Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.
Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and learn more about it. Thanks for reading, and for making the site better!
An anonymous reader writes: The NY Times explains research into how our mindset can influence results. The common refrain when striving for a goal is to stay positive and imagine success — people say this will help you accomplish what you want. But a series of psychological experiments show such thinking tends to have exactly the opposite effect. "In a 2011 study published in the Journal of Experimental Social Psychology, we asked two groups of college students to write about what lay in store for the coming week. One group was asked to imagine that the week would be great. The other group was just asked to write down any thoughts about the week that came to mind. The students who had positively fantasized reported feeling less energized than those in the control group. As we later documented, they also went on to accomplish less during that week." This research has been replicated across many types of people and many different goals.
Building on that research, the scientists developed a thought process called "mental contrasting," where people are encouraged to think about their dreams coming true only for a few minutes before dedicating just as much time to thinking about the obstacles they'll have to deal with. Experiments have demonstrated that subjects using these techniques were more successful at things like exercise and maintaining a healthy diet than a control group. "[D]reaming about the future calms you down, measurably reducing systolic blood pressure, but it also can drain you of the energy you need to take action in pursuit of your goals."
27 comments | 1 hour ago
Frequent contributor Bennett Haselton writes: Facebook threatened to banish drag queen pseudonyms, and (some) users revolted by flocking to Ello, a social network which promised not to enforce real names and also to remain ad-free. Critics said that the idealistic model would buckle under pressure from venture capitalists. But both gave scant mention to the fact that a distributed social networking protocol, backed by a player large enough to get people using it, would achieve all of the goals that Ello aspired to achieve, and more. Read on for the rest.
257 comments | 2 days ago
Social media site Ello is presented as the anti-Facebook, promising an ad-free social network, and that they won't sell private data. Today, they've also announced that Ello has become a Public Benefit Corporation, and that the site's anti-advertising promise has been enshrined in a corporate charter. The BBC reports on the restrictions that Ello has therefore entered into, which mean the site cannot, for monetary gain,
While that might turn off some potential revenue flows (the company says it will make money by selling optional features), as the linked article points out, it hasn't turned off investors; Ello has now raised $5.5 million from investors.
165 comments | 2 days ago
HughPickens.com writes James Swearingen writes at The Atlantic that the Internet can be a mean, hateful, and frightening place — especially for young women but human behavior and the limits placed on it by both law and society can change. In a Pew Research Center survey of 2,849 Internet users, one out of every four women between 18 years old and 24 years old reports having been stalked or sexually harassed online. "Like banner ads and spam bots, online harassment is still routinely treated as part of the landscape of being online," writes Swearingen adding that "we are in the early days of online harassment being taken as a serious problem, and not simply a quirk of online life." Law professor Danielle Citron draws a parallel between how sexual harassment was treated in the workplace decades ago and our current standard. "Think about in the 1960s and 1970s, what we said to women in the workplace," says Citron. "'This is just flirting.' That a sexually hostile environment was just a perk for men to enjoy, it's just what the environment is like. If you don't like it, leave and get a new job." It took years of activism, court cases, and Title VII protection to change that. "Here we are today, and sexual harassment in the workplace is not normal," said Citron. "Our norms and how we understand it are different now."
According to Swearingen, the likely solution to internet trolls will be a combination of things. The expansion of laws like the one currently on the books in California, which expands what constitutes online harassment, could help put the pressure on harassers. The upcoming Supreme Court case, Elonis v. The United States, looks to test the limits of free speech versus threatening comments on Facebook. "Can a combination of legal action, market pressure, and societal taboo work together to curb harassment?" asks Swearingen. "Too many people do too much online for things to stay the way they are."
546 comments | 2 days ago
First time accepted submitter dkatana writes Having some type of fiber or high-speed cable connectivity is normal for many of us, but in most developing countries of the world and many areas of Europe, the US, and other developed countries, access to "super-fast" broadband networks is still a dream. This is creating another "digital divide." Not having the virtually unlimited bandwidth of all-fiber networks means that, for these populations, many activities are simply not possible. For example, broadband provided over all-fiber networks brings education, healthcare, and other social goods into the home through immersive, innovative applications and services that are impossible without it. Alternatives to fiber, such as cable (DOCSYS 3.0), are not enough, and they could be more expensive in the long run. The maximum speed a DOCSYS modem can achieve is 171/122 Mbit/s (using four channels), just a fraction the 273 Gbit/s (per channel) already reached on fiber.
