Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.
Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and learn more about it. Thanks for reading, and for making the site better!
itwbennett (1594911) writes "Despite the hot job market and competitive salaries, the share of Computer Science degrees as a percentage of BA degrees has remained essentially unchanged since 1981, according to data from the National Center for Educational Statistics' Digest of Educational Statistics. If history is any indication, it will take a cultural phenomenon to shift the percentage higher: Blogger Phil Johnson point out that there were 'two distinct peaks, one in 1985 (4.4% of U.S. college degrees) and one in 2002 (4.42%). These would represent big increases for the classes entering school in 1981 and 1998 respectively. The former year corresponds to the beginning of computers coming into the home and the release of things like MS-DOS 1.0, all of which may have increased interest in programming. The latter year was during the dot com bubble, which, no doubt, also boosted interest.'"
wiredmikey (1824622) writes "Sony Pictures Entertainment has acquired the rights to the new book by journalist Glenn Greenwald about fugitive US intelligence leaker Edward Snowden, the studio said Wednesday. James Bond franchise producers Michael Wilson and Barbara Broccoli will make the movie version of 'No Place to Hide,' described as 'a political film that will resonate with today's moviegoers.' The book, subtitled 'Edward Snowden, the NSA and the US Surveillance State,' was just recently published in Britain by Hamish Hamilton and in the United States by Metropolitan Books."
sciencehabit (1205606) writes "Every day, our cells manufacture small amounts of a molecule that, in higher doses, might be the key to leading a longer, healthier life. A team of researchers has found that this molecule boosts the lifespan of worms by more than 50%, raising the possibility that it will increase human longevity. Dietary supplements that contain the molecule and allegedly build muscle are already on the market. The study drops a barbell on their use, however, by suggesting that the molecule may actually thwart muscle growth."
coondoggie (973519) writes "Future autos leased by the federal government will be equipped with some advanced high-tech safety technology in an effort to test the equipment in real-life situations. The General Services Administration (GSA) and the Department of Transportation's National Highway Traffic Safety Administration (NHTSA) said they would team up on the program to further develop high-tech driver and vehicle safety technology."
An anonymous reader writes "Nick Rush-Cooper has an insightful article at Rock, Paper, Shotgun about his visits to Chernobyl. He's made many such trips for research purposes, and he's mapping radiation levels in the Exclusion Zone, which can 'vary by tenfold or more over the space of less than a meter.' But he's also a gamer, and he's played S.T.A.L.K.E.R. Shadow of Chernobyl and other titles that take place there. He writes about the unusual perspective this afforded him: 'If you travel and recognize something you have seen in a film, that's visual recognition. You're seeing something you have seen before. With games it's a recognition of experience, not just a visual memory of a three dimensional space, but the sense of being somewhere you have been before. Even in Call of Duty 4, which uses Pripyat just as much as an aesthetic choice with little meaning as many movies have, its shooting gallery still requires the player to think of Pripyat as a space that requires positioning; identifying firing lines and choke points. It wasn't until I was actually in the Zone myself that I realized to what extent the games manage to capture the sense of the Pripyat landscape itself as a malevolent, even antagonistic, presence. Of course, guided tours in a hot, sunny summer bear little resemblance to Stalker's world. But, as an invisible presence known only through little blinking, chattering devices, I never really got used to radiation during my two-dozen trips to the Zone.'"
An anonymous reader writes "There's a blog post floating around right now listing articles every programmer should read. I'm curious what articles, books, etc., Slashdot readers would add to this list. Should The Art of Computer Programming, Design Patterns, or Structure and Interpretation of Computer Programs be on the list? What about The Mythical Man-Month, or similar works that are about concepts relating to programming? Is there any code that every programmer should take a look at? Obviously, the nature of this question precludes articles about the nitty-gritty of particular languages, but I'm sure a lot of people would be interested in those, too. So if you can think of a few articles that every C++ programmer (or Perl, or Haskell, or whatever) should know, post those too."
