Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Researchers Test Developer Biometrics To Predict Buggy Code

Soulskill posted 20 minutes ago | from the subject-was-asleep-when-this-code-was-checked-in dept.

Bug 13

rjmarvin writes: Microsoft Research is testing a new method for predicting errors and bugs while developers write code: biometrics. By measuring a developer's eye movements, physical and mental characteristics as they code, the researchers tracked alertness and stress levels to predict the difficulty of a given task with respect to the coder's abilities. In a paper entitled "Using Psycho-Physiological Measures to Assess Task Difficulty in Software Development," the researchers summarized how they strapped an eye tracker, an electrodermal sensor and an EEG sensor to 15 developers as they programmed for various tasks. Biometrics predicted task difficulty for a new developer 64.99% of the time. For a subsequent tasks with the same developer, the researchers found biometrics to be 84.38% accurate. They suggest using the information to mark places in code that developers find particularly difficult, and then reviewing or refactoring those sections later.

UK Users Overwhelmingly Spurn Broadband Filters

timothy posted 1 hour ago | from the but-it's-a-free-service dept.

United Kingdom 30

nk497 (1345219) writes "Broadband customers are overwhelmingly choosing not to use parental-control systems foisted on ISPs by the government — with takeup in the single-digits for three of the four major broadband providers. Last year, the government pushed ISPs to roll out network-level filters, forcing new customers to make an "active" decision about whether they want to use them or not. Only 5% of new BT customers signed up, 8% opted in for Sky and 4% for Virgin Media. TalkTalk rolled out a parental-control system two years before the government required it and has a much better takeup, with 36% of customers signing up for it. The report, from regulator Ofcom, didn't bother to judge if the filters actually work, however."

Ask Slashdot: Linux Login and Resource Management In a Computer Lab?

timothy posted 1 hour ago | from the explain-your-system dept.

Linux 41

New submitter rongten (756490) writes I am managing a computer lab composed of various kinds of Linux workstations, from small desktops to powerful workstations with plenty of RAM and cores. The users' $HOME is NFS mounted, and they either access via console (no user switch allowed), ssh or x2go. In the past, the powerful workstations were reserved to certain power users, but now even "regular" students may need to have access to high memory machines for some tasks. Is there a sort of resource management that would allow the following tasks? To forbid a same user to log graphically more than once (like UserLock); to limit the amount of ssh sessions (i.e. no user using distcc and spamming the rest of the machines, or even worse, running in parallel); to give priority to the console user (i.e. automatically renicing remote users jobs and restricting their memory usage); and to avoid swapping and waiting (i.e. all the users trying to log into the latest and greatest machine, so have a limited amount of logins proportional to the capacity of the machine). The system being put in place uses Fedora 20, and LDAP PAM authentication; it is Puppet-managed, and NFS based. In the past I tried to achieve similar functionality via cron jobs, login scripts, ssh and nx management, and queuing system — but it is not an elegant solution, and it is hacked a lot. Since I think these requirements should be pretty standard for a computer lab, I am surprised to see that I cannot find something already written for it. Do you know of a similar system, preferably open source? A commercial solution could be acceptable as well.

Exodus Intelligence Details Zero-Day Vulnerabilities In Tails OS

timothy posted 3 hours ago | from the compared-to-what? dept.

Operating Systems 73

New submitter I Ate A Candle (3762149) writes Tails OS, the Tor-reliant privacy-focused operating system made famous by Edward Snowden, contains a number of zero-day vulnerabilities that could be used to take control of the OS and execute code remotely. At least that's according to zero-day exploit seller Exodus Intelligence, which counts DARPA amongst its customer base. The company plans to tell the Tails team about the issues "in due time", said Aaron Portnoy, co-founder and vice president of Exodus, but it isn't giving any information on a disclosure timeline. This means users of Tails are in danger of being de-anonymised. Even version 1.1, which hit public release today (22 July 2014), is affected. Snowden famously used Tails to manage the NSA files. The OS can be held on a USB stick and leaves no trace once removed from the drive. It uses the Tor network to avoid identification of the user, but such protections may be undone by the zero-day exploits Exodus holds.

Netflix Reduces Physical-Disc Processing, Keeps Prices the Same

timothy posted 3 hours ago | from the rising-overhead dept.

Movies 192

Nom du Keyboard writes: After seeing a drop in my DVD service from Netflix I got a customer service representative tonight to confirm that Netflix has ceased processing DVD returns on Saturdays nationwide. And that they did this without notifying their customers, or reducing prices to compensate for the reduced service. Given that the DVD selection still far outstrips their streaming selection, this may be news to others like myself who don't find streaming an adequate replacement for plastic discs. My experience up until recently, unlike Netflix's promise of a 1-3 day turnaround at their end which gives them lots of wiggle room to degrade service even further, had been of mailing in a DVD on day one, having them receive it and mail out my next selection on day two, and receiving it on day three. Now with them only working 5 days and many U.S. Post Office holidays, they're still getting the same money for significantly less. The Netflix shipping FAQ confirms the change, and a spokesperson said, "Saturdays have been low volume ship days for us."

