Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Amazon Fire HD 6 Price in India, USA, UAE Review and Specification

Anonymous Coward writes | 11 minutes ago

0

An anonymous reader writes "Amazon Fire HD 6 Camera, Fire HD 6 Network, Fire HD 6 Connectivity, Fire HD 6 Qwerty, Fire HD 6 Features, Fire HD 6 Memory, Amazon Fire HD 6 Price in Pakistan, Fire HD 6 Amazon, Fire HD 6 Amazon price, Fire HD 6 price, Price Fire HD 6, price of Fire HD 6 mobile, rate of Fire HD 6, cost of Fire HD 6"
Link to Original Source

NASA Wants to 3D Print Tools, Radiation Shields & Habitats on Mars Within 10

Anonymous Coward writes | 14 minutes ago

0

An anonymous reader writes "On September 20th, NASA and Made In Space will be sending the first zero-gravity 3D printer up to the International Space Station. While most people see this as a tremendous accomplishment, NASA's Niki Werkheiser says that it is only the beginning. When asked where she sees the technology of 3D printing in its relation to space travel in the next 10 years, she stated, "On Mars building everything from hand tools to radiation shielding habitats – and maybe even the engines you need to travel throughout the cosmos!""
Link to Original Source

Mozilla Labs Closed And Nobody Noticed

mikejuk (1801200) writes | about half an hour ago

0

mikejuk (1801200) writes "When Google Labs closed there was an outcry. How could an organization just pull the rug from under so many projects?
At least Google announced what it was doing. Mozilla, it seems since there is no official record, just quietly tiptoes away — leaving the lights on since the Mozilla Labs Website is still accessible. It is accessible but when you start to explore the website you notice it is moribund with the last blog post being December 2013 with the penultimate one being September 2013.
The fact that it is gone is confirmed by recent blog posts and by the redeployment of the people who used to run it. The projects that survived have been moved to their own websites. It isn't clear what has happened to the Hatchery -the incubator that invited new ideas from all and sundry.
One of the big advantages of open source is the ease with which a project can be started. One of the big disadvantages of open source is the ease with which projects can be allowed to die — often without any clear cut time of death. It seems Mozilla applies this to groups and initiatives as much as projects. This isn't good."

Link to Original Source

How To Activate Do Not Disturb (DND) India Registration For All Networks

Bala Satya (3825041) writes | about half an hour ago

0

Bala Satya (3825041) writes "Many of the people suffering from promotional calls from their telecom service providers not only calls but also promotional messages and the truth is that most of the people don't know about DND service.by using DND service you can able to stop unwanted calls or sms's so read the article carefully and protect your privacy."
Link to Original Source

Long-Lasting, Water-Based Nuclear Battery Developed

Zothecula (1870348) writes | 38 minutes ago

0

Zothecula (1870348) writes "Researchers working at the University of Missouri (MU) claim to have produced a prototype of a nuclear-powered, water-based battery that is said to be both longer-lasting and more efficient than current battery technologies and may eventually be used as a dependable power supply in vehicles, spacecraft, and other applications where longevity, reliability, and efficiency are paramount."
Link to Original Source

Latest Logitech Harmony Remotes Can Now Control Smart Home Devices Too

MojoKid (1002251) writes | 39 minutes ago

0

MojoKid (1002251) writes "In an ongoing effort to put every device in your house under the control of a Harmony Remote, Logitech is also now claiming they're ready to take over other devices in addition to those that reside in your living room. The company stepped into the home control market, releasing two high-end home remotes and the Logitech Harmony Home Hub, which manages the traffic between the remotes and your home's door locks, garage door opener, thermostat, lights and window shades, among other devices. Interestingly, the most important part of the Logitech Harmony Home series is also one of the cheapest. The Logitech Harmony Home Hub, which will set you back $99.99, use a variety of connectivity options (including Wi-Fi and Bluetooth) to send commands from your wireless remote to your thermostat and other devices. It's compatible with home automation tools from industry brands, including August, Honeywell, Kwikset, Schlage, and Sylvania (to name just a few). For controlling those devices, you have three options: an app for your smartphone, the Logitech Harmony Home Control ($149.99), or the Logitech Harmony Ultimate Home ($349.99)."
Link to Original Source

