Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

MIT' Combines Carbon Foam and Graphite Flakes For Efficient Solar Steam Generati

timothy posted 10 minutes ago | from the science-fiction-future-awaits dept.

Technology 3

rtoz (2530056) writes Researchers at MIT have developed a new spongelike material structure which can use 85% of incoming solar energy for converting water into steam. This spongelike structure has a layer of graphite flakes and an underlying carbon foam. This structure has many small pores. It can float on the water, and it will act as an insulator for preventing heat from escaping to the underlying liquid. As sunlight hits the structure, it creates a hotspot in the graphite layer, generating a pressure gradient that draws water up through the carbon foam. As water seeps into the graphite layer, the heat concentrated in the graphite turns the water into steam. This structure works much like a sponge. This new material is able to use 85 percent of incoming solar energy for converting water into steam. It is a significant improvement over recent approaches to solar-powered steam generation. And, this setup loses very little heat in the process, and can produce steam at relatively low solar intensity. i-e if scaled up, this setup will not require complex, costly systems to highly concentrate sunlight.

For Now, UK Online Pirates Will Get 4 Warnings -- And That's It

timothy posted 49 minutes ago | from the on-high-alert dept.

Piracy 27

New submitter Tmackiller writes with an excerpt from VG247.com: The British government has decriminalised online video game, music and movie piracy, scrapping fuller punishment plans after branding them unworkable. Starting in 2015, persistent file-sharers will be sent four warning letters explaining their actions are illegal, but if the notes are ignored no further action will be taken. The scheme, named the Voluntary Copyright Alert Programme (VCAP), is the result of years of talks between ISPs, British politicians and the movie and music industries. The UK's biggest providers – BT, TalkTalk, Virgin and Sky – have all signed up to VCAP, and smaller ISPs are expected to follow suit. VCAP replaces planned anti-piracy measures that included cutting users' internet connections and creating a database of file-sharers. Geoff Taylor, chief executive of music trade body the BPI, said VCAP was about "persuading the persuadable, such as parents who do not know what is going on with their net connection." He added: "VCAP is not about denying access to the internet. It's about changing attitudes and raising awareness so people can make the right choice." Officials will still work to close and stem funding to file-sharing sites, but the news appears to mean that the British authorities have abandoned legal enforcement of online media piracy. Figures recently published by Ofcom said that nearly a quarter of all UK downloads were of pirated content." Tmackiller wants to know "Will this result in more private lawsuits against file sharers by the companies involved?"

A New Form of Online Tracking: Canvas Fingerprinting

Unknown Lamer posted 1 hour ago | from the subverting-features-for-evil-and-profit dept.

Privacy 62

New submitter bnortman (922608) was the first to write in with word of "a new research paper discussing a new form of user fingerprinting and tracking for the web using the HTML 5 <canvas> ." globaljustin adds more from an article at Pro Publica: Canvas fingerprinting works by instructing the visitor's Web browser to draw a hidden image. Because each computer draws the image slightly differently, the images can be used to assign each user's device a number that uniquely identifies it. ... The researchers found canvas fingerprinting computer code ... on 5 percent of the top 100,000 websites. Most of the code was on websites that use the AddThis social media sharing tools. Other fingerprinters include the German digital marketer Ligatus and the Canadian dating site Plentyoffish. ... Rich Harris, chief executive of AddThis, said that the company began testing canvas fingerprinting earlier this year as a possible way to replace cookies ...

Print Isn't Dead: How Linux Voice Crowdfunded a New Magazine

Unknown Lamer posted 4 hours ago | from the something-about-paper dept.

The Media 37

M-Saunders (706738) writes The death of print has been predicted for years, and many magazines and publishers have taken a big hit with the rise of eBooks and tablets. But not everyone has given up. Four geeks quit their job at an old Linux magazine to start Linux Voice, an independent GNU/Linux print and digital mag with a different publishing model: giving profits and content back to the community. Six months after a successful crowdfunding campaign, the magazine is going well, so here is the full story.

Experiment Shows People Exposed To East German Socialism Cheat More

Unknown Lamer posted 6 hours ago | from the roll-high-or-be-sent-to-siberia dept.

