We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!
Lasrick (2629253) writes In a controversial article last week, MIT physicist Ted Postol again questioned whether Israel's vaunted Iron Dome rocket defense system actually works. This week, he comes back with evidence in the form of diagrams, photos of Iron Dome intercepts and contrails, and evidence on the ground to show that Iron Dome in fact is effective only about 5% of the time. Postol believes the real reason there are so few Israeli casualties is that Hamas rockets have very small warheads (only 10 to 20 pounds), and also Israel's outstanding civil defense system, which includes a vast system of shelters and an incredibly sophisticated rocket attack warning system (delivered through smart phones, among other ways).
theodp (442580) writes So, what does Microsoft do for an encore after laying off 18,000 employees with a hilariously bad memo? Issue another bad memo — Changes to Microsoft Network and Building Access for External Staff — "to introduce a new policy [retroactive to July 1] that will better protect our Microsoft IP and confidential information." How so? "The policy change affects [only] US-based external staff (including Agency Temporaries, Vendors and Business Guests)," Microsoft adds, "and limits their access to Microsoft buildings and the Microsoft corporate network to a period of 18 months, with a required six-month break before access may be granted again." Suppose Microsoft feels that's where the NSA went wrong with Edward Snowden? And if any soon-to-be-terminated Microsoft employees hope to latch on to a job with a Microsoft external vendor to keep their income flowing, they best think again. "Any Microsoft employee who separated from Microsoft on or after July 1, 2014," the kick-em-while-they're-down memo explains, "will be required to take a minimum 6-month break from access between the day the employee separates from Microsoft and the date when the former employee may begin an assignment as an External Staff performing services for Microsoft." Likely not just to prevent leaks, but also to prevent any contractors from being reclassified as employees.
Presto Vivace (882157) writes It seems that Murdoch's desire to acquire Time Warner predates his acquisition of Fox, and continues in spite of Time Warner's recent refusal. The possible deal is important in and of itself, but it also affects the future leadership of Fox. From the article: "Murdoch's skill is not just hiring the right people; he has been able to maintain control over them. They have his support as long as they produce results. His executives are the hired help. There is never any threat to his control. When a Murdoch favourite begins to get more headlines than the chairman, the clock begins ticking for their departure. But with the Time Warner bid, that balance may change. Chase Carey has put together a deal that, because of Murdoch's history, is almost irresistible to him. But it's a deal only Carey can put together. If he succeeds, the $US160 billion company that will emerge will be an ungainly beast that will depend on Carey making the merger work. He's indispensable." Clearly we have not heard the last of this.
rtoz (2530056) writes A special class of tiny gold particles can easily slip through cell membranes, making them good candidates to deliver drugs directly to target cells. A new study from MIT materials scientists reveals that these nanoparticles enter cells by taking advantage of a route normally used in vesicle-vesicle fusion, a crucial process that allows signal transmission between neurons. MIT engineers created simulations of how a gold nanoparticle coated with special molecules can penetrate a membrane. Paper (abstract; full text paywalled).
Jason Koebler writes The number of law enforcement requests coming from Canada for information from companies like Facebook and Google are often inaccurate thanks to a little-known loophole that lumps them in with U.S. numbers. For example, law enforcement and government agencies in Canada made 366 requests for Facebook user data in 2013, according to the social network's transparency reports. But that's not the total number. An additional 16 requests are missing, counted instead with U.S. requests thanks to a law that lets Canadian agencies make requests with the U.S. Department of Justice.
An anonymous reader writes A building at NASA's Kennedy Space Center in Florida, where Apollo astronauts once trained, was named in honor of astronaut Neil Armstrong. Armstrong, who died in 2012, was remembered at a ceremony as not only an astronaut, but also as an aerospace engineer, test pilot, and university professor. NASA renamed the Operations and Checkout building, also known as the O&C, which is on the National Register of Historic Places. It has been the last stop for astronauts before their flights since 1965. It was also used to test and process Apollo spacecraft. Currently, it's where the Orion spacecraft is being assembled to send astronauts to an asteroid and later to Mars.
redletterdave writes Dan Petro, a security analyst for the Bishop Fox IT consulting firm, built a proof of concept device that's able to hack into any Google Chromecasts nearby to project Rick Astley's "Never Gonna Give You Up," or any other video a prankster might choose. The "Rickmote," which is built on top of the $35 Raspberry Pi single board computer, finds a local Chromecast device, boots it off the network, and then takes over the screen with multimedia of one's choosing. But it gets worse for the victims: If the hacker leaves the range of the device, there's no way to regain control of the Chromecast. Unfortunately for Google, this is a rather serious issue with the Chromecast device that's not too easy to fix, as the configuration process is an essential part of the Chromecast experience.
