Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

How much would all state car insurance cost per year for a 16 year old with a 20

Anonymous Coward writes | 9 minutes ago

0

An anonymous reader writes "How much would all state car insurance cost per year for a 16 year old with a 2004 Pontiac GTO??? ? ? ?

How much would all state car insurance cost per year for a 16 year old with a 2004 Pontiac GTO??? ?

BEST ANSWER: At this site: USAINSURANCEQUOTES.NET you can compare quotes from different companies in a few minutes. Try it is free."

The first interactive game on Youtube.

Dailytainment (3795145) writes | 13 minutes ago

0

Dailytainment (3795145) writes "I have an interesting Video for you. It is an interactive game.
This game consists of a start video https://www.youtube.com/watch?...
and 11 other Next Way videos which are all linked together.
Each video contains two buttons (ways). You have to decide for a button (way).

Then two things can happen.

1. A new Next Way Video opens.
2. The game is lost (Game Over) and you have to start from the beginning.

Objective: Find the right way to the goal video.

Try it. Good luck.

Start Video: https://www.youtube.com/watch?...

Did you like the video (interactive game)? Did you find the goal Video?"

Instagram provides new tools for brands

Anonymous Coward writes | 19 minutes ago

0

An anonymous reader writes "Instagram turning more and more to the professionals: new tools for brands will emerge on the social network.

Instagram improves the user experience for professionals with the arrival of new tools. "We are aware of the importance for brands to get more information about the commitment of the community with their photos and videos. "In the coming weeks, the brands that use Instagram will have better insight into the performance of their content (paid and organic)."

Link to Original Source

Ask Slashdot: Where Can I Find Good Replacement Batteries?

Anonymous Coward writes | about an hour ago

0

An anonymous reader writes "I have an old phone with a battery that barely works any more. My current phone's battery is mediocre — I can put up with it, but I've been thinking about getting a new one. My four-year-old ThinkPad holds less of a charge than I'd like, and less than it did when I bought it. In all these cases, the only thing holding me back from buying a new battery is that I'm not sure where to find a good one. Searching for my phone's battery on Amazon yields a dozen results, all fairly cheap. But which are reliable? They all seem to have varying reviews, ranging from "Perfect official factory replacement!" to "Garbage knock-off, worse than the battery I replaced." Part numbers don't seem to help, as the knock-offs replicate those pretty well. I ask you, Slashdot: where can I find a good replacement battery?"
Link to Original Source

A project that aims to create digital clones of people and their memories

snipermk0 (3686967) writes | 1 hour ago

0

snipermk0 (3686967) writes "Artificial intelligence has been the cornerstone of science-fiction. Now, a start-up project called, 'The exClone Project' could accomplish that by letting users upload their memories, personality and even their expertise to create a digital clone of themselves. Your digital clone can then progressively adapt and learn from the internet or social media."

Google Wants To Test Driverless Cars in a Simulation

Anonymous Coward writes | 1 hour ago

0

An anonymous reader writes "Google has been testing its autonomous vehicles on U.S. roads for a while now. In fact, they're required to, by law. "California's regulations stipulate autonomous vehicles must be tested under "controlled conditions" that mimic real-world driving as closely as possible. Usually, that has meant a private test track or temporarily closed public road." It's easy enough to test a few prototypes, but whenever autonomous cars start being produced by manufacturers, it'll become a lot more complicated. Now, Google is lobbying to change that law to allow testing via computer simulation. Safety director Ron Medford said, "Computer simulations are actually more valuable, as they allow manufacturers to test their software under far more conditions and stresses than could possibly be achieved on a test track." Google spokeswoman Katelin Jabbari said, "In a few hours, we can test thousands upon thousands of scenarios which in terms of driving all over again might take decades." Shee adds that simulator data can also easily provide information on how human behavior creeps into driving. "It's not just about the physics of avoiding a crash. It's also about the emotional expectation of passengers and other drivers." For example, when one of Google's computer-controlled cars is cut off, the software brakes harder than it needs to, because this makes the passengers feel safer. Critics say relying heavily on simulation data is flawed because it doesn't take into account how other cars react to the computer's driving."
Link to Original Source

'MythBusters' drop Kari Byron, Grant Imahara, Tory Belleci

rbrandis (735555) writes | 1 hour ago

1

rbrandis (735555) writes "In a video announcement Thursday on Discovery Channel, "MythBusters" hosts Adam Savage and Jamie Hyneman revealed that longtime co-hosts and fan favorites Kari Byron, Grant Imahara, and Tory Belleci are no longer on the show.

"This next season we're going back to our origins with just Adam and me," Hyneman said in the video, which explained that the change took hold as of the season's last episode on August 21."