An anonymous reader writes "Video game development budgets have been rising for years, and the recent launch of a new generation of consoles has only made it worse. Developers of AAA titles are now fighting to keep costs manageable while providing the technological advances gamers have come to expect. Just a few years ago, budgets ranging above $100 million were considered absurd, but now Activision is committing $500 million to a new IP from the studio that created Halo. Alan Roberts, technical director for Playground Games, says development teams keep expanding: 'Our in-house development team is roughly 20 per cent bigger than it was on last-gen, but we're doing even more with outsourcers this time in order to create content to the level of detail required by new generation games.' He adds that one way studios are trying to defray costs is to put more effort into building great tools for content creators."
New submitter Megan Sever writes: "This is a cool story about anthropogenic effects of water withdrawal moving mountains — literally. According to new research published today (abstract) and reported in EARTH Magazine, humans have been causing the Sierra Nevada mountains to rise. By withdrawing water for irrigation and other purposes, we have inadvertently removed water from the mountains, allowing them to uplift. The research shows a seasonal and annual cycle."
Hugh Pickens DOT Com writes: "Ryan Reed reports that when most Game of Thrones fans imagine George R.R. Martin writing his epic fantasy novels, they probably picture the author working on a futuristic desktop (or possibly carving his words onto massive stones like the Ten Commandments). But the truth is that Martin works on an outdated DOS machine using '80s word processor WordStar 4.0, as he revealed during an interview on Conan. 'I actually like it,' says Martin. 'It does everything I want a word processing program to do, and it doesn't do anything else. I don't want any help. I hate some of these modern systems where you type a lower case letter and it becomes a capital letter. I don't want a capital. If I wanted a capital, I would have typed a capital. I know how to work the shift key.' 'I actually have two computers,' Martin continued. 'I have a computer I browse the Internet with and I get my email on, and I do my taxes on. And then I have my writing computer, which is a DOS machine, not connected to the Internet.'"
An anonymous reader writes "BlackPhone was designed by Phil Zimmermann (inventor of PGP). The 4.7" display phone features a 2 GHz NVIDIA Tegra 4i ARM Cortex-A9 quad-core processor with 60 GPU cores, 1GB RAM and 16GB storage [more specs]. The OS is a customized version of Android called PrivatOS which offers encrypted calls, texts and emails that can't be unscrambled even by spy agencies. It also offers built-in resistance against malicious software which will be most welcomed for users worried about free Apps that are becoming increasingly invasive, if not pure data collection spyware for unknown 3rd parties. It's coming out this June, and many Fortune 50 companies have already ordered the phone to protect against industrial espionage."
itwbennett writes: "In an emailed statement, Samsung offered its 'sincerest apology' for the sickness and deaths of some of its workers, vowing to compensate those affected and their families. So far there have been 26 reported victims of blood cancers who worked in Samsung's Gi-Heung and On-Yang semiconductor plants. Ten have died. Other alleged workplace-related illnesses include miscarriages, infertility, hair loss, blood disorders, kidney troubles and liver disease."
An anonymous reader writes "Last year the W3C approved the inclusion of DRM in future HTML revisions. It's called Encrypted Media Extensions, and it was not well received by the web community. Nevertheless, it had the support of several major browser makers, and now Mozilla CTO Andreas Gal has a post explaining how Firefox will be implementing EME. He says, 'This is a difficult and uncomfortable step for us given our vision of a completely open Web, but it also gives us the opportunity to actually shape the DRM space and be an advocate for our users and their rights in this debate. ... From the security perspective, for Mozilla it is essential that all code in the browser is open so that users and security researchers can see and audit the code. DRM systems explicitly rely on the source code not being available. In addition, DRM systems also often have unfavorable privacy properties. ... Firefox does not load this module directly. Instead, we wrap it into an open-source sandbox. In our implementation, the CDM will have no access to the user's hard drive or the network. Instead, the sandbox will provide the CDM only with communication mechanism with Firefox for receiving encrypted data and for displaying the results.'"
