Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

New EU Rules Will Limit Vacuum Cleaners To 1600W

timothy posted 2 hours ago | from the sucking-power-defined dept.

EU 17

AmiMoJo writes "New EU rules are limiting vacuum cleaner motors to 1600W from 2014/09/01. The EU summary of the new rules explains that consumers currently equate watts with cleaning power, which is not the case. Manufacturers will be required to put ratings on packaging, including energy efficiency, cleaning efficiency on hard and carpeted floors, and dust emissions from the exhaust. In the EU vacuum cleaners use more energy than the whole of Denmark, and produce more emissions than dishwashers and washing machines."

Virtual Machine Brings X86 Linux Apps To ARMv7 Devices

timothy posted 5 hours ago | from the ever-widening-abstraction-layers dept.

Android 16

DeviceGuru writes Eltechs announced a virtual machine that runs 32-bit x86 Linux applications on ARMv7 hardware. The ExaGear VM implements a virtual x86 Linux container on ARMv7 computers and is claimed to be 4.5 times faster than QEMU, according to Eltechs. The VM is based on binary translation technology and requires ARMv7, which means it should run on mini-PCs and SBCs based on Cortex-A8, A7, A9, and A15 processors — but sadly, it won't run on the ARM11 (ARMv6) SoC found on the Raspberry Pi. It also does not support applications that require kernel modules. It currently requires Ubuntu (v12.04 or higher), but will soon support another, unnamed Linux distro, according to Eltechs, which is now accepting half price pre-orders without payment obligation.

"MythBusters" Drops Kari Byron, Grant Imahara, Tory Belleci

timothy posted 8 hours ago | from the small-team dept.

Television 185

rbrandis (735555) writes In a video announcement Thursday on Discovery Channel, MythBusters hosts Adam Savage and Jamie Hyneman revealed that longtime co-hosts and fan favorites Kari Byron, Grant Imahara, and Tory Belleci are no longer on the show. "This next season we're going back to our origins with just Adam and me," Hyneman said in the video, which explained that the change took hold as of the season's last episode on August 21. (Our interview with the original-and-remaining Mythbusters is one of my favorites.)

Google Wants To Test Driverless Cars In a Simulation

timothy posted 9 hours ago | from the do-you-want-to-be-a-virtual-pedestrian? dept.

Google 131

An anonymous reader writes Google has been testing its autonomous vehicles on U.S. roads for a while now. In fact, they're required to, by law. "California's regulations stipulate autonomous vehicles must be tested under "controlled conditions" that mimic real-world driving as closely as possible. Usually, that has meant a private test track or temporarily closed public road." It's easy enough to test a few prototypes, but whenever autonomous cars start being produced by manufacturers, it'll become a lot more complicated. Now, Google is lobbying to change that law to allow testing via computer simulation. Safety director Ron Medford said, "Computer simulations are actually more valuable, as they allow manufacturers to test their software under far more conditions and stresses than could possibly be achieved on a test track." Google spokeswoman Katelin Jabbari said, "In a few hours, we can test thousands upon thousands of scenarios which in terms of driving all over again might take decades." Shee adds that simulator data can also easily provide information on how human behavior creeps into driving. "It's not just about the physics of avoiding a crash. It's also about the emotional expectation of passengers and other drivers." For example, when one of Google's computer-controlled cars is cut off, the software brakes harder than it needs to, because this makes the passengers feel safer. Critics say relying heavily on simulation data is flawed because it doesn't take into account how other cars react to the computer's driving.

Illinois University Restricts Access To Social Media, Online Political Content

timothy posted 10 hours ago | from the teach-the-controversy dept.

Censorship 74

onproton writes Northern Illinois University recently began restricting student access to web pages that contain "illegal or unethical" content which, according to University policy, includes resources used for "political activities...and the organization or participation in meetings, rallies and demonstrations." A student raised concerns after attempting to access the Wikipedia page for Westboro Baptist Church, and receiving a filter message informing him that his access of this page would likely violate the University's Acceptable Use Policy, along with a warning that "all violations would be reviewed." This has lead to questions about whether some policies that restrict student access to information are in the best interest of the primary goal of education.

