An anonymous reader writes: Hackathons are common these days, but you don't often hear about events hosted by law enforcement. That's what the Seattle Police Department did on Friday, with the solitary goal of finding a good way to redact the video streams taken by police body cameras and dash cameras. Seven different teams demonstrated solutions, but in the end, none thought automation could realistically handle the task in the near future. "The Washington State public records act requires that almost all video filmed by any government agency – including police – be disclosed upon request. The only real exception is for video which is part of an open case currently under investigation. However, various parts of the state code include other restrictions – the identity of minors cannot be disclosed. Requests from victims or witnesses who may be at risk if their identities are disclosed also must be honored. However in all such cases the video still must be released – it is just the faces or other potential identifying characteristics, which might include gender or even a person's gait – which need to be blurred and redacted." The city just started a pilot program for body-worn police cameras.
Rob Y. writes:
The discussion on Slashdot about Microsoft's move to open source .NET core has centered on:
1. whether this means Microsoft is no longer the enemy of the open source movement
2. if not, then does it mean Microsoft has so lost in the web server arena that it's resorting to desperate moves.
3. or nah — it's standard Microsoft operating procedure. Embrace, extend, extinguish.
What I'd like to ask is whether anybody that's not currently a .NET fan actually wants to use it? Open source or not. What is the competition? Java? PHP? Ruby? Node.js? All of the above? Anything but Microsoft? Because as an OSS advocate, I see only one serious reason to even consider using it — standardization. Any of those competing platforms could be as good or better, but the problem is: how to get a job in this industry when there are so many massively complex platforms out there. I'm still coding in C, and at 62, will probably live out my working days doing that. But I can still remember when learning a new programming language was no big deal. Even C required learning a fairly large library to make it useful, but it's nothing compared to what's out there today. And worse, jobs (and technologies) don't last like they used to. Odds are, in a few years, you'll be starting over in yet another job where they use something else.
Employers love standardization. Choosing a standard means you can't be blamed for your choice. Choosing a standard means you can recruit young, cheap developers and actually get some output from them before they move on. Or you can outsource with some hope of success (because that's what outsourcing firms do — recruit young, cheap devs and rotate them around). To me, those are red flags — not pluses at all. But they're undeniable pluses to greedy employers. Of course, there's much more to being an effective developer than knowing the platform so you can be easily slotted in to a project. But try telling that to the private equity guys running too much of the show these days.
So, assuming Microsoft is sincere about this open source move,
1. Is .NET up to the job?
2. Is there an open source choice today that's popular enough to be considered the standard that employers would like?
3. If the answer to 1 is yes and 2 is no, make the argument for avoiding .NET.
An anonymous reader writes: Ars Technica summaries a study by the Chicago Tribune (paywalled) that found red light cameras do not improve driver safety. "[W]hile right angle crash incidents have been reduced, rear-end crashes that resulted in injuries went up 22 percent." Chicago officials recently claimed that the cameras led to a 47% reduction "T-bone" injury crashes, using that statistic as evidence that the program is worthwhile. But the study's authors, who "accounted for declining accident rates in recent years as well as other confounding factors, found cameras reduced right-angle crashes that caused injuries by just 15 percent."
They also noted that the city chose to install many cameras at intersections where crashes were rare to begin with. Chicago has raised roughly $500 million from red light camera tickets since 2002. "[O]fficials recently admitted to the city inspector general that they had quietly dropped the threshold for what constitutes a red light camera ticket, allowing the tickets even when cameras showed a yellow light time just under the three-second federal minimum standard. That shift earlier this year snared 77,000 more drivers and $7.7 million in ticket revenue before the city agreed to change the threshold back.
SternisheFan writes: The original Starship Enterprise was on a 5-year mission, but the original series was canceled after the third year. A continuation of Star Trek:TOS is being created by a dedicated cast and crew intent on keeping true to the spirit of Gene Roddenberry's television show. From recreating the original sets with incredible accuracy and attention to details, staying faithful to original storylines has been a true labor of love for all involved. Here are a series of videos showing the progress being made on recreating the iconic series. (And if you missed it last time, here's the first episode they produced.)
mpicpp tips news that oceanographers have discovered a creature that sets the record for the most deeply dwelling fish on Earth. It was found in the Mariana Trench, some 8,145 meters below the surface.