cartechboy writes: "Back in 2010, Toyota and Tesla teamed up to develop electric cars. That partnership gave us the RAV4 EV electric crossover, but it seems as though that will be the only vehicle we see from that deal. The partnership will soon expire and Toyota has no plans to renew it. Why? Because Toyota believes the future is in hydrogen fuel cell cars, not battery electric vehicles. We knew trouble was brewing when the RAV4 EV failed to set the world on fire when it came to the sales floor. Then Toyota and Honda announced plans to debut hydrogen fuel cell vehicles as early as next year. Add it all together and the writing was on the wall. Is Toyota right? Are hydrogen fuel cell cars the future, or is it missing the mark?"
Daniel_Stuckey (2647775) writes with news that we may soon learn which countries were sold the FinFisher malware package to spy on their own citizens. "The UK's High Court ruled yesterday that HM Revenue and Customs acted 'unlawfully' when it declined to detail how it was investigating the export of digital spy tools created by a British company. Human rights group Privacy International is celebrating the decision of Mr. Justice Green, which means HMRC now has to reconsider releasing information on its investigation into controls surrounding the export of malware known as FinFisher, created by British supplier Gamma International. The widespread FinFisher malware family, also known as FinSpy, can carry out a range of surveillance operations, from snooping on Skype and Facebook conversations to siphoning off emails or files sitting on a device. It is supposed to benefit law enforcement in their investigations, but has allegedly been found in various nations with poor human rights records, including Bahrain and Ethiopia."
KentuckyFC (1144503) writes "There is growing evidence that the center of the Milky Way contains a mysterious object some 4 million times more massive than the Sun. Many astronomers believe that this object, called Sagittarius A*, is a supermassive black hole that was crucial in the galaxy's birth and formation. The thinking is that about 100 million years after the Big Bang, this supermassive object attracted the gas and dust that eventually became the Milky Way. But there is a problem with this theory--100 million years is not long enough for a black hole to grow so big. The alternative explanation is that Sagittarius A* is a wormhole that connects the Milky Way to another region of the universe or even a another multiverse. Cosmologists have long known that wormholes could have formed in the instants after the Big Bang and that these objects would have been preserved during inflation to appear today as supermassive objects hidden behind an event horizon, like black holes. It's easy to imagine that it would be impossible to tell these objects apart. But astronomers have now worked out that wormholes are smaller than black holes and so bend light from an object orbiting close to them, such as a plasma cloud, in a unique way that reveals their presence. They've even simulated what such a wormhole will look like. No telescope is yet capable of resolving images like these but that is set to change too. An infrared instrument called GRAVITY is currently being prepared for the Very Large Telescope Interferometer in Chile and should be in a position to spot the signature of a wormhole, if it is there, in the next few years."
rohangarg (1966752) writes "KDE announced the beta of its next generation of its plasma workspace today. Built ontop of Qt5 and KDE Frameworks 5, with this transition, all QML-based UIs — which Plasma is built exclusively with — will make use of a new scenegraph and scripting engine, resulting in huge performance wins as well as architectural benefits, such as being able to render using available graphics hardware." There are experimental packages for some distros, and a Live CD (ISO download) available if you want to try it out.
Edward Stone is a professor of physics at the California Institute of Technology who has served as project scientist for the Voyager program from 1972 to the present. Since the launch of the two Voyager spacecraft in 1977, Stone has coordinated the efforts of 11 teams of scientists in their investigations of Jupiter, Saturn, Uranus and Neptune. He served as director of Jet Propulsion Laboratory from 1991 to 2001. Highlights of his career include: Galileo's five-year orbital mission to Jupiter, the launch of Cassini to Saturn, the launch of Mars Global Surveyor and a new generation of Earth science satellites such as TOPEX/Poseidon and SeaWinds, and the successful Mars Pathfinder landing in 1997. Dr. Stone has agreed to sit down with us and answer any questions you may have about his time at JPL and space exploration. As usual, ask as many as you'd like, but please, one question per post.
