We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!
An anonymous reader writes CAPTCHA services that require users to recognize and type in static distorted characters may be a method of the past, according to studies published by researchers at the University of Alabama at Birmingham. Researchers focused on a broad form of gamelike CAPTCHAs, called dynamic cognitive game, or DCG, CAPTCHAs, which challenge the user to perform a gamelike cognitive task interacting with a series of dynamic images. For example, in a "ship parking" DCG challenge, the user is required to identify the boat from a set of moving objects and drag-and-drop it to the available "dock" location. The puzzle is easy for the human user to solve, but may be difficult for a computer program to figure out. The game-like nature may make the process more engaging for the user compared to conventional text-based CAPTCHAs. There are a couple research papers available: "A Three-Way Investigation of a Game-CAPTCHA: Automated Attacks, Relay Attacks and Usability" and "Dynamic Cognitive Game CAPTCHA Usability and Detection of Streaming-Based Farming."
itwbennett (1594911) writes Community Health Systems said the attack occurred in April and June of this year, but it wasn't until July that it determined the theft had taken place. Working with a computer security company, it determined the attack was carried out by a group based in China that used 'highly sophisticated malware' to attack its systems. The hackers got away with patient names, addresses, birthdates, telephone numbers and Social Security numbers of the 4.5 million people who were referred to or received services from doctors affiliated with the company in the last five years. The stolen data did not include patient credit card, medical, or clinical information.
First time accepted submitter BarbaraHudson (3785311) writes The CBC is reporting that Blackberry has made preparations to abandon the phone market by spinning pieces of the business off into Blackberry Technology Solutions. From the article: "The unit ... includes QNX, the company that BlackBerry acquired and used to develop the operating system that became the platform for its new smartphones, and Certicom, a former independent Toronto-area company with advanced security software. BTS will also include BlackBerry's Project Ion, which is an application platform focused on machine-to-machine Internet technology, Paratek antenna tuning technology and about 44,000 patents." When you have less market share than Windows Phone, it's time to throw in the towel ... or as they say in the new "lets not admit we screwed up" vernacular, "pivot to take advantage of new opportunities."
A few weeks ago, Rightscorp announced plans to have ISPs disconnect repeat copyright infringers. mpicpp (3454017) wrote in with news that Rightscorp announced during their latest earnings call further plans to require ISPs to block all web access (using a proxy system similar to hotel / college campus wifi logins) until users admit guilt and pay a settlement fine (replacing the current system of ISPs merely forwarding notices to users). Quoting TorrentFreak: [Rightscorp] says 75,000 cases have been settled so far with copyright holders picking up $10 from each. ... What is clear is that Rightscorp is determined to go after "Comcast, Verizon, AT&T, Cable Vision and one more" in order to "get all of them compliant" (i.e forwarding settlement demands). The company predicts that more details on the strategy will develop in the fall, but comments from COO & CTO Robert Steele hint on how that might be achieved. ... "[What] we really want to do is move away from termination and move to what's called a hard redirect, like, when you go into a hotel and you have to put your room number in order to get past the browser and get on to browsing the web." The idea that mere allegations from an anti-piracy company could bring a complete halt to an entire household or business Internet connection until a fine is paid is less like a "piracy speeding ticket" and more like a "piracy wheel clamp", one that costs $20 to have removed.
alphadogg (971356) writes with news that the transition from Windows to GNU/Linux in Munich may be in danger The German city of Munich, long one of the open-source community's poster children for the institutional adoption of Linux, is close to performing a major about-face and returning to Microsoft products. Munich's deputy mayor, Josef Schmid, told the Süddeutsche Zeitung that user complaints had prompted a reconsideration (Google translation to English) of the city's end-user software, which has been progressively converted from Microsoft to a custom Linux distribution — "LiMux" — in a process that dates back to 2003.
Nerval's Lobster writes Women outpace men when it comes to raising money for technology projects through crowdfunding sites such as Kickstarter, according to a new study by researchers at New York University and the Wharton School at the University of Pennsylvania. Jason Greenberg (NYC) and Ethan Mollick (Wharton/UPenn) chose 1,250 Kickstarter projects in five categories: games and technology, where founders were predominantly male; film, with an even gender distribution; and fashion and children's books, both populated with more female founders and backers. They analyzed additional factors such as "industry typing" (a theory in which people 'often hold conscious or unconscious biases about what gender is the archetype employee in a particular occupation or industry') and restricted the data set by geography and how much money each Kickstarter project wanted (a project aiming for less than $5,000 may attract an inordinate percentage of family and friends as funders, skewing results). After crunching the data, they found that female founders of technology projects were more likely than males to achieve their Kickstarter goals, a finding that didn't extend to the other four categories. "It appears female backers are responsible for helping female founders succeed in specific industry categories that women backers generally disfavor," they theorized, adding a little later: "The value of crowdfunding is that it enables access to a pool of potential female backers particularly inclined to support women in industry categories in which they believe women to be underrepresented."