US Military Unaware of Chinese Attacks Against Transport Contractors

itwbennett (1594911) writes | 1 hour ago

0

itwbennett (1594911) writes "The Senate Armed Service Committee released on Wednesday an unclassified version of a report (PDF) commissioned last year to investigate cyberattacks against contractors for the U.S. Transportation Command (TRANSCOM). The report alleges that the Chinese military successfully stole emails, documents, login credentials and more from contractors, but few of those incidents were ever reported to TRANSCOM. During a one-year period starting in June 2012, TRANSCOM contractors endured more than 50 intrusions, 20 of which were successful in planting malware. TRANSCOM learned of only two of the incidents. The FBI, however, was aware of 10 of the attacks."
Link to Original Source

NASA's Dawn spacecraft Delayed 1 month due to radiation

ordirules (2874769) writes | 1 hour ago

0

ordirules (2874769) writes "NASA's Dawn spacecraft has been delayed 1 month due to a suspected radiation blast, causing the spacecraft to enter into safe mode and disable its ion engine. From JPL:
"Although they have not yet specifically pinpointed the cause of this issue, it could also be explained by a high-energy particle corrupting the software running in the main computer. Ultimately the team reset the computer, which restored the pointing performance to normal. "
One of the goals of this mission was to test their ion engine. With technology containing less and less moving parts, it is clear that space travel relies heavily on the ability of software to recover from a malfunction."

Senate Report: Military In The Dark As China Hacked Transportation Command

chicksdaddy (814965) writes | 1 hour ago

0

chicksdaddy (814965) writes "The Security Ledger reports (https://securityledger.com/2014/09/senate-report-warns-of-attacks-on-military-transport-contractors/#.VBrO4C5dXWI) on a Senate Armed Services Committee investigation that found evidence that hackers associated with the Chinese government compromised the computer systems of U.S. Transportation Command contractors at least 20 times in a single year. The attacks pose a serious risk to the system that moves military troops and equipment.

U.S. Transportation Command – a joint military/civilian program – was targeted by hackers believed to be affiliated with the Chinese government, a Senate Intelligence Committee investigation found.

The Committee released the report on Wednesday. (http://www.armed-services.senate.gov/imo/media/doc/SASC_Cyberreport_091714.pdf) It found a serious gap in awareness and reporting requirements. TRANSCOM was only aware of two of the 20 intrusions, while U.S. Transportation Command remained mostly unaware of the computer compromises of contractors during and after the attacks.
The incidents include an attack that spanned two years – from 2008 to 2010 – and that captured emails, documents, passwords and computer code. A 2012 attack gained access to “multiple systems” onboard a commercial ship contracted by TRANSCOM, the Committee found.

Information sharing about cyber attacks was woeful. An audit of a subset of TRANSCOM contractors uncovered 11 cyber intrusions believed to be linked to China. The Committee said the FBI or DoD had already identified another 9 linked to TRANSCOM contractors. Of those 20, however, information on just two was relayed back to TRANSCOM."