Hugh Pickens DOT Com (2995471) writes "Adrienne LaFrance reports at the Atlantic that if you've tried listening to any of the old CDs lately from your carefully assembled collection from the 1980's or 1990's you may have noticed that many of them won't play. 'While most of the studio-manufactured albums I bought still play, there's really no telling how much longer they will. My once-treasured CD collection — so carefully assembled over the course of about a decade beginning in 1994 — isn't just aging; it's dying. And so is yours.'
Fenella France, chief of preservation research and testing at the Library of Congress is trying to figure out how CDs age so that we can better understand how to save them. But it's a tricky business, in large part because manufacturers have changed their processes over the years and even CDs made by the same company in the same year and wrapped in identical packaging might have totally different lifespans. 'We're trying to predict, in terms of collections, which of the types of CDs are the discs most at risk,' says France. 'The problem is, different manufacturers have different formulations so it's quite complex in trying to figure out what exactly is happening because they've changed the formulation along the way and it's proprietary information.' There are all kinds of forces that accelerate CD aging in real time. Eventually, many discs show signs of edge rot, which happens as oxygen seeps through a disc's layers. Some CDs begin a deterioration process called bronzing, which is corrosion that worsens with exposure to various pollutants. The lasers in devices used to burn or even play a CD can also affect its longevity. 'The ubiquity of a once dominant media is again receding. Like most of the technology we leave behind, CDs are are being forgotten slowly,' concludes LaFrance. 'We stop using old formats little by little. They stop working. We stop replacing them. And, before long, they're gone.'" You can donate CDs to be tested for aging characteristics by emailing the Center for the Library's Analytical Science Samples. I haven't had much trouble ripping discs that were pressed in the 80s (and acquired from used CD stores with who knows how many previous owners), but I'm starting to get nervous about not having flac rips of most of my discs.
wiredmikey (1824622) writes "A team of global IT experts have urged Estonia to drop electronic voting from this month's European elections, saying they had identified major security risks. They also said the system's operational security is lax, transparency measures are insufficient. and the software design is vulnerable to cyber attacks. 'Estonia's Internet voting system blindly trusts the election servers and the voters' computers,' said U.S. computer scientist J. Alex Halderman, a co-author of the report released Tuesday. 'Either of these would be an attractive target for state-level attackers, such as Russia.'" The source for the voting system is available for anyone to inspect. The Estonian National Electoral Committee released a statement dismissing the researchers claims: "At this point, we can give only preliminary answers to allegations published in the Guardian, as the researchers have not shared the full results of their work with us. The researchers met with officials from the electoral committee in October 2013, and could have contacted us at any point in the last 6 months to share the initial findings of their research. ... The researchers have not discovered any new attack vectors that had not already been accounted for in the design of our system as a whole. ... It is not feasible to effectively conduct the described attacks to alter the results of the voting. ... The electoral committee has numerous safeguards and failsafe mechanisms to detect attacks against the elections or manipulated results."
jfruh (300774) writes "BlackBerry broke its longstanding business model recently by announcing that its BlackBerry Enterprise Service 10 management platform would be able to manage not just BlackBerry devices, but Android and iOS gadgets as well. Now, in a new announcement, the company is also exploring the flipside of that coin, allowing software from other companies to manage BlackBerry phones. The moves acknowledge a world in which fewer and fewer people are interested in a vertical BlackBerry solution — but also seem to kill the last things that make BlackBerry special."
An anonymous reader writes with news that the IETF has adopted a policy of designing new protocols taking into account the need to mitigate pervasive monitoring of all traffic. From the article: "...RFC 7258, also known as BCP 188 (where BCP stands for 'Best Common Practice'); it represents Internet Engineering Task Force consensus on the fact that many powerful well-funded entities feel it is appropriate to monitor people's use of the Net, without telling those people. The consensus is: This monitoring is an attack and designers of Internet protocols must work to mitigate it."
