Slashdot: News for Nerds


Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Police placing anti-piracy warning ads on illegal sites

mrspoonsi (2955715) writes | 11 minutes ago


mrspoonsi (2955715) writes "The City of London police has started placing banner advertisements on websites believed to be offering pirated content illegally. The messages, which will appear instead of paid-for ads, will ask users to close their web browsers. The move comes as part of a continuing effort to stop piracy sites from earning money through advertising. Police said the ads would make it harder for piracy site owners to make their pages look authentic. "When adverts from well known brands appear on illegal websites, they lend them a look of legitimacy and inadvertently fool consumers into thinking the site is authentic," said Detective Chief Inspector Andy Fyfe from the City of London Police Intellectual Property Crime Unit (Pipcu). "This new initiative is another step forward for the unit in tackling IP crime and disrupting criminal profits. "Copyright infringing websites are making huge sums of money though advert placement, therefore disrupting advertising on these sites is crucial and this is why it is an integral part of Operation Creative.""

API Changelog Aims to Reduce Risk to API Consumers

Anonymous Coward writes | 18 minutes ago


An anonymous reader writes "API Changelog provides up-to-the-minute tracking of APIs to ensure that API developer-consumers are alerted to any upgrades or changes to endpoints. Changes to an API can create business risks as the end customer’s experience may be affected if an API being used in an application or aggregation product suddenly becomes inaccessible."
Link to Original Source

Friendship day | Originated in North America; Revived by Asia

nottynavi (3766359) writes | 23 minutes ago


nottynavi (3766359) writes "Friendship Day, A day dedicated to honor perhaps the most important person of your life; Friend, will be celebrated on this Sunday. I was hopping over web and found out History of Friendship Day. The event was initiated by United States Congress in order to increase peace and friendship not only amongst nation but among individuals as well.

The commercialization of this event by Greeting cards national association led to consumer resistance all over America and the event largely died out. The event was revitalized in Asian countries as the event became popular among youth."

Link to Original Source

ARA / Fraud and Forensics Services : Linguistics Statement Analysis

rayfiber (3485869) writes | 1 hour ago


rayfiber (3485869) writes "Words can be deceptive. ARA Fraud & Forensic Services, a leading business fraud prevention and detection firm based in St. Louis, Missouri, utilizes LSAT to detect deception in a person’s written words. The Linguistic Statement Analysis Technique (LSAT) is an advanced investigative technique which is highly effective in detecting deception and lies in written statements from victims, suspects and witnesses in various types of investigations and legal depositions.

How LSAT Works:

People use the same subconscious strategies to deceive, by using different words and phrases, statement structure and content in their statements as truthful individuals use. Years of research by experts in the fields of language, psychology and deception detection have led to the identification of these trends in language that are referred to as linguistic signals. Utilizing LSAT, we can identify these linguistic signals that differentiate deceptive statements from truthful ones. It is equally effective when used on suspect, witness, and victim statements alike. Our linguistic analyst examines the subject’s statement to identify all of the existing linguistic signals. We then determine if the statement is truthful or deceptive, exactly what specific points of the statement are deceptive or truthful, and reveal much information that the subject didn’t intend to include. Look at an example:

“Before I left home, I said goodbye to her. After I said goodbye to her, I left the house to catch my flight.”

The sentences above are a small segment taken from a murder suspect’s written statement. They appear to be rather insignificant but believe it or not, this segment contains SIX signals that the writer is likely to have committed the murder! He even tells us when he committed it!

LSAT is a beneficial investigative tool which can be used in various situations including the following:

Litigation purposes — Attorneys have emerged as a tremendous benefactor of LSAT. By analyzing legal depositions for deception and truthfulness, attorneys become much more effective and efficient. Imagine taking a deposition and knowing immediately whether the deposed person is being truthful or not and being able to develop questions based on that information, leading to the truth and the success of your case.

Embezzlement and fraud cases — LSAT reveals the TRUTH behind every story. LSAT allows our investigators to examine the original words of a person’s spoken or written language and determine which parts of their story are true and which are deceptive. LSAT will identify hidden information deep within the person’s subconscious mind and sheds light on the story, revealing the true reality what happened.