Finding an ISIS Training Camp Using Google Earth

Anonymous Coward writes | 1 hour ago

0

An anonymous reader writes "Terrorist organization ISIS has been in the news a lot lately for their hostile activities in Iraq and Syria. They've also been very active online posting propaganda on various social networking sites to try to recruit more members. Frequently, they'll have pictures of themselves in nondescript locations — but even carefully selected images give clues to their real location. Citizen journalists at Bellingcat analyzed a group of these photos, comparing buildings and bridges in the background to images from Google Earth. With very little to go on, they were able to pinpoint the location of a terrorist training camp."
Link to Original Source

U.S. University Restricts Network Access to Social Media, Political Content

onproton (3434437) writes | 1 hour ago

1

onproton (3434437) writes "Northern Illinois University recently began restricting student access to webpages that contain "illegal or unethical" content which, according to University policy, includes resources used for "political activities...and the organization or participation in meetings, rallies and demonstrations." A student raised concerns after attempting to access the Wikipedia page for Westboro Baptist Church, and receiving a filter message informing him that his access of this page would likely violate the University's Acceptable Use Policy, along with a warning that "all violations would be reviewed." This has lead to questions about whether some policies that restrict student access to information are in the best interest of the primary goal of education."

Emulator Brings x86 Linux Apps to ARM Devices

DeviceGuru (1136715) writes | 4 hours ago

0

DeviceGuru (1136715) writes "Eltechs announced a virtual machine that runs 32-bit x86 Linux applications on ARMv7 hardware. The ExaGear VM implements a virtual x86 Linux container on ARMv7 computers and is claimed to be 4.5 times faster than QEMU, according to Eltechs. The VM is based on binary translation technology and requires ARMv7, which means it should run on mini-PCs and SBCs based on Cortex-A8, A7, A9, and A15 processors — but sadly, it won’t run on the ARM11 (ARMv6) SoC found on the Raspberry Pi. It also does not support applications that require kernel modules. It currently requires Ubuntu (v12.04 or higher), but will soon support another, unnamed Linux distro, according to Eltechs, which is now accepting half price pre-orders without payment obligation."
Link to Original Source

Air Force requests info for new engine

schwit1 (797399) writes | 4 hours ago

0

schwit1 (797399) writes "Corporate welfare: The Air Force on Thursday issued a request for information from industry for the replacement of the Russian-made engines used by ULA’s Atlas 5 rocket.

Companies are being asked to respond by Sept. 19 to 35 questions. Among them: “What solution would you recommend to replace the capability currently provided by the RD-180 engine?” Air Force officials have told Congress they only have a broad idea of how to replace the RD-180. Estimates of the investment in money and time necessary to field an American-built alternative vary widely. Congress, meanwhile, is preparing bills that would fund a full-scale engine development program starting next year; the White House is advocating a more deliberate approach that begins with an examination of applicable technologies.

In the request for information, the Air Force says it is open to a variety of options including an RD-180 facsimile, a new design, and alternative configurations featuring multiple engines, and even a brand new rocket. The Air Force is also trying to decide on the best acquisition approach. Options include a traditional acquisition or a shared investment as part of a public-private partnership. [emphasis mine]

The Atlas 5 is built by Lockheed Martin. This is really their problem, not the Air Force or ULA. In addition, the Air Force has other options, both from Boeing’s Delta rocket family as well as SpaceX’s Falcon 9 rocket. For the government to fund this new engine is nothing more than corporate welfare, at a time when the federal government is swimming in debt and is essentially bankrupt."

User backlash at Wordpress.com over new crippled "beep beep boop" blog editor

wattsup (807308) writes | 4 hours ago

0

wattsup (807308) writes "Users of wordpress.com were surprised last week by an unannounced code upgrade that took the trusty default blog editor is use for years and defaulted it to what has become to be known as the "beep beep boop" editor, taken from the comedic "beep beep boop" progress indicator that displays while the app loads. While the classic edior used to load in under five seconds, the new "beep boop" editor takes as long as thirty seconds or more to load and is missing central features that have been around for years.

Users in the support forum topic "Beep Beep Boop screen is a joke. Is this a glitch?" are describing it as the "worst upgrade ever", "a juvenile interface", "maddening", and "a primitive, poorly planned, dysfunctional piece of software". One user "stusshed" commented "Of all the changes WordPress have made to the blogging platform over the years, just how many others have received such a consistently negative response?"

Now more than a week after its introduction, the parent company, Automattic Inc. so far has no official comment on the burgeoning issue that is angering users."

Link to Original Source

Surprise! TSA lied!

Anonymous Coward writes | 5 hours ago

0

An anonymous reader writes "Does this make you feel safer? The TSA has now admitted that it had allowed illegal immigrants to fly without valid identification, something it had strongly denied when news sources revealed it last month.

[A newly discovered TSA] letter confirms that illegal aliens are being allowed to board planes using a Notice to Appear form (also known as I-862), as [union border patrol official] Darby revealed in July. Hector Garza, a spokesman for the National Border Patrol Council (NBPC) told Darby that Notice to Appear forms can “easily be reproduced or manipulated on any home computer. The Notice to Appear form has no photo, anyone can make one and manipulate one. They do not have any security features, no watermark, nothing. They are simply printed on standard copy paper based on the information the illegal alien says is the truth.”

So, while the TSA routinely sexually abuses American citizens while demanding they provide photo id, the agency has had policies that would allow an illegal immigrant, with unknown background and who has come from outside the country, to board planes using a simple form that anyone can photocopy.

