Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

LTE Upgrade Will Let Phones Connect To Nearby Devices Without Towers

Soulskill posted 1 hour ago | from the just-yell-really-loud dept.

Communications 33

An anonymous reader sends this excerpt from MIT's Technology Review: A new feature being added to the LTE protocol that smartphones use to communicate with cellular towers will make it possible to bypass those towers altogether. Phones will be able to "talk" directly to other mobile devices and to beacons located in shops and other businesses. Known as LTE Direct, the wireless technology has a range of up to 500 meters, far more than either Wi-Fi or Bluetooth. It is included in update to the LTE standard slated for approval this year, and devices capable of LTE Direct could appear as soon as late 2015. ... Researchers are, for example, testing LTE Direct as a way to allow smartphones to automatically discover nearby people, businesses, and other information.

CloudFlare Announces Free SSL Support For All Customers

Soulskill posted 3 hours ago | from the big-step-in-the-right-direction dept.

Cloud 29

Z80xxc! writes: CloudFlare, a cloud service that sits between websites and the internet to provide a CDN, DDOS and other attack prevention, speed optimization, and other services announced today that SSL will now be supported for all customers, including free customers. This will add SSL support to approximately 2 million previously unprotected websites. Previously SSL was only available to customers paying at least $20/month for a "Pro" plan or higher.

Browsers connect to CloudFlare's servers and receive a certificate provided by CloudFlare. CloudFlare then connects to the website's server to retrieve the content, serving as a sort of reverse proxy. Different security levels allow CloudFlare to connect to the website host using no encryption, a self-signed certificate, or a verified certificate, depending on the administrator's preferences. CloudFlare's servers will use SNI for free accounts, which is unsupported for IE on Windows XP and older, and Android Browser on Android 2.2 and older.

Energy Utilities Trying To Stifle Growth of Solar Power

Soulskill posted 5 hours ago | from the fortunate-sun dept.

Power 199

An anonymous reader writes: Incremental improvements have been slowly but surely pushing solar power toward mainstream viability for a few decades now. It's getting to the point where the established utilities are worried about the financial hit they're likely to take — and they're working to prevent it. "These solar households are now buying less and less electricity, but the utilities still have to manage the costs of connecting them to the grid. Indeed, a new study from Lawrence Berkeley National Laboratory argues that this trend could put utilities in dire financial straits. If rooftop solar were to grab 10 percent of the market over the next decade, utility earnings could decline as much as 41 percent." The utilities are throwing their weight behind political groups seeking to end subsidies for solar and make "net metering" policies go away. Studies suggest that if solar adoption continues growing at its current rate, incumbents will be forced to raise their prices, which will only persuade more people to switch to solar (PDF).

Tor Executive Director Hints At Firefox Integration

Soulskill posted 6 hours ago | from the foxes-love-onions dept.

Encryption 61

blottsie writes: Several major tech firms are in talks with Tor to include the software in products that can potentially reach over 500 million Internet users around the world. One particular firm wants to include Tor as a "private browsing mode" in a mainstream Web browser, allowing users to easily toggle connectivity to the Tor anonymity network on and off. "They very much like Tor Browser and would like to ship it to their customer base," Tor executive director Andrew Lewman wrote, explaining the discussions but declining to name the specific company. "Their product is 10-20 percent of the global market, this is of roughly 2.8 billion global Internet users." The product that best fits Lewman's description, by our estimation, is Mozilla Firefox, the third-most popular Web browser online today and home to, you guessed it, 10 to 20 percent of global Internet users.

CEO of Spyware Maker Arrested For Enabling Stalkers

Soulskill posted 7 hours ago | from the reaping-what-you-sow dept.

Crime 115

An anonymous reader writes: U.S. authorities have arrested and indicted the CEO of a mobile software company for selling spyware that enables "stalkers and domestic abusers." The U.S. Department of Justice accuses the man of promoting and selling software that can "monitor calls, texts, videos and other communications on mobile phones without detection." The agency pointed out this is the first criminal case based on mobile spyware, and promised to aggressively pursue makers of similar software in the future. Here's the legal filing (PDF). The FBI, with approval from a District Court, has disabled the website hosting the software.