Science 219

An anonymous reader writes The Economist reports, "'UNDER capitalism', ran the old Soviet-era joke, 'man exploits man. Under communism it is just the opposite.' In fact new research suggests that the Soviet system inspired not just sarcasm but cheating too: in East Germany, at least, communism appears to have inculcated moral laxity. Lars Hornuf of the University of Munich and Dan Ariely, Ximena García-Rada and Heather Mann of Duke University ran an experiment last year to test Germans' willingness to lie for personal gain. Some 250 Berliners were randomly selected to take part in a game where they could win up to €6 ($8). ... The authors found that, on average, those who had East German roots cheated twice as much as those who had grown up in West Germany under capitalism. They also looked at how much time people had spent in East Germany before the fall of the Berlin Wall. The longer the participants had been exposed to socialism, the greater the likelihood that they would claim improbable numbers ... when it comes to ethics, a capitalist upbringing appears to trump a socialist one."

MIT's Ted Postol Presents More Evidence On Iron Dome Failures

Unknown Lamer posted 9 hours ago | from the makes-for-good-tv dept.

The Military 214

Lasrick (2629253) writes In a controversial article last week, MIT physicist Ted Postol again questioned whether Israel's vaunted Iron Dome rocket defense system actually works. This week, he comes back with evidence in the form of diagrams, photos of Iron Dome intercepts and contrails, and evidence on the ground to show that Iron Dome in fact is effective only about 5% of the time. Postol believes the real reason there are so few Israeli casualties is that Hamas rockets have very small warheads (only 10 to 20 pounds), and also Israel's outstanding civil defense system, which includes a vast system of shelters and an incredibly sophisticated rocket attack warning system (delivered through smart phones, among other ways).

No RIF'd Employees Need Apply For Microsoft External Staff Jobs For 6 Months

Unknown Lamer posted 11 hours ago | from the no-workers-rights-for-you dept.

Microsoft 162

theodp (442580) writes So, what does Microsoft do for an encore after laying off 18,000 employees with a hilariously bad memo? Issue another bad memo — Changes to Microsoft Network and Building Access for External Staff — "to introduce a new policy [retroactive to July 1] that will better protect our Microsoft IP and confidential information." How so? "The policy change affects [only] US-based external staff (including Agency Temporaries, Vendors and Business Guests)," Microsoft adds, "and limits their access to Microsoft buildings and the Microsoft corporate network to a period of 18 months, with a required six-month break before access may be granted again." Suppose Microsoft feels that's where the NSA went wrong with Edward Snowden? And if any soon-to-be-terminated Microsoft employees hope to latch on to a job with a Microsoft external vendor to keep their income flowing, they best think again. "Any Microsoft employee who separated from Microsoft on or after July 1, 2014," the kick-em-while-they're-down memo explains, "will be required to take a minimum 6-month break from access between the day the employee separates from Microsoft and the date when the former employee may begin an assignment as an External Staff performing services for Microsoft." Likely not just to prevent leaks, but also to prevent any contractors from being reclassified as employees.

Rupert Murdoch's Quest To Buy Time Warner: Not Done Yet

Unknown Lamer posted 13 hours ago | from the please-give-up dept.

The Media 57

Presto Vivace (882157) writes It seems that Murdoch's desire to acquire Time Warner predates his acquisition of Fox, and continues in spite of Time Warner's recent refusal. The possible deal is important in and of itself, but it also affects the future leadership of Fox. From the article: "Murdoch's skill is not just hiring the right people; he has been able to maintain control over them. They have his support as long as they produce results. His executives are the hired help. There is never any threat to his control. When a Murdoch favourite begins to get more headlines than the chairman, the clock begins ticking for their departure. But with the Time Warner bid, that balance may change. Chase Carey has put together a deal that, because of Murdoch's history, is almost irresistible to him. But it's a deal only Carey can put together. If he succeeds, the $US160 billion company that will emerge will be an ungainly beast that will depend on Carey making the merger work. He's indispensable." Clearly we have not heard the last of this.

Mimicking Vesicle Fusion To Make Gold Nanoparticles Easily Penetrate Cells

Unknown Lamer posted yesterday | from the golden-hypospray dept.

Medicine 17

rtoz (2530056) writes A special class of tiny gold particles can easily slip through cell membranes, making them good candidates to deliver drugs directly to target cells. A new study from MIT materials scientists reveals that these nanoparticles enter cells by taking advantage of a route normally used in vesicle-vesicle fusion, a crucial process that allows signal transmission between neurons. MIT engineers created simulations of how a gold nanoparticle coated with special molecules can penetrate a membrane. Paper (abstract; full text paywalled).

The Loophole Obscuring Facebook and Google's Transparency Reports

samzenpus posted yesterday | from the fuzzy-math dept.