The 30-day voyage took place from the Schmidt Ocean Institute's research vessel, Falkor, and is the most comprehensive survey of world's deepest place ever undertaken. The Hadal Ecosystem Studies (Hades) team deployed unmanned landers more than 90 times to depths that ranged between 5,000m and 10,600m. They studied both steep walls of the undersea canyon. ... Dr. Jamieson said: "We think it is a snailfish, but it's so weird-looking; it's up in the air in terms of what it is. "It is unbelievably fragile, and when it swims, it looks like it has wet tissue paper floating behind it. And it has a weird snout — it looks like a cartoon dog snout."
jones_supa writes: A North Korean official said that the secretive regime wants to mount a joint investigation with the United States to identify who was behind the cyber attack against Sony Pictures. An unnamed spokesman of the North Korean foreign ministry was quoted by the country's state news agency, KCNA, describing U.S. claims they were behind the hack as "slander." "As the United States is spreading groundless allegations and slandering us, we propose a joint investigation with it into this incident," the official said, according to Agence France-Presse. Both the FBI and President Barack Obama have said evidence was uncovered linking the hack to to North Korea, but some experts have questioned the evidence tying the attack to Pyongyang.
Meanwhile, reader hessian notes that 2600: The Hacker Quarterly has offered to let the hacker community distribute The Interview for Sony. It's an offer Sony may actually find useful, since the company is now considering releasing the movie on a "different platform." Reader Nicola Hahn warns that we shouldn't be too quick to accept North Korea as the bad guy in this situation:
Most of the media has accepted North Korea's culpability with little visible skepticism. There is one exception: Kim Zetter at Wired has decried the evidence as flimsy and vocally warns about the danger of jumping to conclusions. Surely we all remember high-ranking, ostensibly credible, officials warning about the smoking gun that comes in the form of a mushroom cloud? This underscores the ability of the agenda-setting elements of the press to frame issues and control the acceptable limits of debate. Some would even say that what's happening reveals tools of modern social control (PDF).
Whether or not they're responsible for the attack, North Korea has now warned of "serious consequences" if the U.S. takes action against them for it.
Paul Fernhout writes: An article in the Harvard Business Review by William H. Davidow and Michael S. Malone suggests: "The "Second Economy" (the term used by economist Brian Arthur to describe the portion of the economy where computers transact business only with other computers) is upon us. It is, quite simply, the virtual economy, and one of its main byproducts is the replacement of workers with intelligent machines powered by sophisticated code. ... This is why we will soon be looking at hordes of citizens of zero economic value. Figuring out how to deal with the impacts of this development will be the greatest challenge facing free market economies in this century. ... Ultimately, we need a new, individualized, cultural, approach to the meaning of work and the purpose of life. Otherwise, people will find a solution — human beings always do — but it may not be the one for which we began this technological revolution."
This follows the recent Slashdot discussion of "Economists Say Newest AI Technology Destroys More Jobs Than It Creates" citing a NY Times article and other previous discussions like Humans Need Not Apply. What is most interesting to me about this HBR article is not the article itself so much as the fact that concerns about the economic implications of robotics, AI, and automation are now making it into the Harvard Business Review. These issues have been otherwise discussed by alternative economists for decades, such as in the Triple Revolution Memorandum from 1964 — even as those projections have been slow to play out, with automation's initial effect being more to hold down wages and concentrate wealth rather than to displace most workers. However, they may be reaching the point where these effects have become hard to deny despite going against mainstream theory which assumes infinite demand and broad distribution of purchasing power via wages.
