Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

  • Will Fiber-To-the-Home Create a New Digital Divide?

    First time accepted submitter dkatana writes Having some type of fiber or high-speed cable connectivity is normal for many of us, but in most developing countries of the world and many areas of Europe, the US, and other developed countries, access to "super-fast" broadband networks is still a dream. This is creating another "digital divide." Not having the virtually unlimited bandwidth of all-fiber networks means that, for these populations, many activities are simply not possible. For example, broadband provided over all-fiber networks brings education, healthcare, and other social goods into the home through immersive, innovative applications and services that are impossible without it. Alternatives to fiber, such as cable (DOCSYS 3.0), are not enough, and they could be more expensive in the long run. The maximum speed a DOCSYS modem can achieve is 171/122 Mbit/s (using four channels), just a fraction the 273 Gbit/s (per channel) already reached on fiber.

    114 comments | 3 hours ago

  • 'Microsoft Lumia' Will Replace the Nokia Brand

    jones_supa writes The last emblems of Nokia are being removed from Microsoft products. "Microsoft Lumia" is the new brand name that takes their place. The name change follows a slow transition from Nokia.com over to Microsoft's new mobile site, and Nokia France will be the first of many countries that adopt "Microsoft Lumia" for its Facebook, Twitter, and other social media accounts. Microsoft has confirmed to The Verge that other countries will follow the rebranding steps in the coming weeks. Nokia itself continues as a reborn company focusing on mapping and network infrastructure services.

    148 comments | yesterday

  • Facebook To DEA: Stop Using Phony Profiles To Nab Criminals

    HughPickens.com writes: CNNMoney reports that Facebook has sent a letter to the U.S. Drug Enforcement Administration demanding that agents stop impersonating users on the social network. "The DEA's deceptive actions... threaten the integrity of our community," Facebook chief security officer Joe Sullivan wrote to DEA head Michele Leonhart. "Using Facebook to impersonate others abuses that trust and makes people feel less safe and secure when using our service." Facebook's letter comes on the heels of reports that the DEA impersonated a young woman on Facebook to communicate with suspected criminals, and the Department of Justice argued that they had the right to do so. Facebook contends that their terms and Community Standards — which the DEA agent had to acknowledge and agree to when registering for a Facebook account — expressly prohibit the creation and use of fake accounts. "Isn't this the definition of identity theft?" says privacy researcher Runa Sandvik. The DEA has declined to comment and referred all questions to the Justice Department, which has not returned CNNMoney's calls.

    227 comments | 2 days ago

  • Developers, IT Still Racking Up (Mostly) High Salaries

    Nerval's Lobster (2598977) writes Software development and IT remain common jobs among those in the higher brackets, although not the topmost one, according to a new study (with graph) commissioned by NPR. Among those earning between $58,000 and $72,000, IT was the sixth-most-popular job, while software developers came in tenth place. In the next bracket up (earning between $72,000 and $103,000), IT rose to third, with software development just behind in fourth place. As incomes increased another level ($103,000 to $207,000), software developers did even better, coming in second behind managers, although IT dropped off the list entirely. In the top percentile ($207,000 and above), neither software developers nor IT staff managed to place; this is a segment chiefly occupied by physicians (in first place), managers, chief executives, lawyers, and salespeople who are really good at their jobs. In other words, it seems like a good time to be in IT, provided you have a particular skillset. If those high salaries are in Silicon Valley or New York, though, they might not seem as high as half the same rate would in Omaha, or Houston, or Raleigh.

    191 comments | 2 days ago

  • In UK, Internet Trolls Could Face Two Years In Jail

    An anonymous reader writes with this news from The Guardian about a proposed change in UK law that would greatly increase the penalties for online incivility: Internet trolls who spread "venom" on social media could be jailed for up to two years, the justice secretary Chris Grayling has said as he announced plans to quadruple the maximum prison sentence. Grayling, who spoke of a "baying cybermob", said the changes will allow magistrates to pass on the most serious cases to crown courts. The changes, which will be introduced as amendments to the criminal justice and courts bill, will mean the maximum custodial sentence of six months will be increased to 24 months. Grayling told the Mail on Sunday: "These internet trolls are cowards who are poisoning our national life. No one would permit such venom in person, so there should be no place for it on social media. That is why we are determined to quadruple the six-month sentence.

