Forgot your password?
typodupeerror

Follow Slashdot stories on Twitter

Open Source

An Open Source Pitfall? Mozilla Labs Closed, Quietly 2

Posted by timothy
from the same-people-are-still-smart dept.
mikejuk writes with this excerpt: When Google Labs closed there was an outcry. How could an organization just pull the rug from under so many projects? At least Google announced what it was doing. Mozilla, it seems since there is no official record, just quietly tiptoes away — leaving the lights on since the Mozilla Labs Website is still accessible. It is accessible but when you start to explore the website you notice it is moribund with the last blog post being December 2013 with the penultimate one being September 2013.
The fact that it is gone is confirmed by recent blog posts and by the redeployment of the people who used to run it. The projects that survived have been moved to their own websites. It isn't clear what has happened to the Hatchery -the incubator that invited new ideas from all and sundry.
One of the big advantages of open source is the ease with which a project can be started. One of the big disadvantages of open source is the ease with which projects can be allowed to die — often without any clear cut time of death. It seems Mozilla applies this to groups and initiatives as much as projects. This isn't good.
The same is true at companies that aren't open source centric, though, too, isn't it?
Government

Snowden's Leaks Didn't Help Terrorists 29

Posted by timothy
from the what-they-want-you-to-think dept.
HughPickens.com writes The Interecept reports that contrary to lurid claims made by U.S. officials, a new independent analysis of Edward Snowden's revelations on NSA surveillance that examined the frequency of releases and updates of encryption software by jihadi groups has found no correlation in either measure to Snowden's leaks about the NSA's surveillance techniques. According to the report "well prior to Edward Snowden, online jihadists were already aware that law enforcement and intelligence agencies were attempting to monitor them (PDF)." In fact, concerns about terrorists' use of sophisticated encryption technology predates even 9/11.

Earlier this month former NSA head Michael Hayden stated, "The changed communications practices and patterns of terrorist groups following the Snowden revelations have impacted our ability to track and monitor these groups", while Matthew Olsen of the National Counterterrorism Centre would add "Following the disclosure of the stolen NSA documents, terrorists are changing how they communicate to avoid surveillance." Snowden's critics have previously accused his actions of contributing from everything from the rise of ISIS to Russia's invasion of the Ukraine. "This most recent study is the most comprehensive repudiation of these charges to date," says Murtaza Hussain. "Contrary to lurid claims to the contrary, the facts demonstrate that terrorist organizations have not benefited from the NSA revelations, nor have they substantially altered their behavior in response to them."
China

US Military Aware Only Belatedly of Chinese Attacks Against Transport Contractor 5

Posted by timothy
from the oh-did-that-happen? dept.
itwbennett writes The Senate Armed Service Committee released on Wednesday an unclassified version of a report (PDF) commissioned last year to investigate cyberattacks against contractors for the U.S. Transportation Command (TRANSCOM). The report alleges that the Chinese military successfully stole emails, documents, login credentials and more from contractors, but few of those incidents were ever reported to TRANSCOM. During a one-year period starting in June 2012, TRANSCOM contractors endured more than 50 intrusions, 20 of which were successful in planting malware. TRANSCOM learned of only two of the incidents. The FBI, however, was aware of 10 of the attacks.
Australia

Australian Police Arrest 15, Charge 2, For Alleged Islamic State Beheading Plot 47

Posted by timothy
from the even-in-the-nicest-places dept.
The Washington Post reports (building on a short AP report they're also carrying) that "[Australian] police have arrested 15 people allegedly linked to the Islamic State, some who plotted a public beheading." According to the Sydney Morning Herald, of the arrestees, only two have been charged. From the Washington Post story: “Police said the planned attack was to be “random.” The killers were to behead a victim and then drape the body in the black Islamic State flag, according to the Sydney Morning Herald. ... Direct exhortations were coming from an Australian who is apparently quite senior in [the Islamic State] to networks of support back in Australia to conduct demonstration killings here in this country,” Australian Prime Minister Tony Abbott said at a press conference, as the BBC reported. “So this is not just suspicion, this is intent and that’s why the police and security agencies decided to act in the way they have.”
Crime