Jason Koebler writes The Royal Society of London, the world's oldest scientific publisher, has unveiled a proposal to create the first serious framework for future geoengineering experiments. It's a sign that what are still considered drastic and risky measures to combat climate change are drifting further into the purview of mainstream science. The scientific body has issued a call to create "an open and transparent review process that ensures such experiments have the necessary social license to operate."
1sockchuck writes In a unique approach to data center design, the new high-performance computing center in Oregon is housed in a geodesic dome. The new facility at the Oregon Health and Science University requires no mechanical air conditioning, using outside air to racks of servers reaching densities of 25kW per cabinet. The design uses an aisle containment system to separate hot and cold air, and can recirculate server exhaust heat to adjust cold aisle temperatures in the winter. It's a very cool integration of many recent advances in data center design, combining elements of the Yahoo Chicken Coop and server silo in Quebec. The school has posted a virtual tour that provides a deep technical dive.
LibbyMC writes For a few years now Linux kernel developers have followed a fairly strict authentication policy for those who commit directly to the git repositories housing the Linux kernel. Each is issued their own ssh private key, which then becomes the sole way for them to push code changes to the git repositories hosted at kernel.org. While using ssh keys is much more secure than just passwords, there are still a number of ways for ssh private keys to fall into malicious hands. So they've further tightened access requirements with two-factor authentication using yubikeys.
Zothecula writes If you're trying to find out what the common features of tabby cats are, a Google image search will likely yield more results than you'd ever have the time or inclination to look over. New software created at the University of California, Berkeley, however, is designed to make such quests considerably easier. Known as AverageExplorer, it searches out thousands of images of a given subject, then amalgamates them into one composite "average" image.
Deathspawner writes Windows 8 brought a lot to the table, with one of its most major features being its app store. However, it's not a feature that Microsoft seems too intent on keeping clean. As it is today, the store is completely littered with misleading apps and outright scamware. The unfortunate thing is that to find any of it, all you have to do is simply open the store and peruse the main sections. Not so surprisingly, no Microsoft software seems to be affected by this, but many open-source apps can be found at the store from unofficial sources that have a cost, or will lead the user to download a third-party installer. It's only a matter of time before malware sneaks its way in, if it's not there already.
mdsolar writes with this story about the rising costs of keeping Europe's nuclear power plants safe and operational. Europe's aging nuclear fleet will undergo more prolonged outages over the next few years, reducing the reliability of power supply and costing plant operators many millions of dollars. Nuclear power provides about a third of the European Union's electricity generation, but the 28-nation bloc's 131 reactors are well past their prime, with an average age of 30 years. And the energy companies, already feeling the pinch from falling energy prices and weak demand, want to extend the life of their plants into the 2020s, to put off the drain of funding new builds. Closing the older nuclear plants is not an option for many EU countries, which are facing an energy capacity crunch as other types of plant are being closed or mothballed because they can't cover their operating costs, or to meet stricter environmental regulation.
An anonymous reader writes The debate over Internet governance for much of the past decade has often come down to a battle between ICANN and the United Nations. The reality has always been far more complicated. The U.S. still maintains contractual control over ICANN, while all governments exert considerable power within the ICANN model through the Governmental Advisory Committee (GAC). Now governments are looking for even more power, seeking a near-complete veto power of ICANN decisions.
An anonymous reader writes Julian Assange has hosted a press conference in which he indicated he is soon about to leave the embassy of Ecuador in London. From the article: "WikiLeaks founder Julian Assange, who has spent over two years in Ecuador's London embassy to avoid a sex crimes inquiry in Sweden, said on Monday he planned to leave the building 'soon', but Britain signaled it would still arrest him if he tried. Assange made the surprise assertion during a news conference alongside Ecuador's Foreign Minister Ricardo Patino. But his spokesman played down the chances of an imminent departure, saying the British government would first need to revise its position and let him leave without arrest, something it has repeatedly refused to do.
Rick Zeman writes Wired has an interesting article on the possibility of selectable ethical choices in robotic autonomous cars. From the article: "The way this would work is one customer may set the car (which he paid for) to jealously value his life over all others; another user may prefer that the car values all lives the same and minimizes harm overall; yet another may want to minimize legal liability and costs for herself; and other settings are possible. Philosophically, this opens up an interesting debate about the oft-clashing ideas of morality vs. liability." Meanwhile, others are thinking about the potential large scale damage a robot car could do.