    484 comments | 3 days ago

  • Snapchat Will Introduce Ads, Attempt To Keep Them Other Than Creepy

    As reported by VentureBeat, dissapearing-message service Snapchat is introducing ads. Considering how most people feel about ads, they're trying to ease them in gently: "Ads can be ignored: Users will not be required to watch them. If you do view an ad, or if you ignore it for 24 hours, it will disappear just like Stories do." Hard to say how much it will mollify the service's users, but the company says "We won’t put advertisements in your personal communication – things like Snaps or Chats. That would be totally rude. We want to see if we can deliver an experience that’s fun and informative, the way ads used to be, before they got creepy and targeted."

    124 comments | 4 days ago

  • Facebook 'Safety Check' Lets Friends Know You're OK After a Major Disaster

    rtoz (2530056) writes Facebook has launched a new Tool called "Safety Check." The Facebook Safety Check tool will notify your friends so that they know you're OK after a major disaster. In times of disaster or crisis, people turn to Facebook to check on loved ones and get updates. "During a major disaster, Safety Check will help you: Let friends and family know you're safe; Check on others in the affected area; Mark your friends as safe ... When the tool is activated after a natural disaster and if you're in the affected area, you'll receive a Facebook notification asking if you're safe. [Facebook] will determine your location by looking at the city you have listed in your profile, your last location if you've opted in to the Nearby Friends product, and the city where you are using the internet. ... If you're safe, you can select "I'm Safe" and a notification and News Feed story will be generated with your update. Your friends can also mark you as safe." More creepy, or more reassuring?

    130 comments | 5 days ago

  • The Guardian Reveals That Whisper App Tracks "Anonymous" Users

    New submitter qqod writes this story at The Guardian that raises privacy concerns over the Whisper app. "The company behind Whisper, the social media app that promises users anonymity and claims to be the “the safest place on the internet”, is tracking the location of its users, including some who have specifically asked not to be followed. The practice of monitoring the whereabouts of Whisper users – including those who have expressly opted out of geolocation services – will alarm users, who are encouraged to disclose intimate details about their private and professional lives. Whisper is also sharing information with the US Department of Defense gleaned from smartphones it knows are used from military bases, and developing a version of its app to conform with Chinese censorship laws."

    180 comments | 5 days ago

  • Early Childhood Neglect Associated With Altered Brain Structure, ADHD

    vinces99 writes "Under the rule of dictator Nicolae Ceausescu, thousands of Romanian children were placed in overcrowded orphanages with bleak conditions and minimal human contact, a legacy that continued even after the 1989 revolution. Only recently have research and public concern caused policy changes.

    University of Washington research on children who began life in these institutions shows that early childhood neglect is associated with changes in brain structure. A paper published this month in Biological Psychiatry shows that children who spent their early years in these institutions have thinner brain tissue in cortical areas that correspond to impulse control and attention. "These differences suggest a way that the early care environment has dramatic and lasting effects for children's functioning," said lead author Katie McLaughlin, a UW assistant professor of psychology.

    Since 2000, the Bucharest Early Intervention Project has worked to document and treat the children's health. McLaughlin joined the team about six years ago to focus on brain development. This study is among the first in any setting to document how social deprivation in early life affects the thickness of the cortex, the thin folded layer of gray matter that forms the outer layer of the brain. The study provides "very strong support" for a link between the early environment and ADHD, McLaughlin said.

    87 comments | about a week ago

  • Eggcyte is Making a Pocket-Sized Personal Web Server (Video)

    Eggcyte has been working on this for two years. It's on Kickstarter now; a personal server you can use to share music, video, text, and just about anything else without resorting to cloud-based services where one weak password can put your private celebrity photos (you are a celebrity, right?) into the wrong hands. If you suddenly decide you don't want to share the information on your Egg any more, turn it off. If you suddenly have something new to share, like a video you just shot of the Loch Ness Monster capturing an alien spaceship, you can connect your Egg to the Internet anywhere you find a wireless access point. The main thing, say the Eggcyte people, is that your data is yours and should stay that way. Facebook and other cloud-based "sharing" companies use your data to learn about you. Here in the U.S. their primary purpose may be to show you ads for things you might want to buy. In more repressive countries, cloud-based sharing services may use your private data in ways that could be hazardous to your health. Of course, our government people would never keep track of what we post on Twitter and other online services... or would they? (Alternate Video Link)

    94 comments | about a week ago

  • Oxytocin Regulates Sociosexual Behavior In Female Mice

    Chipmunk100 writes In a research article in the journal Cell scientists report that there is a subset of neurons that are vital in social interest of female mice for males during estrus, the sexually receptive phase of their cycle. They say that these neurons are responsive to oxytocin. The level of oxytocin rise when we hug or kiss a loved one. The BBC has an article on the findings as well, and reports that Without [oxytocin], female mice were no more attracted to a mate than to a block of Lego ... [The affected] neurons are situated in the prefrontal cortex, an area of the brain important for personality, learning and social behaviour. Both when the hormone was withheld and when the cells were silenced, the females lost interest in mating during oestrous, which is when female mice are sexually active.