Facebook 18

Jason Koebler writes The number of law enforcement requests coming from Canada for information from companies like Facebook and Google are often inaccurate thanks to a little-known loophole that lumps them in with U.S. numbers. For example, law enforcement and government agencies in Canada made 366 requests for Facebook user data in 2013, according to the social network's transparency reports. But that's not the total number. An additional 16 requests are missing, counted instead with U.S. requests thanks to a law that lets Canadian agencies make requests with the U.S. Department of Justice.

NASA Names Building For Neil Armstrong

samzenpus posted yesterday | from the new-name dept.

NASA 44

An anonymous reader writes A building at NASA's Kennedy Space Center in Florida, where Apollo astronauts once trained, was named in honor of astronaut Neil Armstrong. Armstrong, who died in 2012, was remembered at a ceremony as not only an astronaut, but also as an aerospace engineer, test pilot, and university professor. NASA renamed the Operations and Checkout building, also known as the O&C, which is on the National Register of Historic Places. It has been the last stop for astronauts before their flights since 1965. It was also used to test and process Apollo spacecraft. Currently, it's where the Orion spacecraft is being assembled to send astronauts to an asteroid and later to Mars.

The "Rickmote Controller" Can Hijack Any Google Chromecast

samzenpus posted yesterday | from the never-going-to-give-you-up dept.

Google 119

redletterdave writes Dan Petro, a security analyst for the Bishop Fox IT consulting firm, built a proof of concept device that's able to hack into any Google Chromecasts nearby to project Rick Astley's "Never Gonna Give You Up," or any other video a prankster might choose. The "Rickmote," which is built on top of the $35 Raspberry Pi single board computer, finds a local Chromecast device, boots it off the network, and then takes over the screen with multimedia of one's choosing. But it gets worse for the victims: If the hacker leaves the range of the device, there's no way to regain control of the Chromecast. Unfortunately for Google, this is a rather serious issue with the Chromecast device that's not too easy to fix, as the configuration process is an essential part of the Chromecast experience.

Activist Group Sues US Border Agency Over New, Vast Intelligence System

samzenpus posted yesterday | from the lets-see-what-you-have-there dept.

Government 71

An anonymous reader writes with news about one of the latest unanswered FOIA requests made to the Department of Homeland Security and the associated lawsuit the department's silence has brought. The Electronic Privacy Information Center (EPIC) has sued the United States Customs and Border Protection (CBP) in an attempt to compel the government agency to hand over documents relating to a relatively new comprehensive intelligence database of people and cargo crossing the US border. EPIC's lawsuit, which was filed last Friday, seeks a trove of documents concerning the 'Analytical Framework for Intelligence' (AFI) as part of a Freedom of Information Act (FOIA) request. EPIC's April 2014 FOIA request went unanswered after the 20 days that the law requires, and the group waited an additional 49 days before filing suit. The AFI, which was formally announced in June 2012 by the Department of Homeland Security (DHS), consists of "a single platform for research, analysis, and visualization of large amounts of data from disparate sources and maintaining the final analysis or products in a single, searchable location for later use as well as appropriate dissemination."

How One School District Handled Rolling Out 20,000 iPads

samzenpus posted yesterday | from the accident-waiting-to-happen dept.

Education 212

First time accepted submitter Gamoid writes This past school year, the Coachella Valley Unified School District gave out iPads to every single student. The good news is that kids love them, and only 6 of them got stolen or went missing. The bad news is, these iPads are sucking so much bandwidth that it's keeping neighboring school districts from getting online. Here's why the CVUSD is considering becoming its own ISP.

Researcher Finds Hidden Data-Dumping Services In iOS

samzenpus posted yesterday | from the don't-take-my-data-bro dept.

Privacy 87

Trailrunner7 writes There are a number of undocumented and hidden features and services in Apple iOS that can be used to bypass the backup encryption on iOS devices and remove large amounts of users' personal data. Several of these features began as benign services but have evolved in recent years to become powerful tools for acquiring user data.

Jonathan Zdziarski, a forensic scientist and researcher who has worked extensively with law enforcement and intelligence agencies, has spent quite a bit of time looking at the capabilities and services available in iOS for data acquisition and found that some of the services have no real reason to be on these devices and that several have the ability to bypass the iOS backup encryption. One of the services in iOS, called mobile file_relay, can be accessed remotely or through a USB connection can be used to bypass the backup encryption. If the device has not been rebooted since the last time the user entered the PIN, all of the data encrypted via data protection can be accessed, whether by an attacker or law enforcement, Zdziarski said.
Update: 07/21 22:15 GMT by U L : Slides.