NVIDIA Launches Tegra K1-Based SHIELD Tablet, Wireless Controller

timothy posted 4 hours ago | from the pretty-high-resolution-there dept.

Handhelds 34

MojoKid (1002251) writes NVIDIA just officially announced the SHIELD Tablet (powered by their Tegra K1 SoC) and SHIELD wireless controller. As the SHIELD branding implies, the new SHIELD tablet and wireless controller builds upon the previously-released, Android-based SHIELD portable to bring a gaming-oriented tablet to consumers. The SHIELD Tablet and wireless controller are somewhat of mashup of the SHIELD portable and the Tegra Note 7, but featuring updated technology and better build materials. You could think of the SHIELD Tablet and wireless controller as an upgraded SHIELD portable gaming device, with the screen de-coupled from the controller. The device features NVIDIA's Tegra K1 SoC, paired to 2GB of RAM and an 8", full-HD IPS display, with a native resolution of 1920x1200. There are also a pair of 5MP cameras on the SHIELD Tablet (front and rear), 802.11a/b/g/n 2x2 MIMO WiFi configuration, GPS, a 9-axis motion sensor, and Bluetooth 4.0 LE. In addition to the WiFi-only version (which features 16GB of internal storage), NVIDIA has a 32GB version coming with LTE connectivity as well. NVIDIA will begin taking pre-orders for the SHIELD Tablet and wireless controller immediately.

AirMagnet Wi-Fi Security Tool Takes Aim At Drones

timothy posted 5 hours ago | from the command-and-control-is-next dept.

Security 37

alphadogg (971356) writes "In its quest to help enterprises seek out and neutralize all threats to their Wi-Fi networks, AirMagnet is now looking to the skies. In a free software update to its AirMagnet Enterprise product last week, the Wi-Fi security division of Fluke Networks added code specifically crafted to detect the Parrot AR Drone, a popular unmanned aerial vehicle that costs a few hundred dollars and can be controlled using a smartphone or tablet. Drones themselves don't pose any special threat to Wi-Fi networks, and AirMagnet isn't issuing air pistols to its customers to shoot them down. The reason the craft are dangerous is that they can be modified to act as rogue access points and sent into range of a victim's wireless network, potentially breaking into a network to steal data."

MIT' Combines Carbon Foam and Graphite Flakes For Efficient Solar Steam Generati

timothy posted 5 hours ago | from the science-fiction-future-awaits dept.

Technology 79

rtoz (2530056) writes Researchers at MIT have developed a new spongelike material structure which can use 85% of incoming solar energy for converting water into steam. This spongelike structure has a layer of graphite flakes and an underlying carbon foam. This structure has many small pores. It can float on the water, and it will act as an insulator for preventing heat from escaping to the underlying liquid. As sunlight hits the structure, it creates a hotspot in the graphite layer, generating a pressure gradient that draws water up through the carbon foam. As water seeps into the graphite layer, the heat concentrated in the graphite turns the water into steam. This structure works much like a sponge. It is a significant improvement over recent approaches to solar-powered steam generation. And, this setup loses very little heat in the process, and can produce steam at relatively low solar intensity. If scaled up, this setup will not require complex, costly systems to highly concentrate sunlight.

For Now, UK Online Pirates Will Get 4 Warnings -- And That's It

timothy posted 6 hours ago | from the on-high-alert dept.

Piracy 101

New submitter Tmackiller writes with an excerpt from VG247.com: The British government has decriminalised online video game, music and movie piracy, scrapping fuller punishment plans after branding them unworkable. Starting in 2015, persistent file-sharers will be sent four warning letters explaining their actions are illegal, but if the notes are ignored no further action will be taken. The scheme, named the Voluntary Copyright Alert Programme (VCAP), is the result of years of talks between ISPs, British politicians and the movie and music industries. The UK's biggest providers – BT, TalkTalk, Virgin and Sky – have all signed up to VCAP, and smaller ISPs are expected to follow suit. VCAP replaces planned anti-piracy measures that included cutting users' internet connections and creating a database of file-sharers. Geoff Taylor, chief executive of music trade body the BPI, said VCAP was about "persuading the persuadable, such as parents who do not know what is going on with their net connection." He added: "VCAP is not about denying access to the internet. It's about changing attitudes and raising awareness so people can make the right choice." Officials will still work to close and stem funding to file-sharing sites, but the news appears to mean that the British authorities have abandoned legal enforcement of online media piracy. Figures recently published by Ofcom said that nearly a quarter of all UK downloads were of pirated content." Tmackiller wants to know "Will this result in more private lawsuits against file sharers by the companies involved?"