    216 comments | about two weeks ago

  • Mining Kickstarter Data Reveals How To Match Crowdfunding Projects To Investors

    KentuckyFC writes Since 2001, crowdfunding sites have raised almost $3 billion and in 2012 alone, successfully funded more than 1 million projects. But while many projects succeed, far more fail. The reasons for failure are varied and many but one of the most commonly cited is the inability to match a project with suitable investors. Now a group of researchers from Yahoo Labs and the University of Cambridge have mined data from Kickstarter to discover how investors choose projects to back. They studied over 1000 projects in the US funded by over 80,000 investors. They conclude that there are two types of backers: occasional investors who tend to back arts-related projects, probably because of some kind of social connection to the proposers; and frequent investors who have a much more stringent set of criteria. Frequent investors tend to fund projects that are well-managed, have high pledging goals, are global, grow quickly, and match their interests. The team is now working on a website that will create a list of the Twitter handles of potential investors given the URL of a Kickstarter project.

    20 comments | about two weeks ago

  • China Bans "Human Flesh Searching"

    hackingbear writes The Supreme People's Court, China's top court, has outlined the liabilities of network service providers in a document on the handling of online personal rights violation cases. "Rights violators usually hide in the dark online. They post harmful information out of the blue, and victims just can't be certain whom they should accuse when they want to bring the case to court," said Yao Hui, a senior SPC judge specializing in civil cases. Those re-posting content that violates others' rights and interests will also answer for their actions, and their liability will be determined based on the consequences of their posts, the online influence of re-posters, and whether they make untruthful changes to content that mislead. This essentially tries to ban the so-called human flesh searching. Though this does not stop others from using the chance to highlight the country's censorship problems even though the rulings seem to focus on personal privacy protection.

    109 comments | about two weeks ago

  • Snowden's Tough Advice For Guarding Privacy

    While urging policy reform as more important than per-person safeguards, Edward Snowden had a few pieces of advice on maintaining online privacy for attendees at Saturday's New Yorker Festival. As reported by TechCrunch, Snowden's ideas for avoiding online intrusions (delivered via video link) sound simple enough, but may not be easy for anyone who relies on Google, Facebook, or Dropbox, since those are three companies he names as ones to drop. A small slice: He also suggested that while Facebook and Google have improved their security, they remain “dangerous services” that people should avoid. (Somewhat amusingly, anyone watching the interview via Google Hangout or YouTube saw a Google logo above Snowden’s face as he said this.) His final piece of advice on this front: Don’t send unencrypted text messages, but instead use services like RedPhone and Silent Circle. Earlier in the interview, Snowden dismissed claims that increased encryption on iOS will hurt crime-fighting efforts. Even with that encryption, he said law enforcement officials can still ask for warrants that will give them complete access to a suspect’s phone, which will include the key to the encrypted data. Plus, companies like Apple, AT&T, and Verizon can be subpoenaed for their data.

    210 comments | about two weeks ago

  • More Details On The 3rd-Party Apps That Led to Snapchat Leaks

    Yesterday we posted a link to Computerworld's reports that (unnamed) third-party apps were responsible for a massive leak of Snapchat images from the meant-to-be-secure service. An anonymous reader writes with some more details: Ars Technica identifies the culprit as SnapSaved, which was created to allow Snapchat users to access their sent and received images from a browser but which also secretly saved those images on a SnapSaved server hosted by HostGator. Security researcher Adam Caudill warned Snapchat about the vulnerability of their API back in 2012, and although the company has reworked their code multiple times as advised by other security researchers, Caudill concludes that the real culprit is the concept behind Snapchat itself. "Without controlling the endpoint devices themselves, Snapchat can't ensure that its users' photos will truly be deleted. And by offering that deletion as its central selling point, it's lured users into a false sense of privacy."