Hiring new employees – The LSAT is utilized in a very unique way to reveal the level of truthfulness with potential employees by examining employment applications and language used in job interviews. LSAT can determine if an individual had past performance issues or was terminated from a previous employer."

Link to Original Source

How The Emerging Revolution In Neural Wiring Diagrams Is About To Change Biology

KentuckyFC (1144503) writes | 1 hour ago


KentuckyFC (1144503) writes "One of the great challenges in neurobiology is to work out the entire wiring diagram of the human brain, a structure known as the human connectome. That’s going to be tricky. Researchers have successfully constructed the connectome of only one creature, the nematode worm C. elegans with a grand total of 302 neurons and 8000 connections between them. By contrast, the human cerebral cortex contains 10^10 neurons linked by 10^14 synaptic connections. One reason why progress has been slow is that the neurons have to be imaged using electronmicroscopy and the resulting images stacked and aligned so that every part of each neuron can be mapped by hand. In this way, the C. elegans connectome took 50 person-years to assemble. So biologists are racing to develop faster techniques that automate the mapping process. But that creates another problem. The wiring diagram and its spatial layout do not uniquely specify the function of a neural system. To gain a full understanding of what’s going on, biologists need to know the types of cells involved and how they connect to each other in microcircuits. That helps distinguish, for example, the function of circuitry involved in retinal tissue from that in brain tissue. Now researchers have developed an algorithmic technique that uses the spatial wiring diagram from an organism as an input and then uses it to automatically identify cell types, the circuits they form and hence the function of these neural systems. They have tested it on the connectome of C. elegans and say it reproduces the work of many years in just a few hours. They have even used it to work out the type of circuits in the 6502 microprocessor from the Apple II computer using only its ‘connectome’ as an input. This tool and others for automating the mapping of connectomes look set to revolutionise neurobiology. In particular it should allow the comparison of cell types across animals and species. That will be particularly important when different cell types emerge because of the stimuli they receive rather than the biomolecular properties of the cells themselves. So it looks as if connectomics is finally about to be revolutionised by bio informatics, jesters gene finding algorithms revolutionised molecular biology and computational phylogenetics revolutionised evolutionary biology."

Dear museums: uploading your content to Wikimedia Commons just got easier

The ed17 (2834807) writes | 2 days ago


The ed17 (2834807) writes "Galleries, libraries, archives, and museums (GLAMs) are now facing fewer barriers to uploading their content to Wikimedia Commons—the website that stores most of Wikipedia's images and videos. Previously, these institutions had to build customized scripts or be lucky enough to find a Wikimedia volunteer to do the work for them. According to the toolset's coordinator Liam Wyatt, "this is a giant leap forward in giving GLAMs the agency to share with Commons on their own terms.""
Link to Original Source

Twitter has been blocked an account of famous Twitter in Russia

Anonymous Coward writes | 2 hours ago


An anonymous reader writes "Twitter has been blocked an account of famous Twitter in Russia as a result of a request from the Government, only a week after the company denied it would suppress accounts of the extremists "in the country. Global Voices Reports, that the account @ boltai, Russian Anonymous type that regularly publishes Government leaks and other confidential State documents, is not accessible to local users.

A check on Twitter of Russia shows the account is indeed blocked in the country — using the function of specific censure of the location of Twitter — in accordance with a request of the Government of Russia, which is recorded in the Chilling Effects website.

A representative for Twitter says The Next Web company "[is not] any comment on individual accounts, for reasons of privacy and security", but the movement appears to have been in response to a demand that is cited in the application documents for the Russian Government censorship.

A Court of Petersburg awarded the block due to a case not specified in connection with "personal data", according to the document, despite Global Voices points out that there is little information about the demand in the public domain.

Users in Russia can have access to the account to change your global settings to a different country, while an account is no mirror (@ b0ltai2) is not blocked.

A representative for the Government of Russia, said last week that Twitter had agreed to block a maximum of 10 accounts, but at this time, Chilling Effects displays only this sole demand."