A New Form of Online Tracking: Canvas Fingerprinting

Unknown Lamer posted 7 hours ago | from the subverting-features-for-evil-and-profit dept.

Privacy 149

New submitter bnortman (922608) was the first to write in with word of "a new research paper discussing a new form of user fingerprinting and tracking for the web using the HTML 5 <canvas> ." globaljustin adds more from an article at Pro Publica: Canvas fingerprinting works by instructing the visitor's Web browser to draw a hidden image. Because each computer draws the image slightly differently, the images can be used to assign each user's device a number that uniquely identifies it. ... The researchers found canvas fingerprinting computer code ... on 5 percent of the top 100,000 websites. Most of the code was on websites that use the AddThis social media sharing tools. Other fingerprinters include the German digital marketer Ligatus and the Canadian dating site Plentyoffish. ... Rich Harris, chief executive of AddThis, said that the company began testing canvas fingerprinting earlier this year as a possible way to replace cookies ...

Print Isn't Dead: How Linux Voice Crowdfunded a New Magazine

Unknown Lamer posted 10 hours ago | from the something-about-paper dept.

The Media 45

M-Saunders (706738) writes The death of print has been predicted for years, and many magazines and publishers have taken a big hit with the rise of eBooks and tablets. But not everyone has given up. Four geeks quit their job at an old Linux magazine to start Linux Voice, an independent GNU/Linux print and digital mag with a different publishing model: giving profits and content back to the community. Six months after a successful crowdfunding campaign, the magazine is going well, so here is the full story.

Experiment Shows People Exposed To East German Socialism Cheat More

Unknown Lamer posted 12 hours ago | from the roll-high-or-be-sent-to-siberia dept.

Science 422

An anonymous reader writes The Economist reports, "'UNDER capitalism', ran the old Soviet-era joke, 'man exploits man. Under communism it is just the opposite.' In fact new research suggests that the Soviet system inspired not just sarcasm but cheating too: in East Germany, at least, communism appears to have inculcated moral laxity. Lars Hornuf of the University of Munich and Dan Ariely, Ximena García-Rada and Heather Mann of Duke University ran an experiment last year to test Germans' willingness to lie for personal gain. Some 250 Berliners were randomly selected to take part in a game where they could win up to €6 ($8). ... The authors found that, on average, those who had East German roots cheated twice as much as those who had grown up in West Germany under capitalism. They also looked at how much time people had spent in East Germany before the fall of the Berlin Wall. The longer the participants had been exposed to socialism, the greater the likelihood that they would claim improbable numbers ... when it comes to ethics, a capitalist upbringing appears to trump a socialist one."

MIT's Ted Postol Presents More Evidence On Iron Dome Failures

Unknown Lamer posted yesterday | from the makes-for-good-tv dept.

The Military 320

Lasrick (2629253) writes In a controversial article last week, MIT physicist Ted Postol again questioned whether Israel's vaunted Iron Dome rocket defense system actually works. This week, he comes back with evidence in the form of diagrams, photos of Iron Dome intercepts and contrails, and evidence on the ground to show that Iron Dome in fact is effective only about 5% of the time. Postol believes the real reason there are so few Israeli casualties is that Hamas rockets have very small warheads (only 10 to 20 pounds), and also Israel's outstanding civil defense system, which includes a vast system of shelters and an incredibly sophisticated rocket attack warning system (delivered through smart phones, among other ways).

No RIF'd Employees Need Apply For Microsoft External Staff Jobs For 6 Months

Unknown Lamer posted yesterday | from the no-workers-rights-for-you dept.

Microsoft 233

theodp (442580) writes So, what does Microsoft do for an encore after laying off 18,000 employees with a hilariously bad memo? Issue another bad memo — Changes to Microsoft Network and Building Access for External Staff — "to introduce a new policy [retroactive to July 1] that will better protect our Microsoft IP and confidential information." How so? "The policy change affects [only] US-based external staff (including Agency Temporaries, Vendors and Business Guests)," Microsoft adds, "and limits their access to Microsoft buildings and the Microsoft corporate network to a period of 18 months, with a required six-month break before access may be granted again." Suppose Microsoft feels that's where the NSA went wrong with Edward Snowden? And if any soon-to-be-terminated Microsoft employees hope to latch on to a job with a Microsoft external vendor to keep their income flowing, they best think again. "Any Microsoft employee who separated from Microsoft on or after July 1, 2014," the kick-em-while-they're-down memo explains, "will be required to take a minimum 6-month break from access between the day the employee separates from Microsoft and the date when the former employee may begin an assignment as an External Staff performing services for Microsoft." Likely not just to prevent leaks, but also to prevent any contractors from being reclassified as employees.

