We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!
MojoKid (1002251) writes "The address bar in a Web browser has been a standard feature for as long as Web browsers have been around — and that's not going to be changing. What could be, though, is exactly what sort of information is displayed in them. In December, Google began rolling-out a limited test of a feature in Chrome called "Origin Chip", a UI element situated to the left of the address bar. What this "chip" does is show the name of the website you're currently on, while also showing the base URL. To the right, the actual address bar shows nothing, except a prompt to "Search Google or type URL". With this implementation, a descriptive URL would not be seen in the URL bar. Instead, only the root domain would be seen, but to the left of the actual address bar. This effectively means that no matter which page you're on in a given website, all you'll ever see when looking at the address bar is the base URL in the origin chip. What helps here is that the URL is never going to be completely hidden. You'll still be able to hit Ctrl + L to select it, and hopefully be able to click on the origin chip in order to reveal the entire URL. Google could never get rid of the URL entirely, because it's required in order to link someone to a direct location, obviously."
MouseTheLuckyDog (2752443) writes "In a recent story on reason.com it was reported that the DoJ is closing down the bank accounts of porn stars. Not knowing the site I googled around and found another site, the Guardian. The story does not end there. It turns out that this is part of a larger scheme (ironically) called Operation Choke Point. Also reported in a Washington Post article that downplays the practice. According to Cryptocoin news. There are thirty industries the DoJ is now targeteting: Ammunition Sales; Cable Box De-scramblers; Coin Dealers; Credit Card Schemes; Credit Repair Services; Dating Services; Debt Consolidation Scams; Drug Paraphernalia; Escort Services; Firearms Sales; Fireworks Sales; Get Rich Products; Government Grants; Home-Based Charities; Life-Time Guarantees; Life-Time Memberships; Lottery Sales; Mailing Lists/Personal Info; Money Transfer Networks; On-line Gambling; PayDay Loans; Pharmaceutical Sales; Ponzi Schemes; Pornography; Pyramid-Type Sales; Racist Materials; Surveillance Equipment; Telemarketing; Tobacco Sales; and Travel Clubs. But more can be added. (I notice alcohol sales is not on the list)." The Reason article stops short of saying that Choke Point is proven to be the reason for the account closures, but it seems very plausible.
An anonymous reader writes "Apple has removed encrypted email attachments from iOS 7. Apple said back in June 2010 in regards to iOS 4.0: 'Data protection is available for devices that offer hardware encryption, including iPhone 3GS and later, all iPad models, and iPod touch (3rd generation and later). Data protection enhances the built-in hardware encryption by protecting the hardware encryption keys with your passcode. This provides an additional layer of protection for your email messages attachments, and third-party applications.' Not anymore."
waderoush writes: "If Silicon Valley is in a bubble — which it is – how will it finally burst? Where is the bubble's membrane being stretched so thin that it's in danger of tearing open and letting the real world rush in? This commentary from Xconomy picks real places around the San Francisco Bay Area embodying tensions, imbalances, injustices, or dangers that could escalate into a show-stopping crisis for the technology economy. One is Bank of America's former headquarters in the heart of San Francisco's Financial District; another is an elementary school in Oakland that happens to sit on the Hayward Fault. 'If we can identify the fractures that threaten to destroy the innovation machine, we might be able to patch them up and keep the system going for a while longer — and maybe even point it in a smarter direction,' the piece argues."
An anonymous reader writes "Reuters is reporting that Electronic Arts and Comcast are working on a partnership that would stream video games to consumer televisions through Comcast's cable boxes. It will start with the FIFA and Madden sports game franchises. 'Comcast and EA's aim is to make buying games as easy as ordering a pay-per-view movie, sources said. This could create a new distribution model that circumvents console and video-streaming device makers.' The report says consumers will also be able to use tablets as controllers for the games."
An anonymous reader writes "In 2012, a card game called Asylum was successfully funded on Kickstarter. Two months later, its expected delivery date came and passed without a product. In July 2013, the company behind the game stopped communicating with backers. Now, the Washington state Attorney General has filed a consumer protection lawsuit against the makers. This is the first time a project from a crowdfunding site has been the target of such a lawsuit. The AG said, 'Consumers need to be aware that crowdfunding is not without risk. This lawsuit sends a clear message to people seeking the public's money: Washington state will not tolerate crowdfunding theft. The Attorney General's Office will hold those accountable who don't play by the rules.' Here's the legal document (PDF)."
