Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.
Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and learn more about it. Thanks for reading, and for making the site better!
harrymcc (1641347) writes In September of 1959, Nikita Khrushchev, the premier of the Soviet Union, spent 12 days touring the U.S. One of his stops was IBM's facilities in San Jose, which helped to create the area later known as Silicon Valley. The premier got to see the first computer which came with a hard disk, which IBM programmed to answer history questions. But what he was most impressed by was IBM's modern cafeteria. Over at Fast Company, I've chronicled this fascinating and little-known moment in tech history, which will be covered in an upcoming PBS program on Khrushchev's U.S. trip.
An anonymous reader writes: When news broke last week that the Hungarian government was planning to tax internet traffic at a rate of about 62 cents per gigabyte, people on the internet were outraged. But it went beyond that: there were protests in the streets in Hungary, and the European Union warned against the plan. Now, Hungarian Prime Minister Viktor Orban has put the plans on hold, saying, "This tax in its current form cannot be introduced." It's not completely dead — Orban has planned consultations over the next year to look for other ways to tax revenue generated over the internet.
itwbennett writes The critical Shellshock vulnerabilities found last month in the Bash Unix shell have motivated security researchers to search for similar flaws in old, but widely used, command-line utilities. Two remote command execution vulnerabilities were patched this week in the popular wget download agent and tnftp client for Unix-like systems [also mentioned here]. This comes after a remote code execution vulnerability was found last week in a library used by strings, objdump, readelf and other command-line tools.
reifman writes The Internet's been abuzz the past 48 hours about reports the FBI distributed malware via a fake Seattle Times news website. What the agency actually did is more of an example of smart, precise law enforcement tactics. Is the outrage online an indictment of Twitter's tendency towards uninformed, knee-jerk reactions? In this age of unwarranted, unconstitutional blanket data collection by the NSA, the FBI's tactics from 2007 seem refreshing for their precision.
tranquilidad writes "As previously discussed on Slashdot, CurrentC is a consortium of merchants attempting to create a "more secure" payment system. Some controversy surrounds CurrentC's requirements regarding the personal information required, their purchase-tracking intentions and retail stores blocking NFC in apparent support of CurrentC. Now news breaks that CurrentC has already been breached. CurrentC has issued the standard response, "We take the security of our users' information extremely seriously."
the_newsbeagle writes: In the latest high-tech approach to personalized medicine, cardiologists can now create a computer model of an individual patient's heart and use that simulation to make a treatment plan. In this new field of computational medicine, doctors use a patient's MRI scans to make a model showing that patient's unique anatomy and pattern of heart disease. They can then experiment on that virtual organ in ways they simply can't with a flesh-and-blood heart. Proponents say this tech can "improve therapies, minimize the invasiveness of diagnostic procedures, and reduce health-care costs" in cardiology.
wiredmikey writes: The White House's unclassified computer network was recently breached by intruders, a U.S. official said Tuesday. While the White House has not said so, The Washington Post reported that the Russian government was thought to be behind the act. Several recent reports have linked Russia to cyber attacks, including a report from FireEye on Tuesday that linked Russia back to an espionage campaign dating back to 2007. Earlier this month, iSight Partners revealed that a threat group allegedly linked with the Russian government had been leveraging a Microsoft Windows zero-day vulnerability to target NATO, the European Union, and various private energy and telecommunications organizations in Europe. The group has been dubbed the "Sandworm Team" and it has been using weaponized PowerPoint files in its recent attacks. Trend Micro believes the Sandworm team also has their eyes set on compromising SCADA-based systems.
theodp writes: A year-long investigation by NBC Bay Area's Investigative Unit and The Center for Investigative Reporting (CIR) raises questions about the H-1B visa program. In a five-part story that includes a mini-graphic novel called Techsploitation, CIR describes how the system rewards job brokers who steal wages and entrap Indian tech workers in the U.S., including the awarding of half a billion dollars in Federal tech contracts to those with labor violations. "Shackling workers to their jobs," CIR found after interviewing workers and reviewing government agency and court documents, "is such an entrenched business practice that it has even spread to U.S. nationals. This bullying persists at the bottom of a complex system that supplies workers to some of America's richest and most successful companies, such as Cisco Systems Inc., Verizon and Apple Inc."
