Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

A Movie of Triton Made From Voyager 2's Fly-by 25 Years Ago

Soulskill posted 4 minutes ago | from the pretty-pictures dept.

Media 0

schwit1 writes: Using restored images taken by Voyager 2 when it flew past Neptune's moon Triton 25 years ago, scientists have produced a new map and flyby movie of the moon. "The new Triton map has a resolution of 1,970 feet (600 meters) per pixel. The colors have been enhanced to bring out contrast but are a close approximation to Triton's natural colors. Voyager's "eyes" saw in colors slightly different from human eyes, and this map was produced using orange, green and blue filter images. ... Although Triton is a moon of a planet and Pluto is a dwarf planet, Triton serves as a preview of sorts for the upcoming Pluto encounter. Although both bodies originated in the outer solar system, Triton was captured by Neptune and has undergone a radically different thermal history than Pluto. Tidal heating has likely melted the interior of Triton, producing the volcanoes, fractures and other geological features that Voyager saw on that bitterly cold, icy surface. Pluto is unlikely to be a copy of Triton, but some of the same types of features may be present." Dr. Paul Schenk provides provides further information on his blog, and the movie can be viewed here.

Students From States With Faster Internet Tend To Have Higher Test Scores

Soulskill posted about an hour ago | from the in-before-correlation-!=-causation dept.

The Internet 56

An anonymous reader sends word of correlation found between higher internet speeds and higher test scores. Quoting: The numbers—first crunched by the Internet provider comparison site HSI — show a distinct trend between faster Internet and higher ACT test scores. On the high end, Massachusetts scores big with an average Internet speed of 13.1Mbps, and an average ACT test score of 24.1. Mississippi, on the other hand, has an average speed of just 7.6Mbps and an average score of 18.9.

In between those two states, the other 48 fall in a positive correlation that, while not perfect, is quite undeniable. According to HSI's Edwin Ivanauskas, the correlation is stronger than that between household income and test scores, which have long been considered to be firmly connected to each other. The ACT scores were gathered from ACT.org, which has the official rankings and averages for the 2013 test, and the speed ratings were taken from Internet analytics firm Akamai's latest report.

What's After Big Data?

Soulskill posted 1 hour ago | from the i'm-sure-the-marketroids-have-something-in-mind dept.

Businesses 43

gthuang88 writes: As the marketing hype around "big data" subsides, a recent wave of startups is solving a new class of data-related problems and showing where the field is headed. Niche analytics companies like RStudio, Vast, and FarmLink are trying to provide insights for specific industries such as finance, real estate, and agriculture. Data-wrangling software from startups like Tamr and Trifacta is targeting enterprises looking to find and prep corporate data. And heavily funded startups such as Actifio and DataGravity are trying to make data-storage systems smarter. Together, these efforts highlight where emerging data technologies might actually be used in the business world.

Researchers Made a Fake Social Network To Infiltrate China's Internet Censors

Soulskill posted 2 hours ago | from the inside-job dept.

Censorship 28

Jason Koebler writes: In order to get inside China's notorious internet filter, Harvard researcher Gary King created his own fake social network to gain access to the programs used to censor content, so he could reverse-engineer the system. "From inside China, we created our own social media website, purchased a URL, rented server space, contracted with one of the most popular software platforms in China used to create these sites, submitted, automatically reviewed, posted, and censored our own submissions," King wrote in a study published in Science. "We had complete access to the software; we were even able to get their recommendations on how to conduct censorship on our own site in compliance with government standards."

33 Months In Prison For Recording a Movie In a Theater

Soulskill posted 3 hours ago | from the know-when-to-fold-'em dept.

Piracy 240

An anonymous reader writes: Philip Danks used a camcorder to record Fast & Furious 6 in a U.K. cinema. Later, he shared it via bittorrent and allegedly sold physical copies. Now, he's been sentenced to 33 months in prison for his actions. "In Court it was claimed that Danks' uploading of Fast 6 resulted in more than 700,000 downloads, costing Universal Pictures and the wider industry millions of pounds in losses." Danks was originally told police weren't going to take any action against him, but he unwisely continued to share the movie files after his initial detainment with authorities.