jones_supa writes: "A notable security vulnerability has been discovered which impacts both OAuth and OpenID, which are software packages that provide a secure delegated access to websites. Wang Jing, a Ph.D student at the Nanyang Technological University in Singapore, discovered that the 'Covert Redirect' flaw can masquerade as a login popup based on an affected site's domain. Covert Redirect is based on a well-known exploit parameter. For example, someone clicking on a malicious phishing link will get a popup window in Facebook, asking them to authorize the app. Instead of using a fake domain name that's similar to trick users, the Covert Redirect flaw uses the real site address for authentication. If a user chooses to authorize the login, personal data will be released to the attacker instead of to the legitimate website. Wang did already warn a handful of tech giants about the vulnerability, but they mostly dodged the issue. In all honesty, it is not trivial to fix, and any effective remedies would negatively impact the user experience. Users who wish to avoid any potential loss of data should be careful about clicking links that immediately ask you to log in to Facebook or Google, and be aware of this redirection attack."
Lasrick writes: "Lucien Crowder is fed up with the notion that solutions for climate change would be easier to enact if only the public (especially the American public) understood the science better. Crowder looks to nuclear disarmament advocates as a model, as the move to reduce nuclear weapons has seen comparatively greater success even without public awareness and understanding: 'Indeed, in the nuclear and climate realms, desirable policy often seems to flow less from public engagement than from public obliviousness. Disarmament advocates, no matter how they try, cannot tempt most ordinary people into caring about nuclear weapons—yet stockpiles of weapons steadily, if still too slowly, decrease. Climate advocacy provokes greater passion, but passion often manifests itself as outraged opposition to climate action, and atmospheric carbon has reached levels unseen since before human beings evolved.'"
An anonymous reader writes "Net neutrality has been looking pretty shaky in recent months. Netflix has started paying Comcast and Verizon directly and the FCC is saying that's perfectly fine. We may be witnessing a fundamental change in the nature of the internet. Timothy B. Lee at Vox explains how all of this works, and what it means for the future of the web. Quoting: '[S]ome of the largest ISPs now seem to view declining network performance not as a technical problem to be solved so much as a source of leverage in business negotiations. Another reason is that regulating interconnection is much more complex than a "classic" network neutrality rule. When all of an ISP's traffic comes through one cable, it's not too hard to write a rule requiring that the packets in that cable be treated equally. But it's harder to write a rule governing when and how ISPs must interconnect. Someone needs to pay for the cost of these connections, and the fairest way to split the costs depends on many subtle factors, including geography, traffic patterns, and the relative size of the interconnecting networks. A poorly written interconnection rule could create a lot of work for lawyers without actually preventing abusive practices.'"
Capt.Michaels writes: "I need to start sending security alerts and warnings to employees at my somewhat sizable company. My problem: I'm not sure how to send these alerts without freaking everyone out and causing the help desk to get flooded with phone calls. For example, let's take the current Internet Explorer exploit that caused US-CERT to recommend switching browsers. I don't want everyone killing our limited help desk with ridiculous questions like, 'I downloaded $New_Browser, how can I get my toolbar? How do I bookmark things in this browser? Can you tell me which browser you recommend?' Simply put: some vulnerabilities are worth major changes, but many aren't. If we switched software every time a new vulnerability came out, we'd never get anything done. Sooner or later, a patch will come out, and everything will be back to normal. But how do I communicate to end users that they should be aware of an issue and take extra care until it's fixed, without causing panic?"
An anonymous reader writes "One of the most interesting notes from Apple's recent quarterly report was that iPad sales are down. Pundits were quick to jump on that as evidence that the iPad was just a fad, but there were still more than 16 million units sold. iPads, and the tablet market as a whole, clearly aren't a fad, but it's also unclear where they're going. They're not convincingly replacing PCs on one end or phones on the other. Meanwhile, PCs and phones are both morphing into things that are more like tablets. New form factors often succeed (or fail) based on what they can do better than old form factors, and the iPad hasn't done enough to make itself distinct, yet. Ben Thompson had an insightful take on people demanding desktop functionality from the iPad: 'This sounds suspiciously like the recommendation that the only thing holding the Macintosh back was its inability to run Apple II programs. It's also of a piece with the vast majority of geek commentary on the iPad: multiple windows, access to the file system, so on and so forth. I also think it's misplaced. The future of the iPad is not to be a better Mac. That may happen by accident, just as the Mac eventually superseded the Apple II, but to pursue that explicitly would be to sacrifice what the iPad might become, and, more importantly, what it already is.'"
phyr writes: "ESA Summer of Code in Space (SOCIS) is a program run by the European Space Agency. It aims at offering student developers stipends to write code for various space-related open source software projects. Through SOCIS, accepted student applicants are paired with a mentor or mentors from the participating projects, thus gaining exposure to real-world software development scenarios. In turn, the participating projects are able to more easily identify and bring in new developers. Applicants must be attending a European or Canadian university and will receive 4000 Euros for supporting one of the accepted open source projects. Applicants have until May 15th to submit their proposals and resumes. I'm particularly interested to have exceptional proposals for the NEST project."