An anonymous reader writes "You might recall the Debian port that is coming to OpenRISC (which is by the way making good progress with 5000 packages building) — Olof, a developer on the OpenRISC project, recently posted a lengthy status update about what's going on with OpenRISC. A few highlights are upstreamed binutils support, multicore becoming a thing, atomic operations, and a new build system for System-on-Chips."
An anonymous reader writes "In a letter released on Tuesday and addressed to the FCC chairman, a group of the U.S.'s top ISPs have warned that if the FCC re-classifies the internet as telecommunications, then innovation would slow or halt and network upgrades would be unaffordable. 'Under Title II, new service offerings, options, and features would be delayed or altogether foregone. Consumers would face less choice, and a less adaptive and responsive Internet. An era of differentiation, innovation, and experimentation would be replaced with a series of 'Government may I?' requests from American entrepreneurs.' They add, 'even the potential threat of Title II had an investment-chilling effect by erasing approximately 10% of some ISPs' market cap.' Ars Technica highlights earlier doomsday predictions by AT&T. The FCC is scheduled to vote May 15 on the chairman's recent proposal encompassing this reclassification option that the ISPs vehemently oppose." Reader Bob9113 adds that a protest is planned for the same day by those who oppose the FCC's plans.
chicksdaddy writes: "Dan Geer, the CISO of In-Q-Tel, has proposed giving embedded devices such as industrial control and SCADA systems a scheduled end-of-life in order to manage a future in which hundreds of billions of them will populate every corner of our personal, professional and lived environments. Individually, these devices may not be particularly valuable. But, together, IoT systems are tremendously powerful and capable of causing tremendous social disruption. 'Is all the technologic dependency, and the data that fuels it, making us more resilient or more fragile?' he wondered. Geer noted the appearance of malware like TheMoon, which spreads between vulnerable home routers, as one example of how a population of vulnerable, unpatchable embedded devices might be cobbled into a force of mass disruption. Geer proposes a novel solution: embedded systems that do not have a means of being (securely) managed and updated remotely should be configured with some kind of 'end of life,' past which they will cease to operate. Allowing embedded systems to 'die' will remove a population of remote and insecure devices from the Internet ecosystem and prevent those devices from falling into the hands of cyber criminals or other malicious actors, Geer argued."
joe5 writes "Many experts suggest that battery technology is really the key to the future of transportation. Its certainly the key to unlocking Tesla for even further growth. Today, a Japanese startup called Power Japan Plus unveiled a new battery chemistry that could significantly improve transportation batteries. In testing, the recycle-able cell has completed more than 3,000 charge/discharge cycles with virtually no performance degradation, meaning that it could conceivably last the lifetime of a car. They company won't yet provide too many details due to pending patents, and won't even say who its first customer is — but the chemistry requires 'specific and proprietary changes to the nanostructure of the carbon crystals.'"
Lucas123 writes: "The USB SuperSpeed+ spec (a.k.a. v3.1) offers up to 10Gbps throughput. Combine that with USB's new C-Type Connector, the specification for which is expected out in July, and users will have a symmetrical cable and plug just like Thunderbolt but that will enable up to 100 watts of power depending on the cable version. So where does that leave Thunderbolt, Intel's other hardware interconnect? According to some analysts, Thunderbolt withers or remains a niche technology supported almost exclusively by Apple. Even as Thunderbolt 2 offers twice the throughput (on paper) as USB 3.1, or up to 20Gbps, USB SuperSpeed+ is expected to scale past 40Gbps in coming years. 'USB's installed base is in the billions. Thunderbolt's biggest problem is a relatively small installed base, in the tens of millions. Adding a higher data throughput, and a more expensive option, is unlikely to change that,' said Brian O'Rourke, a principal analyst covering wired interfaces at IHS."