Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Foxconn to the cleat for the production of iPhone 6

Anonymous Coward writes | 1 minute ago

0

An anonymous reader writes "Despite massive recruitment and infernal cadences, the Taiwanese manufacturer is struggling to keep up with demand around the new iPhone models.

540,000 units .. per day. This is the current rate of production of the new iPhone. "We produce 140,000 iPhone 6 and 400 000 iPhone 6 Plus every day, the highest volume ever made, but this is insufficient to meet the pre-orders," says the Wall Street Journal a person involved in the production of new Apple smartphones. Recall that Apple had received 4 million pre-orders in the first 24 hours. In the United States, all models will be available in the coming days but to buy iPhone 6 Plus is an achievement and delivery times are now 3 to 4 weeks against at least 7 to 10 days for an iPhone 6 "classic". Besides the difficulty of production, the other reason is the limited supply on the screens 5.5 inches and the difficulty of assembly."

Link to Original Source

Using Illegal E-books Steals Your Amazon Account

divakarsivashankar (2817977) writes | about half an hour ago

0

divakarsivashankar (2817977) writes "Are you used to downloading pirated or illegal E-books for your Amazon Kindle E-book reader, then this post is definitely for you. Now since Sony has gone out of the E-book reader market a couple of months ago, Amazon has become the leader of the E-book reader industry with it awesome Kindle devices and the huge library of E-books it has in its store, We had seen a similar case with Adobe's Flash Plugin Bug and it was fixed."
Link to Original Source

Future Crime Hot Spots Predicted Using Mobile Phone Data

KentuckyFC (1144503) writes | 1 hour ago

0

KentuckyFC (1144503) writes "A growing number of police forces around the world are using data on past crimes to predict the likelihood of crimes in the future. These predictions can be made more accurate by combining crime data with local demographic data about the local population. However, this data is time consuming and expensive to collect and so only updated rarely. Now a team of data experts have shown how combing crime data with data collected from mobile phones can make the prediction of future crimes even more accurate. The team used an anonymised dataset of O2 mobile phone users in the London metropolitan area during December 2012 and January 2013. They then used a small portion of the data to train a machine learning algorithm to find correlations between this and local crime statistics in the same period. Finally, they used the trained algorithm to predict future crime rates in the same areas. Without the mobile phone data, the predictions have an accuracy of 62 per cent. But the phone data increases this accuracy significantly to almost 70 per cent. What's more, the data is cheap to collect and can be gathered in more or less real time. Whether the general population would want their data used in this way is less clear but either way, Minority Report-style policing is looking less far-fetched than when the film appeared in 2002."

Hackers Penetrated Systems Of Key Defense Contractors

Anonymous Coward writes | 1 hour ago

0

An anonymous reader writes "Hackers associated with the Chinese government successfully penetrated the computer systems of U.S. Transportation Command contractors at least 20 times in a single year, intrusions that show vulnerabilities in the military’s system to deploy troops and equipment in a crisis, a Senate Armed Services Committee investigation has found. The year-long investigation found that TRANSCOM, which is responsible for global movement of U.S. troops and equipment, was only aware of two of those intrusions. It also found gaps in reporting requirements and a lack of information sharing among government entities that left the command largely unaware of computer compromises by China of contractors that are key to the mobilization and deployment of military forces."

Irate NSA Staffer Doesn't Like Being Filmed in Public, for Some Reason

Anonymous Coward writes | 1 hour ago

0

An anonymous reader writes "The Intercept writes "The NSA sent someone bearing the nametag “Neal Z.” to the University of New Mexico’s Engineering and Science Career Fair today, in the hopes of recruiting young computer geniuses to help manage the yottabytes of data it is collecting about you. But instead of eager young applicants, Mr. Z. encountered University of New Mexico alumnus Andy Beale and student Sean Potter, who took the rare opportunity of being in the room with a genuine NSA agent to ask him about his employer’s illegal collection of metadata on all Americans. Mr. Z. did not like that one bit.""