    97 comments | about two weeks ago

  • Kmart Says Its Payment System Was Hacked

    wiredmikey writes Kmart is the latest large U.S. retailer to experience a breach of its payment systems, joining a fast growing club dealing successful hack attacks. The company said that on Thursday, Oct. 9, its IT team detected that its payment data systems had been breached, and that debit and credit card numbers appear to have been compromised. A company spokesperson told SecurityWeek that they are not able to provide a figure on the number of customers impacted. The spokesperson said that based on the forensic investigation to date, no personal information, no debit card PIN numbers, no email addresses and no social security numbers were obtained by the attackers.

    101 comments | about two weeks ago

  • Interviews: Ask Reuben Paul What Hackers Can Learn From an 8-Year-Old

    Reuben A. Paul, aka RAPstar, has something of a head-start when it comes to learning about computer security: his father, Mano Paul, has been a security researcher (and instructor) for many years. So Reuben grew up around computers, seeing firsthand that they're neither mysterious nor impregnable. Reuben, though, has a curious mind and his own computer security interests, and a knack for telling others about them; last month, he became the youngest-ever speaker at DerbyCon, and explained some of what he's picked up so far on what kids can learn about security, as well as what the security field can learn from kids. (One hard to dispute nugget: "Kids are the best social engineers, followed by puppies.") Ask of Reuben whatever you'd like, below (please, one question per post), and we'll get answers to selected questions when we catch up with him at next week's Houston Security Conference. (This year's conference is sold out, but there's always 2015.)

    44 comments | about two weeks ago

  • Why the Trolls Will Always Win

    maynard writes: Kathy Sierra spent a tech career developing videogames and teaching Java programming in Sun Microsystems masterclasses. Up until 2007, she'd been a well regarded tech specialist who happened to be female. Until the day she opined on her private blog that given the crap-flood of bad comments, maybe forum moderation wasn't a bad idea. This opinion made her a target. A sustained trolling and harassment campaign followed, comprised of death and rape threats, threats against her family, fabricated claims of prostitution, and a false claim that she had issued a DMCA takedown to stifle criticism. All of this culminated in the public release of her private address and Social Security Number, a technique known as Doxxing. And so she fled from the public, her career, and even her home.

    It turned out that a man named Andrew Auernheimer was responsible for having harassed Sierra. Known as 'Weev', he admitted it in a 2008 New York Times story on Internet Trolls. There, he spoke to the lengths which he and his cohorts went to discredit and destroy the woman. "Over a candlelit dinner of tuna sashimi, Weev asked if I would attribute his comments to Memphis Two, the handle he used to troll Kathy Sierra, a blogger. Inspired by her touchy response to online commenters, Weev said he "dropped docs" on Sierra, posting a fabricated narrative of her career alongside her real Social Security number and address. This was part of a larger trolling campaign against Sierra, one that culminated in death threats."

    Now, seven years later, Kathy Sierra has returned to explain why she left and what recent spates of online harassment against women portend for the future if decent people don't organize. The situation has grown much more serious since she went into hiding all those years ago. It's more than just the threat of Doxxing to incite physical violence by random crazies with a screw loose.
    Read on for the rest of maynard's thoughts.

    721 comments | about two weeks ago

  • DoJ: Law Enforcement Can Impersonate People On Facebook

    An anonymous reader sends news that the U.S. Drug Enforcement Agency impersonated a young woman on Facebook to communicate with suspected criminals, and the Department of Justice argued that they had the right to do so. The woman was charged with being part of a drug ring and sentenced to probation, after which a DEA agent set up a Facebook page in her name, uploaded images to it (including pictures of her son and niece), and used it without her consent. She recently sued the agent in federal district court, and the government argued that she "implicitly consented by granting access to the information stored in her cell phone and by consenting to the use of that information to aid in an ongoing criminal investigations [sic]." Facebook has now removed the account, and the DoJ is "reviewing" the case.

    191 comments | about two weeks ago

  • Why Do Contextual Ads Fail?

    minstrelmike writes If we give up all our privacy on-line for contextual ads, then how come so many of them are so far off the mark? Personal data harvesting for contextual ads and content should be a beautiful thing. They do it privately and securely, and it's all automated so that no human being actually learns anything about you. And then the online world becomes customized, just for you. The real problem with this scenario is that is we're paying for contextual ads and content with our personal data, but we're not getting what we pay for. Facebook advertising is off target and almost completely irrelevant. The question is: Why? Facebook has a database of our explicitly stated interests, which many users fill out voluntarily. Facebook sees what we post about. It knows who we interact with. It counts our likes, monitors our comments and even follows us around the Web. Yet, while the degree of personal data collection is extreme, the advertising seems totally random.

    249 comments | about two weeks ago

Slashdot Login

Need an Account?

Forgot your password?