Link to Original Source

An Open Source, Tiny 3D Printed Robot Called Droidles

J.R.C.L. (3739333) writes | 3 hours ago


J.R.C.L. (3739333) writes "A new crowdfunding at Indiegogo features an interesting small and interactive two-wheeled robot called Droidles . Judging from the way it looks, it is just an ordinary toy.But this 3D printed device is enabled with open source hardware and firmware allowing even amateur programmers to learn new robotics.

For only $89.00, you get to create your own robot and webpage where you can view, edit and experiment with their personality programs, share programs with other users, and try out programs made by other users, created by other Droidles, or generated by the cloud service."

Link to Original Source

US Department of Homeland Security Providing Online Open Source Code Testing

cold fjord (826450) writes | 4 hours ago


cold fjord (826450) writes "ZDNet reports, "At OSCon, The Department of Homeland Security (DHS) ... quietly announced that they're now offering a service for checking out your open-source code for security holes and bugs: the Software Assurance Marketplace (SWAMP). ... Patrick Beyer, SWAMP's Project Manager at Morgridge Institute for Research, the project's prime contractor, explained, "With open source's popularity, more and more government branches are using open-source code. Some are grabbing code from here, there, and everywhere." Understandably, "there's more and more concern about the safety and quality of this code. We're the one place you can go to check into the code" ... funded by a $23.4 million grant from the Department of Homeland Security Science & Technology Directorate (DHS S&T), SWAMP is designed by researchers from the Morgridge Institute, the University of Illinois-Champaign/Urbana, Indiana University, and the University of Wisconsin-Madison. Each brings broad experience in software assurance, security, open source software development, national distributed facilities and identity management to the project. ... SWAMP opened its services to the community in February of 2014 offering five open-source static analysis tools that analyze source code for possible security defects without having to execute the program. ... In addition, SWAMP hosts almost 400 open source software packages to enable tool developers to add enhancements in both the precision and scope of their tools. On top of that the SWAMP provides developers with software packages from the National Institute for Standards and Technology's (NIST) Juliet Test Suite.""
Link to Original Source

Stanford Researchers Claim They Found "The Holy Grail" Of Battery Life

MojoKid (1002251) writes | 4 hours ago


MojoKid (1002251) writes "A research team at Stanford University is claiming to have pulled off a scientific coup that really would be a quantum leap over existing battery technology — and they've done it, supposedly, by solving a very old problem. Right now, the batteries we refer to as "lithium ion" use lithium in the electrolyte, the fluid that surrounds the anode and cathode. Electrons flow from the anode into the attached device, then back into the battery via the cathode. The reason we use lithium for the electrolyte fluid but not the anode itself is simple; lithium anodes tend to expand when they come into contact with their electrolyte solutions. As it expands, it forms tendrils of metal that cause short circuits and destroy the anode's ability to function effectively. This leads to extremely nasty problems, problems with names like "Thermal runaway" and "Explosion.". The Stanford team claims to have discovered a method for using hollow polystyrene nanospheres to isolate the electrolytic solution and the anode. This barrier layer of carbon isolates the anode and would allow the battery to be charged and discharged repeatedly without risk of explosion. If the team is correct, and we could build lithium anodes, it would open the doors for batteries 5-6x more dense than current models. Cell phones, at that point, could possibly last days on a single charge, while a car like the Tesla Model S could comfortably make a New York to LA trip without stretching for more than an overnight trickle charge."
Link to Original Source

U.K. team claims breakthrough in universal cancer test

Anonymous Coward writes | yesterday


An anonymous reader writes "U.K. researchers say they've devised a simple blood test that can be used to diagnose whether people have cancer or not. The Lymphocyte Genome Sensitivity (LGS) test looks at white blood cells and measures the damage caused to their DNA when subjected to different intensities of ultraviolet light (UVA), which is known to damage DNA. The results of the empirical study show a distinction between the damage to the white blood cells from patients with cancer, with pre-cancerous conditions and from healthy patients. “Whilst the numbers of people we tested are, in epidemiological terms, quite small (208), in molecular epidemiological terms, the results are powerful," said the team's lead researcher. "We’ve identified significant differences between the healthy volunteers, suspected cancer patients and confirmed cancer patients of mixed ages at a statistically significant level .... This means that the possibility of these results happening by chance is 1 in 1000." The research is published online in the FASEB Journal, the US Journal of the Federation of American Societies for Experimental Biology."
Link to Original Source