KentuckyFC writes: "One of the main goals of the space program is to spot an Earth-like planet orbiting another star. And by Earth-like, astronomers mean a planet with liquid water, gaseous oxygen and even chlorophyll, or a light-harvesting molecule like it. The biosignatures of these molecules were all observed during the first Earth fly-by in 1990 when the Galileo spacecraft measured the light reflected off Earth as it flew past on its way to Jupiter. But if these biosignatures exist on more distant exoplanets, could we spot them today? Now astronomers have calculated how good the next generation of space telescopes will have to be to pick up these biosignatures of life. They say that gaseous water should be relatively straightforward to pick out and that oxygen will be more challenging. But the spectral signature of chlorophyll-like molecules will be much harder to spot, requiring significantly more sensitivity than is possible today (either that or a great deal of luck). That suggests a plan, they say. The next generation of space telescopes should look for water and oxygen on exoplanets orbiting nearby stars and only then begin the time-consuming and expensive task of looking for chlorophyll on the most promising targets. One spacecraft that might do this is the Advanced Technology Large-Aperture Space Telescope or ATLAST that is currently scheduled for launch in the 2025-2035 time frame."
An anonymous reader writes "When web browsers started implementing 'do-not-track' settings, Yahoo got some respect for being the first of the huge tech companies to honor those settings. Unfortunately, that respect has now gone out the door. As of this week, Yahoo will no longer alter their data collection if a user doesn't want to be tracked. They say there are two reasons for this. First, they want to provide a personalized web-browsing experience, which isn't possible using do-not-track. Second, they don't think do-not-track is viable. They say, '[W]e've been at the heart of conversations surrounding how to develop the most user-friendly standard. However, we have yet to see a single standard emerge that is effective, easy to use and has been adopted by the broader tech industry.' It looks like this is another blow to privacy on the web."
itwbennett writes: "A class-action lawsuit filed Thursday (PDF) accuses Google of strong-arming device manufacturers into making its search engine the default on Android devices, driving up the cost of those devices and hurting consumers. The suit does not argue that device manufacturers entered Mobile Application Distribution Agreements involuntarily, but that the market power of Google compels them to. 'Because consumers want access to Google's products, and due to Google's power in the U.S. market for general handheld search, Google has unrivaled market power over smartphone and tablet manufacturers,' says the suit."
"In a recent interview, Senator Rand Paul said there's one thing he would change about Bitcoin: it should be backed by something with intrinsic value, like stocks. He said, 'I was looking more at it until that recent thing [sic]. And actually my theory, if I were setting it up, I'd make it exchangeable for stock. And then it'd have real value. And I'd have it pegged, and I'd have a basket of 10 big retailers I think it would work, but I think, because I'm sort of a believer in currency having value, if you're going to create a currency, have it backed up by — you know, Hayek used to talk about a basket of commodities? You could have a basket of stocks, and have some exchangeability, because it's hard for people like me who are a bit tangible. But you could have an average of stocks, I'm wondering if that's the next permutation.'"
First time accepted submitter ElyKahn (3637855) writes "The diaspora of startups with an NSA pedigree is rapidly growing. These startups, such as Sqrrl, Virtru, and Synack, are typically security-focused and often are commercializing technology projects from the NSA. However, coming from the NSA is a dual-edged sword... the technology is world-class and cutting-edge, but they must also fight the viewpoint of some that the startups are merely a front for the NSA."
jfruh (300774) writes "Who says tape storage is out of date? Sony researchers have announced a breakthrough in magnetic tape tech that increases the data density per square inch by a factor of 74. The result could be 185 TB tape cartridges. 'By comparison, LTO-6 (Linear Tape-Open), the latest generation of magnetic tape storage, has a density of 2 gigabits per square inch, or 2.5 TB per cartridge uncompressed.'"
Science_afficionado (932920) writes "A Vanderbilt University graduate student, working at Oak Ridge National Laboratory, has discovered a way to create nanowires capable of linking transistors and other components made out of the monolayer material TMDC. His accomplishment is an important step toward creating monolayer microelectronic devices, which could be as thin and flexible as paper and extremely tough."