Lasrick writes Patrick Lin writes about a recent FBI report that warns of the use of robot cars as terrorist and criminal threats, calling the use of weaponized robot cars "game changing." Lin explores the many ways in which robot cars could be exploited for nefarious purposes, including the fear that they could help terrorist organizations based in the Middle East carry out attacks on US soil. "And earlier this year, jihadists were calling for more car bombs in America. Thus, popular concerns about car bombs seem all too real." But Lin isn't too worried about these threats, and points out that there are far easier ways for terrorists to wreak havoc in the US.
KentuckyFC writes Art experts look for influences between great masters by studying the artist's use of space, texture, form, shape, colour and so on. They may also consider the subject matter, brushstrokes, meaning, historical context and myriad other factors. So it's easy to imagine that today's primitive machine vision techniques have little to add. Not so. Using a new technique for classifying objects in images, a team of computer scientists and art experts have compared more than 1700 paintings from over 60 artists dating from the early 15th century to the late 20 the century. They've developed an algorithm that has used these classifications to find many well known influences between artists, such as the well known influence of Pablo Picasso and George Braque on the Austrian symbolist painter Gustav Klimt, the influence of the French romantic Delacroix on the French impressionist Bazille, the Norwegian painter Munch's influence on the German painter Beckmann and Degas' influence on Caillebotte. But the algorithm also discovered connections that art historians have never noticed (judge the comparisons for yourself). In particular, the algorithm points out that Norman Rockwell's Shuffleton's Barber Shop painted in 1950 is remarkably similar to Frederic Bazille's Studio 9 Rue de la Condamine painted 80 years before.
stephendavion writes Looks like Chinese device maker, Xiaomi, is taking its "Apple of the East" tag too literally. First, their CEO brazenly copies Steve Jobs' signature look, sitting cross-legged on the floor. And now, Xiaomi's latest version of Android shamelessly rips off iOS 7. MIUI 6, which is Xiaomi's upcoming edition of Android for its latest phones and tablets, looks almost exactly like Apple's operating system for iPhones, iPads and the iPod Touch. It features the same bright color palette and a flat design. Heck, it even does away with Google's "app drawer" and puts all apps on your home screen. It's like the CEO handed iPhones to the design team and barked: "Here, copy this!"
First time accepted submitter carbon_tet writes I read two articles this week that made me wonder: "Would anyone actually pay for a website without trolls?" The first, was about web trolls and civility on the internet, and the second about the ad-based internet. It seems that public comments unavoidably have trolls, or they degrade very quickly until someone makes a reference to Hitler. So, is it impossible to have a substantive discussion online without trolls? Would you put your money where your mouth is to have a serious online conversation without them? Are there any topics that you would talk about (or prefer to see talked about) on a website where trolls were paywalled out?
AmiMoJo writes Sure, you can set an out-of-office auto-reply to let others know they shouldn't email you, but that doesn't usually stop the messages; you may still have to handle those urgent-but-not-really requests while you're on vacation. That's not a problem if you work at Daimler, though. The German automaker recently installed software that not only auto-replies to email sent while staff is away, but deletes it outright.
An anonymous reader writes "The former CEO of Redflex, a major red light camera vendor, and John Bills, former Managing Deputy Commissioner at the Department of Transportation, have been indicted on federal corruption charges stemming from a contract with the City of Chicago. According to the indictment, a friend of Bills was hired as a contractor and paid $2 million. Much of that money was then kicked back to Bills, who also got a Mercedes and a condominium via Redflex employees. The defendants are facing 23 counts including: mail fraud, wire fraud, and bribery. Each fraud count carries a maximum sentence of 20 years."
An anonymous reader writes The BBC and other outlets are reporting that a major quarantine center for patients who have been infected with the Ebola virus in Liberia has been looted and ransacked. Reports vary on the motive of the attack, but officials have confirmed that the Ebola patients are missing and that the quarantine center's medical supplies have been stolen. Officials say that the looters are highly likely to contract the virus themselves and worsen the epidemic further, as the WHO counts 1000+ lives claimed by the virus total."
An anonymous reader writes NPR commentator Bonny Wolf has a unique solution to battle the threat of invasive fish species in our waterways. She proposes we fight them with a knife, fork, and a few lemon wedges. From the article: "Take the northern snakehead, which has made its way into tributaries of the Chesapeake Bay. It competes with native species for food, and then eats the native species, not to mention the odd frog or bird, with its mouthful of sharp teeth. It's been called "Fishzilla." It breeds fast, has no natural predators and can grow to be 4 feet long. The northern snakehead hangs out in grassy shallows, making it hard to catch. But a couple of years ago, Maryland started promoting the snakehead as an eating fish. Its harvest has increased from zero to 5,000 pounds a year."