Slashdot Deals: Ace the Amazon Web Services Certification Exams - Get a head start on your new year's resolution at 87% off. ×
Programming

The Unsung Heroes of Scientific Software (nature.com) 18

An anonymous reader sends this news from Nature: For researchers who code, academic norms for tracking the value of their work seem grossly unfair. They can spend hours contributing to software that underpins research, but if that work does not result in the authorship of a research paper and accompanying citations, there is little way to measure its impact. ... Enter Depsy, a free website launched in November 2015 that aims to "measure the value of software that powers science."

[Postdoc researcher Klaus] Schliep's profile on that site shows that he has contributed in part to seven software packages, and that he shares 34% of the credit for phangorn. Those packages have together received more than 2,600 downloads, have been cited in 89 open-access research papers and have been heavily recycled for use in other software — putting Schliep in the 99th percentile of all coders on the site by impact.

Transportation

Your Car: Aerial Drone Launcher? (dice.com) 21

Nerval's Lobster writes: Ford and Chinese technology company DJI (which manufactures drones that specialize in aerial photography) used the spotlight of this year's CES to announce a developer challenge: figure out how someone can use the dashboard touch-screen to launch (and land) a drone from the back of a pickup. While the challenge is framed as a "search-and-rescue system for the future," drone control from a moving vehicle has a lot more applications than search-and-rescue. In 2014, Renault designed a concept car that came with a small flying drone controllable via tablet or preset GPS waypoints. In theory, this "flying companion," launched from a retractable hatch in the roof, could prove especially useful at scanning the road ahead for possible traffic jams. (Renault hasn't yet announced a production model of the car.) So are drones-from-cars an odd sideshow? Maybe. But if they catch on, imagine the driver-distraction issues from trying to pilot a UAV while you're on the road.
China

China's Tech Copycats Transformed Into a Hub For Innovation (wired.com) 42

hackingbear writes: Following similar path of the 19th century America, China has advanced from being copycats to innovators. After its middle class has risen from 4% of population to 2/3 in the last decade, a generation both creative and comfortable with risk-taking are born. "We're seeing people in their early twenties starting companies—people just out of school, and there are even some dropouts," says Kai-Fu Lee, a Chinese venture capitalist and veteran of Apple, Microsoft, and Google, who has spent the past decade crisscrossing the nation, helping youths start firms. Major cities, i.e. Beijing, Shanghai, Shenzhen, Hangzhou, are crowded with ambitious inventors and entrepreneurs, flocking into software accelerators and hackerspaces. They no longer want jobs at Google or Apple; like their counterparts in San Francisco, they want to build the next Google or Apple. Venture capitalists pumped a record $15.5 billion into Chinese startups last year, so entrepreneurs are being showered in funding, as well as crucial advice and mentoring from millionaire angels. Even the Chinese government—which has a wary attitude toward online expression and runs a vast digital censorship apparatus—has launched a $6.5 billion fund for startups.
Twitter

Twitter To Extend 140-Character Limit For Tweets (recode.net) 118

An anonymous reader writes: According to Re/code, Twitter is doing away with its 140-character limit for tweets. The company is currently planning on increasing the limit to 10,000 characters, though the final number may change before they roll it out. "Twitter is currently testing a version of the product in which tweets appear the same way they do now, displaying just 140 characters, with some kind of call to action that there is more content you can't see. Clicking on the tweets would then expand them to reveal more content. The point of this is to keep the same look and feel for your timeline, although this design is not necessarily final, sources say."
Microsoft

Microsoft Teams With Automakers To Put Windows, Office In Cars (microsoft.com) 130

An anonymous reader writes: Today Microsoft announced partnerships with several companies to bring Windows 10, Office 365, and Azure to cars. Volvo is having their Call Universal App integrate with Windows 10 smartphones and Microsoft Band 2 watches to let drivers interact with their cars. Harman, a company that builds infotainment systems, will allow drivers to access Office 365 services (while parked or while the car is driving itself). IAV, a similar company, will let users stream Windows 10 Continuum from their smartphone directly to a vehicle's dashboard. Finally, Nissan's LEAF and Infiniti models in Europe will run their telematics system on Azure. "The common thread between these announcements is that Microsoft is pitching Azure as an enabling platform, tossing in analytics and focusing on its core productivity strengths. Aside from the Microsoft Band 2 partnership with Volvo, Microsoft is taking an enterprise behind-the-scenes approach to the auto industry."
United States

Obama Orders Feds To Study Smart Gun Technology (cnet.com) 439

An anonymous reader writes: Today U.S. President Barack Obama rolled out a set of executive actions aimed at reducing gun violence. The most controversial of the provisions requires licenses for those who sell guns at gun shows and on the internet, and forces background checks on buyers. There are also a number of measures dedicated to making background checks more foolproof and universal. Less controversial but more on-topic for Slashdot is that Obama is requiring the departments of Defense, Justice, and Homeland Security to investigate smart gun technology. This can include RFID chips, fingerprint scanners, and other bits of technology. Their goal will be to "explore potential ways to further its use and development to more broadly improve gun safety." The new gun measures include a proposal for a $500 million investment into providing care for people with serious mental illnesses.
Government