Rupert Murdoch's Quest To Buy Time Warner: Not Done Yet

Unknown Lamer posted yesterday | from the please-give-up dept.

The Media 60

Presto Vivace (882157) writes It seems that Murdoch's desire to acquire Time Warner predates his acquisition of Fox, and continues in spite of Time Warner's recent refusal. The possible deal is important in and of itself, but it also affects the future leadership of Fox. From the article: "Murdoch's skill is not just hiring the right people; he has been able to maintain control over them. They have his support as long as they produce results. His executives are the hired help. There is never any threat to his control. When a Murdoch favourite begins to get more headlines than the chairman, the clock begins ticking for their departure. But with the Time Warner bid, that balance may change. Chase Carey has put together a deal that, because of Murdoch's history, is almost irresistible to him. But it's a deal only Carey can put together. If he succeeds, the $US160 billion company that will emerge will be an ungainly beast that will depend on Carey making the merger work. He's indispensable." Clearly we have not heard the last of this.

Mimicking Vesicle Fusion To Make Gold Nanoparticles Easily Penetrate Cells

Unknown Lamer posted yesterday | from the golden-hypospray dept.

Medicine 19

rtoz (2530056) writes A special class of tiny gold particles can easily slip through cell membranes, making them good candidates to deliver drugs directly to target cells. A new study from MIT materials scientists reveals that these nanoparticles enter cells by taking advantage of a route normally used in vesicle-vesicle fusion, a crucial process that allows signal transmission between neurons. MIT engineers created simulations of how a gold nanoparticle coated with special molecules can penetrate a membrane. Paper (abstract; full text paywalled).

The Loophole Obscuring Facebook and Google's Transparency Reports

samzenpus posted yesterday | from the fuzzy-math dept.

Facebook 18

Jason Koebler writes The number of law enforcement requests coming from Canada for information from companies like Facebook and Google are often inaccurate thanks to a little-known loophole that lumps them in with U.S. numbers. For example, law enforcement and government agencies in Canada made 366 requests for Facebook user data in 2013, according to the social network's transparency reports. But that's not the total number. An additional 16 requests are missing, counted instead with U.S. requests thanks to a law that lets Canadian agencies make requests with the U.S. Department of Justice.

NASA Names Building For Neil Armstrong

samzenpus posted yesterday | from the new-name dept.

NASA 50

An anonymous reader writes A building at NASA's Kennedy Space Center in Florida, where Apollo astronauts once trained, was named in honor of astronaut Neil Armstrong. Armstrong, who died in 2012, was remembered at a ceremony as not only an astronaut, but also as an aerospace engineer, test pilot, and university professor. NASA renamed the Operations and Checkout building, also known as the O&C, which is on the National Register of Historic Places. It has been the last stop for astronauts before their flights since 1965. It was also used to test and process Apollo spacecraft. Currently, it's where the Orion spacecraft is being assembled to send astronauts to an asteroid and later to Mars.

The "Rickmote Controller" Can Hijack Any Google Chromecast

samzenpus posted yesterday | from the never-going-to-give-you-up dept.

Google 125

redletterdave writes Dan Petro, a security analyst for the Bishop Fox IT consulting firm, built a proof of concept device that's able to hack into any Google Chromecasts nearby to project Rick Astley's "Never Gonna Give You Up," or any other video a prankster might choose. The "Rickmote," which is built on top of the $35 Raspberry Pi single board computer, finds a local Chromecast device, boots it off the network, and then takes over the screen with multimedia of one's choosing. But it gets worse for the victims: If the hacker leaves the range of the device, there's no way to regain control of the Chromecast. Unfortunately for Google, this is a rather serious issue with the Chromecast device that's not too easy to fix, as the configuration process is an essential part of the Chromecast experience.

Activist Group Sues US Border Agency Over New, Vast Intelligence System

samzenpus posted yesterday | from the lets-see-what-you-have-there dept.

Government 77

An anonymous reader writes with news about one of the latest unanswered FOIA requests made to the Department of Homeland Security and the associated lawsuit the department's silence has brought. The Electronic Privacy Information Center (EPIC) has sued the United States Customs and Border Protection (CBP) in an attempt to compel the government agency to hand over documents relating to a relatively new comprehensive intelligence database of people and cargo crossing the US border. EPIC's lawsuit, which was filed last Friday, seeks a trove of documents concerning the 'Analytical Framework for Intelligence' (AFI) as part of a Freedom of Information Act (FOIA) request. EPIC's April 2014 FOIA request went unanswered after the 20 days that the law requires, and the group waited an additional 49 days before filing suit. The AFI, which was formally announced in June 2012 by the Department of Homeland Security (DHS), consists of "a single platform for research, analysis, and visualization of large amounts of data from disparate sources and maintaining the final analysis or products in a single, searchable location for later use as well as appropriate dissemination."

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...