Ask Slashdot: Where Can I Find Good Replacement Batteries?

Soulskill posted 11 hours ago | from the they're-a-myth dept.

Power 92

An anonymous reader writes: I have an old phone with a battery that barely works anymore. My current phone's battery is mediocre — I can put up with it, but I've been thinking about getting a new one. My four-year-old ThinkPad holds less of a charge than I'd like, and less than it did when I bought it. In all these cases, the only thing holding me back from buying a new battery is that I'm not sure where to find a good one. Searching for my phone's battery on Amazon (or any major online retailer) yields a dozen results, all fairly cheap. But which are reliable? They all seem to have varying reviews, ranging from "Perfect official factory replacement!" to "Garbage knock-off, worse than the battery I replaced." Part numbers don't seem to help, as the knock-offs replicate those pretty well. I ask you, Slashdot: where can I find a good replacement battery?

Finding an ISIS Training Camp Using Google Earth

Soulskill posted 11 hours ago | from the bet-you-wished-you'd-stuck-to-word-of-mouth dept.

Google 91

An anonymous reader writes: Terrorist organization ISIS has been in the news a lot lately for their hostile activities in Iraq and Syria. They've also been very active online, posting propaganda and photos on various social networking sites to try to recruit more members. Frequently, they'll have pictures of themselves in nondescript locations — but even carefully selected images give clues to a real location. Citizen journalists at Bellingcat analyzed a group of these photos, comparing buildings and bridges in the background to images from Google Earth. With very little to go on, they were able to pinpoint the location of a terrorist training camp.

Researchers Hack Gmail With 92 Percent Success Rate

Soulskill posted 12 hours ago | from the good-enough-for-an-A dept.

Android 72

SternisheFan sends this report from CNET: Researchers at the University of California Riverside Bourns College of Engineering and the University of Michigan have identified a weakness they believe to exist across Android, Windows, and iOS operating systems that could allow malicious apps to obtain personal information. Although it was tested only on an Android phone, the team believes that the method could be used across all three operating systems because all three share a similar feature: all apps can access a mobile device's shared memory. "The assumption has always been that these apps can't interfere with each other easily," said Zhiyun Qian, an associate professor at UC Riverside. "We show that assumption is not correct and one app can in fact significantly impact another and result in harmful consequences for the user." To demonstrate the method of attack, first a user must download an app that appears benign, such as a wallpaper, but actually contains malicious code. Once installed, the researchers can use it to access the shared memory statistics of any process (PDF), which doesn't require any special privileges.

A Better Way To Make Mind-Controlled Prosthetic Limbs

Soulskill posted 13 hours ago | from the resistance-is-futile dept.

Biotech 25

the_newsbeagle writes: To make a brain-machine interface, you need a way to capture neurons' electric signals. The most precise and most invasive way uses implants that are stuck in the gray matter. The least precise and least invasive way uses EEG sensors stuck to the scalp. But researchers at Johns Hopkins University say there's a third way that gets the best of both worlds, which is not too invasive and fairly precise. They use ECoG systems, in which a mesh of electrodes is placed under the skull, draped over the surface of the cortex.

They're testing their systems on epilepsy patients, who have these ECoG systems inserted anyway while they're waiting for surgery (the electrodes record the source of their seizures). The researchers are capturing these patients' movement commands from their brains, and using them to control robotic limbs. Someday such a system could be used by amputees to control their prosthetic limbs.

When Customer Dissatisfaction Is a Tech Business Model

Soulskill posted yesterday | from the friendly-until-they-have-your-money dept.

Businesses 212

jammag writes: A new trend has emerged where tech companies have realized that abusing users pays big. Examples include the highly publicized Comcast harassing service call, Facebook "experiments," Twitter timeline tinkering, rude Korean telecoms — tech is an area where the term "customer service" has an Orwellian slant. Isn't it time customer starting fleeing abusive tech outfits?

Apple CarPlay Rollout Delayed By Some Carmakers

Soulskill posted yesterday | from the methods-to-increase-auto-accidents dept.