Tech Looks To Obama To Save Them From 'Just Sort of OK' US Workers

Soulskill posted 3 hours ago | from the right-in-the-pride dept.

Businesses 248

theodp writes Following up on news that the White House met with big biz on immigration earlier this month, Bloomberg sat down with Joe Green, the head of Mark Zuckerberg's Fwd.US PAC, to discuss possible executive actions President Obama might take on high tech immigration (video) in September. "Hey, Joe," asked interviewer Alix Steel. "All we keep hearing about this earnings season though from big tech is how they're actually cutting jobs. If you look at Microsoft, Cisco, IBM, Hewlett-Packard, why do the tech companies then need more tech visas?" Green explained why tech may not want to settle for laid-off U.S. talent when the world is its oyster. "The difference between someone who's truly great and just sort of okay is really huge," Green said. "Culture in tech is a very meritocratic culture," he added. "The vast, vast majority of tech engineers that I talked to who are from the United States are very supportive of bringing in people from other countries because they want to work with the very best."

NSA Agents Leak Tor Bugs To Developers

Soulskill posted 4 hours ago | from the right-hand-thinks-the-left-hand-is-a-jerk dept.

Encryption 81

An anonymous reader writes: We've known for a while that NSA specifically targets Tor, because they want to disrupt one of the last remaining communication methods they aren't able to tap or demand access to. However, not everybody at the NSA is on board with this strategy. Tor developer Andrew Lewman says even as flaws in Tor are rooted out by the NSA and British counterpart GCHQ, other agents from the two organizations leak those flaws directly to the developers, so they can be fixed quickly. He said, "You have to think about the type of people who would be able to do this and have the expertise and time to read Tor source code from scratch for hours, for weeks, for months, and find and elucidate these super-subtle bugs or other things that they probably don't get to see in most commercial software." Lewman estimates the Tor Project receives these reports on a monthly basis. He also spoke about how a growing amount of users will affect Tor. He suggests a massive company like Google or Facebook will eventually have to take up the task of making Tor scale up to millions of users.

It's Easy To Hack Traffic Lights

Soulskill posted 5 hours ago | from the looking-forward-to-the-mobile-app dept.

Transportation 97

An anonymous reader notes coverage of research from the University of Michigan into the ease with which attackers can hack traffic lights. From the article: As is typical in large urban areas, the traffic lights in the subject city are networked in a tree-type topology, allowing them to pass information to and receive instruction from a central management point. The network is IP-based, with all the nodes (intersections and management computers) on a single subnet. In order to save on installation costs and increase flexibility, the traffic light system uses wireless radios rather than dedicated physical networking links for its communication infrastructure—and that’s the hole the research team exploited. ... The 5.8GHz network has no password and uses no encryption; with a proper radio in hand, joining is trivial. ... The research team quickly discovered that the debug port was open on the live controllers and could directly "read and write arbitrary memory locations, kill tasks, and even reboot the device (PDF)." Debug access to the system also let the researchers look at how the controller communicates to its attached devices—the traffic lights and intersection cameras. They quickly discovered that the control system’s communication was totally non-obfuscated and easy to understand—and easy to subvert.

UPS: We've Been Hacked

samzenpus posted 5 hours ago | from the protect-ya-neck dept.

Security 48

paysonwelch writes The United Parcel Service announced that customers' credit and debit card information at 51 franchises in 24 states may have been compromised. There are 4,470 franchised center locations throughout the U.S., according to UPS. The malware began to infiltrate the system as early as January 20, but the majority of the attacks began after March 26. UPS says the threat was eliminated as of August 11 and that customers can shop safely at all locations.

Would Scottish Independence Mean the End of UK's Nuclear Arsenal?

samzenpus posted 8 hours ago | from the there-goes-the-boom dept.

United Kingdom 303

Lasrick writes The referendum on Scottish independence on September 18th affects more than just residents of the United Kingdom. All of the UK's nuclear deterrent is located in Scotland, and Alex Salmond and the Scottish government have pledged to safely remove and permanently ban nuclear weapons from Scottish territory within the first term of a newly independent parliament.

