×

Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

Comments

top

Dell's Hot Air Video: Parody or Lapse in Judgment?

itwbennett Dell confirms it's not their video (1 comments)

Gizmodo is calling shenanigans and the Dell Twitter account confirmed it's not their video. But Dell also seems to be OK with it, which I suppose just means they believe there is no bad press.

more than 2 years ago
top

FoxConn Faces Mass Suicide Prrotest

itwbennett In related news... (1 comments)

A Microsoft investigation of the protest has found that workers aren't complaining about working conditions, but about 'staffing assignments and transfer policies'.

about 3 years ago
top

E-Mail Can Reveal Your Friend Hierarchy

itwbennett Re:Is this an article from 2005? (85 comments)

My thoughts exactly. Email is so 5-10 years ago. If I'm communicating only with people who are in their 40s, then maybe this study has some merit. But anyone in their 20s is using facebook (incl facebook chat) or texting. And folks on the other end of the age spectrum are probably using the phone.

more than 3 years ago
top

Microsoft Now Collects Royalties From Over Half of All Android Devices

itwbennett ChromeOS also implicated as infringing patents (241 comments)

What's notable this time around is that ChromeOS is also implicated as an infringing technology. Compal is now the third ODM company to enter into a Microsoft agreement over ChromeOS and Android. Brian Proffitt goes into more detail in this blog post: http://www.itworld.com/mobile-wireless/215897/microsoft-why-innovate-when-you-can-litigate

more than 3 years ago
top

Paywalled NYT Now Has 300,000 Online Subscribers

itwbennett Need more numbers (179 comments)

Is 300k subscribers good? What percentage of total online readers is that? Also, sure, a 6% increase in digital advertising revenue is good, in that any increase is good. But what sort of increase did comparable websites see?

more than 3 years ago
top

Lack of Technology Puts Star Wars Series On Hold

itwbennett Define cost effective (309 comments)

How 'cost effective' does it need to be when it's got a guaranteed audience of male tweens, teens, 20s ... plus all the geek girls. And the nostalgia audience too (that's my demographic, btw.).

more than 3 years ago
top

Using Flywheels to Meet Peak Power Grid Demands

itwbennett taking stock (325 comments)

Hoping the attention of the slashdot community will do good things for the Beacon stock I bought.

more than 3 years ago
top

35% Use Mobile Apps Before Getting Out of Bed

itwbennett Numbers are higher for nighttime checkins (180 comments)

Also, not surprisingly, 72% check Facebook from bed before going to sleep and 20% check Twitter. That's what happens when you keep your smartphone on your nightstand and/or work on your laptop into the wee hours.

more than 3 years ago
top

Detained MS Employee Freed By Libyan Gov't?

itwbennett Microsoft confirms release (1 comments)

The blog post linked to above has been updated. Microsoft has confirmed that Khalid Elhasumi was indeed freed on Tuesday.

more than 3 years ago
top

SlashTweaks Let YOU Micro-Edit Slashdot

itwbennett madlibs live! (257 comments)

Only snarkier

more than 3 years ago
top

Firing Phraseology: 'Pursure Other Interests'?

itwbennett headline typo (2 comments)

'Pursure' should be 'Pursue'.

more than 3 years ago

Submissions

top

How Three Credit Card Transactions Could Reveal Your Identity

itwbennett itwbennett writes  |  yesterday

itwbennett (1594911) writes "Yves-Alexandre de Montjoye, an MIT graduate student, and his colleagues analyzed credit card transactions provided by an unnamed major bank from 1.1 million people over a three-month period in some 10,000 stores to see how much (or little) data they needed to identify an individual’s transactions from a larger set of transaction records. Ninety percent of the time, they could identify an individual using just four pieces of data, such the locations where four purchases were made. Adding price information to the location data — for example, purchase receipts — allowed the researchers to identify a person with just three transactions."
Link to Original Source
top

Wi-Fi Issues Continue for OS X Users Despite Updates

itwbennett itwbennett writes  |  yesterday

itwbennett (1594911) writes "Although Apple has never officially acknowledged issues surrounding Yosemite and Wi-Fi connectivity, the company is clearly aware of the problem: Leading off the improvements offered in the update 10.10.2 update released Tuesday was 'resolves an issue that might cause Wi-Fi to disconnect,' according to the release notes. Despite this, Apple's support forum was filled with tales of frustrated users. And Mac owners aren’t the only Apple users experiencing wireless connection failures after updating their OS. Wi-Fi connectivity issues have also dogged iOS 8 since Apple released the mobile OS on Sept. 17."
Link to Original Source
top

