Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Chromebooks Are Outselling iPads In Schools

Unknown Lamer posted 3 minutes ago | from the keyboards-still-useful dept.

Education 0

Nate the greatest (2261802) writes Apple thrilled investors earlier this week when they revealed that they had sold 13 million iPads to schools and claimed 85% of the educational tablet market, but that wasn't the whole story. It turns out that Apple has only sold 5 million iPads to schools since February 2013, or an average of less than a million tablets a quarter over 6 quarters. It turns out that instead of buying iPads, schools are buying Chromebooks. Google reported that a million Chromebooks were sold to schools last quarter, well over half of the 1.8 million units sold in the second quarter. With Android tablets getting better, Apple is losing market share in the consumer tablet market, and now it looks Apple is also losing the educational market to Google. Analysts are predicting that 5 million Chromebooks will be sold by the end of the year; how many of those will be sold to schools, do you think?

A Warm-Feeling Wooden Keyboard (Video)

Roblimo posted 38 minutes ago | from the keyboard-as-cool-as-a-woodie-station-wagon dept.

Open Source 13

Plastic, plastic everywhere! Except on most surfaces of the Keyboardio ergonomic keyboard, which started as a 'scratch his itch' project by Jesse Vincent. According to his blurb on the Keyboardio site, Jesse 'has spent the last 20 years writing software like Request Tracker, K-9 Mail, and Perl. He types... a lot. He tried all the keyboards before finally making his own.'

His objective was to make a keyboard he really liked. And he apparently has. This video was shot in June, and Jesse already has a new model prototype under way that Tim Lord says is a notable improvement on the June version he already liked. || Note that the Keyboardio is hackable and open source, so if you think you can improve it, go right ahead. (Alternate Video Link)

ScummVM 1.7.0 Released

Unknown Lamer posted 1 hour ago | from the manic-mansion dept.

Classic Games (Games) 10

jones_supa (887896) writes It's been a while since a new ScummVM release, but version 1.7.0 is now here with many exciting features. New games supported are The Neverhood, Mortville Manor, Voyeur, Return to Ringworld and Chivalry is Not Dead. The Roland MT-32 emulator has been updated, there is an OpenGL backend, the GUI has seen improvements, AGOS engine is enhanced, tons of SCI bug fixes have been applied, and various other improvements can be found. This version also introduces support for the OUYA gaming console and brings improvements to some other more exotic platforms. Please read the release notes for an accurate description of the new version. SCUMM being the language/interpreter used by many classic adventure games.

Laser Eye Surgery, Revisited 10 Years Later

Unknown Lamer posted 1 hour ago | from the waiting-for-the-laser-vision-option dept.

Medicine 259

gunner_von_diamond (3461783) happened upon Ask Slashdot: Experiences with Laser Eye Surgery from ten years ago, and asks: I was just reading a story on /. from 10 years ago about Lasik Eye Surgery. Personally, I've had Lasik done and loved every single part of the surgery. I went from wearing contacts/glasses every day to having 20/15 vision! In the older post, everyone seemed to be cautious about it, waiting for technical advances before having the surgery. Today, the surgery is fairly inexpensive [even for a programmer :) ], takes about 10-15 minutes, and I recovered from the surgery that same day. So my question is: what is holding everyone else back from freeing themselves from contacts and glasses?

Comcast Carrying 1Tbit/s of IPv6 Internet Traffic

Unknown Lamer posted 2 hours ago | from the hurd-1.0-released dept.

Networking 68

New submitter Tim the Gecko (745081) writes Comcast has announced 1Tb/s of Internet facing, native IPv6 traffic, with more than 30% deployment to customers. With Facebook, Google/YouTube, and Wikipedia up to speed, it looks we are past the "chicken and egg" stage. IPv6 adoption by other carriers is looking better too with AT&T at 20% of their network IPv6 enabled, Time Warner at 10%, and Verizon Wireless at 50%. The World IPv6 Launch site has measurements of global IPv6 adoption.

