The Almighty Buck

Video Why Kickstarter Became a Public Benefit Corporation (Video) 7

Meet Kickstarter co-founder and CEO Yancey Strickler. Timothy Lord asked Yancey about Kickstarter's recent move to become a Public Benefit Corporation, which is, according to Wikipedia, "a specific type of corporation that allows for public benefit to be a charter purpose in addition to the traditional corporate goal of maximizing profit for shareholders."

This corporate restructuring has no tax advantages, and creates a slight increase in paperwork, Yancey says. So why did they do it? Please view the video (or read the transcript, which has more info than the video) to find out.
Government

Snowden Joins Twitter, Follows NSA 69

wiredmikey writes: Edward Snowden joined Twitter Tuesday, picking up more than a quarter of a million followers on the social network in just over two hours. Snowden followed a single Twitter account: the U.S. National Security Agency, from which he stole electronic documents revealing the agency's secret surveillance programs. "Can you hear me now?" he asked in his first tweet, which was quickly resent by Twitter users tens of thousands of times. In his second, Snowden noted the recent news about the planet Mars and then quipped about the difficulty he had finding asylum after the U.S. government fingered him as the source of the NSA leaks. "And now we have water on Mars!" he wrote. "Do you think they check passports at the border? Asking for a friend."
Google

Google Shows Off 2 New Nexus Phones, a New Pixel, and More 58

Two of the products officially unveiled at Google's much-anticipated (at least much-hyped) release announcement were widely and correctly predicted: a pair of new Nexus phones. The flagship is the all-metal Huawei 6P, with a 5.7" AMOLED display (2,560x1,440), 3GB of RAM, and a Snapdragon 810 chip. The Huawei overshadows the nonetheless respectable second offering, the LG-made Nexus 5X, which makes concessions in the form of less RAM (2GB instead of the 6P's 3), smaller battery (2700mAh, instead of 3450) and a lesser Snapdragon chip inside (808, rather than 810). Both phones, though, come with USB-C and with a big upgrade for a line of phones not generally praised for its cameras: a large-pixel 12.3-megapixel Sony camera sensor. Much less predicted: Google announced a new bearer for the Pixel name, after its line of high-end Chromebooks; today's entrant is a tablet, not running Chrome, and it's running Android rather than Chrome OS. The Pixel C tablet will debut sometime later this year; google touts it as "the first Android tablet built end-to-end by Google." Also on the agenda today, news that Android 6 will start hitting Nexus devices next week.
Displays

Ask Slashdot: Advanced KVM Switch? 65

jez9999 writes: I have a rather advanced use-case for my home work area that I need a KVM-type device for, and I was wondering whether such a thing even existed. I want a 3-PC setup; 2 desktops (PC1 and PC2) and 1 laptop going through a dock (DOCK1). I want to connect 2 monitors (SCREEN1 and SCREEN2), 1 mouse, and 1 keyboard (INPUTS). So far it's relatively straightforward, as I could just switch everything between the 3 devices.

But here's the kicker; I'd like at least 4 modes of operation: one mode to output PC1 video to both screens (dual-screen) and redirect INPUTS to it, one mode to output PC2 video to both screens (dual-screen) and redirect INPUTS to it, one mode to output PC1 video to SCREEN1, extend DOCK1 video to SCREEN2, and redirect INPUTS to DOCK1, and one mode to output PC1 video to SCREEN1, extend DOCK1 video to SCREEN2, and redirect INPUTS to PC1.

Basically with the latter two modes I'd like to be able to switch between inputting to PC1 & DOCK1, whilst continuing to be able to monitor each by outputting each one's video to one of the 2 monitors. However, I also want to be able to go dual-screen with and control PC1 & PC2.

In terms of ports I'd like to use HDMI (or possibly DVI-D) and USB for peripherals; not VGA or PS/2.