Anonymous No More: Your Coding Style Can Give You Away

itwbennett itwbennett writes  |  2 days ago

itwbennett (1594911) writes "Researchers from Drexel University, the University of Maryland, the University of Goettingen, and Princeton have developed a 'code stylometry' that uses natural language processing and machine learning to determine the authors of source code based on coding style. To test how well their code stylometry works, the researchers gathered publicly available data from Google’s Code Jam, an annual programming competition that attracts a wide range of programmers, from students to professionals to hobbyists. Looking at data from 250 coders over multiple years, averaging 630 lines of code per author their code stylometry achieved 95% accuracy in identifying the author of anonymous code. Using a dataset with fewer programmers (30) but more lines of code per person (1,900), the identification accuracy rate reached 97%."
Link to Original Source
top

DEA Cameras Tracking Hundreds of Millions of Car Journeys Across the US

itwbennett itwbennett writes  |  4 days ago

itwbennett (1594911) writes "A U.S. Drug Enforcement Administration program set up in 2008 to keep tabs on cars close to the U.S.-Mexican border has been gradually expanded nationwide and is regularly used by other law enforcement agencies in their hunt for suspects. The extent of the system, which is said to contain hundreds of millions of records on motorists and their journeys, was disclosed in documents obtained by the American Civil Liberties Union as part of a Freedom of Information Act request."
Link to Original Source
top

Simple Google Search Outed Alleged Silk Road Founder

itwbennett itwbennett writes  |  4 days ago

itwbennett (1594911) writes "As the first step in investigating Silk Road, IRS agent Gary Alford, who was part of an agency task force investigating organized crime, simply entered 'Silk Road' into Google and looked for the oldest mention on the site. The details he found would ultimately lead to the arrest of Ross Ulbricht in October 2013, as well as to the forfeiture of all the assets of Silk Road itself."
Link to Original Source
top

Modular Smartphones Could Be Reused As Computer Clusters

itwbennett itwbennett writes  |  4 days ago

itwbennett (1594911) writes "The promise of modular smartphones like Google’s Project Ara is that buyers will be able to upgrade components at will — and now Finnish company Circular Devices has come up with a use for discarded computing modules, which they're calling Puzzlecluster. Drawings of the Puzzlecluster architecture show a chassis with slots for the reused modules, which can then be interconnected with others to create the cluster. Just one unit could also be used as a desktop computer."
Link to Original Source
top

IBM About To Get Hit With a Massive Reorg and Layoffs

itwbennett itwbennett writes  |  4 days ago

itwbennett (1594911) writes "IBM is expected to go through a massive reorg next month that will see 26% of its 430,000-strong work force let go, or 111,800 people, according to a report by long-time Silicon Valley journalist Robert X. Cringely. If that figure holds true, that would make it far and away the largest corporate layoff event in history, breaking the record previously held by IBM, when it cut 60,000 in 1993."
Link to Original Source
top

Winklevoss Twins Plan Regulated Bitcoin Exchange

itwbennett itwbennett writes  |  about a week ago

itwbennett (1594911) writes "They of the square jaws and famous dispute with Mark Zuckerberg over the origins of Facebook, are also believed to be among the largest holders of Bitcoin in the world. Now they want to launch a regulated Bitcoin exchange—named Gemini, of course. To bolster confidence, they said they have formed a relationship with a chartered bank in the state of New York. 'This means that your money will never leave the country,' the twins wrote in a blog post. 'It also means that U.S. dollars on Gemini will be eligible for FDIC insurance and held by a U.S.-regulated bank.'"
Link to Original Source
top

U.S. Gas Stations Vulnerable To Internet Attacks

itwbennett itwbennett writes  |  about a week ago

itwbennett (1594911) writes "Automated tank gauges (ATGs), which are used by gas stations in the U.S. to monitor their fuel tank levels can be manipulated over the Internet by malicious attackers, according to security firm Rapid7. 'An attacker with access to the serial port interface of an ATG may be able to shut down the station by spoofing the reported fuel level, generating false alarms, and locking the monitoring service out of the system,' said HD Moore, the chief research officer at Rapid7."
Link to Original Source
top

Fujitsu Psychology Tool Profiles Users At Risk Of Cyberattacks

itwbennett itwbennett writes  |  about a week ago

itwbennett (1594911) writes "Fujitsu Laboratories is developing an enterprise tool that can identify and advise people who are more vulnerable to cyberattacks, based on certain traits. For example, the researchers found that users who are more comfortable taking risks are also more susceptible to virus infections, while those who are confident of their computer knowledge were at greater risk for data leaks. Rather than being like an antivirus program, the software is more like 'an action log analysis than looks into the potential risks of a user,' said a spokesman for the lab. 'It judges risk based on human behavior and then assigns a security countermeasure for a given user.'"
Link to Original Source
top