Android 66

Lucas123 writes: Some car makers are delaying the implementation of Apple's CarPlay iPhone interface for vehicle infotainment systems. The delays, which are prompting manufacturers such as Mercedes, Volvo and Honda to push their announcement from 2014 to 2015, appear to be related to a few snags in the integration process or in choosing which model cars should have the middleware. At the same time, many of the automakers rolling out CarPlay are also implementing Android Auto, which will provide a vehicle head unit user interface for Android smartphones. Analysts believe the addition of Android Auto earlier this year may also be causing delays because manufacturers want to be able to announce availability of both platforms in their new model vehicles.

A Movie of Triton Made From Voyager 2's Fly-by 25 Years Ago

Soulskill posted yesterday | from the pretty-pictures dept.

Media 33

schwit1 writes: Using restored images taken by Voyager 2 when it flew past Neptune's moon Triton 25 years ago, scientists have produced a new map and flyby movie of the moon. "The new Triton map has a resolution of 1,970 feet (600 meters) per pixel. The colors have been enhanced to bring out contrast but are a close approximation to Triton's natural colors. Voyager's "eyes" saw in colors slightly different from human eyes, and this map was produced using orange, green and blue filter images. ... Although Triton is a moon of a planet and Pluto is a dwarf planet, Triton serves as a preview of sorts for the upcoming Pluto encounter. Although both bodies originated in the outer solar system, Triton was captured by Neptune and has undergone a radically different thermal history than Pluto. Tidal heating has likely melted the interior of Triton, producing the volcanoes, fractures and other geological features that Voyager saw on that bitterly cold, icy surface. Pluto is unlikely to be a copy of Triton, but some of the same types of features may be present." Dr. Paul Schenk provides provides further information on his blog, and the movie can be viewed here.

Students From States With Faster Internet Tend To Have Higher Test Scores

Soulskill posted yesterday | from the in-before-correlation-!=-causation dept.

The Internet 166

An anonymous reader sends word of correlation found between higher internet speeds and higher test scores. Quoting: The numbers—first crunched by the Internet provider comparison site HSI — show a distinct trend between faster Internet and higher ACT test scores. On the high end, Massachusetts scores big with an average Internet speed of 13.1Mbps, and an average ACT test score of 24.1. Mississippi, on the other hand, has an average speed of just 7.6Mbps and an average score of 18.9.

In between those two states, the other 48 fall in a positive correlation that, while not perfect, is quite undeniable. According to HSI's Edwin Ivanauskas, the correlation is stronger than that between household income and test scores, which have long been considered to be firmly connected to each other. The ACT scores were gathered from ACT.org, which has the official rankings and averages for the 2013 test, and the speed ratings were taken from Internet analytics firm Akamai's latest report.

What's After Big Data?

Soulskill posted yesterday | from the i'm-sure-the-marketroids-have-something-in-mind dept.

Businesses 81

gthuang88 writes: As the marketing hype around "big data" subsides, a recent wave of startups is solving a new class of data-related problems and showing where the field is headed. Niche analytics companies like RStudio, Vast, and FarmLink are trying to provide insights for specific industries such as finance, real estate, and agriculture. Data-wrangling software from startups like Tamr and Trifacta is targeting enterprises looking to find and prep corporate data. And heavily funded startups such as Actifio and DataGravity are trying to make data-storage systems smarter. Together, these efforts highlight where emerging data technologies might actually be used in the business world.

Researchers Made a Fake Social Network To Infiltrate China's Internet Censors

Soulskill posted yesterday | from the inside-job dept.

Censorship 47

Jason Koebler writes: In order to get inside China's notorious internet filter, Harvard researcher Gary King created his own fake social network to gain access to the programs used to censor content, so he could reverse-engineer the system. "From inside China, we created our own social media website, purchased a URL, rented server space, contracted with one of the most popular software platforms in China used to create these sites, submitted, automatically reviewed, posted, and censored our own submissions," King wrote in a study published in Science. "We had complete access to the software; we were even able to get their recommendations on how to conduct censorship on our own site in compliance with government standards."

33 Months In Prison For Recording a Movie In a Theater

Soulskill posted yesterday | from the know-when-to-fold-'em dept.

