Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Surprise! TSA lied!

Anonymous Coward writes | 1 hour ago

0

An anonymous reader writes "Does this make you feel safer? The TSA has now admitted that it had allowed illegal immigrants to fly without valid identification, something it had strongly denied when news sources revealed it last month.

[A newly discovered TSA] letter confirms that illegal aliens are being allowed to board planes using a Notice to Appear form (also known as I-862), as [union border patrol official] Darby revealed in July. Hector Garza, a spokesman for the National Border Patrol Council (NBPC) told Darby that Notice to Appear forms can “easily be reproduced or manipulated on any home computer. The Notice to Appear form has no photo, anyone can make one and manipulate one. They do not have any security features, no watermark, nothing. They are simply printed on standard copy paper based on the information the illegal alien says is the truth.”

So, while the TSA routinely sexually abuses American citizens while demanding they provide photo id, the agency has had policies that would allow an illegal immigrant, with unknown background and who has come from outside the country, to board planes using a simple form that anyone can photocopy.

Does anyone but me see something significantly wrong with this picture? Didn’t Congress originally create the TSA to prevent foreign nationals from boarding planes to hijack them?

The TSA is a joke imposed on us by our elected officials and approved of by too many Americans because it allows them to make believe we are doing something about terrorism. Other elected officials and TSA managers and employees than use the agency as a weapon to obtain power and crush the freedom of Americans. In that context, these actions by the TSA, including lying about their policies, make complete sense."

Power generation from the meeting of river water and seawater.

rtoz (2530056) writes | 1 hour ago

0

rtoz (2530056) writes "A team at MIT has now developed a model to evaluate the performance and optimal dimensions of large PRO systems. In general, the researchers found that the larger a system’s membrane, the more power can be produced — but only up to a point. Interestingly, 95 percent of a system’s maximum power output can be generated using only half or less of the maximum membrane area.

A PRO system could potentially power a coastal wastewater-treatment plant by taking in seawater and combining it with treated wastewater to produce renewable energy."

Researchers find way to hack Gmail with 92 percent success rate

SternisheFan (2529412) writes | 1 hour ago

0

SternisheFan (2529412) writes "CNET reports; Researchers at the University of California Riverside Bourns College of Engineering and the University of Michigan have identified a weakness they believe to exist across Android, Windows, and iOS operating systems that could allow malicious apps to obtain personal information.

Although it was tested only on an Android phone, the team believes that the method could be used across all three operating systems because all three share a similar feature: all apps can access a mobile device's shared memory.

"The assumption has always been that these apps can't interfere with each other easily," said Zhiyun Qian, an associate professor at UC Riverside. "We show that assumption is not correct and one app can in fact significantly impact another and result in harmful consequences for the user."

To demonstrate the method of attack, first a user must download an app that appears benign, such as a wallpaper, but actually contains malicious code. Once installed, the researchers can use it to access the shared memory statistics of any process, which doesn't require any special privileges."

Link to Original Source

Apple CarPlay Rollout Delayed By Some Carmakers

Lucas123 (935744) writes | 1 hour ago

0

Lucas123 (935744) writes "Some car makers are delaying the implementation of Apple's CarPlay iPhone interface for vehicle infotainment systems. The delays, which are prompting manufacturers such as Mercedes, Volvo and Honda to push their announcement from 2014 to 2015, appear to be related to a few snags in the integration process or in choosing which model cars should have the middleware. At the same time, many of the automakers rolling out CarPlay are also implementing Android Auto, which will provide a vehicle head unit user interface for Android smartphones. Analysts believe the addition of Android Auto earlier this year may also be adding delays because manufacturers want to be able to announce availability of both platforms in their new model vehicles. According to IHS, adoption of Android Auto is expected to slightly outpace CarPlay with an annual growth rate of 179% compared to 165%. In 2020, for example, 40 million cars will roll off assembly lines with Android Auto versus 37 million with CarPlay."
Link to Original Source