Is there any KVM switch out there able to do this kind of thing? I guess I'm probably looking for some kind of programmable KVM which allows me to specify, for each 'mode of operation', which inputs are routed to which outputs. Failing that, is there some other way I can get the setup I want (or something close)?
Encryption

Newly Found TrueCrypt Flaw Allows Full System Compromise 66

itwbennett writes: James Forshaw, a member of Google's Project Zero team has found a pair of flaws in the discontinued encryption utility TrueCrypt that could allow attackers to obtain elevated privileges on a system if they have access to a limited user account. 'It's impossible to tell if the new flaws discovered by Forshaw were introduced intentionally or not, but they do show that despite professional code audits, serious bugs can remain undiscovered,' writes Lucian Constantin.
Advertising

Poll Preferred outcome after VW software fakery ... 278

Looks like someone has already voted from this IP. If you would like to vote please login and try again.

0
Percentage of others that also voted for:

IOS

Advertisers Already Using New iPhone Text Message Exploit 56

Andy Smith writes: The annoying App Store redirect issue has blighted iPhone users for years, but now there's a new annoyance and it's already being exploited: Visit a web page on your iPhone and any advertiser can automatically open your messages app and create a new text message with the recipient and message already filled in. We can only hope they don't figure out how to automatically send the message, although you can bet they're trying.
Digital

Retro Roundup: Old Computers Emulated Right In Your Browser 61

An anonymous reader writes: If you ever wanted to program an Altair, an Apple I, or a COSMAC ELF you may think you either have to buy one (expensive now) or load and configure simulation software. However, there's a slew of browser-based emulators for everything from a PDP-11 to Windows 1.0 out there. Some use Java, but many use Javascript and many perform better on a modern PC then they did in their original. If you want to learn some history or just want to finally play with the computers you saw in the magazines 35 years ago, these are great fun and slightly addictive.
Biotech

Rogue Biohacking Is Not a Problem 35

Lasrick writes: Although biosecurity experts have long warned that biohackers will eventually engineer pathogens in the same way that computer enthusiasts in the 1970s developed viruses and adware, UC Berkeley's Zian Liu thinks fears about 'rogue biohackers' are overblown. He lists the five barriers that make it much more difficult to bioengineer in your garage than people think, but also suggests some important chokeholds regulators can take to prevent a would-be bioweaponeer from getting lucky.
Input Devices

ALS Patients Use a Brain Implant To Type 6 Words Per Minute 24

the_newsbeagle writes: With electrodes implanted in their neural tissue and a new brain-computer interface, two paralyzed people with ALS used their thoughts to control a computer cursor with unprecedented accuracy and speed. They showed off their skills by using a predictive text-entering program to type sentences, achieving a rate of 6 words per minute. While paralyzed people can type faster using other assistive technologies that are already on the market, like eye-gaze trackers and air-puff controllers, a brain implant could be the only option for paralyzed people who can't reliably control their eyes or mouth muscles.
Stats

(Over-)Measuring the Working Man 135

HughPickens.com writes: Tyler Cowen writes in MIT Technology Review that the improved measurement of worker performance through information technology is beginning to allow employers to measure value fairly precisely and as we get better at measuring who produces what, the pay gap between those who make more and those who make less grows. Insofar as workers type at a computer, everything they do is logged, recorded, and measured. Surveillance of workers continues to increase, and statistical analysis of large data sets makes it increasingly easy to evaluate individual productivity, even if the employer has a fairly noisy data set about what is going on in the workplace. Consider journalism. In the "good old days," no one knew how many people were reading an article, or an individual columnist. Today a digital media company knows exactly how many people are reading which articles for how long, and also whether they click through to other links. The result is that many journalists turn out to be not so valuable at all. Their wages fall or they lose their jobs, while the superstar journalists attract more Web traffic and become their own global brands.