Digicert Root CA Expires, taking down, digicert and others

TinBane (1747006) writes | 6 hours ago


TinBane (1747006) writes "Secure connections to sites using Digicert's EV Root CA are failing, because their Root CA Expired on Sunday Morning (Melbourne Time). This in the case of sites like BitBucket, that means any https based git interactions will fail. You can switch over to SSH if you've already got them set up, and they will function normally. It seems unlikely that Digicert weren't aware of this expiry, however https access to digicert's own page also fails with the same error."
Link to Original Source

Ask Slashdot: Where can I obtain resources to program for Palm OS 5?

baka_toroi (1194359) writes | yesterday


baka_toroi (1194359) writes "I got a Tungsten E2 from a friend and I wanted to give it some life by programming for it a little bit. The main problem I'm bumping with is that HP thought it would be awesome to just shut down every single thing related to Palm OS development. After googling a lot I found out CodeWarrior was the de facto IDE for Palm OS development... but I was soon disappointed as I learned that Palm moved from the 68K architecture to ARM, and of course, CodeWarrior was just focused on Palm OS 4 development.

Now, I realize Palm OS 4 software can be run on Palm OS 5, but I'm looking to use some of the "newer" APIs. Also, I have the Wi-fi add-on card so I wanted to create something that uses it. I thought what I needed was PODS (Palm OS Development Suite) but not only I can't find it anywhere but also it seems it was deprecated during Palm OS's lifetime. It really doesn't help the fact that I'm a beginner, but I really want to give this platform some life.
Any general tip, book, working link or even anecdotes related to all this will be greatly appreciated."

Lawsuit Filed To Prove Happy Birthday Is In The Public Domain; Demands Warner Pa

Anonymous Coward writes | 8 hours ago


An anonymous reader writes "Happy Birthday remains the most profitable song ever. Every year, it is the song that earns the highest royalty rates, sent to Warner/Chappell Music (which makes millions per year from "licensing" the song). However, as we've been pointing out for years, the song is almost certainly in the public domain. Robert Brauneis did some fantastic work a few years ago laying out why the song's copyright clearly expired many years ago, even as Warner/Chappell pretends otherwise. You can read all the background, but there are a large number of problems with the copyright, including that the sisters who "wrote" the song, appear to have written neither the music, nor the lyrics. At best, they may have written a similar song called "Good Morning to All" in 1893, with the same basic melody, but there's evidence to suggest the melody itself predated the sisters. But, more importantly, the owner of the copyright (already questionable) failed to properly renew it in 1962, which would further establish that it's in the public domain"
Link to Original Source

Smoking mothers may alter the DNA of their children

sciencehabit (1205606) writes | 11 hours ago


sciencehabit (1205606) writes "Pregnant women who smoke don’t just harm the health of their baby—they may actually impair their child’s DNA, according to new research. A genetic analysis shows that the children of mothers who smoke harbor far more chemical modifications of their genome--known as epigenetic changes--than kids of non-smoking mothers. Many of these are on genes tied to addiction and fetal development. The finding may explain why the children of smokers continue to suffer health complications later in life."
Link to Original Source

Microsofts Android patents ..

lippydude (3635849) writes | 9 hours ago


lippydude (3635849) writes "'73 patents that are said to be "standard-essential patents," or SEPs, implemented in smartphones generally, followed by 127 patents that Microsoft says are implemented in Android' ..

'The patent lists are strategically significant, because Microsoft has managed to build a huge patent-licensing business by taxing Android phones without revealing what kind of legal leverage they really have over those phones' ..."

Link to Original Source

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account