In a presumably unrelated move, the U.S. changed its H-1B record retention policy last week, declaring that records used for labor certification, whether in paper or electronic, "are temporary records and subject to destruction" after five years under the new policy. "There was no explanation for the change, and it is perplexing to researchers," reports Computerworld. "The records under threat are called Labor Condition Applications (LCA), which identify the H-1B employer, worksite, the prevailing wage, and the wage paid to the worker." Lindsay Lowell, director of policy studies at the Institute for the Study of International Migration at Georgetown University, added: "It undermines our ability to evaluate what the government does and, in today's world, retaining electronic records like the LCA is next to costless [a full year's LCA data is less than 1 GB]." President Obama, by the way, is expected to use his executive authority to expand the H-1B program after the midterm elections.
blottsie writes: The most-valuable, second-richest telecommunications company in the world is bankrolling a technology news site called SugarString.com. The publication, which is now hiring its first full-time editors and reporters, is meant to rival major tech websites like Wired and the Verge while bringing in a potentially giant mainstream audience to beat those competitors at their own game.
There's just one catch: In exchange for the major corporate backing, tech reporters at SugarString are expressly forbidden from writing about American spying or net neutrality around the world, two of the biggest issues in tech and politics today.
mrspoonsi sends news that a group of major tech companies has combined to donate $750 million worth of gadgets and services to students in 114 schools across the U.S. Apple is sending out $100 million worth of iPads, MacBooks, and other products. O'Reilly Media is making $100 million worth of educational content available for free. Microsoft and Autodesk are discounting software, while Sprint and AT&T are offering free wireless service. This is part of the ConnectED Initiative, a project announced by the Obama Administration last year to bring modern technology to K-12 classrooms. The FCC has also earmarked $2 billion to improve internet connectivity in schools and libraries over the next two years. Obama also plans to seek funding for training teachers to utilize this infusion of technology.
sneakyimp writes: The Antares rocket operated by Orbital Sciences Corporation exploded on launch due to a "catastrophic anomaly" after a flawless countdown. No injuries are reported and all personnel are accounted for. According to the audio stream hosted by local news affiliate WTVR's website, the Cygnus spacecraft contained classified crypto technology and efforts are being made to cordon off the wreckage area. Additionally, interviews of personnel and witness reports are to be limited to appropriate government agencies so that an accident report can be generated. This accident is likely to have a detrimental effect on the stock price of Orbital Sciences Corp, traded on the NYSE. The Antares rocket's engines are based on old soviet designs from the '60s. While this is sure to be a blow to NASA due to the cost, it may well boost the fortunes of SpaceX, a chief competitor of Orbital Sciences. Both companies were recently awarded resupply contracts by NASA.
An anonymous reader writes The U.S. Federal Trade Commission today announced it is suing AT&T. The commission is charging the carrier for allegedly misleading millions of its smartphone customers by changing the terms while customers were still under contract for "unlimited" data plans that were, well, limited. "AT&T promised its customers 'unlimited' data, and in many instances, it has failed to deliver on that promise," FTC Chairwoman Edith Ramirez said in a statement. "The issue here is simple: 'unlimited' means unlimited." How apropos.
New submitter hejman08 writes with a question probably faced by many whose parents, grandparents, and other relatives rely on them for tech support and advice, specifically one about finding an appropriate data plan for his grandmother, of whom he writes: She is on her own plan through Verizon with 1GB of data, and she literally blows through it in three days or less every month, then complains about having nothing to do. They have Wi-Fi at her senior center, but only in specific rooms, and she has bad ankles and knees so she wants to stay home. Internet service would cost 80 a month to add where she lives. What I am wondering, is if any of the genius slashdotters out there know of a plan that- regardless of cost of phone, which we could manage as a gift to her, once- would allow her to have at least 300 minutes, 250 texts, and truly unlimited data (as in none of that Unlimited* stuff that is out there where they drop you to caveman speeds within a gig of usage), all for the price of less than say, 65 a month? The big 4 carriers don't seem to have anything that would work for her. What would you recommend? (I might start with a signal repeater in a utility closet, myself, or some clandestine CAT5 from a friendly neighbor's place.)
itwbennett writes Working closely with VISA, Apple solved many complex security issues making in-person payments safer than ever. But it's that close relationship with the credit card companies that may be Apple Pay's downfall. A competing solution called CurrentC has recently gained a lot of press as backers of the project moved to block NFC payments (Apple Pay, Google Wallet, etc.) at their retail terminals. The merchants designing or backing CurrentC reads like a greatest hits list of retail outfits and leading the way is the biggest of them all, Walmart. The retailers have joined together to create a platform that is independent of the credit card companies and their profit-robbing transaction fees. Hooking directly to your bank account rather than a credit or debit card, CurrentC will use good old ACH to transfer money from your account to the merchant's bank account at little to no cost.
HughPickens.com writes: Nicolas Niarchos has a profile of 2600 in The New Yorker that is well worth reading. Some excerpts: "2600 — named for the frequency that allowed early hackers and "phreakers" to gain control of land-line phones — is the photocopier to Snowden's microprocessor. Its articles aren't pasted up on a flashy Web site but, rather, come out in print. The magazine—which started as a three-page leaflet sent out in the mail, and became a digest-sized publication in the late nineteen-eighties — just celebrated its thirtieth anniversary. It still arrives with the turning of the seasons, in brown envelopes just a bit smaller than a 401k mailer."
