We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!
WheezyJoe writes: If you've been holding out hope that FiOS would rescue you from your local cable monopoly, it's probably time to give up. Making good on their statements five years ago, Verizon announced this week it is nearing "the end" of its fiber construction and is reducing wireline capital expenditures while spending more on wireless.
The expense of replacing old copper lines with fiber has allegedly led Verizon to stop building in new regions and to complete wiring up the areas where it had already begun. The fiber network was profitable, but nowhere near as profitable as their wireless network. So, if Verizon hasn't started in your neighborhood by now, they never will, and you'd best ignore all those ads for FiOS.
191 comments | 2 days ago
lightbox32 writes Dish Network has been found guilty of violating the Do Not Call list on 57 million separate occasions. They were also found liable for abandoning or causing telemarketers to abandon nearly 50 million outbound telephone calls, in violation of the abandoned-call provision of the Federal Trade Commission's Telemarketing Sales Rule. Penalties for infringing on the Do Not Call list can be up to a whopping $16,000 for each outbound call.
230 comments | 2 days ago
MojoKid writes There's a new report suggesting Google is partnering with select wireless carriers to sell its own branded wireless voice and data plans directly to consumers. According to sources and the "three people with knowledge of the plans," Google will tap into networks belonging to Sprint and T-Mobile for its new service, buying wholesale access to mobile voice and data in order to make itself a virtual network operator. That might sound disappointing on the surface. Had Google struck a deal with Verizon and AT&T, or even just Verizon, the deal could potentially have more critical mass, with great coverage backed by a company like Google and its services. The former might be a winning combination but at least this is a start. The project will be known as "Nova," which is reportedly being led by Google's Nick Fox, a longtime executive with the company. Apparently Fox has been overseeing this for some time now, and it seems likely a launch will take place this year.
101 comments | 3 days ago
wiredmikey writes Oracle has pushed out a massive security update, including critical fixes for Java SE and the Oracle Sun Systems Products Suite. Overall, the update contains nearly 170 new security vulnerability fixes, including 36 for Oracle Fusion Middleware. Twenty-eight of these may be remotely exploitable without authentication and can possibly be exploited over a network without the need for a username and password.
79 comments | 3 days ago
HughPickens.com writes: The insurance industry is a fat target — there's were about $481 billion in premiums in 2013, and agents' commissions of about $50 billion. Now Conor Dougherty writes in the NYT that the boring but lucrative trade has been attracting big names like Google, which has formed a partnership with Comparenow, an American auto insurance comparison site that will give Google access to insurers in Comparenow's network. "A lot of people are waking up to the fact that it's a massive industry, it's old-fashioned, they still use human agents and the commissions are pretty big," says Jennifer Fitzgerald. It may seem like an odd match for Google, whose projects include driverless cars, delivery drones and a pill to detect cancer, but the key to insurance is having lots of data about people's backgrounds and habits, which is perhaps the company's greatest strength. "They have a ton of data on where people drive, how people drive," says Jon McNeill. "It's the holy grail of being able to price auto insurance correctly."
People in the industry and Silicon Valley say it is only a matter of time before online agencies attack the armies of intermediaries that are the backbone of the trade, and Google could present formidable competition for other insurance sellers. As many as two-thirds of insurance customers say they would consider purchasing insurance products from organizations other than insurers, including 23 percent who would consider buying from online service providers such as Google and Amazon. Google Compare auto insurance site has already been operating in Britain for two years as a search engine for auto insurance prices.
237 comments | 4 days ago
SonicSpike writes The investigative arm of the Department of Justice is attempting to short-circuit the legal checks of the Fourth Amendment by requesting a change in the Federal Rules of Criminal Procedure. These procedural rules dictate how law enforcement agencies must conduct criminal prosecutions, from investigation to trial. Any deviations from the rules can have serious consequences, including dismissal of a case. The specific rule the FBI is targeting outlines the terms for obtaining a search warrant. It's called Federal Rule 41(b), and the requested change would allow law enforcement to obtain a warrant to search electronic data without providing any specific details as long as the target computer location has been hidden through a technical tool like Tor or a virtual private network. It would also allow nonspecific search warrants where computers have been intentionally damaged (such as through botnets, but also through common malware and viruses) and are in five or more separate federal judicial districts. Furthermore, the provision would allow investigators to seize electronically stored information regardless of whether that information is stored inside or outside the court's jurisdiction.
371 comments | 4 days ago
Mike Lape links to a NYTimes piece which says "The evidence gathered by the 'early warning radar' of software painstakingly hidden to monitor North Korea's activities proved critical in persuading President Obama to accuse the government of Kim Jong-un of ordering the Sony attack, according to the officials and experts, who spoke on the condition of anonymity about the classified N.S.A. operation." From the linked article: For about a decade, the United States has implanted “beacons,” which can map a computer network, along with surveillance software and occasionally even destructive malware in the computer systems of foreign adversaries. The government spends billions of dollars on the technology, which was crucial to the American and Israeli attacks on Iran’s nuclear program, and documents previously disclosed by Edward J. Snowden, the former security agency contractor, demonstrated how widely they have been deployed against China. ... The extensive American penetration of the North Korean system also raises questions about why the United States was not able to alert Sony as the attacks took shape last fall, even though the North had warned, as early as June, that the release of the movie “The Interview,” a crude comedy about a C.I.A. plot to assassinate the North’s leader, would be “an act of war.”