Social Security Administration Joins Other Agencies With $300M "IT Boondoggle"

Unknown Lamer posted 3 hours ago | from the should-have-gone-into-government-IT dept.

Government 100

alphadogg (971356) writes with news that the SSA has joined the long list of federal agencies with giant failed IT projects. From the article: "Six years ago the Social Security Administration embarked on an aggressive plan to replace outdated computer systems overwhelmed by a growing flood of disability claims. Nearly $300 million later, the new system is nowhere near ready and agency officials are struggling to salvage a project racked by delays and mismanagement, according to an internal report commissioned by the agency. In 2008, Social Security said the project was about two to three years from completion. Five years later, it was still two to three years from being done, according to the report by McKinsey and Co., a management consulting firm. Today, with the project still in the testing phase, the agency can't say when it will be completed or how much it will cost.

Black Holes Not Black After All, Theorize Physicists

Unknown Lamer posted 4 hours ago | from the lemon-chiffon-hole dept.

Space 127

KentuckyFC (1144503) writes Black holes are singularities in spacetime formed by stars that have collapsed at the end of their lives. But while black holes are one of the best known ideas in cosmology, physicists have never been entirely comfortable with the idea that regions of the universe can become infinitely dense. Indeed, they only accept this because they can't think of any reason why it shouldn't happen. But in the last few months, just such a reason has emerged as a result of intense debate about one of cosmology's greatest problems — the information paradox. This is the fundamental tenet in quantum mechanics that all the information about a system is encoded in its wave function and this always evolves in a way that conserves information. The paradox arises when this system falls into a black hole causing the information to devolve into a single state. So information must be lost.

Earlier this year, Stephen Hawking proposed a solution. His idea is that gravitational collapse can never continue beyond the so-called event horizon of a black hole beyond which information is lost. Gravitational collapse would approach the boundary but never go beyond it. That solves the information paradox but raises another question instead: if not a black hole, then what? Now one physicist has worked out the answer. His conclusion is that the collapsed star should end up about twice the radius of a conventional black hole but would not be dense enough to trap light forever and therefore would not be black. Indeed, to all intents and purposes, it would look like a large neutron star.

Mac OS X Yosemite Beta Opens

Unknown Lamer posted 4 hours ago | from the smells-like-system-7 dept.

GUI 120

New submitter David Hames (3763525) writes Would you like to test drive the newest release of the Macintosh operating system? Apple is opening up the beta for Mac OS X Yosemite starting Thursday to the first million people who sign up. Beta users won't be able to access such promised Yosemite features such as the ability to make or receive your iPhone calls or text messages on your Mac, turn on your iPhone hotspot feature from your Mac, or "Handoff" the last thing you were doing on your iOS 8 device to your Mac and vice versa. A new iCloud Drive feature is also off-limits, while any Spotlight search suggestions are U.S.-based only. Don't expect all your Mac apps to run either. Ars has a preview of Yosemite.

Sony Agrees To $17.75m Settlement For 2011 PSN Attack

Unknown Lamer posted 5 hours ago | from the claim-your-prize-now dept.

Sony 60

mrspoonsi (2955715) writes with word that Sony has agreed to settle a class action lawsuit brought by PSN users affected by the 2011 breach. From the article: Sony has finally agreed to a preliminary settlement of $15m, which may be able to appease most of the customers that suffered from this attack. The PlayStation Network users that did not partake in the "Welcome Back" program that Sony unveiled shortly after their online services were brought back will be able to choose from two of several options for compensation: One PlayStation 3 or PlayStation Portable game selected from a list of 14 games; three PlayStation 3 themes selected from a list of six themes; or a three-month subscription to PlayStation Plus free of charge. Claiming these benefits will be done on a first come, first serve basis ...The settlement isn't just about free games or services. Customers with documented identity theft charges are eligible for up to $2,500 per claim.

GOG.com Announces Linux Support

Soulskill posted 6 hours ago | from the year-of-linux-on-the-gamebox dept.

