An anonymous reader writes: In response to an inquiry from European data protection regulators, Google has detailed how they evaluate and act on requests to de-index search results. Google's procedures for responding to "right-to-be-forgotten" requests are explained in a lengthy document that was made publicly available. "Google of course claims its own economic interest does not come into play when making these rtbf judgements — beyond an 'abstract consideration' of a search engine needing to help people find the most relevant information for their query. ... Google also goes into lengthy detail to justify its decision to inform publishers when it has removed links to content on their sites — a decision which has resulted in media outlets writing new articles about delisted content, thereby resulting in the rtbf ruling causing the opposite effect to that intended (i.e. fresh publicity, not fair obscurity)."
theodp writes: Over at Code.org, they're celebrating because more than 100 members of Congress are now co-sponsoring the Computer Science Education Act (HR 2536), making the bill designed to"strengthen elementary and secondary computer science education" the most broadly cosponsored education bill in the House. By adding fewer than 50 words to the Elementary and Secondary Education Act of 1965, HR 2536 would elevate Computer Science to a "core academic subject" (current core academic subjects are English, reading or language arts, mathematics, science, foreign languages, civics and government, economics, arts, history, and geography), a status that opens the doors not only to a number of funding opportunities, but also to a number of government regulations. So, now that we know it takes 112 U.S. Representatives to make a CS education bill, the next question is, "How many taxpayer dollars will it take to pay for the consequences?" While Code.org says "the bill is cost-neutral and doesn't introduce new programs or mandates," the organization in April pegged the cost of putting CS in every school at $300-$400 million. In Congressional testimony last January, Code.org proposed that "comprehensive immigration reform efforts that tie H-1B visa fees to a new STEM education fund" could be used "to support the teaching and learning of more computer science in K-12 schools," echoing Microsoft's National Talent Strategy.
An anonymous reader writes: Citing the problems caused by the lack of legal control over the current name and its long outdated origins as the reasons for the change, The Xbox Media Center team announced that they will switch the project's name to Kodi when version 14 is released later this year. If you're wondering how they picked the name Kodi, here's what they said: "We considered a TON of names. We had a number of requirements for the new name, such as being reasonably pronounceable in various languages and not be a mouthful to say, not be used as a trademark for someone else's media-related product, be easy to remember, etc. The group came up with a list of names and had our lawyer go over them. We then got back a smaller list that had been checked for various legal issues, and then we voted on the final name."
Zothecula writes: In an ambitious attempt to break every wing-borne sustained flight height record for a manned aircraft, the Perlan ll project intends to construct and fly a glider higher than any sailplane has gone before. Riding on the colossal stratospheric air waves generated over mountains, the team plans to fly their craft to more than 90,000 ft (27,000 m), which will shatter their own existing glider altitude record of 50,671 ft (15,400 m) set by Perlan l in 2008.
ancientribe writes: If you're wondering whether the most tech-loaded vehicles are also the most vulnerable to hackers, there is now research that shows it. Charlie Miller, a security engineer with Twitter, and Chris Valasek, director of security intelligence at IOActive, studied modern auto models and concluded that the 2014 Jeep Cherokee, the 2014 Infiniti Q50, and the 2015 Escalade are the most likely to get hacked. The key is whether their networked features that can communicate outside the vehicle are on the same network as the car's automated physical functions. They also name the least-hackable cars, and will share the details of their new findings next week at Black Hat USA in Las Vegas.
MonOptIt writes: I'm a new IT professional, having recently switched from a different sci/tech field. My first gig is with a mid-size (50ish) nonprofit which includes a wide variety of departments and functions. I'm the sole on-site IT support, which means that I'm working with every employee/department regularly both at HQ and off-site locations. My questions for the seasoned pros are: Do you find yourself deliberately ignoring office politics, overheard conversations, open documents or emails, etc as you go about your work? If not, how do you preserve the impartiality/neutrality which seems (to my novice mind) necessary to be effective in this position? In either case: how do you deal with the possibility of accidentally learning something you're not supposed to know? E.g. troubleshooting a user's email program when they've left sensitive/eyes-only emails open on their workstation. Are there protections or policies that are standard, or is this a legal and professional gray-area?
An anonymous reader writes: At the end of last year, we discussed Bertha, the world's largest tunnel boring machine. During an effort to drill a viaduct beneath downtown Seattle, the machine — clocking in at 7,000 tons, 57.5 feet in diameter, and 326 feet long — got hamstrung by an 8-inch-diameter steel pipe. The complexity and scope of the repair plan rivals that of the project itself. "The rescue operation (workers call it "the intervention") began in late spring with construction on the shaft to reach Bertha. Workers have been sinking pilings in a ring to prevent the shaft from collapsing, using 24,000 cubic yards of concrete — enough for a medium-size office building. Once that ring is complete, digging on the shaft will start. When the shaft is ready, Bertha, which is damaged but still operational, will be turned back on so she can chew through the concrete pilings to reach the center of the shaft. There, the machine will rest on a cradle where workers can detach the front end and hoist it out." That detachable front end? It weighs about 2,000 tons by itself. The repair bill is estimated at about $125 million.