UEA Research Shows Oceans Vital For Possibility of Alien Life

samzenpus posted yesterday | from the everything-is-wet dept.

EU 80

An anonymous reader writes New research at the University of East Anglia finds that oceans are vital in the search for alien life. So far, computer simulations of habitable climates on other planets have focused on their atmospheres. But oceans play an equally vital role in moderating climates on planets and bringing stability to the climate, according to the study. From the press release: "The research team from UEA's schools of Mathematics and Environmental Sciences created a computer simulated pattern of ocean circulation on a hypothetical ocean-covered Earth-like planet. They looked at how different planetary rotation rates would impact heat transport with the presence of oceans taken into account. Prof David Stevens from UEA's school of Mathematics said: 'The number of planets being discovered outside our solar system is rapidly increasing. This research will help answer whether or not these planets could sustain alien life. We know that many planets are completely uninhabitable because they are either too close or too far from their sun. A planet's habitable zone is based on its distance from the sun and temperatures at which it is possible for the planet to have liquid water. But until now, most habitability models have neglected the impact of oceans on climate.'"

Verizon Boosts FiOS Uploads To Match Downloads

samzenpus posted yesterday | from the greased-lightning dept.

Verizon 211

An anonymous reader writes Verizon is boosting the upload speeds of nearly all its FiOS connections to match the download speeds, greatly shortening the time it takes to send videos and back up files online. All new subscribers will get "symmetrical" connections. If you previously were getting 15 Mbps down and 5 Mbps up, you'll be automatically upgraded for no extra cost to 15/15. Same goes if you were on their 50/25 plan: You'll now be upgraded to 50/50. And if you had 75/35? You guessed it: Now it'll be 75 down, and 75 up.

Method Rapidly Reconstructs Animal's Development Cell By Cell

samzenpus posted yesterday | from the best-baby-pictures dept.

Science 38

An anonymous reader writes Researchers at the Howard Hughes Medical Institute's Janelia Research Campus have developed software that can track each and every cell in a developing embryo. The software will allow a researcher to pick out a single cell at any point in development and trace its life backward and forward during the embryo's growth. Philipp Keller, a group leader at Janelia says: "We want to reconstruct the elemental building plan of animals, tracking each cell from very early development until late stages, so that we know everything that has happened in terms of cell movement and cell division. In particular, we want to understand how the nervous system forms. Ultimately, we would like to collect the developmental history of every cell in the nervous system and link that information to the cell's final function. For this purpose, we need to be able to follow individual cells on a fairly large scale and over a long period of time."

Why My LG Optimus Cellphone Is Worse Than It's Supposed To Be

samzenpus posted yesterday | from the no-sir-I-don't-like-it dept.

Cellphones 271

Bennett Haselton writes My LG Optimus F3Q was the lowest-end phone in the T-Mobile store, but a cheap phone is supposed to suck in specific ways that make you want to upgrade to a better model. This one is plagued with software bugs that have nothing to do with the cheap hardware, and thus lower one's confidence in the whole product line. Similar to the suckiness of the Stratosphere and Stratosphere 2 that I was subjected to before this one, the phone's shortcomings actually raise more interesting questions — about why the free-market system rewards companies for pulling off miracles at the hardware level, but not for fixing software bugs that should be easy to catch. Read below to see what Bennett has to say.

China Has More People Going Online With a Mobile Device Than a PC

samzenpus posted yesterday | from the surfing-on-the-go dept.

China 53

An anonymous reader points out that even though China's internet adoption rate is the lowest it's been in 8 years, the number of people surfing the net from a mobile device has never been higher. "The number of China's internet users going online with a mobile device — such as a smartphone or tablet — has overtaken those doing so with a personal computer (PC) for the first time, said the official China Internet Network Information Center (CNNIC) on Monday. China's total number of internet users crept up 2.3 percent to 632 million by the end of June, from 618 million at the end of 2013, said CNNIC's internet development statistics report. Of those, 527 million — or 83 percent — went online via mobile. Those doing so with a PC made up 81 percent the total. China is the largest smartphone market in the world, and by 2018 is likely to account for nearly one-third of the expected 1.8 billion smartphones shipped that year, according to data firm IDC.

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...