"The indictment alleges that StealthGenie's capabilities included the following: it recorded all incoming/outgoing voice calls; it intercepted calls on the phone to be monitored while they take place; it allowed the purchaser to call the phone and activate it at any time to monitor all surrounding conversations within a 15-foot radius; and it allowed the purchaser to monitor the user's incoming and outgoing e-mail messages and SMS messages, incoming voicemail messages, address book, calendar, photographs, and videos. All of these functions were enabled without the knowledge of the user of the phone."

Man Walks Past Security Screening Staring At iPad Causing Airport Evacuation

samzenpus posted 7 hours ago | from the paying-attention dept.

Australia 103

First time accepted submitter chentiangemalc writes While Australia is on "high alert" for terror threats a man walked past a Sydney Airport security screening while engrossed in his iPad and delayed flights for an hour. From the article: "This event was captured on CCTV and unnerved officials so much that they evacuated passengers. As the Sydney Morning Herald reported, the man found himself (or, perhaps, didn't) going into the terminal through an exit passage that clearly was convenient for him, but less convenient for the hordes of passengers who not only had to be removed from Terminal 3, but also re-screened. A spokeswoman for Qantas told the Morning Herald: 'The man disembarked a flight and left. It appears he wasn't paying attention, was looking at his iPad, forgot something and walked back past (the security area).'"

New Research Casts Doubt On the "10,000 Hour Rule" of Expertise

samzenpus posted 8 hours ago | from the some-amount-of-practice-makes-perfect dept.

Science 108

First time accepted submitter Scroatzilla writes What makes someone rise to the top in music, games, sports, business, or science? This question is the subject of one of psychology's oldest debates. Malcolm Gladwell's '10,000 hours' rule probably isn't the answer. Recent research has demonstrated that deliberate practice, while undeniably important, is only one piece of the expertise puzzle—and not necessarily the biggest piece.

Microsoft Revives Its Hardware Conference

samzenpus posted 9 hours ago | from the back-by-popular-demand dept.

Microsoft 40

jfruh writes Microsoft's Windows Hardware Engineering Conference, or WinHEC, was an annual staple of the '90s and '00s: every year, execs from Redmond would tell OEMs what to expect when it came to Windows servers and PCs. The conference was wrapped with software into Build in 2009, but now it's being revived to deal with not just computers but also the tablets and cell phone Microsoft has found itself in the business of selling and even making. It's also being moved from the U.S. to China, as an acknowledgment of where the heart of the tech hardware business is now.

Former GM Product Czar: Tesla a "Fringe Brand"

samzenpus posted 10 hours ago | from the get-a-haircut dept.

Transportation 219

cartechboy writes There's been plenty of skepticism when it comes to Tesla. The Silicon Valley startup unveiled an all-electric car that stunned the world and had many other automakers rolling their eyes. Fast forward to 2014 and Tesla's preparing to launch its third model, the Model X. Production of the Model S sedan is humming along, and this new automaker continues to make headlines multiple times a week. Industry veteran Bob Lutz was the champion behind the Chevrolet Volt, and has been quite vocal about Tesla from the beginning. So what's his view on the company now? He said Tesla will remain a "fringe brand" until it launches its next generation of vehicles and the smaller, less expensive Model 3. Speaking Wednesday on CNBC's "Squawk Alley" finance show he said that Tesla's stock price was "kinda high" at the moment.

Building Apps In Swift With Storyboards

samzenpus posted 10 hours ago | from the build-it-better dept.

Programming 57

Nerval's Lobster writes Apple touts the Swift programming language as easy to use, thanks in large part to features such as Interface Builder, a visual designer provided in Xcode that allows a developer to visually design storyboards. In theory, this simplifies the process of designing both screens and the connections between screens, as it needs no code and offers an easy-to-read visual map of an app's navigation. But is Swift really so easy (or at least as easy as anything else in a developer's workflow)? This new walkthrough of Interface Builder (via Dice) shows that it's indeed simple to build an app with these custom tools... so long as the app itself is simple. Development novices who were hoping that Apple had created a way to build complex apps with a limited amount of actual coding might have to spend a bit more time learning the basics before embarking on the big project of their dreams.

Court Rules Nokia Must Pay Damages To Buyers of Faulty Phones In Mexico

samzenpus posted 10 hours ago | from the pay-the-people dept.