181 comments | about a week ago
MojoKid writes You have to hand it to Elon Musk, who has occasionally been referred to as a real life "Tony Stark." The man helped to co-found PayPal and Tesla Motors. Musk also helms SpaceX, which just recently made its fifth successful trip the International Space Station (ISS) to deliver supplies via the Dragon capsule. The secondary mission of the latest ISS launch resulted in the "successful failure" of the Falcon 9 rocket, which Musk described as a Rapid Unscheduled Disassembly (RUD) event. In addition to his Hyperloop transit side project, Musk is eyeing a space-based Internet network that would be comprised of hundred of micro satellites orbiting roughly 750 miles above Earth. The so-called "Space Internet" would provide faster data speeds than traditional communications satellites that have a geosynchronous orbit of roughly 22,000 miles. Musk hopes that the service will eventually grow to become "a giant global Internet service provider," reaching over three billion people who are currently either without Internet service or only have access to low-speed connections. And this wouldn't be a Musk venture without reaching for some overly ambitious goal. The satellite network would truly become a "Space Internet" platform, as it would form the basis for a direct communications link between Earth and Mars. It's the coming thing.
104 comments | about a week ago
Advocatus Diaboli (1627651) writes According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money. Also check out — New Snowden documents show that the NSA and its allies are laughing at the rest of the world.
81 comments | about a week ago
Dave Knott writes UK Police have arrested an 18-year-old man over involvement in the cyber-attacks on Sony's PlayStation Network and Microsoft's Xbox Live gaming services over Christmas, for which the Lizard Squad hacking group claimed responsibility. The man was arrested Friday in Southport, England, on suspicion of computer hacking, threats to kill and swatting. Computers and other electronic devices were seized during the arrest by officers from two UK cybercrime units working in conjunction with the US Federal Bureau of Investigation. A spokesman said that police were still in the early stages of an investigation working closely with the FBI to identify further people involved in the attacks.
55 comments | about a week ago
gurps_npc writes: As most people know, the US has for quite some time let police seize pretty much anything they wanted to, forcing you to go to court to get back your stuff (at significant expense). Most of the problems came about because the Federal government let the local cops keep most of what they took.
Eric Holder, the U.S. Attorney General, has changed the rules of that program, making it more difficult for the police to do it under the federal program. They can still use local state programs, but that accounts for only about 57% of the cash taken. Holder did not end the program entirely — he left in some exceptions for things like explosives, weapons, and items related to child pornography, which all together amount to about 1% of the current federal program. Still, with this action he will have struck a serious blow to a despicable practice that serious newspapers and comedy TV shows decried as nothing more than legalized theft.
308 comments | about a week ago
We all love 'The Internet of Things.' Now imagine appliances, such as your refrigerator and hot water heater, getting radio messages from the power grid telling them when they should turn on and off to get the best electricity prices. Now kick that up to the electric company level, and give them a radio network that tells them which electric provider to get electricity from at what time to get the best (wholesale) price. This is what e-Radio is doing. They make this claim: "Using pre-existing and near ubiquitous radio signals can save billions of dollars, reduce environmental impact, add remote addressability and reap additional significant societal benefits."
Timothy noticed these people at CES. They were one of the least flashy and least "consumer-y" exhibitors. But saving electricity by using it efficiently, while not glamorous, is at least as important as a $6000 Android phone. Note that the guy e-Radio had at CES speaking to Timothy was Scott Cuthbertson, their Chief Financial Officer. It's a technology-driven company, from Founder and CEO Jackson Wang on down, but in the end, saving money is what they sell. (Alternate Video Link)
172 comments | about a week ago
reifman writes: Fizzmint CEO Tarah Wheeler Van Vlack says she "never had a problem with Mitt Romney's use of the phrase 'binders full of women.' ... Instead of congratulating him for his realization and his attempt to (awkwardly) rectify the situation, we crucified him for not already having a network of accomplished women." The scarcity of women in tech is a central issue in Seattle, where Amazon's growth is literally reshaping the city. The company refuses to release its technology workforce diversity numbers, and it's been criticized for interviewing practices that put female candidates on a "horrifying steeplechase [by] careless and non-people-oriented technologists." Van Vlack says, "It's stupid on every level not to acknowledge the obstacles women face when they try to join a tech company." She suggests three concrete steps for technology leaders to attract more women into the fold: 1) Push your technical recruiters to hit 20% thresholds for female candidates 2) Challenge and question your personal assumptions about the leadership skills of women in technology and 3) Transparently and openly take a stand to improve your company's diversity figures.