Long-Awaited LibreOffice Arrives On Android

itwbennett itwbennett writes  |  about a week ago

itwbennett (1594911) writes "You can now download and install an official LibreOffice Viewer for Android — the very first release of LibreOffice Viewer that is capable of handling text documents and presentations. Unfortunately, its newness shows. LibreOffice, in its current state, is not solving any problems that Android face. There are already a few document readers for Android that can open ODF files. Open source apps such as OpenDocument Reader can even edit and save ODF files."
Link to Original Source
top

Advertising Company Will Stop Using Verizon's Mobile Tracking ID

itwbennett itwbennett writes  |  about two weeks ago

itwbennett (1594911) writes "Here's a good bit of follow-up for Slashdot readers: Turn, the advertising company that was found last week to be using Verizon's Unique Identifier Header (UIDH) to recreate deleted cookies in order to track users' movements across the Web, said on Friday that it will stop using the controversial tracking method."
Link to Original Source
top

Don't Blame Sharks For Asian Internet Problems

itwbennett itwbennett writes  |  about two weeks ago

itwbennett (1594911) writes "Internet connections in the South East Asian nation have been affected by problems with the Asia America Gateway (AAG) submarine cable system for the fourth time in a year, according to local news outlets. The cause of the outages is as yet unknown, but that's not stopping online reports for pinning the blame on sharks. The more likely, but less dramatic cause of the damage was ship anchors or fishing, says Michael Costin, Chairman of the AAG Cable Consortium."
Link to Original Source
top

How To Remain (Mostly) Invisible Online

itwbennett itwbennett writes  |  about two weeks ago

itwbennett (1594911) writes "It's a basic truth that when people use a medium owned or operated by a third party, such as the Internet, an elevator with a camera or a mobile app that requires connectivity, there is no privacy. So the best thing you can do, is to place some value on your personal information and then lie, lie, lie your way into obscurity, says Frank Ahearn, a privacy expert and author of the book 'How to Disappear.'"
Link to Original Source
top

Ad Company Using Verizon Tracking Header To Recreate Deleted Cookies

itwbennett itwbennett writes  |  about two weeks ago

itwbennett (1594911) writes "The story began a few months ago when it was reported that both Verizon and AT&T were injecting unique identifiers in the Web requests of their mobile customers. AT&T has since stopped using the system, but Verizon continues. Now, Stanford computer scientist Jonathan Mayer has found that one advertising company called Turn, which tracks users across the Web when they visit major sites including Facebook, Twitter, Yahoo, BlueKai, AppNexus, Walmart and WebMD, uses the Verizon UIDH to respawn its own tracking cookies."
Link to Original Source
top

Do Female Programmers Have a Confidence Problem?

itwbennett itwbennett writes  |  about two weeks ago

itwbennett (1594911) writes "Social learning platform Piazza looked at over 2 million questions asked and answered during four recent semesters by almost 1 million undergraduate and graduate students at schools in the U.S. and Canada in a wide range of fields to see if they could identify a gender confidence gap (defined as the percentage difference between the average number of questions answered by male and female students). Overall, they found a noticeably greater confidence gap between the genders in computer science than in other STEM fields. Among CS students, women answered 37% fewer questions than men, as compared to 18% fewer in non-CS STEM fields. Outside of STEM, the confidence gap is much lower and sometimes reversed, where women answered just 7% fewer questions than men in humanities while actually answering more questions than the men in business and social sciences, 11% more and 5% more, respectively. But take this with a grain of salt: The most confident aren't always (or even often) the most correct."
Link to Original Source
top

Temporary Sales Ban Hits SanDisk's SSD Server Business

itwbennett itwbennett writes  |  about two weeks ago

itwbennett (1594911) writes "A California court has issued a preliminary sales ban for controller chips that SanDisk uses in its high-speed SSDs. The injunction 'affects all modules containing Diablo components,' said Netlist, a U.S. company that designs and manufactures high-performance, logic-based memory subsystems for servers. This means that the order has an effect on IBM, which uses components derived from Diablo technology in ULLtraDIMM and eXFlash modules. It could also have an effect on Huawei, Lenovo and Supermicro, which are looking to offer ULLtraDIMMs in their server platforms, Netlist added."
Link to Original Source
top

David Cameron Wants To Ban Encrypted Apps

itwbennett itwbennett writes  |  about three weeks ago

itwbennett (1594911) writes "Saying that having access to people's communications is vital for combating terrorism, U.K. Prime Minister David Cameron has laid out surveillance plans that may involve banning online messaging services that offer encryption such as WhatsApp and Apple's iMessage. 'In our country, do we want to allow a means of communication between people which, even in extremists ... that we cannot read?' Cameron said, adding later, 'No, we must not.'"
Link to Original Source

Journals

itwbennett has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?