290 comments | 2 days ago
jones_supa writes The last emblems of Nokia are being removed from Microsoft products. "Microsoft Lumia" is the new brand name that takes their place. The name change follows a slow transition from Nokia.com over to Microsoft's new mobile site, and Nokia France will be the first of many countries that adopt "Microsoft Lumia" for its Facebook, Twitter, and other social media accounts. Microsoft has confirmed to The Verge that other countries will follow the rebranding steps in the coming weeks. Nokia itself continues as a reborn company focusing on mapping and network infrastructure services.
150 comments | 4 days ago
HughPickens.com writes: CNNMoney reports that Facebook has sent a letter to the U.S. Drug Enforcement Administration demanding that agents stop impersonating users on the social network. "The DEA's deceptive actions... threaten the integrity of our community," Facebook chief security officer Joe Sullivan wrote to DEA head Michele Leonhart. "Using Facebook to impersonate others abuses that trust and makes people feel less safe and secure when using our service." Facebook's letter comes on the heels of reports that the DEA impersonated a young woman on Facebook to communicate with suspected criminals, and the Department of Justice argued that they had the right to do so. Facebook contends that their terms and Community Standards — which the DEA agent had to acknowledge and agree to when registering for a Facebook account — expressly prohibit the creation and use of fake accounts. "Isn't this the definition of identity theft?" says privacy researcher Runa Sandvik. The DEA has declined to comment and referred all questions to the Justice Department, which has not returned CNNMoney's calls.
239 comments | 4 days ago
Nerval's Lobster (2598977) writes Software development and IT remain common jobs among those in the higher brackets, although not the topmost one, according to a new study (with graph) commissioned by NPR. Among those earning between $58,000 and $72,000, IT was the sixth-most-popular job, while software developers came in tenth place. In the next bracket up (earning between $72,000 and $103,000), IT rose to third, with software development just behind in fourth place. As incomes increased another level ($103,000 to $207,000), software developers did even better, coming in second behind managers, although IT dropped off the list entirely. In the top percentile ($207,000 and above), neither software developers nor IT staff managed to place; this is a segment chiefly occupied by physicians (in first place), managers, chief executives, lawyers, and salespeople who are really good at their jobs. In other words, it seems like a good time to be in IT, provided you have a particular skillset. If those high salaries are in Silicon Valley or New York, though, they might not seem as high as half the same rate would in Omaha, or Houston, or Raleigh.
196 comments | 5 days ago
An anonymous reader writes with this news from The Guardian about a proposed change in UK law that would greatly increase the penalties for online incivility: Internet trolls who spread "venom" on social media could be jailed for up to two years, the justice secretary Chris Grayling has said as he announced plans to quadruple the maximum prison sentence. Grayling, who spoke of a "baying cybermob", said the changes will allow magistrates to pass on the most serious cases to crown courts. The changes, which will be introduced as amendments to the criminal justice and courts bill, will mean the maximum custodial sentence of six months will be increased to 24 months. Grayling told the Mail on Sunday: "These internet trolls are cowards who are poisoning our national life. No one would permit such venom in person, so there should be no place for it on social media. That is why we are determined to quadruple the six-month sentence.
488 comments | about a week ago
As reported by VentureBeat, dissapearing-message service Snapchat is introducing ads. Considering how most people feel about ads, they're trying to ease them in gently: "Ads can be ignored: Users will not be required to watch them. If you do view an ad, or if you ignore it for 24 hours, it will disappear just like Stories do." Hard to say how much it will mollify the service's users, but the company says "We won’t put advertisements in your personal communication – things like Snaps or Chats. That would be totally rude. We want to see if we can deliver an experience that’s fun and informative, the way ads used to be, before they got creepy and targeted."
