's first Information Technology (IT) Summit will bring together government and industry leaders to explore the outer reaches of information technology. The summit, which takes place August 16-18 at the Gaylord National Harbor in Maryland, will gather 750 participants and more than 100 expert presenters with themes on collaboration, social networking, innovation, infrastructure, operations and IT security and privacy."
Keith's note: So far the meeting has gone well. The event was very well organized and ran like clockwork. That said, some curious things emerged rather quickly as I observed the sessions and the audience. First of all, the 1,190 registered attendees are overwhelmingly white males aged 40-60. Second, although half of the audience was, at any given time, fiddling with their cellphones (and a few with laptops), only a dozen or so attendees were actually Twittering from/about the meeting. Given the discussion about future trends, social media, and new populations of stakeholders (audiences) this was rather troubling. 