Piracy 396

An anonymous reader writes: Philip Danks used a camcorder to record Fast & Furious 6 in a U.K. cinema. Later, he shared it via bittorrent and allegedly sold physical copies. Now, he's been sentenced to 33 months in prison for his actions. "In Court it was claimed that Danks' uploading of Fast 6 resulted in more than 700,000 downloads, costing Universal Pictures and the wider industry millions of pounds in losses." Danks was originally told police weren't going to take any action against him, but he unwisely continued to share the movie files after his initial detainment with authorities.

Tech Looks To Obama To Save Them From 'Just Sort of OK' US Workers

Soulskill posted yesterday | from the right-in-the-pride dept.

Businesses 393

theodp writes Following up on news that the White House met with big biz on immigration earlier this month, Bloomberg sat down with Joe Green, the head of Mark Zuckerberg's Fwd.US PAC, to discuss possible executive actions President Obama might take on high tech immigration (video) in September. "Hey, Joe," asked interviewer Alix Steel. "All we keep hearing about this earnings season though from big tech is how they're actually cutting jobs. If you look at Microsoft, Cisco, IBM, Hewlett-Packard, why do the tech companies then need more tech visas?" Green explained why tech may not want to settle for laid-off U.S. talent when the world is its oyster. "The difference between someone who's truly great and just sort of okay is really huge," Green said. "Culture in tech is a very meritocratic culture," he added. "The vast, vast majority of tech engineers that I talked to who are from the United States are very supportive of bringing in people from other countries because they want to work with the very best."

NSA Agents Leak Tor Bugs To Developers

Soulskill posted yesterday | from the right-hand-thinks-the-left-hand-is-a-jerk dept.

Encryption 111

An anonymous reader writes: We've known for a while that NSA specifically targets Tor, because they want to disrupt one of the last remaining communication methods they aren't able to tap or demand access to. However, not everybody at the NSA is on board with this strategy. Tor developer Andrew Lewman says even as flaws in Tor are rooted out by the NSA and British counterpart GCHQ, other agents from the two organizations leak those flaws directly to the developers, so they can be fixed quickly. He said, "You have to think about the type of people who would be able to do this and have the expertise and time to read Tor source code from scratch for hours, for weeks, for months, and find and elucidate these super-subtle bugs or other things that they probably don't get to see in most commercial software." Lewman estimates the Tor Project receives these reports on a monthly basis. He also spoke about how a growing amount of users will affect Tor. He suggests a massive company like Google or Facebook will eventually have to take up the task of making Tor scale up to millions of users.

It's Easy To Hack Traffic Lights

Soulskill posted yesterday | from the looking-forward-to-the-mobile-app dept.

Transportation 130

An anonymous reader notes coverage of research from the University of Michigan into the ease with which attackers can hack traffic lights. From the article: As is typical in large urban areas, the traffic lights in the subject city are networked in a tree-type topology, allowing them to pass information to and receive instruction from a central management point. The network is IP-based, with all the nodes (intersections and management computers) on a single subnet. In order to save on installation costs and increase flexibility, the traffic light system uses wireless radios rather than dedicated physical networking links for its communication infrastructure—and that’s the hole the research team exploited. ... The 5.8GHz network has no password and uses no encryption; with a proper radio in hand, joining is trivial. ... The research team quickly discovered that the debug port was open on the live controllers and could directly "read and write arbitrary memory locations, kill tasks, and even reboot the device (PDF)." Debug access to the system also let the researchers look at how the controller communicates to its attached devices—the traffic lights and intersection cameras. They quickly discovered that the control system’s communication was totally non-obfuscated and easy to understand—and easy to subvert.

UPS: We've Been Hacked

samzenpus posted yesterday | from the protect-ya-neck dept.

Security 60

paysonwelch writes The United Parcel Service announced that customers' credit and debit card information at 51 franchises in 24 states may have been compromised. There are 4,470 franchised center locations throughout the U.S., according to UPS. The malware began to infiltrate the system as early as January 20, but the majority of the attacks began after March 26. UPS says the threat was eliminated as of August 11 and that customers can shop safely at all locations.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>