479 comments | about a week ago
jones_supa writes Gustav Nipe, president of Sweden's Pirate Party's youth wing, was successful with somewhat trivial social engineering experiment in the area of the Sälen security conference. He set up a WiFi hotspot named "Öppen Gäst" ("Open Guest") without any kind of encryption. What do you know, a large amount of unsuspecting high profile guests associate with the network. Nipe says he was able to track which sites people visited as well as the emails and text messages of around 100 delegates, including politicians and journalists as well as security experts. He says that he won't be revealing which sites were visited by specific experts, as the point was just to draw attention to the issue of rogue network monitoring. The stunt has already sparked criticism in Swedish newspapers and on social media, with some angry comments saying that Nipe breached Sweden's Personal Data Act.
67 comments | about two weeks ago
An anonymous reader writes How to make politicians really understand the dangers of mass digital surveillance and the importance of information security? Gustav Nipe, the 26-year old president of the Swedish Pirate Party's youth wing, tried to do it by setting up an open Wi-Fi network at the Society and Defence National Conference held in Sälen, Sweden, and collecting and analyzing the metadata of conference attendees who connected to it. Nipe set up an open wireless Internet access point named "Open Guest" and over 100 delegates used this particular unsecured Wi-Fi network to go online. The collected metadata showed that, among other sites, they visited those of daily Swedish newspaper Aftonbladet, Swedish private ads website Blocket, eBay, and tourism sites. "This was during the day when I suppose they were being paid to be at the conference working," Nipe noted for The Local.
81 comments | about two weeks ago
jones_supa writes A lot of development work is happening on systemd with just the recent couple of weeks seeing over 200 commits. With the most recent work that has landed, the networkd component has been improved with new features. Among the additions are IP forwarding and masquerading support (patch). This is the minimal support needed and these settings get turned on by default for container network interfaces. Also added was minimal firewall manipulation helpers for systemd's networkd. The firewall manipulation helpers (patch) are used for establishing NAT rules. This support in systemd is provided by libiptc, the library used for communicating with the Linux kernel's Netfilter and changing iptables firewall rulesets. Those wishing to follow systemd development on a daily basis and see what is actually happening under the hood, can keep tabs via the systemd Git viewer.
552 comments | about two weeks ago
An anonymous reader writes "Facebook unveiled its rumored "at Work" service to a handful of partners today. Facebook at Work puts co-workers into a standalone social network and allows them to share posts and images appropriate for the workplace but looks and acts just like regular Facebook. "We have found that using Facebook as a work tool makes our work day more efficient," Lars Rasmussen, Facebook's director of engineering, tells WIRED. "You can get more stuff done with Facebook than any other tool that we know of, and we'd like to make that available to the whole world.""
112 comments | about two weeks ago
New submitter TechCurmudgeon writes: According to a story at Wired, towns in Mexico that aren't served by the nation's telecom monopoly are taking matters in their own hands with the help of a non-profit and open source technology. "Strategically ignored by Mexico's major telecoms, Yaee is putting itself on the mobile communications grid with the help of a Oaxaca-based telecommunications non-profit called Rhizomatica." A locally-made tower is the backbone of Yaee's first cellular network. The town's network is composed of two antennas and an open-source base station from a Canadian company called NuRAN. Once Yaee gets the tower installed and the network online, its 500 citizens will, for the first time, be able to make cell phone calls from home, and for cheaper rates than almost anywhere else in Mexico.
104 comments | about two weeks ago
rossgneumann writes A new anonymous online drug market has emerged, but instead of using the now infamous Tor network, it uses the lesser known "I2P" alternative. "Silk Road Reloaded" launched yesterday, and is only accessible by downloading the special I2P software, or by configuring your computer in a certain way to connect to I2P web pages, called 'eepsites', and which end in the suffix .i2p. The I2P project site is informative, as is the Wikipedia entry.
155 comments | about two weeks ago
HughPickens.com writes Anna North writes in the NYT that self-control, curiosity, and "grit" may seem more personal than academic, but at some schools, they're now part of the regular curriculum. Some researchers say personality could be even more important than intelligence when it comes to students' success in school. "We probably need to start rethinking our emphasis on intelligence," says Arthur E. Poropat citing research that shows that both conscientiousness and openness are more highly correlated with student performance than intelligence. "This isn't to say that we should throw intelligence out, but we need to pull back on thinking that this is the only game in town." The KIPP network of charter schools emphasizes grit along with six other "character strengths," including self-control and curiosity. "We talk a lot about them as being skills or strengths, not necessarily traits, because it's not innate," says Leyla Bravo-Willey. "If a child happens to be very gritty but has trouble participating in class, we still want them to develop that part of themselves."
But the focus on character has encountered criticism. "To begin with, not everything is worth doing, let alone doing for extended periods, and not everyone who works hard is pursuing something worthwhile" says Alfie Kohn. "On closer inspection, the concept of grit turns out to be dubious, as does the evidence cited to support it. Persistence can actually backfire and distract from more important goals." There's other evidence that grit isn't always desirable. Gritty people sometimes exhibit what psychologists call "nonproductive persistence": They try, try again, says Dean MacFarlin though the result may be either unremitting failure or "a costly or inefficient success that could have been easily surpassed by alternative courses of action."
249 comments | about two weeks ago