Handhelds 23

An anonymous reader writes Nokia must pay damages to consumers in Mexico who reported malfunctioning handsets, following a court ruling for a trial that has lasted four years. The case was brought to court by Mexican watchdog Profeco in 2010, before the Finnish manufacturer was acquired by Microsoft – that deal was only completed earlier this year. Profeco added that the court has ordered Nokia to either replace the faulty handsets and/or reimburse their cost. On top of that, Nokia must also pay compensation totaling at least 20 percent of the damages resulting from malfunctioning. Customers that had been affected by faulty Nokia equipment would be able to seek damages even if they had not yet presented complaints.

Google To Require As Many As 20 of Its Apps Preinstalled On Android Devices

samzenpus posted 11 hours ago | from the new-rules dept.

Google 310

schwit1 writes Google is looking to exert more pressure on device OEMs that wish to continue using the Android mobile operating system. Among the new requirements for many partners: increasing the number of Google apps that must be pre-installed on the device to as many as 20, placing more Google apps on the home screen or in a prominent icon folder and making Google Search more prominent. Earlier this year, Google laid its vision to reduce fragmentation by forcing OEMs to ship new devices with more recent version of Android. Those OEMs that choose not to comply lose access to Google Mobile Services (GMS) apps like Gmail, Google Play, and YouTube.

Statistician Creates Mathematical Model To Predict the Future of Game of Thrones

samzenpus posted 12 hours ago | from the math-is-coming dept.

Math 111

KentuckyFC writes One way of predicting the future is to study data about events in the past and build a statistical model that generates the same pattern of data. Statisticians can then use the model to generate data about the future. Now one statistician has taken this art to new heights by predicting the content of the soon-to-be published novels in the Song of Ice and Fire series by George R R Martin. The existing five novels are the basis of the hit TV series Game of Thrones. Each chapter in the existing books is told from the point of view of one of the characters. So far, 24 characters have starred in this way. The statistical approach uses the distribution of characters in chapters in the first five books to predict the distribution in the forthcoming novels. The results suggest that several characters will not appear at all and also throw light on whether one important character is dead or not, following an ambiguous story line in the existing novels. However, the model also serves to highlight the shortcomings of purely statistical approaches. For example, it does not "know" that characters who have already been killed off are unlikely to appear in future chapters. Neither does it allow for new characters that might appear. Nevertheless, this statistical approach to literature could introduce the process of mathematical modelling to more people than any textbook.

Marines Put Microsoft Kinect To Work For 3D Mapping

samzenpus posted 12 hours ago | from the quick-map dept.

Microsoft 35

colinneagle points out this article about how the Marines are using a Microsoft Kinect to build maps. A military contractor has come up with something that has the U.S. Marine Corps interested. The Augmented Reality Sand Table is currently being developed by the Army Research Laboratory and was on display at the Modern Day Marine Expo that recently took place on Marine Corps Base Quantico in Virginia. The set-up is simple: a table-sized sandbox is rigged with a Microsoft Kinect video game motion sensor and an off-the-shelf projector. Using existing software, the sensor detects features in the sand and projects a realistic topographical map that corresponds to the layout, which can change in real time as observers move the sand around in the box. The setup can also project maps from Google Earth or other mapping and GPS systems, enabling units to visualize the exact terrain they'll be covering for exercises or operations. Eventually, they hope to add visual cues to help troops shape the sandbox to match the topography of a specified map. Eventually, the designers of the sandbox hope to involve remote bases or even international partners in conducting joint training and operations exercises. Future possibilities include large-scale models that could project over a gymnasium floor for a battalion briefing, and a smartphone version that could use a pocket-sized projector to turn any patch of dirt into an operational 3-D map.

How To Find the Right Open Source Project To Get Involved With

samzenpus posted 13 hours ago | from the get-going dept.

Open Source 53

An anonymous reader writes Writing on Opensource.com, Matt Micene shares his thoughts on getting started with an open source project. "I came back from OSCON this year with a new fire to contribute to an open source project. I've been involved in open source for years, but lately I've been more of an enthusiast-evangelist than a hands-on-contributor to an open source community. So, I started some thinking about what to do next. When I was involved in projects before, it was due to a clear progression from user to forum guru to contributor. It's a great path to take but what do you do if you just want to jump into something?" Matt goes on to lay out several steps to help new contributors get started.

Medical Records Worth More To Hackers Than Credit Cards

samzenpus posted 13 hours ago | from the pills-please dept.