Does anyone but me see something significantly wrong with this picture? Didn’t Congress originally create the TSA to prevent foreign nationals from boarding planes to hijack them?

The TSA is a joke imposed on us by our elected officials and approved of by too many Americans because it allows them to make believe we are doing something about terrorism. Other elected officials and TSA managers and employees than use the agency as a weapon to obtain power and crush the freedom of Americans. In that context, these actions by the TSA, including lying about their policies, make complete sense."

Power generation from the meeting of river water and seawater.

rtoz (2530056) writes | 5 hours ago

0

rtoz (2530056) writes "A team at MIT has now developed a model to evaluate the performance and optimal dimensions of large PRO systems. In general, the researchers found that the larger a system’s membrane, the more power can be produced — but only up to a point. Interestingly, 95 percent of a system’s maximum power output can be generated using only half or less of the maximum membrane area.

A PRO system could potentially power a coastal wastewater-treatment plant by taking in seawater and combining it with treated wastewater to produce renewable energy."

Researchers find way to hack Gmail with 92 percent success rate

SternisheFan (2529412) writes | 5 hours ago

0

SternisheFan (2529412) writes "CNET reports; Researchers at the University of California Riverside Bourns College of Engineering and the University of Michigan have identified a weakness they believe to exist across Android, Windows, and iOS operating systems that could allow malicious apps to obtain personal information.

Although it was tested only on an Android phone, the team believes that the method could be used across all three operating systems because all three share a similar feature: all apps can access a mobile device's shared memory.

"The assumption has always been that these apps can't interfere with each other easily," said Zhiyun Qian, an associate professor at UC Riverside. "We show that assumption is not correct and one app can in fact significantly impact another and result in harmful consequences for the user."

To demonstrate the method of attack, first a user must download an app that appears benign, such as a wallpaper, but actually contains malicious code. Once installed, the researchers can use it to access the shared memory statistics of any process, which doesn't require any special privileges."

Link to Original Source

Apple CarPlay Rollout Delayed By Some Carmakers

Lucas123 (935744) writes | 5 hours ago

0

Lucas123 (935744) writes "Some car makers are delaying the implementation of Apple's CarPlay iPhone interface for vehicle infotainment systems. The delays, which are prompting manufacturers such as Mercedes, Volvo and Honda to push their announcement from 2014 to 2015, appear to be related to a few snags in the integration process or in choosing which model cars should have the middleware. At the same time, many of the automakers rolling out CarPlay are also implementing Android Auto, which will provide a vehicle head unit user interface for Android smartphones. Analysts believe the addition of Android Auto earlier this year may also be adding delays because manufacturers want to be able to announce availability of both platforms in their new model vehicles. According to IHS, adoption of Android Auto is expected to slightly outpace CarPlay with an annual growth rate of 179% compared to 165%. In 2020, for example, 40 million cars will roll off assembly lines with Android Auto versus 37 million with CarPlay."
Link to Original Source

When Customer Dissatisfaction Is a Tech Business Model

jammag (1021683) writes | 6 hours ago

0

jammag (1021683) writes "A new trend has emerged where tech companies have realized that abusing users pays big. Examples include the highly publicized Comcast harassing service call, Facebook "experiments," Twitter timeline tinkering, rude Korean telecoms — tech is an area where the term "customer service" has an Orwellian slant. Isn't it time customer starting fleeing abusive tech outfits?"
Link to Original Source

A Better Way to Make Mind-Controlled Prosthetic Limbs

the_newsbeagle (2532562) writes | 8 hours ago

0

the_newsbeagle (2532562) writes "To make a brain-machine interface, you need a way to capture neurons' electric signals. The most precise and most invasive way uses implants that are stuck in the gray matter. The least precise and least invasive way uses EEG sensors stuck to the scalp. But researchers at Johns Hopkins University say there's a third way that gets the best of both worlds, which is not too invasive and fairly precise. They use ECoG systems, in which a mesh of electrodes is placed under the skull, draped over the surface of the cortex.

They're testing their systems on epilepsy patients, who have these ECoG systems inserted anyway while they're waiting for surgery (the electrodes record the source of their seizures). The researchers are capturing these patients' movement commands from their brains, and using them to control robotic limbs. Someday such a system could be used by amputees to control their prosthetic limbs."

Link to Original Source

Securing networks in the Internet of Things era

Anonymous Coward writes | 8 hours ago

0

An anonymous reader writes "Gartner reckons that the number of connected devices will hit 26 billion by 2020, almost 30 times the number of devices connected to the IoT in 2009. This estimate doesn’t even include connected PCs, tablets and smartphones. The IoT will represent the biggest change to our relationship with the Internet since its inception. Many IoT devices themselves suffer from security limitations as a result of their minimal computing capabilities. For instance, the majority don’t support sufficiently robust mechanisms for authentication, leaving network admins with only weak alternatives or sometimes no alternatives at all. As a result, it can be difficult for organizations to provide secure network access for certain IoT devices. Yet IT teams need to set network access policies for all connected devices in order to preserve network security and make the most efficient use of available network resources."

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>