Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

BBC and FACT Shut Down Doctor Who Fansite

timothy posted 7 minutes ago | from the you're-gonna-need-a-bigger-tardis dept.

Sci-Fi 1

An anonymous reader writes with this report from Torrentfreak, excerpting: In just a few hours time the brand new season of Doctor Who will premiere, kicking off with the first episode 'Deep Breath'. There's been a huge build up in the media, but for fans who prefer to socialize and obtain news via a dedicated community, today brings bad news. Doctor Who Media (DWM) was a site created in 2010 and during the ensuing four and a half years it amassed around 25,000 dedicated members. A source close to the site told TF that since nothing like it existed officially, DWM's core focus was to provide a central location and community for everything in the 'Whoniverse,' from reconstructions of missing episodes to the latest episodes, and whatever lay between. But yesterday, following a visit by representatives from the BBC and Federation Against Copyright Theft, the site's operator took the decision to shut down the site for good.

Google Announces a New Processor For Project Ara

timothy posted 1 hour ago | from the starting-from-not-quite-scratch dept.

Cellphones 10

rtoz writes Google has just announced a new processor for Project Ara. The mobile Rockchip SoC will function as an applications processor, without requiring a bridge chip. A prototype of the phone with the Rockchip CPU, will be available early next year. Via Google+ post, Project Ara team Head Paul Eremenko says "We view this Rockchip processor as a trailblazer for our vision of a modular architecture where the processor is a node on a network with a single, universal interface -- free from also serving as the network hub for all of the mobile device's peripherals." (Project Ara is Google's effort to create an extensible, modular cellphone; last month we mentioned a custom version of Linux being developed for the project, too.)

2 Galileo Satellites Launched To Wrong Orbit

timothy posted 1 hour ago | from the conspiracy-theory dept.

Space 43

As reported by the BBC, two satellites meant to form part of the EU's Galileo global positioning network have been launched into a wrong, lower orbit, and it is unclear whether they can be salvaged. NASASpaceFlight.com has a more detailed account of the launch, which says [D]espite the Arianespace webcast noting no issue with the launch, it was later admitted the satellites were lofted into the wrong orbit. “Following the announcement made by Arianespace on the anomalies of the orbit injection of the Galileo satellites, the teams of industries and agencies involved in the early operations of the satellites are investigating the potential implications on the mission,” noted a short statement, many hours after the event. It is unlikely the satellites can be eased into their correct orbit, even with a large extension to their transit time. However, ESA are not classing the satellites as lost at this time. “Both satellites have been acquired and are safely controlled and operated from ESOC, ESA’s Operations Centre in Darmstadt, Germany,” the Agency added. Over the course of the next "year or so," an additional 24 satellites are slated to complete the Galileo constellation, to be launched by a mixed slate of Ariane and Soyuz rockets.

Anomaly Triggers Self-Destruct For SpaceX Falcon 9 Test Flight

timothy posted 3 hours ago | from the fly-up-go-boom dept.

Transportation 49

SpaceMika (867804) writes "A SpaceX test flight at the McGregor test facility ended explosively on Friday afternoon. A test flight of a three-engine Falcon 9 Dev1 reusable rocket ended in a rapid unscheduled disassembly after an unspecified anomaly triggered the Flight Termination System, destroying the rocket. No injuries were reported." Update: 08/23 13:33 GMT by T : Space.com has video.

Securing Networks In the Internet of Things Era

timothy posted 5 hours ago | from the glad-that-someone-finally-invented-things dept.

Communications 51

An anonymous reader writes "Gartner reckons that the number of connected devices will hit 26 billion by 2020, almost 30 times the number of devices connected to the IoT in 2009. This estimate doesn't even include connected PCs, tablets and smartphones. The IoT will represent the biggest change to our relationship with the Internet since its inception. Many IoT devices themselves suffer from security limitations as a result of their minimal computing capabilities. For instance, the majority don't support sufficiently robust mechanisms for authentication, leaving network admins with only weak alternatives or sometimes no alternatives at all. As a result, it can be difficult for organizations to provide secure network access for certain IoT devices."