An anonymous reader writes: When Sony acquired nascent cloud gaming service Gaikai, it was obvious they were interested in bringing streamed gaming to the PlayStation. The service is in the process of coming online, in a beta test that started this week. The idea is simple, and one that game companies are excited about — but it's also complex and expensive, creating a new problem for each one it solves. The biggest difficulty you'd expect — latency — actually seems to hold up pretty well. It'll even hold its own when fighting for bandwidth with Netflix and other video streams.
But the expense of using the service is excessive. "To rent Darksiders, a game that's been practically given away to PC owners thanks to Humble Bundle and the collapse of publisher THQ, you can pay $14.99 for 90 days, $7.99 for 30 days, $5.99 for 5 days or — no joke — $4.99 for four hours. ... Final Fantasy 13-2 costs $29.99 for 90 days. A used copy of the same costs $20 at GameStop." In addition, the pricing options are unusual and unpredictable. Users can't simply pay a flat monthly fee for service. "Variable pricing is in place because Sony gave the publishers and developers free reign to set their own prices, which results in wildly disparate costs for different games and different periods of rental time. It's not even mandatory that you have to have all four categories of rental time. I went to check out Saints Row 3 and found that it only had the four hour and 90 day options."
An anonymous reader writes: Uber, Lyft, and a variety of competitors are becoming ubiquitous. Their presence is jarring not because of how different they are from conventional taxis, but simply because they're different at all. Taxis really haven't changed much over the years. Watch a movie from the '90s and you can't help but chuckle at the giant, clunky mobile phones they use. But you can go all the way back to movies from '30s and scenes with taxis won't be unfamiliar. New York Magazine has a series of articles about the taxi revolution currently underway. "So far, Uber appears to be pinching traditional car services—Carmel, Dial 7, and the like—hardest. (They have apps, too, but Uber's is the one you've heard of.) The big question is about the prices for medallions, because so much of the yellow-cab business depends on their future value. ... [I]t's hard to see how those prices won't slip. Medallions, after all, are part of a top-down system formed to fight the abuses and dangers of the old crooked New York: rattletrap cars, overclocked meters, bribed inspectors. Its heavy regulation in turn empowered the taxi lobby and (somewhat) the drivers union. That system may be a pain to deal with, but in its defense, it provided predictability and security. The loosey-goosey libertarian alternative, conceived in the clean Northern California air, calls upon the market to provide checks and balances. A poorly served passenger can, instead of turning to a city agency for recourse, switch allegiances or sue."
An anonymous reader writes: Hard work is almost an axiom in the U.S. — office culture continually rewards people who are at their desks early and stay late, regardless of actual performance. Over the past decade, it's encroached even further into workers' private lives with the advent of smartphones. An article at the Harvard Business Review takes issue with the idea that more work is always better: "When we accept this new and permanent ambient workload — checking business news in bed or responding to coworkers' emails during breakfast — we may believe that we are dedicated, tireless workers. But, actually, we're mostly just getting the small, easy things done. Being busy does not equate to being effective. ... And let's not forget about ambient play, which often distracts us from accomplishing our most important tasks. Facebook and Twitter report that their sites are most active during office hours. After all, the employee who's required to respond to her boss on Sunday morning will think nothing of responding to friends on Wednesday afternoon. And research shows (PDF) that these digital derailments are costly: it's not only the minutes lost responding to a tweet but also the time and energy required to 'reenter' the original task." How do we shift business culture to reward effective work more than the appearance of work?
jfruh writes The FTC has moved aggressively recently against companies that make it too easy for people — especially kids — to rack up huge charges on purchases within apps. But at a dicussion panel sponsored by free-market think tank TechFreedom, critics pushed back. Joshua Wright, an FTC commissioner who dissented in a recent settlement with Apple, says a 15-minute open purchase window produced "obvious and intuitive consumer benefits" and that the FTC "simply substituted its own judgment for a private firm's decision as to how to design a product to satisfy as many users as possible."
An anonymous reader writes The office of the Mayor of London went into a bit of a panic this week after their own paper suggested that driverless buses could appear on the streets of the UK's capital at some point in the next four decades. The Mayor's office went so far as to suggest that they were really talking about driverless underground trains. Even more bizarre was the reaction of the city's taxi drivers' association — whose spokesperson claimed that the failure to deliver 'simple' software tasks such as speech recognition meant there was no chance of driverless buses appearing on London's streets.
mask.of.sanity (1228908) writes "Honeypots are the perfect bait for corporate IT shops to detect hackers targeting and already within their networks and now a guide has been published to build a dirt cheap battalion of the devices from Raspberry Pis. "By running honeypots on our internal network, we are able to detect anomalous events. We gain awareness and insight into our network when network hosts interact with a Raspberry Pi honeypot sensor," the author explained."