London's Crime Hot Spots Predicted Using Mobile Phone Data 36

Posted by timothy
from the gotta-get-my-car-out-of-this-bad-area dept.
KentuckyFC (1144503) writes A growing number of police forces around the world are using data on past crimes to predict the likelihood of crimes in the future. These predictions can be made more accurate by combining crime data with local demographic data about the local population. However, this data is time consuming and expensive to collect and so only updated rarely. Now a team of data experts have shown how combing crime data with data collected from mobile phones can make the prediction of future crimes even more accurate. The team used an anonymised dataset of O2 mobile phone users in the London metropolitan area during December 2012 and January 2013. They then used a small portion of the data to train a machine learning algorithm to find correlations between this and local crime statistics in the same period. Finally, they used the trained algorithm to predict future crime rates in the same areas. Without the mobile phone data, the predictions have an accuracy of 62 per cent. But the phone data increases this accuracy significantly to almost 70 per cent. What's more, the data is cheap to collect and can be gathered in more or less real time. Whether the general population would want their data used in this way is less clear but either way Minority Report-style policing is looking less far-fetched than when the film appeared in 2002.
Medicine

Study Finds Link Between Artificial Sweeteners and Glucose Intolerance 104

Posted by timothy
from the tastes-sweet-produce-insulin dept.
onproton (3434437) writes The journal Nature released a study today that reveals a link between the consumption of artificial sweeteners and the development of glucose intolerance [note: abstract online; paper itself is paywalled], a leading risk factor for the development of type 2 diabetes, citing a critical alteration of intestinal bacteria. Paradoxically, these non-caloric sweeteners, which can be up to 20,000 times sweeter than natural sugars, are often recommended to diabetes patients to control blood glucose levels. Sugar substitutes have come under additional fire lately from studies showing that eating artificially sweetened foods can lead to greater overall calorie consumption and even weight gain. While some, especially food industry officials, remain highly skeptical of such studies, more research still needs to be done to determine the actual risks these substances may pose to health.
United States

FCC Chairman: Americans Shouldn't Subsidize Internet Service Under 10Mbps 154

Posted by samzenpus
from the reasonable-speed dept.
An anonymous reader writes On Wednesday at a hearing in front of the US House Committee on Small Business, FCC Chairman Tom Wheeler stated that for ISPs to be eligible for government broadband subsidies, they would have to deliver speeds of at least 10 Mbps. Said Wheeler: "What we are saying is we can't make the mistake of spending the people's money, which is what Universal Service is, to continue to subsidize something that's subpar." He further indicated that he would remedy the situation by the end of 2014. The broadband subsidies are collected through bill surcharges paid for by phone customers.
NASA

NASA Inspector General Lobs Big Rocks At Agency's Asteroid Hunting Program 23

Posted by samzenpus
from the money-spent dept.
coondoggie writes Lack of money, management structure and staff are hampering NASA's ability to effectively identify and track comets, meteorites and asteroids that might threaten Earth. The space agency's Inspector General, Paul Martin, issued a scathing report this week that said while NASA's Near Earth Object program has done substantial work in identifying the sometimes massive rocks hurtling around the planet it is substantially behind in its goal of cataloging 90% of those 140 meters in diameter by 2020, among other issues.
Iphone

Apple Locks iPhone 6/6+ NFC To Apple Pay Only 211

Posted by samzenpus
from the pay-our-way dept.
Ronin Developer writes From the Cnet article: "At last week's Apple event, the company announced Apple Pay — a new mobile payments service that utilizes NFC technology in conjunction with its Touch ID fingerprint scanner for secure payments that can be made from the iPhone 6, iPhone 6 Plus or Apple Watch. Apple also announced a number of retailers that would accept Apple Pay for mobile payments at launch. However, Cult of Mac reports that NFC will be locked to the Apple Pay platform, meaning the technology will not be available for other uses. An Apple spokesperson confirmed the lock down of the technology, saying developers would be restricted from utilizing its NFC chip functionality for at least a year. Apple declined to comment on whether NFC capability would remain off limits beyond that period." So, it would appear, for at least a year, that Apple doesn't want competing mobile payment options to be available on the newly released iPhone 6 and 6+. While it's understandable that they want to promote their payment scheme and achieve a critical mass for Apple Pay, it's a strategy that may very well backfire as other other mobile payment vendors gain strength on competing platforms.
Communications

Scientists Twist Radio Beams To Send Data At 32 Gigabits Per Second 97

Posted by samzenpus
from the greased-lightning dept.
concertina226 writes Scientists from three international universities have succeeded in twisting radio beams in order to transfer data at the speed of 32 gigabits per second, which is 30 times faster than 4G LTE wireless technology in use today. The researchers, led by Alan Willner, an electrical engineering professor with the University of Southern California Viterbi School of Engineering, successfully demonstrated data transmission rates of 32 gigabits per second across 2.5m of free space in a basement laboratory.
Security