New EU Rules Will Limit Vacuum Cleaners To 1600W

timothy posted 8 hours ago | from the sucking-power-defined dept.

EU 165

AmiMoJo writes "New EU rules are limiting vacuum cleaner motors to 1600W from 2014/09/01. The EU summary of the new rules explains that consumers currently equate watts with cleaning power, which is not the case. Manufacturers will be required to put ratings on packaging, including energy efficiency, cleaning efficiency on hard and carpeted floors, and dust emissions from the exhaust. In the EU vacuum cleaners use more energy than the whole of Denmark, and produce more emissions than dishwashers and washing machines."

Virtual Machine Brings X86 Linux Apps To ARMv7 Devices

timothy posted 11 hours ago | from the ever-widening-abstraction-layers dept.

Android 45

DeviceGuru writes Eltechs announced a virtual machine that runs 32-bit x86 Linux applications on ARMv7 hardware. The ExaGear VM implements a virtual x86 Linux container on ARMv7 computers and is claimed to be 4.5 times faster than QEMU, according to Eltechs. The VM is based on binary translation technology and requires ARMv7, which means it should run on mini-PCs and SBCs based on Cortex-A8, A7, A9, and A15 processors — but sadly, it won't run on the ARM11 (ARMv6) SoC found on the Raspberry Pi. It also does not support applications that require kernel modules. It currently requires Ubuntu (v12.04 or higher), but will soon support another, unnamed Linux distro, according to Eltechs, which is now accepting half price pre-orders without payment obligation.

"MythBusters" Drops Kari Byron, Grant Imahara, Tory Belleci

timothy posted yesterday | from the small-team dept.

Television 238

rbrandis (735555) writes In a video announcement Thursday on Discovery Channel, MythBusters hosts Adam Savage and Jamie Hyneman revealed that longtime co-hosts and fan favorites Kari Byron, Grant Imahara, and Tory Belleci are no longer on the show. "This next season we're going back to our origins with just Adam and me," Hyneman said in the video, which explained that the change took hold as of the season's last episode on August 21. (Our interview with the original-and-remaining Mythbusters is one of my favorites.)

Google Wants To Test Driverless Cars In a Simulation

timothy posted yesterday | from the do-you-want-to-be-a-virtual-pedestrian? dept.

Google 150

An anonymous reader writes Google has been testing its autonomous vehicles on U.S. roads for a while now. In fact, they're required to, by law. "California's regulations stipulate autonomous vehicles must be tested under "controlled conditions" that mimic real-world driving as closely as possible. Usually, that has meant a private test track or temporarily closed public road." It's easy enough to test a few prototypes, but whenever autonomous cars start being produced by manufacturers, it'll become a lot more complicated. Now, Google is lobbying to change that law to allow testing via computer simulation. Safety director Ron Medford said, "Computer simulations are actually more valuable, as they allow manufacturers to test their software under far more conditions and stresses than could possibly be achieved on a test track." Google spokeswoman Katelin Jabbari said, "In a few hours, we can test thousands upon thousands of scenarios which in terms of driving all over again might take decades." Shee adds that simulator data can also easily provide information on how human behavior creeps into driving. "It's not just about the physics of avoiding a crash. It's also about the emotional expectation of passengers and other drivers." For example, when one of Google's computer-controlled cars is cut off, the software brakes harder than it needs to, because this makes the passengers feel safer. Critics say relying heavily on simulation data is flawed because it doesn't take into account how other cars react to the computer's driving.

Illinois University Restricts Access To Social Media, Online Political Content

timothy posted yesterday | from the teach-the-controversy dept.

Censorship 99

onproton writes Northern Illinois University recently began restricting student access to web pages that contain "illegal or unethical" content which, according to University policy, includes resources used for "political activities...and the organization or participation in meetings, rallies and demonstrations." A student raised concerns after attempting to access the Wikipedia page for Westboro Baptist Church, and receiving a filter message informing him that his access of this page would likely violate the University's Acceptable Use Policy, along with a warning that "all violations would be reviewed." This has lead to questions about whether some policies that restrict student access to information are in the best interest of the primary goal of education.