Scientists Confirm Life Under Antarctic Ice

samzenpus posted 9 hours ago | from the cold-living dept.

Science 45

MikeChino writes A new paper by a group of researchers from Montana State University confirms that life can survive under antarctic ice. Researchers led by John Priscu drilled down into the West Antarctic Ice Sheet and pulled up organisms called Archaea. These organisms survive by converting methane into energy, enabling them to survive where there is no wind or sunlight, buried deep under the ice.

UK Police Warn Sharing James Foley Killing Video Is a Crime

samzenpus posted 10 hours ago | from the do-not-pass-go dept.

United Kingdom 321

An anonymous reader points out that UK authorities have warned that sharing the video of the James Foley murder could lead to prosecution under anti-terror laws. Scotland Yard has warned internet users they could be arrested under terrorism legislation if they viewed or shared the video of James Foley's murder, as Twitter and YouTube attempted to remove all trace of the footage from the web. Twitter suspended dozens of accounts that published the graphic footage while YouTube tried to remove several copies of the video, which was first uploaded on Tuesday night. Twitter CEO Dick Costolo tweeted: "We have been and are actively suspending accounts as we discover them related to this graphic imagery. Thank you." The unprecedented social media clampdown came as the Metropolitan police warned that even viewing the video could constitute a criminal offence in the UK. The force said in a statement: "The MPS counter-terrorism command (SO15) is investigating the contents of the video that was posted online in relation to the alleged murder of James Foley. We would like to remind the public that viewing, downloading or disseminating extremist material within the UK may constitute an offence under terrorism legislation."

The Star That Exploded At the Dawn of Time

samzenpus posted 13 hours ago | from the in-the-beginning dept.

Space 38

sciencehabit writes To probe the dawn of time, astronomers usually peer far away; but now they've made a notable discovery close to home. An ancient star a mere thousand light-years from Earth bears chemical elements that may have been forged by the death of a star that was both extremely massive and one of the first to arise after the big bang. If confirmed, the finding means that some of the universe's first stars were so massive they died in exceptionally violent explosions that altered the growth of early galaxies.

Cause of Global Warming 'Hiatus' Found Deep In the Atlantic

samzenpus posted yesterday | from the biggest-heatsink dept.

Earth 293

vinces99 writes with news about a study that may account for a slowdown in air temperature rises. Following rapid warming in the late 20th century, this century has so far seen surprisingly little increase in the average temperature at the Earth's surface. More than a dozen theories have now been proposed for the so-called global warming hiatus, ranging from air pollution to volcanoes to sunspots. New research from the University of Washington shows the heat absent from the surface is plunging deep in the north and south Atlantic Ocean, and is part of a naturally occurring cycle. The study is published in Science. Subsurface ocean warming explains why global average air temperatures have flatlined since 1999, despite greenhouse gases trapping more solar heat at the Earth's surface. "Every week there's a new explanation of the hiatus," said corresponding author Ka-Kit Tung, a UW professor of applied mathematics and adjunct faculty member in atmospheric sciences. "Many of the earlier papers had necessarily focused on symptoms at the surface of the Earth, where we see many different and related phenomena. We looked at observations in the ocean to try to find the underlying cause." What they found is that a slow-moving current in the Atlantic, which carries heat between the two poles, sped up earlier this century to draw heat down almost a mile (1,500 meters). Most previous studies focused on shorter-term variability or particles that could block incoming sunlight, but they could not explain the massive amount of heat missing for more than a decade.

Scientists Developing Remote-Control Cyborg Moths

samzenpus posted yesterday | from the stay-out-of-the-light dept.

Technology 24

Zothecula writes We've been hearing a lot about the development of tiny flying sensor-equipped robots, that could be sent into areas such as disaster sites to seek out survivors or survey the damage. However, why go to the trouble of designing those robots from scratch, when there are already ready-made insects that are about the right size? That's the thinking behind research being conducted at North Carolina State University, which is aimed at converting moths into "biobots".

How Does Tesla Build a Supercharger Charging Site?

samzenpus posted yesterday | from the power-up dept.