"There's been now, by any stretch of the imagination, three generations of hackers who have read 2600 magazine," Jason Scott, a historian and Web archivist who recently reorganized a set of 2600's legal files, said. Referring to Goldstein, whose real name is Eric Corley, he continued: "Eric really believes in the power of print, words on paper. It's obvious for him that his heart is in the paper."
"2600 provides an important forum for hackers to discuss the most pressing issues of the day — whether it be surveillance, Internet freedom, or the security of the nation's nuclear weapons—while sharing new code in languages like Python and C.* For example, the most recent issue of the magazine addresses how the hacking community can approach Snowden's disclosures. After lampooning one of the leaked N.S.A. PowerPoint slides ("whoever wrote this clearly didn't know that there are no zombies in '1984' ") and discussing how U.S. government is eroding civil rights, the piece points out the contradictions that everyone in the hacking community currently faces. "Hackers are the ones who reveal the inconvenient truths, point out security holes, and offer solutions," it concludes. "And this is why hackers are the enemy in a world where surveillance and the status quo are the keys to power."
Jason Koebler writes At least 20 additional American cities have expressed a formal interest in joining a coalition that's dedicated to bringing gigabit internet speeds to their residents by any means necessary—even if it means building the infrastructure themselves. The Next Centuries Cities coalition launched last week with an impressive list of 32 cities in 19 states who recognize that fast internet speeds unencumbered by fast lanes or other tiered systems are necessary to keep residents and businesses happy. That launch was so successful that 20 other cities have expressed formal interest in joining, according to the group's executive director.
An anonymous reader writes Lenovo is the latest tech company to enter the fitness tracker market with its Smartband SW-B100 device. "It can record calories burnt, steps taken and a user's heartrate, in addition to syncing with a smartphone through an app to provide more complete health data. Users can also customize notifications and reminders on the smartband, and even use it to unlock a Windows PC without typing in the password, according to the product page."
An anonymous reader writes Elon Musk, the chief executive of Tesla and founder of SpaceX, said that artificial intelligence is probably the biggest threat to humans. "I think we should be very careful about artificial intelligence. If I had to guess at what our biggest existential threat is, it's probably that. So we need to be very careful with artificial intelligence." he said. "I'm increasingly inclined to think that there should be some regulatory oversight, maybe at the national and international level, just to make sure that we don't do something very foolish. With artificial intelligence we're summoning the demon. You know those stories where there's the guy with the pentagram, and the holy water, and he's like — Yeah, he's sure he can control the demon? Doesn't work out."
theodp writes After an NPR podcast fingered the marketing of computers to boys as the culprit behind the declining percentages of women in undergraduate CS curricula since 1984 (a theory seconded by Smithsonian mag), some are concluding that NPR got the wrong guy. Calling 'When Women Stopped Coding' quite engaging, but long on Political Correctness and short on real evidence, UC Davis CS Prof Norm Matloff concedes a sexist element, but largely ascribes the gender lopsidedness to economics. "That women are more practical than men, and that the well-publicized drastic swings in the CS labor market are offputting to women more than men," writes Matloff, and "was confirmed by a 2008 survey in the Communications of the ACM" (related charts of U.S. unemployment rates and Federal R&D spending in the '80s). Looking at the raw numbers of female CS grads instead of percentages, suggests there wasn't a sudden and unexpected disappearance of a generation of women coders, but rather a dilution in their percentages as women's growth in undergrad CS ranks was far outpaced by men, including a boom around the time of the dot-com boom/bust.
theodp writes According to Steve Ballmer, Amazon.com is not a real business. "They make no money," Ballmer said on the Charlie Rose Show. "In my world, you're not a real business until you make some money. I have a hard time with businesses that don't make money at some point." Ballmer's comments come as Amazon posted a $437 million loss for the third quarter, disappointing Wall Street. "If you are worth $150 billion," Ballmer added, "eventually somebody thinks you're going to make $15 billion pre-tax. They make about zero, and there's a big gap between zero and 15." Fired-up as ever, LA Clippers owner Ballmer's diss comes after fellow NBA owner Mark Cuban similarly slammed IBM, saying Big Blue is no longer a tech company (Robert X. Cringely seems to concur). "Today, they [IBM] specialize in financial engineering," Cuban told CNBC after IBM posted another disappointing quarter. "They're no longer a tech company, they are an amalgamation of different companies that they are trying to arb[itrage] on Wall Street, and I'm not a fan of that at all."