Ask Slashdot: Where Can I Find Good Replacement Batteries?

Soulskill posted yesterday | from the they're-a-myth dept.

Power 109

An anonymous reader writes: I have an old phone with a battery that barely works anymore. My current phone's battery is mediocre — I can put up with it, but I've been thinking about getting a new one. My four-year-old ThinkPad holds less of a charge than I'd like, and less than it did when I bought it. In all these cases, the only thing holding me back from buying a new battery is that I'm not sure where to find a good one. Searching for my phone's battery on Amazon (or any major online retailer) yields a dozen results, all fairly cheap. But which are reliable? They all seem to have varying reviews, ranging from "Perfect official factory replacement!" to "Garbage knock-off, worse than the battery I replaced." Part numbers don't seem to help, as the knock-offs replicate those pretty well. I ask you, Slashdot: where can I find a good replacement battery?

Finding an ISIS Training Camp Using Google Earth

Soulskill posted yesterday | from the bet-you-wished-you'd-stuck-to-word-of-mouth dept.

Google 104

An anonymous reader writes: Terrorist organization ISIS has been in the news a lot lately for their hostile activities in Iraq and Syria. They've also been very active online, posting propaganda and photos on various social networking sites to try to recruit more members. Frequently, they'll have pictures of themselves in nondescript locations — but even carefully selected images give clues to a real location. Citizen journalists at Bellingcat analyzed a group of these photos, comparing buildings and bridges in the background to images from Google Earth. With very little to go on, they were able to pinpoint the location of a terrorist training camp.

Researchers Hack Gmail With 92 Percent Success Rate

Soulskill posted yesterday | from the good-enough-for-an-A dept.

Android 81

SternisheFan sends this report from CNET: Researchers at the University of California Riverside Bourns College of Engineering and the University of Michigan have identified a weakness they believe to exist across Android, Windows, and iOS operating systems that could allow malicious apps to obtain personal information. Although it was tested only on an Android phone, the team believes that the method could be used across all three operating systems because all three share a similar feature: all apps can access a mobile device's shared memory. "The assumption has always been that these apps can't interfere with each other easily," said Zhiyun Qian, an associate professor at UC Riverside. "We show that assumption is not correct and one app can in fact significantly impact another and result in harmful consequences for the user." To demonstrate the method of attack, first a user must download an app that appears benign, such as a wallpaper, but actually contains malicious code. Once installed, the researchers can use it to access the shared memory statistics of any process (PDF), which doesn't require any special privileges.

A Better Way To Make Mind-Controlled Prosthetic Limbs

Soulskill posted yesterday | from the resistance-is-futile dept.

Biotech 25

the_newsbeagle writes: To make a brain-machine interface, you need a way to capture neurons' electric signals. The most precise and most invasive way uses implants that are stuck in the gray matter. The least precise and least invasive way uses EEG sensors stuck to the scalp. But researchers at Johns Hopkins University say there's a third way that gets the best of both worlds, which is not too invasive and fairly precise. They use ECoG systems, in which a mesh of electrodes is placed under the skull, draped over the surface of the cortex.

They're testing their systems on epilepsy patients, who have these ECoG systems inserted anyway while they're waiting for surgery (the electrodes record the source of their seizures). The researchers are capturing these patients' movement commands from their brains, and using them to control robotic limbs. Someday such a system could be used by amputees to control their prosthetic limbs.

When Customer Dissatisfaction Is a Tech Business Model

Soulskill posted yesterday | from the friendly-until-they-have-your-money dept.

Businesses 223

jammag writes: A new trend has emerged where tech companies have realized that abusing users pays big. Examples include the highly publicized Comcast harassing service call, Facebook "experiments," Twitter timeline tinkering, rude Korean telecoms — tech is an area where the term "customer service" has an Orwellian slant. Isn't it time customer starting fleeing abusive tech outfits?

Apple CarPlay Rollout Delayed By Some Carmakers

Soulskill posted yesterday | from the methods-to-increase-auto-accidents dept.