Classic Games (Games) 63

For years, Good Old Games has made a business out of selling classic PC game titles completely free of DRM. Today they announced that their platform now supports Linux. They said, We've put much time and effort into this project and now we've found ourselves with over 50 titles, classic and new, prepared for distribution, site infrastructure ready, support team trained and standing by ... We're still aiming to have at least 100 Linux games in the coming months, but we've decided not to delay the launch just for the sake of having a nice-looking number to show off to the press. ... Note that we've got many classic titles coming officially to Linux for the very first time, thanks to the custom builds prepared by our dedicated team of penguin tamers. ... For both native Linux versions, as well as special builds prepared by our team, GOG.com will provide distro-independent tar.gz archives and support convenient DEB installers for the two most popular Linux distributions: Ubuntu and Mint, in their current and future LTS editions.

For Half, Degrees In Computing, Math, Or Stats Lead To Other Jobs

Unknown Lamer posted 6 hours ago | from the better-than-working-at-walmart dept.

Businesses 150

dcblogs (1096431) writes The Census Bureau reports that only 26% of people with any type of four-year STEM degree are working in a STEM field. For those with a degree specifically in computer, math or statistics, the figure is 49%, nearly the same for engineering degrees. What happens to the other STEM trained workers? The largest numbers are managers at non-STEM businesses (22.5%), or having careers in education (17.7%), business/finance (13.2%) and office support (11.5%). Some other data points: Among those with college degrees in computer-related occupations, men are paid more than women ($90,354 vs. $78,859 on average), and African American workers are more likely to be unemployed than white or Asian workers.

Empathy For Virtual Characters Studied With FMRI Brain Imaging

Unknown Lamer posted 7 hours ago | from the little-billy-loved-hearing-virtual-screams dept.

Science 43

vrml (3027321) writes "A novel brain imaging study published by the prestigious Neuroimage journal sheds light on different reactions that players' brains display when they meet a virtual character in a game world. While their head was inside a fMRI machine, participants played an interactive virtual experience in which they had to survive a serious fire emergency in a building by reaching an exit as soon as possible. However, when they finally arrived at the exit, they also found a virtual character trapped under an heavy cabinet, begging them for help. Some participants chose not to help the character and took the exit, while others stopped to help although the fire became more and more serious and moving away the cabinet required considerable time. Functional brain imaging showed activation of very different brain areas in players when they met the character. When there was an increased functional connectivity of the brain salience network, which suggests an enhanced sensitivity to the threatening situation and potential danger, players ignored the character screams and went for the exit. In those players who helped the character, there was an engagement of the medial prefrontal and temporo-parietal cortices, which in the neuroscience literature are associated with the human ability of taking the perspective of other individuals and making altruistic choices. The paper concludes by emphasizing how virtual worlds can be a salient and ecologically valid stimulus for modern social neuroscience."

FCC Reminds ISPs That They Can Be Fined For Lacking Transparency

Unknown Lamer posted 8 hours ago | from the beware-the-$5-fine dept.

Communications 34

An anonymous reader writes The FCC issued a notice on Wednesday reminding ISPs that, according to the still-intact transparency rule of the 2010 Open Internet Order, they are required to be transparent about their services. "The FCC's transparency rule requires that consumers get the information they need to make informed choices about the broadband services they purchase." Applicable scenarios include "poorly worded service offers or inaccurate counts of data against a data cap...[as well as] blocking or slowing certain types of traffic without explaining that to the customer." The transparency rule gives the FCC the power to fine ISPs for non-compliance.

Internet Explorer Vulnerabilities Increase 100%

samzenpus posted 9 hours ago | from the protect-ya-neck dept.

Security 106

An anonymous reader writes Bromium Labs analyzed public vulnerabilities and exploits from the first six months of 2014. The research determined that Internet Explorer vulnerabilities have increased more than 100 percent since 2013, surpassing Java and Flash vulnerabilities. Web browsers have always been a favorite avenue of attack, but we are now seeing that hackers are not only getting better at attacking Internet Explorer, they are doing it more frequently.