As to possible solutions, there is a mention in the HBR article of using government planning by creating public works like infrastructure investments to help address the issue. There is no mention in the article of expanding the "basic income" of Social Security currently only received by older people in the U.S., expanding the gift economy as represented by GNU/Linux, or improving local subsistence production using, say, 3D printing and gardening robots like Dewey of "Silent Running." So, it seems like the mainstream economics profession is starting to accept the emerging reality of this increasingly urgent issue, but is still struggling to think outside an exchange-oriented box for socioeconomic solutions. A few years ago, I collected dozens of possible good and bad solutions related to this issue. Like Davidow and Malone, I'd agree that the particular mix we end up will be a reflection of our culture. Personally, I feel that if we are heading for a technological "singularity" of some sort, we would be better off improving various aspects of our society first, since our trajectory going out of any singularity may have a lot to do with our trajectory going into it.
Rambo Tribble writes: It sounds like a Mission: Impossible scenario, but aerospace company Boeing is teaming with Canadian phone maker BlackBerry to produce an ultra-secure mobile phone that "self-destructs." The phone uses encryption on calls and is intended to serve the high-security needs of government and industry. As Blackberry CEO John Chen said, "We're pleased to announce that Boeing is collaborating with BlackBerry to provide a secure mobile solution for Android devices utilizing our BES 12 platform. That, by the way, is all they allow me to say."
No word yet if you'll need the services of the bomb squad when you go over your minutes.
SternisheFan sends a report from scientists who were tracking a group of birds — golden-winged warblers — in the Appalachian mountains. Just a few days after the birds completed their seasonal migration, they did something odd — they picked up and moved again. Shortly thereafter, a series of storms swept through that area of the U.S., which led to a destructive tornado outbreak (abstract).
After the storm had blown over, the team recaptured five of the warblers and removed the geolocators. These are tiny devices weighing about half a gram, which measure light levels. Based on the timing and length of the days they record, these gadgets allow scientists to calculate and track the approximate location of migratory birds. In this case, all five indicated that the birds had taken unprecedented evasive action, beginning one to two days ahead of the storm's arrival. "The warblers in our study flew at least 1,500km (932 miles) in total," Dr. Streby said. They escaped just south of the tornadoes' path — and then went straight home again. By 2 May, all five were back in their nesting area."
schwit1 writes: A careful updating of the geological timeline has shown that massive volcanic eruptions aligned with the extinction event that wiped out the non-avian dinosaurs 66 million years ago (abstract). "A primeval volcanic range in western India known as the Deccan Traps, which were once three times larger than France, began its main phase of eruptions roughly 250,000 years before the Cretaceous-Paleogene, or K-Pg, extinction event, the researchers report in the journal Science. For the next 750,000 years, the volcanoes unleashed more than 1.1 million cubic kilometers (264,000 cubic miles) of lava. The main phase of eruptions comprised about 80-90 percent of the total volume of the Deccan Traps' lava flow and followed a substantially weaker first phase that began about 1 million years earlier.
The results support the idea that the Deccan Traps played a role in the K-Pg extinction, and challenge the dominant theory that a meteorite impact near present-day Chicxulub, Mexico, was the sole cause of the extinction. The researchers suggest that the Deccan Traps eruptions and the Chicxulub impact need to be considered together when studying and modeling the K-Pg extinction event."
HughPickens.com writes: Victoria Shannon reports in the NY Times that fifty years ago was a good year for music, with the Beatles appearing on Billboard's charts for the first time, the Rolling Stones releasing their first album, the Supremes with five No. 1 hits, and Simon and Garfunkel releasing their debut album. The 50-year milestone is significant, because music published within the first half-century of its recording gets another 20 years of copyright protection under changes in European law. So every year since 2012, studios go through their tape vaults to find unpublished music to get it on the market before the deadline.
The first year, Motown released a series of albums packed with outtakes by some of its major acts, and Sony released a limited-edition collection of 1962 outtakes by Bob Dylan, with the surprisingly frank title, "The Copyright Extension Collection, Vol. I." In 2013, Sony released a second Dylan set, devoted to previously unreleased 1963 recordings. Similar recordings by the Beatles and the Beach Boys followed. This year, Sony is releasing a limited-edition nine-LP set of 1964 recordings by Dylan, including a 46-second try at "Mr. Tambourine Man," which he would not complete until 1965. The Beach Boys released two copyright-extension sets of outtakes last week. And while there's no official word on a Beatles release, last year around this time, "The Beatles Bootleg Recordings 1963" turned up unannounced on iTunes.