NASA Inspector General lobs big rocks at agency's asteroid hunting program

coondoggie (973519) writes | yesterday

0

coondoggie (973519) writes "Lack of money, management structure and staff are hampering NASA’s ability to effectively identify and track comets, meteorites and asteroids that might threaten Earth. The space agency’s Inspector General, Paul Martin, issued a scathing report this week that said while NASA’s Near Earth Object program has done substantial work in identifying the sometimes massive rocks hurtling around the planet it is substantially behind in its goal of cataloging 90% of those 140 meters in diameter by 2020, among other issues."
Link to Original Source

Swedish underground forum Flashback is down, counterattack from Researchgruppen?

Glam Casvaluir (3831567) writes | 2 hours ago

0

Glam Casvaluir (3831567) writes "Some speculate it is an counterattack from the left-wing extremist group Researchgruppen who lately got their database service Piscatus hacked and published to the public on the Sedish election day. There is a underground digital war going on in Sweden with the culprit on the election day, and this is the latest act. The liberal forum Flashback is one of the most popular Forum for Sweden, and all writers there are anonymous."
Link to Original Source

Ask Slashdot: How hard is it to pick-up astronomy and physics as an adult?

samalex01 (1290786) writes | 4 hours ago

0

samalex01 (1290786) writes "I'm 38, married, two young kids, and I have a nice job in the IT industry, but since I was a kid I've had this deep love and passion for astronomy and astrophysics. This love and passion though never evolved into any formal education or anything beyond just a distant fascination as I got out of high school, into college, and started going through life on more of an IT career path.

So my question, now that I'm 38 is there any hope that I could start learning more about astronomy or physics to make it more than just a hobby? I don't expect to be a Carl Sagan or Neil deGrasse Tyson, but I'd love to have enough knowledge in these subjects to research and experiment to the point where I could possibly start contributing back to the field. MIT Open Courseware has some online courses for free that cover these topics, but given I can only spend maybe 10 hours a week on this would it be a pointless venture? Not to mention my mind isn't as sharp now as it was 20 years ago when I graduated high school.

Thanks for any advice or suggestions."

Wikipedia's page view counts are off by nearly one-third

The ed17 (2834807) writes | 5 hours ago

0

The ed17 (2834807) writes "A prominent Wikipedia researcher has discovered that Wikipedia's widely used article traffic statistics are missing out on approximately one-third of all views. Why? The Wikimedia Foundation's official article traffic data segregates desktop and mobile hits, and the hit counter linked from every Wikipedia page is only using the former.

This carries particularly large implications for the Global South, where far more individuals own web-capable mobile devices than computers."

Link to Original Source

Europeans came from three ancestry groupings

Taco Cowboy (5327) writes | 5 hours ago

0

Taco Cowboy (5327) writes "A recent study by researchers at Harvard Medical School and the University of Tübingen in Germany has found that present day Europeans are descendants of three different groups of people — A near east farmer group, an indigenous hunter gatherer group, and an ncient North Eurasian group from Siberia

"Nearly all Europeans have ancestry from all three ancestral groups," said Iosif Lazaridis, a research fellow in genetics in Reich's lab and first author of the paper. "Differences between them are due to the relative proportions of ancestry. Northern Europeans have more hunter-gatherer ancestry — up to about 50 percent in Lithuanians — and Southern Europeans have more farmer ancestry."

The most surprising part of the project, however, was the discovery of the Basal Eurasians

Before Australian Aborigines and New Guineans and South Indians and Native Americans and other indigenous hunter-gatherers split, they split from Basal Eurasians

The study also found that Mediterranean groups such as the Maltese, as well as Ashkenazi Jews, had more Near East ancestry than anticipated, while far northeastern Europeans such as Finns and the Saami, as well as some northern Russians, had more East Asian ancestry in the mix"

Link to Original Source

Scientists Twist Radio Beams to Send Data at 32 Gigabits p/s, Faster Than LTE

concertina226 (2447056) writes | yesterday

1

concertina226 (2447056) writes "Scientists from three international universities have succeeded in twisting radio beams in order to transfer data at the speed of 32 gigabits per second, which is 30 times faster than 4G LTE wireless technology in use today.