Tinba Trojan Targets Major US Banks 49

Posted by samzenpus
from the protect-ya-neck dept.
An anonymous reader writes Tinba, the tiny (20 KB) banking malware with man-in-the-browser and network traffic sniffing capabilities, is back. After initially being made to target users of a small number of banks, that list has been amplified and now includes 26 financial institutions mostly in the US and Canada, but some in Australia and Europe as well. Tinba has been modified over the years, in an attempt to bypass new security protections set up by banks, and its source code has been leaked on underground forums a few months ago. In this new campaign, the Trojan gets delivered to users via the Rig exploit kit, which uses Flash and Silverlight exploits. The victims get saddled with the malware when they unknowingly visit a website hosting the exploit kit."
IT

Ask Slashdot: Remote Support For Disconnected, Computer-Illiterate Relatives 289

Posted by samzenpus
from the help-me-please dept.
An anonymous reader writes I use email to communicate with my folks overseas. Their ISP only allows dial-up access to their email account (there is no option of changing ISP), that can receive messages no larger than 1MB nor hold more than 15MB (no hope of changing that either). They are computer-illiterate, click on everything they receive, and take delight on sending their information to any Nigerian prince that contacts them, "just in case this one is true". Needless to say, their PC is always full of viruses and spyware. In my next yearly visit, instead of just cleaning it up, I'd like to gift them with some "hardened" PC to use for email only that would hopefully last the year before someone has to fix it. So far, these are the things I have in mind:
  • Some kind of linux distro, or maybe even mac. Most viruses over there are windows only and propagate via Autorun.inf or by email attachments, not having Windows could prevent both.
  • Some desktop environment that hides anything unrelated to connecting to the net and accessing their account (dial-up software, email client, web browser, exchanging files between their hard disk/email attachments and USB drives). By "hide", I just want the rest to be out of the way, but not entirely removed, so that if necessary, I can guide them over the phone. For this, Ubuntu's Unity seems like a particularly bad solution, but a Gnome desktop with non-removable desktop shortcuts (is this possible?) for the file manager, browser, email client and dial-up program could work. An android system is unlikely to work (they have no wifi, and they were utterly confused with Android's UI).
  • This could be a life saver: some kind of extension to the email client that executes commands on specially formatted emails (e.g., signed with my private key), so that I can do some basic diagnostics or install extra software if I have to. This las point is important: they currently rely on acquaintances who may not be competent (they can't evaluate that) if something happens between my visits. They, most likely, wont know how to deal with anything non-windows, so all tech support would fall on me. (This is the reason I haven't moved them from windows yet.)
  • Another very useful extension would be something to automatically re-assemble attachments split into several emails, to overcome the 1MB message limit.

Does any of that exist? If I have to build that system myself (or parts of it), do you have other suggestions? For the inevitable and completely reasonable suggestion of getting someone competent for tech support: I've tried that too. The competent ones don't last beyond the third visit.

The Almighty Buck

Airbnb To Start Collecting Hotel Tax On Rentals In San Francisco 61

Posted by samzenpus
from the paying-the-price dept.
An anonymous reader writes Airbnb announced that it will begin collecting a 14% occupancy tax on behalf of its San Francisco hosts October 1. "This is the culmination of a long process that began earlier this year when we announced our intent to help collect and remit occupancy taxes in San Francisco," wrote Airbnb public policy leader David Owen. The company already collects taxes in Portland, and has discussed the possibility of collecting taxes in New York.
Space

ULA and Jeff Bezos' Blue Origin Announce Rocket Engine Partnership 18

Posted by samzenpus
from the working-together dept.
An anonymous reader writes During an event at the National Press Club, Bezos announced an agreement with Blue Origin and United Launch Alliance, the joint venture of Boeing and Lockheed Martin, to continue development of a new rocket engine for ULA's Atlas and Delta rocket lines. From the article: "Called BE-4, the engine has been in the works at Blue Origin for three years and is currently in testing at the company's West Texas facilities. ULA, founded in 2006, has supplied rockets to the US Department of Defense and NASA and will now co-fund the BE-4 project to accelerate its completion. The agreement is for a four-year development process with testing slated for 2016 and flight in 2019."

"Pull the trigger and you're garbage." -- Lady Blue

Working...