MojoKid (1002251) writes Tech support scammers have been around for a long time and are familiar to most Slashdot readers. But last month, the Federal Trade Commission (FTC) announced that it had issued lawsuits against several culprits responsible for tech support scams. Now Microsoft has announced that it too is going after tech support scammers. According to the company, more than 65,000 complaints have been made about tech support scams since May of this year alone. Bogus technicians, pretending to represent Microsoft, call the house offering fake tech support and trick people into paying hundreds of dollars to solve a non-existent issue. If successful in their ruse, the scammer then gains access to a person's computer, which lets them steal personal and financial information and even install malware.
I managed to keep one of these guys on the phone for about 20 minutes while I stumbled through his directions, over and over, "rebooting," pretending to be using Windows, etc; the next one caught on my quickly. Have they called you? If so, how did the call go?
Nerval's Lobster writes Ever since 3-D printing began to enter the mainstream, people have discussed the technology's potential for building prosthetic arms and legs for human beings. But what about doing the same for dogs? In one of those videos that ends up circulated endlessly on the Internet, a dog named Derby, born with a congenital deformity that deprived him of front paws, is outfitted with a pair of 3-D-printed prosthetics. With those "legs" in place, the dog can run for the first time, at a pretty good clip. Both the prosthetics and the video were produced by 3D Systems, which builds 3-D printers, and it seems likely that other 3-D-printing companies will explore the possibility of printing off parts for pets. And while the idea of a cyborg pooch is heartwarming, it will be interesting to see how 3D printers will continue to advance the realm of human prosthetics, which have become increasingly sophisticated over the past decade.
wiredmikey writes Just hours after the FBI and President Obama called out North Korea as being responsible for the destructive cyber attack against Sony Pictures, US-CERT issued an alert describing the primary malware used by the attackers, along with indicators of compromise. While not mentioning Sony by name in its advisory, instead referring to the victim as a "major entertainment company," US-CERT said that the attackers used a Server Message Block (SMB) Worm Tool to conduct the attacks. According to the advisory, the SMB Worm Tool is equipped with five components, including a Listening Implant, Lightweight Backdoor, Proxy Tool, Destructive Hard Drive Tool, and Destructive Target Cleaning Tool. US-CERT also provided a list of the Indicators of Compromise (IOCs), which include C2 IP addresses, Snort signatures for the various components, host based Indicators, potential YARA signatures to detect malware binaries on host machines, and recommended security practices and tactical mitigations.
mpicpp writes with this excerpt from Fortune: Staples said Friday afternoon that nearly 1.16 million customer payment cards may have been affected in a data breach under investigation since October. The office-supply retailer said two months ago that it was working with law enforcement officials to look into a possible hacking of its customers' credit card data. Staples said in October that it had learned of a potential data theft at several of its U.S. stores after multiple banks noticed a pattern of payment card fraud suggesting the company computer systems had been breached. Now, Staples believes that point-of-sale systems at 115 Staples locations were infected with malware that thieves may have used to steal customers' names, payment card numbers, expiration dates and card verification codes, Staples said on Friday. At all but two of those stores, the malware would have had access to customer data for purchases made between August 10 and September 16 of this year. At the remaining two stores, the malware was active from July 20 through September 16, the company said.
Onnimikki writes James Stewart, author of the calculus textbooks many of us either loved or loved to hate, has died. In case you ever wondered what the textbook was funding, this story has the answer: a $32 million dollar home over-looking a ravine in Toronto, Canada.
itwbennett writes T-Mobile US will pay at least $90 million to settle a Federal Communications Commission (FCC) suit that alleged it looked the other way while third parties charged T-Mobile subscribers for services they didn't want. The settlement is the second largest ever for so-called 'cramming,' following one that the FCC reached with AT&T in October. It came just two days after the Consumer Financial Protection Bureau sued Sprint for the same practice.