Transportation 142

cartechboy writes Tesla's Superchargers are the talk of the electric car community. These charging stations can take a Model S battery pack from nearly empty to about 150 miles of range in around 30 minutes. That's crazy fast, and it's nothing short of impressive. But what does it take to actually build a Tesla Supercharger site? Apparently a lot of digging. A massive trench is created to run high-capacity electric cables before the charging stations themselves are even installed. A diagram and photos of the Electric Conduit Construction build out have surfaced on the Internet. The conduits connect the charging stations to a power distribution center, which in turn is connected to a transformer that provides the power for charging cars. It took 11 days to install the six charging stalls in Goodland, Kansas. If you thought it was a quick process to build a Supercharger station, you were clearly wrong.

FCC Warned Not To Take Actions a Republican-Led FCC Would Dislike

samzenpus posted yesterday | from the you-wouldn't-like-me-whn-I'm-angry dept.

The Internet 308

tlhIngan writes Municipal broadband is in the news again — this time Chief of Staff Matthew Berry, speaking at the National Conference of State Legislatures, has endorsed states' right to ban municipal broadband networks and warned the (Democrat-led) FCC to not do anything that a future Republican led FCC would dislike. The argument is that municipal broadband discourages private investment in broadband communications, that taxpayer-funded projects are barriers to future infrastructure investment.

Latest Wikipedia Uproar Over 'Superprotection'

Soulskill posted yesterday | from the like-regular-protection,-but-super dept.

Wikipedia 222

metasonix writes: As if the problems brought up during the recent 2014 Wikimania conference weren't enough, now Wikipedia is having an outright battle between its editor and administrator communities, especially on the German-language Wikipedia. The Wikimedia Foundation, currently flush with cash from its donors, keeps trying to force flawed new software systems onto the editor community, who has repeatedly responded by disabling the software. This time, however, Foundation Deputy Director Erik Moeller had the bright idea to create a new level of page protection to prevent the new software from being disabled. "Superprotection" has resulted in an outright revolt on the German Wikipedia. There has been subsequent coverage in the German press, and people have issued demands that Moeller, one of Wikipedia's oldest insiders, be removed from his job. One English Wikipedia insider started a change.org petition demanding the removal of superprotection."

Future Hack: New Cybersecurity Tool Predicts Breaches Before They Happen

Soulskill posted yesterday | from the do-androids-dream-of-electric-wolves? dept.

Security 31

An anonymous reader writes: A new research paper (PDF) outlines security software that scans and scrapes web sites (past and present) to identify patterms leading up to a security breach. It then accurately predicts what websites will be hacked in the future. The tool has an accuracy of up to 66%. Quoting: "The algorithm is designed to automatically detect whether a Web server is likely to become malicious in the future by analyzing a wide array of the site's characteristics: For example, what software does the server run? What keywords are present? How are the Web pages structured? If your website has a whole lot in common with another website that ended up hacked, the classifier will predict a gloomy future. The classifier itself always updates and evolves, the researchers wrote. It can 'quickly adapt to emerging threats.'"

NASA's Space Launch System Searches For a Mission

Soulskill posted yesterday | from the attack-titan-for-its-oil dept.

Space 50

schwit1 writes: Managers of NASA's Space Launch System (SLS) are searching for a mission that they can propose and convince Congress to fund. "Once SLS is into the 2020s, the launch rate should see the rocket launching at least once per year, ramping up to a projected three times per year for the eventual Mars missions. However, the latter won’t be until the 2030s. With no missions manifested past the EM-2 flight, the undesirable question of just how 'slow' a launch rate would be viable for SLS and her workforce has now been asked." Meanwhile, two more Russian rocket engines were delivered yesterday, the first time that's happened since a Russian official threatened to cut off the supply. Another shipment of three engines is expected later this year. In Europe, Arianespace and the European Space Agency signed a contract today for the Ariane 5 rocket to launch 12 more of Europe’s Galileo GPS satellites on three launches. This situation really reminds me of the U.S. launch market in the 1990s, when Boeing and Lockheed Martin decided that, rather than compete with Russia and ESA for the launch market, they instead decided to rely entirely on U.S. government contracts, since those contracts didn’t really demand that they reduce their costs significantly to compete.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>