According to Cowen, the upside is that measuring value tends to boost productivity, as has been the case since the very beginning of management science. We're simply able to do it much better now, and so employers can assign the most productive workers to the most suitable tasks. The downsides are several. Individuals don't in fact enjoy being evaluated all the time, especially when the results are not always stellar: for most people, one piece of negative feedback outweighs five pieces of positive feedback.
Privacy

FBI and DEA Under Review For Misuse of NSA Mass Surveillance Data 70

Patrick O'Neill writes: The FBI and DEA were among the agencies fed information from an NSA surveillance program described as "staggering" by one judge who helped strike the program down. Now the two agencies are under review by the Justice Department for the use of parallel construction as well as looking into the specifics and results of cases originating from NSA tips. (Here's some more on the practice of parallel construction in this context.)
Education

When Schools Overlook Introverts 244

Esther Schindler writes: A few years ago, Susan Cain's book, Quiet: The Power of Introverts in a World That Can't Stop Talking seemed to give the world a bit of enlightenment about getting the most out of people who don't think they should have to be social in order to succeed. For a while, at least some folks worked to respect the needs and advantages of introversion, such as careful, reflective thinking based on the solitude that idea-generation requires.

But in When Schools Overlook Introverts, Michael Godsey writes, "The way in which certain instructional trends — education buzzwords like "collaborative learning" and "project-based learning" and "flipped classrooms" — are applied often neglect the needs of introverts. In fact, these trends could mean that classroom environments that embrace extroverted behavior — through dynamic and social learning activities — are being promoted now more than ever." It's a thoughtful article, worth reading. As I think many people on slashdot will agree, Godsley observes, "This growing emphasis in classrooms on group projects and other interactive arrangements can be challenging for introverted students who tend to perform better when they're working independently and in more subdued environments."
United States

Raytheon Wins US Civilian Cyber Contract Worth $1 Billion 52

Tokolosh writes: Raytheon is a company well-known in military-industrial and political circles, but not so much for software, networking and cybersecurity. That has not stopped the DHS awarding it a $1 billion, five year contract to help more than 100 civilian agencies manage their computer security. Raytheon said DHS selected it to be the prime contractor and systems integrator for the agency's Network Security Deployment (NSD) division, and its National Cybersecurity Protection System (NCPS). The contract runs for five years, but some orders could be extended for up to an additional 24 months, it said. Dave Wajsgras, president of Raytheon Intelligence, Information and Services, said the company had invested over $3.5 billion in recent years to expand its cybersecurity capabilities. He said cybersecurity incidents had increased an average of 66 percent a year worldwide between 2009 and 2014. As you might expect, Raytheon spends heavily on political contributions and lobbying.
Encryption

How the FBI Hacks Around Encryption 72

Advocatus Diaboli writes with this story at The Intercept about how little encryption slows down law enforcement despite claims to the contrary. To hear FBI Director James Comey tell it, strong encryption stops law enforcement dead in its tracks by letting terrorists, kidnappers and rapists communicate in complete secrecy. But that's just not true. In the rare cases in which an investigation may initially appear to be blocked by encryption — and so far, the FBI has yet to identify a single one — the government has a Plan B: it's called hacking.

Hacking — just like kicking down a door and looking through someone's stuff — is a perfectly legal tactic for law enforcement officers, provided they have a warrant. And law enforcement officials have, over the years, learned many ways to install viruses, Trojan horses, and other forms of malicious code onto suspects' devices. Doing so gives them the same access the suspects have to communications — before they've been encrypted, or after they've been unencrypted.
Science

New Nanoparticle Sunblock Is Stronger and Safer, Scientists Say 102

sciencehabit writes: What's the best sunscreen? It's a question that troubles beachgoers, athletes, and scientists alike. Mark Saltzman, who falls into the last category, was so concerned by the time his third child was born that he wanted to engineer a better sunblock. "The initial goal was to make a sunblock that lasted longer," says Saltzman, a biomedical engineer at Yale University. "But as I read more about sunscreen, I became aware of people's concerns about safety." Now, he and his colleagues have unveiled the results of their research: a nanoparticle-based sunblock, which they say is longer lasting and less likely to leak into the body than traditional sunscreen.