Ebola Outbreak Continues To Expand

samzenpus posted 12 hours ago | from the mask-and-gloves dept.

Medicine 152

symbolset writes in with the latest about an ebola outbreak spreading across West Africa. The World Health Organization (WHO) continues to monitor the evolution of the Ebola virus disease (EVD) outbreak in Sierra Leone, Liberia, and Guinea. The current epidemic trend of EVD outbreak in Sierra Leone and Liberia remains serious, with 67 new cases and 19 deaths reported July 15-17, 2014. These include suspect, probable, and laboratory-confirmed cases. The EVD outbreak in Guinea continues to show a declining trend, with no new cases reported during this period. Critical analyses and review of the current outbreak response is being undertaken to inform the process of developing prioritized national operational plans. Effective implementation of the prioritized plans will be vital in reversing the current trend of EVD outbreak, especially in Liberia and Sierra Leone.

How the Internet of Things Could Aid Disaster Response

samzenpus posted yesterday | from the when-the-microwave-calls dept.

Networking 58

jfruh writes While the Internet has made communications easier, that ease had made us very dependent on the Internet for communications — and, when disaster strikes, power and infrastructure outages tend to shut down those communications networks when we need them most. But now researchers are examining how the so-called "Internet of Things" — the proliferating array of Internet-communicating devices in our lives — can transmit emergency messages via ad-hoc networks even when the Internet backbone in a region is inoperable.

The Psychology of Phishing

samzenpus posted yesterday | from the click-and-release dept.

Security 114

An anonymous reader writes Phishing emails are without a doubt one of the biggest security issues consumers and businesses face today. Cybercriminals understand that we are a generation of clickers and they use this to their advantage. They will take the time to create sophisticated phishing emails because they understand that today users can tell-apart spam annoyances from useful email, however they still find it difficult identifying phishing emails, particularly when they are tailored to suit each recipient individually. Fake emails are so convincing and compelling that they fool 10% of recipients into clicking on the malicious link. To put that into context a legitimate marketing department at a FTSE 100 company typically expects less than a 2% click rate on their advertising campaigns. So, how are the cybercriminals out-marketing the marketing experts?

Dropbox Head Responds To Snowden Claims About Privacy

samzenpus posted yesterday | from the protect-ya-neck dept.

Security 144

First time accepted submitter Carly Page writes When asked for its response to Edward Snowden's claims that "Dropbox is hostile to privacy", Dropbox told The INQUIRER that users concerned about privacy should add their own encryption. The firm warned however that if users do, not all of the service's features will work. Head of Product at Dropbox for Business Ilya Fushman says: "We have data encrypted on our servers. We think of encryption beyond that as a users choice. If you look at our third-party developer ecosystem you'll find many client-side encryption apps....It's hard to do things like rich document rendering if they're client-side encrypted. Search is also difficult, we can't index the content of files. Finally, we need users to understand that if they use client-side encryption and lose the password, we can't then help them recover those files."

Verizon's Offer: Let Us Track You, Get Free Stuff

samzenpus posted yesterday | from the do-your-worst dept.

Verizon 73

mpicpp points out a new program from Verizon that is perfect if you don't mind being tracked. Are you comfortable having your location and Web browsing tracked for marketing purposes? If so, Verizon's got a deal for you. The wireless giant announced a new program this week called 'Smart Rewards' that offers customers credit card-style perks like discounts for shopping, travel and dining. You accrue points through the program by doing things like signing onto the Verizon website, paying your bill online and participating in the company's trade-in program. Verizon emphasizes that the data it collects is anonymized before it's shared with third parties. The program is novel in that offers Verizon users some compensation for the collection of their data, which has become big business for telecom and tech companies. Some privacy advocates have pushed data-collecting companies to reward customers for their personal information in the interest of transparency.

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...