Education Funding for Washington State is in the Hands of Microsoft Shareholders

reifman (786887) writes | 2 hours ago

0

reifman (786887) writes "In June, the Washington State Supreme Court ordered the Legislature to appear on September 3rd to explain why it hasn't found the revenue to fully fund the education reforms required by its McCleary ruling, as much as $7.83 billion through 2019. One reason the state has such a huge shortfall is major tax breaks to corporations such as Boeing and Microsoft. In particular, Microsoft’s savings from lobbying and dodging the state royalty tax between 1997 and 2014 is $5.34 billion. Factoring in interest and the Department of Revenue’s typical 25 percent penalty on unpaid corporate taxes, that number jumps to $8.16 billion. In other words, the entire education shortfall which Microsoft's leaders regularly decry, would not likely exist if not for their tax practices, passing education dollars to its out of state and international shareholders."
Link to Original Source

When Customer Dissatisfaction Is a Tech Business Model

jammag (1021683) writes | 2 hours ago

0

jammag (1021683) writes "A new trend has emerged where tech companies have realized that abusing users pays big. Examples include the highly publicized Comcast harassing service call, Facebook "experiments," Twitter timeline tinkering, rude Korean telecoms — tech is an area where the term "customer service" has an Orwellian slant. Isn't it time customer starting fleeing abusive tech outfits?"
Link to Original Source

Which Is More Scalable, Nuclear Energy Or Wind Energy?

mdsolar (1045926) writes | 3 hours ago

1

mdsolar (1045926) writes "Summary: Empirically, wind energy is much more scalable than nuclear energy.

China is the true experiment for maximum scalability of nuclear vs wind. It has a tremendous gap between demand and generation. It can mostly ignore democracy and social license for nuclear. It is building both wind and nuclear as rapidly as possible. It has been on a crash course for both for about the same period of time. It has bypassed most of the regulatory red tape for nuclear.

So how is it doing?

        China turned on just over 16 GW of nameplate capacity of wind generation in 2013 according to the Global Wind Energy Council.

Over the four years of 2010 to 2014, China managed to put 4.7 GW of nuclear into operation at the Qinshan Phase II, Ling Ao Phase II, Ningde, Hongyanhe and Yangjiang plants. This is not their stated plans for nuclear, which had them building almost double this in 2013 alone and around 28 GW by 2015, but the actual plants put into production. The variance between the nuclear roadmap and nuclear reality in China is following the trajectory of nuclear buildout worldwide: delays, cost overruns, and unmet expectations."

Link to Original Source

A Better Way to Make Mind-Controlled Prosthetic Limbs

the_newsbeagle (2532562) writes | 3 hours ago

0

the_newsbeagle (2532562) writes "To make a brain-machine interface, you need a way to capture neurons' electric signals. The most precise and most invasive way uses implants that are stuck in the gray matter. The least precise and least invasive way uses EEG sensors stuck to the scalp. But researchers at Johns Hopkins University say there's a third way that gets the best of both worlds, which is not too invasive and fairly precise. They use ECoG systems, in which a mesh of electrodes is placed under the skull, draped over the surface of the cortex.

They're testing their systems on epilepsy patients, who have these ECoG systems inserted anyway while they're waiting for surgery (the electrodes record the source of their seizures). The researchers are capturing these patients' movement commands from their brains, and using them to control robotic limbs. Someday such a system could be used by amputees to control their prosthetic limbs."

Link to Original Source

Securing networks in the Internet of Things era

Anonymous Coward writes | 4 hours ago

0

An anonymous reader writes "Gartner reckons that the number of connected devices will hit 26 billion by 2020, almost 30 times the number of devices connected to the IoT in 2009. This estimate doesn’t even include connected PCs, tablets and smartphones. The IoT will represent the biggest change to our relationship with the Internet since its inception. Many IoT devices themselves suffer from security limitations as a result of their minimal computing capabilities. For instance, the majority don’t support sufficiently robust mechanisms for authentication, leaving network admins with only weak alternatives or sometimes no alternatives at all. As a result, it can be difficult for organizations to provide secure network access for certain IoT devices. Yet IT teams need to set network access policies for all connected devices in order to preserve network security and make the most efficient use of available network resources."