An anonymous reader writes with news about one of the latest unanswered FOIA requests made to the Department of Homeland Security and the associated lawsuit the department's silence has brought. The Electronic Privacy Information Center (EPIC) has sued the United States Customs and Border Protection (CBP) in an attempt to compel the government agency to hand over documents relating to a relatively new comprehensive intelligence database of people and cargo crossing the US border. EPIC's lawsuit, which was filed last Friday, seeks a trove of documents concerning the 'Analytical Framework for Intelligence' (AFI) as part of a Freedom of Information Act (FOIA) request. EPIC's April 2014 FOIA request went unanswered after the 20 days that the law requires, and the group waited an additional 49 days before filing suit. The AFI, which was formally announced in June 2012 by the Department of Homeland Security (DHS), consists of "a single platform for research, analysis, and visualization of large amounts of data from disparate sources and maintaining the final analysis or products in a single, searchable location for later use as well as appropriate dissemination."
First time accepted submitter Gamoid writes This past school year, the Coachella Valley Unified School District gave out iPads to every single student. The good news is that kids love them, and only 6 of them got stolen or went missing. The bad news is, these iPads are sucking so much bandwidth that it's keeping neighboring school districts from getting online. Here's why the CVUSD is considering becoming its own ISP.
Trailrunner7 writes There are a number of undocumented and hidden features and services in Apple iOS that can be used to bypass the backup encryption on iOS devices and remove large amounts of users' personal data. Several of these features began as benign services but have evolved in recent years to become powerful tools for acquiring user data.
Jonathan Zdziarski, a forensic scientist and researcher who has worked extensively with law enforcement and intelligence agencies, has spent quite a bit of time looking at the capabilities and services available in iOS for data acquisition and found that some of the services have no real reason to be on these devices and that several have the ability to bypass the iOS backup encryption. One of the services in iOS, called mobile file_relay, can be accessed remotely or through a USB connection can be used to bypass the backup encryption. If the device has not been rebooted since the last time the user entered the PIN, all of the data encrypted via data protection can be accessed, whether by an attacker or law enforcement, Zdziarski said. Update: 07/21 22:15 GMT by U L : Slides.
An anonymous reader writes New research at the University of East Anglia finds that oceans are vital in the search for alien life. So far, computer simulations of habitable climates on other planets have focused on their atmospheres. But oceans play an equally vital role in moderating climates on planets and bringing stability to the climate, according to the study. From the press release: "The research team from UEA's schools of Mathematics and Environmental Sciences created a computer simulated pattern of ocean circulation on a hypothetical ocean-covered Earth-like planet. They looked at how different planetary rotation rates would impact heat transport with the presence of oceans taken into account. Prof David Stevens from UEA's school of Mathematics said: 'The number of planets being discovered outside our solar system is rapidly increasing. This research will help answer whether or not these planets could sustain alien life. We know that many planets are completely uninhabitable because they are either too close or too far from their sun. A planet's habitable zone is based on its distance from the sun and temperatures at which it is possible for the planet to have liquid water. But until now, most habitability models have neglected the impact of oceans on climate.'"
An anonymous reader writes Verizon is boosting the upload speeds of nearly all its FiOS connections to match the download speeds, greatly shortening the time it takes to send videos and back up files online. All new subscribers will get "symmetrical" connections. If you previously were getting 15 Mbps down and 5 Mbps up, you'll be automatically upgraded for no extra cost to 15/15. Same goes if you were on their 50/25 plan: You'll now be upgraded to 50/50. And if you had 75/35? You guessed it: Now it'll be 75 down, and 75 up.
An anonymous reader writes Researchers at the Howard Hughes Medical Institute's Janelia Research Campus have developed software that can track each and every cell in a developing embryo. The software will allow a researcher to pick out a single cell at any point in development and trace its life backward and forward during the embryo's growth. Philipp Keller, a group leader at Janelia says: "We want to reconstruct the elemental building plan of animals, tracking each cell from very early development until late stages, so that we know everything that has happened in terms of cell movement and cell division. In particular, we want to understand how the nervous system forms. Ultimately, we would like to collect the developmental history of every cell in the nervous system and link that information to the cell's final function. For this purpose, we need to be able to follow individual cells on a fairly large scale and over a long period of time."
