Google Foresees Ads On Your Refrigerator, Thermostat, and Glasses
Garmin GPS units have been showing ads for years. It used to be a small message on the search screen or something, but I read that the newer ones display on the screen when they sense that you're stopped (e.g. at lights). So when upgrading I switched to another brand, despite being a fan or Garmin.
Opting Out of Big Data Snooping: Harder Than It Looks
At the start of every day, go to amazon and Google and search for lingerie (or appropriate underwear for your gender of choice).
All day long, web pages you visit will be filled with pleasing images.
Anonymous' Airchat Aim: Communication Without Need For Phone Or Internet
People are comparing this to packet radio. Well, the first software I used for internet access was ka9q, originally for HAM use. And it ran on DOS. So there's no need to feel left out.
This 1981 BYTE Magazine Cover Explains Why We're So Bad At Tech Predictions
There were some with a full set of calculator keys which included a stylus clipped to the strap.
Also there was the PalmOS Fossil watch (a stylus, but no keyboard).
Google Project Ara Design Will Use Electro-Permanent Magnets To Lock In Modules
Only if you don't opt for the airbag or parachute modules.
USB Reversable Cable Images Emerge
Just as with the lightning connector, they make a big point that the plug is reversible but NO mention of whether the socket can be used either way around!
Canonical Shutting Down Ubuntu One File Services
And it has versioning via the website. You can see all recent activity, revert to old versions and undo deletions.
UK Bans Sending Books To Prisoners
Ask Slashdot: What Software Can You Not Live Without?
An anonymous reader writes
"Whenever I install a fresh operating system on my computer, I immediately grab a handful of programs that I simply must have.
And yet won't tell us what they are?
Facebook Estimates Around 10% of Accounts Are Fake
due to FB's policies, legitimate users feel compelled to put in fake names, birthdates, locations, schools, employers, etc.
Or in fact not put most of those in at all. Facebook is still trying to guess which continent I live on (it occasionally asks if I live in cities related to my friends list). I haven't given any info about education, work or interests (although I'm sure there's a big profile on what interests me based on what I click on).
James Dyson: We Should Pay Students To Study Engineering
And when you empty the vacuum, you get to breath a giant cloud dust
What are you doing? Maybe it it different for some models, but for mine, you place the end of the canister into a trash bag and pull the trigger on the handle. You can even close the base again by pushing it while it's still in the trash bag.
Does Anyone Make a Photo De-Duplicator For Linux? Something That Reads EXIF?
I've used findimagedups. IIRC, it rescales each image to a standard size (64x64 or something) then filters and normalizes it down to a 1-bit-depth image.
It then builds a database of these 'hashes'/'signatures' and can output a list of files that have a threshold of bits in common.
That's how it can ignore small changes, it loses most detail and then can ignore a threshold of differences.
It would fail if an image was cropped or rotated, for instance. It could handle picture orientation it it was modified to store 4 versions of the signature, I guess.
It won't actually remove images itself (I wrote a script to read it's output and delete listed images matching a specific path).
I needed it because Dropbox was 'fixing' orientation when it uploaded images and I wanted to clear out ones I'd backed up directly from the camera. (I usually delete duplicate images based on hash.)
It's Not Just the NSA: Police Are Tracking Your Car
Well I heard that they track the trains, so they're sure to be tracking buses too.
Ask Slashdot: Practical Bitrot Detection For Backups?
You may need to use -c to force rsync to compare checksums.
I use something like this as part of my backup
rsync --del --backup --backup-dir=../changedfiles_$DATE
The whole backup also goes to S3 glacier.
As an added step - I don't delete pictures from my camera unless they match the checksum of files in the _backup_ - not the original copy (via a script).
That way, once they're first copied from the camera, a single failure in the original, PC copy or backup copy will all result in the camera version remaining and I can check what has gone wrong.
Twitter Will Track Your Browsing To Sell Ads
Google Chrome allows easy creation and switching of user profiles.
I've wondered whether I should have a separate profile for each social site as a way to isolate them.
I turn off 3rd party cookies, but I heard that there was an exclusion for sites that you had logged into and received cookies from.
Meaning, 3rd-party ad site could not send you cookies, but Facebook still could if you'd signed in to it earlier.
More drastic isolation of browser instances is another option (I've wondered about sandboxie but not tried it).
FTC Drops the Hammer On Maker of Location-Sharing Flashlight App
I just hold down the lock switch for a second to turn on the LED, it's a built-in feature on my Nokia.
But why doesn't Android sandbox apps in a way that the app is unaware of? Just present all apps with an empty contact list, a fake GPS location, an empty drive, etc and the user grants permissions to substitute the real ones as needed. That way, all apps could be installed and you'd get a popup such as "this app wants your location" in a similar way to IOS, only this way the app would keep working if you said no.
No Shirt, No Shoes, No Service — and No Google Glass, Either
Especially as a Faraday cage wouldn't prevent any device from recording video.
Intelligence Officials Fear Snowden's 'Doomsday' Cache
Don't the trees block a lot more of the road than they did then?
There's a webcam mounted inside the box near the window if anyone want's to check out the view (the pile of boxes placed there to represent the one's he's said to have placed there to rest the rifle on).
Zuckerberg To Teach 10 Million Kids 0-Based Counting
Those who count from 0 and the other 10 types.
Duke Univ. Device Converts Stray Wireless Energy Into Electricity For Charging
that would probably take too many volts of time
Light-years of time.
Maybe even parsecs.
safetyinnumbers hasn't submitted any stories.
safetyinnumbers has no journal entries.