131 comments | about a week ago
rtoz (2530056) writes Facebook has launched a new Tool called "Safety Check." The Facebook Safety Check tool will notify your friends so that they know you're OK after a major disaster. In times of disaster or crisis, people turn to Facebook to check on loved ones and get updates. "During a major disaster, Safety Check will help you: Let friends and family know you're safe; Check on others in the affected area; Mark your friends as safe ... When the tool is activated after a natural disaster and if you're in the affected area, you'll receive a Facebook notification asking if you're safe. [Facebook] will determine your location by looking at the city you have listed in your profile, your last location if you've opted in to the Nearby Friends product, and the city where you are using the internet. ... If you're safe, you can select "I'm Safe" and a notification and News Feed story will be generated with your update. Your friends can also mark you as safe." More creepy, or more reassuring?
130 comments | about a week ago
New submitter qqod writes this story at The Guardian that raises privacy concerns over the Whisper app. "The company behind Whisper, the social media app that promises users anonymity and claims to be the “the safest place on the internet”, is tracking the location of its users, including some who have specifically asked not to be followed. The practice of monitoring the whereabouts of Whisper users – including those who have expressly opted out of geolocation services – will alarm users, who are encouraged to disclose intimate details about their private and professional lives. Whisper is also sharing information with the US Department of Defense gleaned from smartphones it knows are used from military bases, and developing a version of its app to conform with Chinese censorship laws."
180 comments | about a week ago
vinces99 writes "Under the rule of dictator Nicolae Ceausescu, thousands of Romanian children were placed in overcrowded orphanages with bleak conditions and minimal human contact, a legacy that continued even after the 1989 revolution. Only recently have research and public concern caused policy changes.
University of Washington research on children who began life in these institutions shows that early childhood neglect is associated with changes in brain structure. A paper published this month in Biological Psychiatry shows that children who spent their early years in these institutions have thinner brain tissue in cortical areas that correspond to impulse control and attention. "These differences suggest a way that the early care environment has dramatic and lasting effects for children's functioning," said lead author Katie McLaughlin, a UW assistant professor of psychology.
Since 2000, the Bucharest Early Intervention Project has worked to document and treat the children's health. McLaughlin joined the team about six years ago to focus on brain development. This study is among the first in any setting to document how social deprivation in early life affects the thickness of the cortex, the thin folded layer of gray matter that forms the outer layer of the brain. The study provides "very strong support" for a link between the early environment and ADHD, McLaughlin said.
87 comments | about two weeks ago
Eggcyte has been working on this for two years. It's on Kickstarter now; a personal server you can use to share music, video, text, and just about anything else without resorting to cloud-based services where one weak password can put your private celebrity photos (you are a celebrity, right?) into the wrong hands. If you suddenly decide you don't want to share the information on your Egg any more, turn it off. If you suddenly have something new to share, like a video you just shot of the Loch Ness Monster capturing an alien spaceship, you can connect your Egg to the Internet anywhere you find a wireless access point. The main thing, say the Eggcyte people, is that your data is yours and should stay that way. Facebook and other cloud-based "sharing" companies use your data to learn about you. Here in the U.S. their primary purpose may be to show you ads for things you might want to buy. In more repressive countries, cloud-based sharing services may use your private data in ways that could be hazardous to your health. Of course, our government people would never keep track of what we post on Twitter and other online services... or would they? (Alternate Video Link)
94 comments | about two weeks ago
Chipmunk100 writes In a research article in the journal Cell scientists report that there is a subset of neurons that are vital in social interest of female mice for males during estrus, the sexually receptive phase of their cycle. They say that these neurons are responsive to oxytocin. The level of oxytocin rise when we hug or kiss a loved one. The BBC has an article on the findings as well, and reports that Without [oxytocin], female mice were no more attracted to a mate than to a block of Lego ... [The affected] neurons are situated in the prefrontal cortex, an area of the brain important for personality, learning and social behaviour. Both when the hormone was withheld and when the cells were silenced, the females lost interest in mating during oestrous, which is when female mice are sexually active.