Bennett Haselton writes My LG Optimus F3Q was the lowest-end phone in the T-Mobile store, but a cheap phone is supposed to suck in specific ways that make you want to upgrade to a better model. This one is plagued with software bugs that have nothing to do with the cheap hardware, and thus lower one's confidence in the whole product line. Similar to the suckiness of the Stratosphere and Stratosphere 2 that I was subjected to before this one, the phone's shortcomings actually raise more interesting questions — about why the free-market system rewards companies for pulling off miracles at the hardware level, but not for fixing software bugs that should be easy to catch. Read below to see what Bennett has to say.
An anonymous reader points out that even though China's internet adoption rate is the lowest it's been in 8 years, the number of people surfing the net from a mobile device has never been higher. "The number of China's internet users going online with a mobile device — such as a smartphone or tablet — has overtaken those doing so with a personal computer (PC) for the first time, said the official China Internet Network Information Center (CNNIC) on Monday. China's total number of internet users crept up 2.3 percent to 632 million by the end of June, from 618 million at the end of 2013, said CNNIC's internet development statistics report. Of those, 527 million — or 83 percent — went online via mobile. Those doing so with a PC made up 81 percent the total. China is the largest smartphone market in the world, and by 2018 is likely to account for nearly one-third of the expected 1.8 billion smartphones shipped that year, according to data firm IDC.
An anonymous reader writes If you're tired of yelling at the kids without the help of technology, Toyota has a van for you. From the article: "The latest version of the company's Sienna minivan has a feature called 'Driver Easy Speak.' It uses a built-in microphone to amplify a parent's voice through speakers in the back seats. Toyota says it added Easy Speak 'so parents don't have to shout to passengers in the back.' But chances are many parents will yell into the microphone anyway. And the feature only works one way, so the kids can't talk back. At least not with amplified voices. The feature is an option on the 2015 Sienna, which is being refreshed with a totally new interior. It also has an optional 'pull-down conversation mirror' that lets drivers check on kids without turning around."
jfruh writes While several U.S. judges have refused overly broad warrants that sought to grant police access to a suspect's complete Gmail account, a federal judge in New York State OK'd such an order this week. Judge Gabriel W. Gorenstein argued that a search of this type was no more invasive than the long-established practice of granting a warrant to copy and search the entire contents of a hard drive, and that alternatives, like asking Google employees to locate messages based on narrowly tailored criteria, risked excluding information that trained investigators could locate.
An anonymous reader writes Thanks to some clean-energy tax incentives approved late this spring, California appears to be in the running again for Tesla's "Gigafactory". From the article: "The decision should have been made by now, and ground broken, according to the company's timeline, but is on hold, allowing California, which was not in the race initially — CEO Elon Musk has called California an improbable choice, citing regulations — to throw its hat in the ring. 'In terms of viability, California has progressed. Now it's a four-plus-one race,' said Simon Sproule, Tesla's vice president of global communication and marketing, referring to the four named finalists — Texas, Arizona, New Mexico and Nevada — for the prize. That's heartening. Having the Gigafactory would be a vindication of Gov. Jerry Brown's drive to make California the home of advanced manufacturing, of which Tesla's battery technology is a prime example. With its technology, 'Tesla may be in position to disrupt industries well beyond the realm of traditional auto manufacturing. It's not just cars,' a Morgan Stanley analyst told Quartz, an online business publication last year.
An anonymous reader writes Speaking via a Google Hangout at the Hackers on Planet Earth Conference, Edward Snowden says he plans to work on technology to preserve personal data privacy and called on programmers and the tech industry to join his efforts. "You in this room, right now have both the means and the capability to improve the future by encoding our rights into programs and protocols by which we rely every day," he said. "That is what a lot of my future work is going to be involved in."
rtoz writes Researchers from Seoul National University have designed a robotic wheel based on the origami "magic ball pattern," which is a traditional technique used to create folded paper spheres. This robotic wheel can change its radius to create larger wheels to climb over things, and shrink back to a smaller size to squeeze under obstacles. The diameter of the wheels changes automatically to enable the robot to either be strong or speedy. The scientists think their innovation could one day be used for interplanetary rovers as the wheel can be folded up and "inflate" itself.