cultiv8 (1660093) writes "The Bureau for Private Postsecondary Education (BPPE), a unit in the California Department of Consumer Affairs charged with licensing and regulating postsecondary education in California, is arguing that 'learn to code' bootcamps fall under its jurisdiction and are subject to regulation. In mid-January, BPPE sent cease and desist letters to Hackbright Academy, Hack Reactor, App Academy, Zipfian Academy, and others. Unless they comply, these organizations face imminent closure and a hefty $50,000 fine. A BPPE spokesperson said these organizations have two weeks to start coming into compliance." Link to Original Source top
Twitter blocks website supporting Phil Robertson Following anti-gay comments
cultiv8 (1660093) writes "Social network giant Twitter has reportedly blocked users from tweeting the phrase "iStandWithPhil.com," a hashtag representing the petition drive to have Phil Robertson reinstated to A&E's "Duck Dynasty" reality show. Robertson was indefinitely suspended from the show last week after he described homosexuality as a sin in an interview with GQ Magazine. The organization running the organization does not know why it is being blocked, as a diagnostic page says the site "has not hosted malicious software over the past 90 days."" Link to Original Source top
You might've read some headlines recently—in very reputable publications—saying that there's an online attack underway. The biggest in history. Enough to slow down the internet. This would be exciting and scary, except it's just not true.
Google has picked out 8,000 people who will be given a chance to don a pair of Internet-connected glasses and make a fashion statement likely to be envied by gadget-loving geeks around the world.
The pool selected by Google won a contest conducted last month requiring U.S. residents to submit 50-word applications through Twitter or Google’s Plus to explain how they would use a technology that is being hailed as the next breakthrough in mobile computing.
Google Inc. began notifying the winners Tuesday.
Wanting to save his students some money, rather than requiring them to buy an e-book he considered “redundant” and “irrelevant,” he left all texts off his syllabus and is now out of a job because of it.
Tracy, who has previously never required books for his Photoshop class, was informed by school administrators that all teachers must require e-book purchases from their students as part of a new school policy. When Tracy refused to adhere to that policy, he received a letter dated last Tuesday, August 10, from school president Gregory Marick, who issued this ultimatum:
"As you have been previously informed, you are required to utilize an eBook from the listFailure to comply with this directive will result in your immediate termination of employment for insubordination."
The teacher refused, and was fired August 14.
cultiv8 (1660093) writes "I am a developer and released some code at one point under GPLv2. It's nothing huge, a small Drupal module that integrates a Drupal e-commerce system (ie. Ubercart) with multiple Authorize.net accounts, very useful for non-profits. Earlier today I discovered that a Drupal user was selling the module from their website for $49 and claiming it was their custom-made module. IANAL but my perspective is this violates both the spirit and law of GPLv2, most specifically clause 2-b:
You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.
Am I correct in my understanding of GPLv2? Do I have any recourse, and related, should I do anything about this? I don't care about money, I just don't want someone selling stuff that I released for free. How do most developers/organizations deal with licensing infringements of this type?"
cultiv8 writes "A team at Stevens Institute of Technology and Rutgers in New Jersey have created a system which shuts down a driver's phone without affecting other people in the vehicle.
It utilises a phone's Bluetooth connection and a vehicle's speakers to detect if the driver is using their mobile phone while driving, reports CNET.
The system measures the acoustic signals emitted from the stereo and the proximity of the phone to the Bluetooth receiver, essentially pinging both systems toto determine where the phone is being operated." Link to Original Source top
cultiv8 writes "The huge Upper Atmosphere Research Satellite (UARS) is expected to re-enter Earth's atmosphere in an uncontrolled fall in late September or early October. Much of the spacecraft is expected to burn up during re-entry, but some pieces are expected to make it intact to the ground, NASA officials said.
The U.S. space agency will be taking measures to inform the public about the pieces of the spacecraft that are expected to survive re-entry." Link to Original Source top
cultiv8 writes "When Miguel Hanson and his fiancee, Diana Wesley, get married on Saturday, a computer program Hanson wrote will serve as the minister. During the wedding, to be held in the Houston home of Hanson's parents, the couple will stand before a 30-inch monitor in the backyard. In a robotic voice, the computer will greet the guests, say how the couple met and go through the ceremony." Link to Original Source top
cultiv8 writes "A research team from Seoul National University (SNU) said the genetically modified female beagle, named Tegon and born in 2009, has been found to glow fluorescent green under ultraviolet light if given a doxycycline antibiotic, the report said.
The researchers, who completed a two-year test, said the ability to glow can be turned on or off by adding a drug to the dog's food.