Link to Original Source

Apple updates privacy policy, moves to reassure users - Computerworld

feedfeeder (1749978) writes | 1 hour ago

0


ZDNet

Apple updates privacy policy, moves to reassure users
Computerworld
Apple outlined its new privacy policy and set up a site to explain what information it collects from users and how it handles it, as the company enters new areas like health tracking and mobile payments that have potential privacy implications. "We don't build a...
Cook: We have never allowed GOVERNMENT access to Apple serversRegister
Apple says iOS 8 will shield your data from policeCNNMoney
Apple is using iPhone privacy as a sales pitch—too bad nobody seems to careQuartz
USA TODAY-Daily Mail-Maine News Online
all 272 news articles

Link to Original Source

FCC May Raise Broadband Speed Requirements for Subsidies to ISPs

Anonymous Coward writes | 13 hours ago

1

An anonymous reader writes "On Wednesday at a hearing in front of the US House Committee on Small Business, FCC Chairman Tom Wheeler stated that for ISPs to be eligible for government broadband subsidies, they would have to deliver speeds of at least 10 Mbps. Said Wheeler: "What we are saying is we can't make the mistake of spending the people's money, which is what Universal Service is, to continue to subsidize something that's subpar." He further indicated that he would remedy the situation by the end of 2014. The broadband subsidies are collected through bill surcharges paid for by phone customers."

Future Crime Hot Spots Predicted Using Mobile Phone Data

KentuckyFC (1144503) writes | 4 hours ago

0

KentuckyFC (1144503) writes "A growing number of police forces around the world are using data on past crimes to predict the likelihood of crimes in the future. These predictions can be made more accurate by combining crime data with local demographic data about the local population. However, this data is time consuming and expensive to collect and so only updated rarely. Now a team of data experts have shown how combing crime data with data collected from mobile phones can make the prediction of future crimes even more accurate. The team used an anonymised dataset of O2 mobile phone users in the London metropolitan area during December 2012 and January 2013. They then used a small portion of the data to train a machine learning algorithm to find correlations between this and local crime statistics in the same period. Finally, they used the trained algorithm to predict future crime rates in the same areas. Without the mobile phone data, the predictions have an accuracy of 62 per cent. But the phone data increases this accuracy significantly to almost 70 per cent. What's more, the data is cheap to collect and can be gathered in more or less real time. Whether the general population would want their data used in this way is less clear but either way, Minority Report-style policing is looking less far-fetched than when the film appeared in 2002."

Hackers Penetrated Systems Of Key Defense Contractors

Anonymous Coward writes | 4 hours ago

0

An anonymous reader writes "Hackers associated with the Chinese government successfully penetrated the computer systems of U.S. Transportation Command contractors at least 20 times in a single year, intrusions that show vulnerabilities in the military’s system to deploy troops and equipment in a crisis, a Senate Armed Services Committee investigation has found. The year-long investigation found that TRANSCOM, which is responsible for global movement of U.S. troops and equipment, was only aware of two of those intrusions. It also found gaps in reporting requirements and a lack of information sharing among government entities that left the command largely unaware of computer compromises by China of contractors that are key to the mobilization and deployment of military forces."

Irate NSA Staffer Doesn't Like Being Filmed in Public, for Some Reason

Anonymous Coward writes | 4 hours ago

0

An anonymous reader writes "The Intercept writes "The NSA sent someone bearing the nametag “Neal Z.” to the University of New Mexico’s Engineering and Science Career Fair today, in the hopes of recruiting young computer geniuses to help manage the yottabytes of data it is collecting about you. But instead of eager young applicants, Mr. Z. encountered University of New Mexico alumnus Andy Beale and student Sean Potter, who took the rare opportunity of being in the room with a genuine NSA agent to ask him about his employer’s illegal collection of metadata on all Americans. Mr. Z. did not like that one bit.""

NASA Inspector General lobs big rocks at agency's asteroid hunting program

coondoggie (973519) writes | yesterday

0

coondoggie (973519) writes "Lack of money, management structure and staff are hampering NASA’s ability to effectively identify and track comets, meteorites and asteroids that might threaten Earth. The space agency’s Inspector General, Paul Martin, issued a scathing report this week that said while NASA’s Near Earth Object program has done substantial work in identifying the sometimes massive rocks hurtling around the planet it is substantially behind in its goal of cataloging 90% of those 140 meters in diameter by 2020, among other issues."
Link to Original Source

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>