216 comments | about two weeks ago
KentuckyFC writes Since 2001, crowdfunding sites have raised almost $3 billion and in 2012 alone, successfully funded more than 1 million projects. But while many projects succeed, far more fail. The reasons for failure are varied and many but one of the most commonly cited is the inability to match a project with suitable investors. Now a group of researchers from Yahoo Labs and the University of Cambridge have mined data from Kickstarter to discover how investors choose projects to back. They studied over 1000 projects in the US funded by over 80,000 investors. They conclude that there are two types of backers: occasional investors who tend to back arts-related projects, probably because of some kind of social connection to the proposers; and frequent investors who have a much more stringent set of criteria. Frequent investors tend to fund projects that are well-managed, have high pledging goals, are global, grow quickly, and match their interests. The team is now working on a website that will create a list of the Twitter handles of potential investors given the URL of a Kickstarter project.
20 comments | about two weeks ago
hackingbear writes The Supreme People's Court, China's top court, has outlined the liabilities of network service providers in a document on the handling of online personal rights violation cases. "Rights violators usually hide in the dark online. They post harmful information out of the blue, and victims just can't be certain whom they should accuse when they want to bring the case to court," said Yao Hui, a senior SPC judge specializing in civil cases. Those re-posting content that violates others' rights and interests will also answer for their actions, and their liability will be determined based on the consequences of their posts, the online influence of re-posters, and whether they make untruthful changes to content that mislead. This essentially tries to ban the so-called human flesh searching. Though this does not stop others from using the chance to highlight the country's censorship problems even though the rulings seem to focus on personal privacy protection.
109 comments | about two weeks ago
While urging policy reform as more important than per-person safeguards, Edward Snowden had a few pieces of advice on maintaining online privacy for attendees at Saturday's New Yorker Festival. As reported by TechCrunch, Snowden's ideas for avoiding online intrusions (delivered via video link) sound simple enough, but may not be easy for anyone who relies on Google, Facebook, or Dropbox, since those are three companies he names as ones to drop. A small slice: He also suggested that while Facebook and Google have improved their security, they remain “dangerous services” that people should avoid. (Somewhat amusingly, anyone watching the interview via Google Hangout or YouTube saw a Google logo above Snowden’s face as he said this.) His final piece of advice on this front: Don’t send unencrypted text messages, but instead use services like RedPhone and Silent Circle. Earlier in the interview, Snowden dismissed claims that increased encryption on iOS will hurt crime-fighting efforts. Even with that encryption, he said law enforcement officials can still ask for warrants that will give them complete access to a suspect’s phone, which will include the key to the encrypted data. Plus, companies like Apple, AT&T, and Verizon can be subpoenaed for their data.
210 comments | about two weeks ago
Yesterday we posted a link to Computerworld's reports that (unnamed) third-party apps were responsible for a massive leak of Snapchat images from the meant-to-be-secure service. An anonymous reader writes with some more details: Ars Technica identifies the culprit as SnapSaved, which was created to allow Snapchat users to access their sent and received images from a browser but which also secretly saved those images on a SnapSaved server hosted by HostGator. Security researcher Adam Caudill warned Snapchat about the vulnerability of their API back in 2012, and although the company has reworked their code multiple times as advised by other security researchers, Caudill concludes that the real culprit is the concept behind Snapchat itself. "Without controlling the endpoint devices themselves, Snapchat can't ensure that its users' photos will truly be deleted. And by offering that deletion as its central selling point, it's lured users into a false sense of privacy."
101 comments | about two weeks ago
wiredmikey writes Kmart is the latest large U.S. retailer to experience a breach of its payment systems, joining a fast growing club dealing successful hack attacks. The company said that on Thursday, Oct. 9, its IT team detected that its payment data systems had been breached, and that debit and credit card numbers appear to have been compromised. A company spokesperson told SecurityWeek that they are not able to provide a figure on the number of customers impacted. The spokesperson said that based on the forensic investigation to date, no personal information, no debit card PIN numbers, no email addresses and no social security numbers were obtained by the attackers.
101 comments | about two weeks ago