New Understanding of Lizard Tails Could Allow Humans to Regrow Body Parts

Zothecula (1870348) writes | 4 hours ago

0

Zothecula (1870348) writes "If you ever had a pet lizard as a child, it was quite likely a green anole. As is the case with other lizards, they have the ability to break off their own tail when attacked by a predator, and then regrow it. Scientists from Arizona State University recently announced that they have cracked the code regarding that tail regrowth process, and are now hoping that it could be applied to the field of regenerative medicine."
Link to Original Source

Researchers Made a Fake Social Network to Infiltrate China's Internet Censors

Jason Koebler (3528235) writes | 5 hours ago

0

Jason Koebler (3528235) writes "In order to get inside China's notorious internet filter, Harvard researcher Gary King created his own fake social network in order to gain access to the programs used to censor content, so he could reverse-engineer the system.
"From inside China, we created our own social media website, purchased a URL, rented server space, contracted with one of the most popular software platforms in China used to create these sites, submitted, automatically reviewed, posted, and censored our own submissions," King wrote in a study published in Science. "We had complete access to the software; we were even able to get their recommendations on how to conduct censorship on our own site in compliance with government standards.""

33 Months In Prison For Recording a Movie in a Theater

Anonymous Coward writes | 5 hours ago

0

An anonymous reader writes "Philip Danks made a video recording of the movie Fast & Furious 6 in a UK cinema. Later, he shared it via bittorrent and allegedly sold physical copies. Now, he's been sentenced to 33 months in prison for his actions. "In Court it was claimed that Danks’ uploading of Fast 6 resulted in more than 700,000 downloads costing Universal Pictures and the wider industry millions of pounds in losses." Danks was originally told police weren't going to take any action against him, but he unwisely continued to share the movie files after his initial interview with authorities."
Link to Original Source

NSA Agents Leak Tor Bugs To Developers

Anonymous Coward writes | 5 hours ago

0

An anonymous reader writes "We've known for a while that NSA specifically targets Tor, because they want to disrupt one of the last remaining communication methods they aren't able to tap or demand access to. However, not everybody at the NSA is on board with this strategy. Tor developer Andrew Lewman says even as flaws in Tor are rooted out by the NSA and British counterpart GCHQ, other agents from the two organizations leak those flaws directly to the developers, so they can be fixed quickly. He said, "You have to think about the type of people who would be able to do this and have the expertise and time to read Tor source code from scratch for hours, for weeks, for months, and find and elucidate these super-subtle bugs or other things that they probably don't get to see in most commercial software." Lewman estimates the Tor Project receives these reports on a monthly basis. He also spoke about how a growing amount of users will affect Tor. He suggests a massive company like Google or Facebook will eventually have to take up the task of making Tor scale up to millions of users."
Link to Original Source

UPS: We've Been Hacked

paysonwelch (2505012) writes | yesterday

0

paysonwelch (2505012) writes "The United Parcel Service announced Wednesday that customersâ(TM) credit and debit card information at 51 franchises in 24 states may have been compromised. There are 4,470 franchised center locations throughout the U.S., according to UPS.

The malware began to infiltrate the system as early as January 20, but the majority of the attacks began after March 26. UPS says the threat was eliminated as of August 11 and that customers can shop safely at all locations."

Link to Original Source

Would Scottish independence mean the end of UK's nuclear arsenal?

Lasrick (2629253) writes | yesterday

0

Lasrick (2629253) writes "The referendum on Scottish independence on September 18th affects more than just residents of the United Kingdom. All of the UK's nuclear deterrent is located in Scotland (no wonder they want independence), and Alex Salmond and the Scottish government have pledged to safely remove and permanently ban nuclear weapons from Scottish territory within the first term of a newly independent parliament. Although the polls seem not to favor Scottish independence, you would think the British government would have some sort of contingency plan to quickly and safely remove these weapons from Scottish soil. Nope. There's no contingency plan."
Link to Original Source

Scientists Confirm Life Under Antarctic Ice for the First Time

MikeChino (1640221) writes | yesterday

0

MikeChino (1640221) writes "A new paper by a group of researchers from Montana State University confirms that life can survive under antarctic ice. Researchers led by John Priscu drilled down into the West Antarctic Ice Sheet and pulled up organisms called Archaea. These organisms survive by converting methane into energy, enabling them to survive where there is no wind or sunlight, buried deep under the ice."
Link to Original Source

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>