Privacy 70

HughPickens.com writes Reuters reports that your medical information, including names, birth dates, policy numbers, diagnosis codes and billing information, is worth 10 times more than your credit card number on the black market. Fraudsters use this data to create fake IDs to buy medical equipment or drugs that can be resold, or they combine a patient number with a false provider number and file made-up claims with insurers, according to experts who have investigated cyber attacks on healthcare organizations. Medical identity theft is often not immediately identified by a patient or their provider, giving criminals years to milk such credentials. That makes medical data more valuable than credit cards, which tend to be quickly canceled by banks once fraud is detected. Stolen health credentials can go for $10 each, about 10 or 20 times the value of a U.S. credit card number, says Don Jackson, director of threat intelligence at PhishLabs, a cyber crime protection company. He obtained the data by monitoring underground exchanges where hackers sell the information. Plus "healthcare providers and hospitals are just some of the easiest networks to break into," says Jeff Horne. "When I've looked at hospitals, and when I've talked to other people inside of a breach, they are using very old legacy systems — Windows systems that are 10 plus years old that have not seen a patch."

Study: An Evolutionary "Arms Race" Shaped the Human Genome

samzenpus posted yesterday | from the cell-wars dept.

Biotech 31

An anonymous reader writes "An evolutionary race between rival elements within the genomes of primates drove the evolution of complex regulatory networks that orchestrate the activity of genes in every cell of our bodies, reveals new research. The race was between mobile DNA sequences known as 'retrotransposons' (jumping genes) and the genes that have evolved to control them. Scientists at the University of California Santa Cruz, identified genes in humans that make repressor proteins to shut down specific jumping genes. "We have basically the same 20,000 protein-coding genes as a frog, yet our genome is much more complicated, with more layers of gene regulation. This study helps explain how that came about," said Sofie Salama, a research associate at the UC Santa Cruz Genomics Institute who led the study."

Blood For Extra Credit Points Offer Raises Eyebrows In Test-Mad China

samzenpus posted yesterday | from the bloody-report-card dept.

China 89

An anonymous reader writes Parents in China's Zhejiang province can give their own blood to earn some extra points on their child's high school entrance exam. Four liters of donated blood will get your child one extra point; 6 liters adds two points; and 8 liters, three. From the article: "The policy burst into the national limelight this week, when a Weibo user posted a photo of a bandaged arm, saying, 'For my future child, I say one thing: Relax when you take the high school entrance exam. Your dad's already helped you gain points.' The post was widely shared. Though the user declined to be interviewed by China Real Time, he also clarified his original post, saying that he had in fact been giving blood since age 18."

Lenovo Set To Close $2.1 Billion Server Deal With IBM

samzenpus posted yesterday | from the power-up dept.

IBM 48

An anonymous reader writes Lenovo has announced that it will be closing the acquisition deal of IBM's x86 server business on October 1. The closing purchase price is lower than the $2.3 billion announced in January because of a change in the valuation of inventory and deferred revenue liability, Lenovo said. Roughly $1.8 billion will be paid in cash and the remainder in stock. Lenovo says it had "big plans" for the enterprise market. "We will compete vigorously across every sector, using our manufacturing scale, and operational excellence to repeat the success we have had with PCs," the company added.

Scientists Seen As Competent But Not Trusted By Americans

samzenpus posted yesterday | from the hug-a-scientist-today dept.

Science 376

cold fjord writes The Woodrow Wilson School reports, "If scientists want the public to trust their research suggestions, they may want to appear a bit 'warmer,' according to a new review published by Princeton University's Woodrow Wilson School of Public and International Affairs. The review, published in the Proceedings of the National Academy of Sciences (PNAS), shows that while Americans view scientists as competent, they are not entirely trusted. This may be because they are not perceived to be friendly or warm. In particular, Americans seem wary of researchers seeking grant funding and do not trust scientists pushing persuasive agendas. Instead, the public leans toward impartiality. 'Scientists have earned the respect of Americans but not necessarily their trust,' said lead author Susan Fiske, the Eugene Higgins Professor of Psychology and professor of public affairs. 'But this gap can be filled by showing concern for humanity and the environment. Rather than persuading, scientists may better serve citizens by discussing, teaching and sharing information to convey trustworthy intentions.'"

Slashdot Login

Need an Account?

Forgot your password?