The researchers, led by Alan Willner, an electrical engineering professor with the University of Southern California Viterbi School of Engineering, successfully demonstrated data transmission rates of 32 gigabits per second across 2.5m of free space in a basement laboratory.

Millimetre waves occupy the 30GHz to 300GHz frequency bands. They are found in the spectrum between microwaves, which take up the 1GHz to 30GHz bands, and infrared waves, which are sometimes known as extremely high frequency (EHF)."

Link to Original Source

Study Finds Link Between Artificial Sweeteners and Glucose Intolerance

onproton (3434437) writes | 7 hours ago

0

onproton (3434437) writes "The journal Nature released a study today that reveals a link between the consumption of artificial sweeteners and the development of glucose intolerance, a leading risk factor for the development of type 2 diabetes, citing a critical alteration of intestinal bacteria. Paradoxically, these non-caloric sweeteners, which can be up to 20,000 times sweeter than natural sugars, are often recommended to diabetes patients to control blood glucose levels. Sugar substitutes have come under additional fire lately from studies showing that eating artificially sweetened foods can lead to greater overall calorie consumption and even weight gain. While some, especially food industry officials, remain highly skeptical of such studies, more research still needs to be done to determine the actual risks these substances may pose to health."

Apple will no longer unlock most iPhones, iPads for police

SternisheFan (2529412) writes | 8 hours ago

3

SternisheFan (2529412) writes "By Craig Timberg September 17 at 9:51 PM
Apple said Wednesday night that it is making it impossible for the company to turn over data from most iPhones or iPads to police — even when they have a search warrant — taking a hard new line as tech companies attempt to blunt allegations that they have too readily participated in government efforts to collect user data.

The move, announced with the publication of a new privacy policy tied to the release of Apple’s latest mobile operating system, iOS 8, amounts to an engineering solution to a legal dilemma: Rather than comply with binding court orders, Apple has reworked its latest encryption in a way that makes it almost impossible for the company – or anyone else but the device’s owner – to gain access to the vast troves of user data typically stored on smartphones or tablet computers.

The key is the encryption that Apple mobile devices automatically put in place when a user selects a passcode, making it difficult for anyone who lacks that passcode to access the information within, including photos, e-mails, recordings or other documents. Apple once kept possession of encryption keys that unlocked devices for legally binding police requests, but will no longer do so for iOS8, it said in a new guide for law enforcement.

“Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data,” Apple said on its Web site. “So it’s not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8.”"

Link to Original Source

Tinba Trojan Targets Major US Banks

Anonymous Coward writes | yesterday

0

An anonymous reader writes "Tinba, the tiny (20 KB) banking malware with man-in-the-browser and network traffic sniffing capabilities, is back. After initially being made to target users of a small number of banks, that list has been amplified and now includes 26 financial institutions mostly in the US and Canada, but some in Australia and Europe as well. Tinba has been modified over the years, in an attempt to bypass new security protections set up by banks, and its source code has been leaked on underground forums a few months ago. In this new campaign, the Trojan gets delivered to users via the Rig exploit kit, which uses Flash and Silverlight exploits. The victims get saddled with the malware when they unknowingly visit a website hosting the exploit kit."

Steve Jobs' office at Apple remains exactly how he left it

Anonymous Coward writes | 9 hours ago

0

An anonymous reader writes "Steve Jobs' office at Apple remains intact, and looks exactly the way it did when he passed away in October of 2012. This tidbit first came to the surface when a video clip of Tim Cook's interview with Charlie Rose was released earlier this week.

"I literally think about him every day," Cook explained. "His office is still left as it was. His name is still on the door.”"

Link to Original Source

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>