"The creation of Tegon opens new horizons since the gene injected to make the dog glow can be substituted with genes that trigger fatal human diseases," the news agency quoted lead researcher Lee Byeong-chun as saying.
He said the dog was created using the somatic cell nuclear transfer technology that the university team used to make the world's first cloned dog, Snuppy, in 2005." Link to Original Source top
cultiv8 writes "China's military is developing electromagnetic pulse weapons that Beijing plans to use against U.S. aircraft carriers in any future conflict over Taiwan, according to an intelligence report made public on Thursday.
Portions of a National Ground Intelligence Centerstudy on the lethal effects of electromagnetic pulse (EMP) and high-powered microwave (HPM) weapons revealed that the arms are part of China’s so-called “assassin’s mace” arsenal — weapons that allow a technologically inferior China to defeat U.S. military forces.
EMP weapons mimic the gamma-ray pulse caused by a nuclear blast that knocks out all electronics, including computers and automobiles, over wide areas. The phenomenon was discovered in 1962 after an aboveground nuclear test in the Pacific disabled electronics in Hawaii." Link to Original Source top
cultiv8 writes "Dozens of police departments nationwide are gearing up to use a tech company's already controversial iris- and facial-scanning device that slides over an iPhone and helps identify a person or track criminal suspects.
The smartphone-based scanner, named Mobile Offender Recognition and Information System, or MORIS, is made by BI2 Technologies in Plymouth, Massachusetts, and can be deployed by officers out on the beat or back at the station.
An iris scan, which detects unique patterns in a person's eyes, can reduce to seconds the time it takes to identify a suspect in custody. This technique also is significantly more accurate than results from other fingerprinting technology long in use by police, BI2 says.
When attached to an iPhone, MORIS can photograph a person's face and run the image through software that hunts for a match in a BI2-managed database of U.S. criminal records. Each unit costs about $3,000." Link to Original Source top
This message contains blocked content that has previously been flagged as abusive or spammy. Let us know if you think this is an error.
I did a little research and found others reporting the same problem, including claims that comments with "05 What Is The Plan?" are deleted. I would normally rely on analysis from blogs and online news journals to get more info and help form my opinions, but since it hasn't been picked up by any blogs and/or mainstream media, I'm at a loss. So I'm curious Slashdot, is this a case of censorship? Are people filing phony abuse complaints? Legitimate complaints? Is there important information that I haven't come across?"
cultiv8 writes "Deputy Defense Secretary William Lynn unveiled a new U.S. strategy on Thursday for protecting military computer networks, moving away from a passive defense toward treating cyberspace as an "operational domain" in which trained forces defend against attacks." Link to Original Source top
cultiv8 writes "Newly released internal government documents, obtained via the Freedom Of Information Act, reveal that the TSA, and specifically the head of the Department of Homeland Security, “publicly mischaracterized” the findings of the National Institute of Standards and Technology, in stating that NIST had positively confirmed the safety of full body scanners in tests.
In the private email response, NIST stated that the Institute had not, in fact, tested full body scanners at all for safety, and that the Institute does not even undertake product testing.
Another document obtained by EPIC even shows that, far from affirming their safety, NIST warned that airport screeners should avoid standing next to full body scanners in order to keep exposure to harmful radiation “as low as reasonably achievable.”
However, another document obtained by EPIC shows that a growing number of TSA workers diagnosed with cancers are voicing concern that the full body scanners and x-ray machines are indeed to blame for their illnesses." Link to Original Source top
cultiv8 (1660093) writes "I am teaching an Intro to Web Design class this next fall at a local college that specializes in arts and design. This is the most "technical" class required for their major (other than the Adobe suite of software) and I'm looking for papers and resources that describe "how the internet works". Subjects I want to cover (during the course of 3 hours) include LAMP, TCP/IP & related protocols, DNS, principles of OSS, and why you should love your system admin. I'm searching for resources, preferably under a Creative Commons license, to distribute and share with students. Any recommendations?" top
cultiv8 writes "The edge of our solar system is filled with a turbulent sea of magnetic bubbles, according to new NASA research.
Scientists made the discovery by using a new computer model, which is based on data from NASA's twin Voyager probes. The unmanned Voyager 1 and Voyager 2, which launched in 1977, are plying the outer reaches of our solar system, a region known as the heliosheath.
The new discovery suggests that researchers will need to revise their views about the solar system's edge, NASA officials said. A more detailed picture of this region is key to our understanding of how fast-moving particles known as cosmic rays are spawned, and how they reach near-Earth space." Link to Original Source