Android 66

Lucas123 writes: Some car makers are delaying the implementation of Apple's CarPlay iPhone interface for vehicle infotainment systems. The delays, which are prompting manufacturers such as Mercedes, Volvo and Honda to push their announcement from 2014 to 2015, appear to be related to a few snags in the integration process or in choosing which model cars should have the middleware. At the same time, many of the automakers rolling out CarPlay are also implementing Android Auto, which will provide a vehicle head unit user interface for Android smartphones. Analysts believe the addition of Android Auto earlier this year may also be causing delays because manufacturers want to be able to announce availability of both platforms in their new model vehicles.

A Movie of Triton Made From Voyager 2's Fly-by 25 Years Ago

Soulskill posted yesterday | from the pretty-pictures dept.

Media 33

schwit1 writes: Using restored images taken by Voyager 2 when it flew past Neptune's moon Triton 25 years ago, scientists have produced a new map and flyby movie of the moon. "The new Triton map has a resolution of 1,970 feet (600 meters) per pixel. The colors have been enhanced to bring out contrast but are a close approximation to Triton's natural colors. Voyager's "eyes" saw in colors slightly different from human eyes, and this map was produced using orange, green and blue filter images. ... Although Triton is a moon of a planet and Pluto is a dwarf planet, Triton serves as a preview of sorts for the upcoming Pluto encounter. Although both bodies originated in the outer solar system, Triton was captured by Neptune and has undergone a radically different thermal history than Pluto. Tidal heating has likely melted the interior of Triton, producing the volcanoes, fractures and other geological features that Voyager saw on that bitterly cold, icy surface. Pluto is unlikely to be a copy of Triton, but some of the same types of features may be present." Dr. Paul Schenk provides provides further information on his blog, and the movie can be viewed here.

Students From States With Faster Internet Tend To Have Higher Test Scores

Soulskill posted yesterday | from the in-before-correlation-!=-causation dept.

The Internet 170

An anonymous reader sends word of correlation found between higher internet speeds and higher test scores. Quoting: The numbers—first crunched by the Internet provider comparison site HSI — show a distinct trend between faster Internet and higher ACT test scores. On the high end, Massachusetts scores big with an average Internet speed of 13.1Mbps, and an average ACT test score of 24.1. Mississippi, on the other hand, has an average speed of just 7.6Mbps and an average score of 18.9.

In between those two states, the other 48 fall in a positive correlation that, while not perfect, is quite undeniable. According to HSI's Edwin Ivanauskas, the correlation is stronger than that between household income and test scores, which have long been considered to be firmly connected to each other. The ACT scores were gathered from ACT.org, which has the official rankings and averages for the 2013 test, and the speed ratings were taken from Internet analytics firm Akamai's latest report.

What's After Big Data?

Soulskill posted yesterday | from the i'm-sure-the-marketroids-have-something-in-mind dept.

Businesses 81

gthuang88 writes: As the marketing hype around "big data" subsides, a recent wave of startups is solving a new class of data-related problems and showing where the field is headed. Niche analytics companies like RStudio, Vast, and FarmLink are trying to provide insights for specific industries such as finance, real estate, and agriculture. Data-wrangling software from startups like Tamr and Trifacta is targeting enterprises looking to find and prep corporate data. And heavily funded startups such as Actifio and DataGravity are trying to make data-storage systems smarter. Together, these efforts highlight where emerging data technologies might actually be used in the business world.

Researchers Made a Fake Social Network To Infiltrate China's Internet Censors

Soulskill posted yesterday | from the inside-job dept.

Censorship 48

Jason Koebler writes: In order to get inside China's notorious internet filter, Harvard researcher Gary King created his own fake social network to gain access to the programs used to censor content, so he could reverse-engineer the system. "From inside China, we created our own social media website, purchased a URL, rented server space, contracted with one of the most popular software platforms in China used to create these sites, submitted, automatically reviewed, posted, and censored our own submissions," King wrote in a study published in Science. "We had complete access to the software; we were even able to get their recommendations on how to conduct censorship on our own site in compliance with government standards."

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>