Brain Game Maker Lumosity Fined $2 Million For False Advertising (sciencemag.org) 41

sciencehabit writes: Lumos Labs, the company that produces the popular 'brain-training' program Lumosity, yesterday agreed to pay a $2 million settlement to the Federal Trade Commission (FTC) for running deceptive advertisements. Lumos had claimed that its online games can help users perform better at work and in school, and stave off cognitive deficits associated with serious diseases such as Alzheimer's, traumatic brain injury, and post-traumatic stress.

The $2 million settlement will be used to compensate Lumosity consumers who were misled by false advertising, says Michelle Rusk, a spokesperson with the FTC in Washington, D.C. The company will also be required to provide an easy way to cancel auto-renewal billing for the service, which includes online and mobile app subscriptions, with payments ranging from $14.95 monthly to lifetime memberships for $299.95. Before consumers can access the games, a pop-up screen will alert them to the FTC's order and allow them to avoid future billing, Rusk says.

Cloud

Linode Resets Passwords After Credentials Leak (linode.com) 36

New submitter qmrq sends news that Linode, a major provider of virtual private servers, has been compromised again. In a blog post, they said, "A security investigation into the unauthorized login of three accounts has led us to the discovery of two Linode.com user credentials on an external machine. This implies user credentials could have been read from our database, either offline or on, at some point. The user table contains usernames, email addresses, securely hashed passwords and encrypted two-factor seeds." The Linode team said it found evidence of unauthorized access to three customer accounts. They don't yet know who is behind the attacks.

An employee for PagerDuty said they were compromised through Linode Manager all the way back in July. "In our situation the attacker knew one of our user's passwords and MFA secret. This allowed them to provide valid authentication credentials for an account in the Linode Manager. It's worth noting that all of our active user accounts had two-factor authentication enabled. ... We also have evidence from access logs provided by Linode that the attackers tried to authenticate as an ex-employee, whose username ONLY existed in the Linode database."
Government

A History of Innovation and Dysfunction At Los Alamos National Laboratory (santafenewmexican.com) 66

In the past, Los Alamos National Laboratory has done some of the United States' most crucial research and development. Lately, the lab has been dealing with accidents and management problems. Reader DougDot directs us to a report from the Santa Fe New Mexican about the questions surrounding LANL's future. Quoting: Federal officials told Congress in December that they will put the LANL contract up for competitive bid for only the second time since the lab opened in 1943. The current LANS contract ends Sept 30, 2017. Identifying what went wrong, and why the lab has proven so difficult to manage, will play an important role for the Department of Energy as it seeks out new managers to run the lab. Investigators say the problems stem from repeated management weaknesses, the kind that were supposed to get fixed when the Department of Energy turned to private industry in 2006 to oversee the lab.

It was the first time the federal government had put the lab’s management up for bid, with the idea that a for-profit model, operating under an incentives-based contract, would fix the problems that haunted the nonprofit University of California, which had run the lab since World War II. ... experts, watchdog groups and former lab employees point to an array of problems, from a clash of cultures between the regimented and profit-driven Bechtel and the languorous, research-oriented university; to incentives that may have induced contractors to put a premium on meeting deadlines despite safety risks; to a mix of shoddy accountability and micromanagement on the part of the federal government.

The Almighty Buck

Exploit Vendor Zerodium Puts $100,000 Bounty On Flash's New Security Feature (softpedia.com) 46

An anonymous reader writes: Zerodium, the company that buys zero-day bugs from security researchers and then sells them forward to government intelligence agencies, has put out a new bounty, this one on Adobe's Flash Player. The exploit vendor is offering $100,000 to the first researcher that finds a similar zero-day bug, capable of avoiding Flash's newly-released isolated heap memory protection feature. Previously, Zerodium offered $1 million to a security researcher for a zero-day bug in Apple's iOS 9 operating system.
Books

A New, App-Based Format For Novels (theguardian.com) 48

HughPickens.com writes: The Guardian reports that Julian Fellowes, creator of Downton Abbey, plans to release his new novel, a historical drama set in London during the 1840s, in installments via an app. It's a tradition that dates back to Charles Dickens, but utilizes modern technology. Each of Belgravia's 11 chapters will be delivered on a weekly basis, and will come with multimedia extras including music, character portraits, family trees and an audio book version. "To marry the traditions of the Victorian novel to modern technology, allowing the reader, or listener, an involvement with the characters and the background of the story and the world in which it takes place, that would not have been possible until now, and yet to preserve within that the strongest traditions of storytelling, seems to me a marvelous goal and a real adventure," says Fellowes.

Publisher Jamie Raab says the format appealed to her precisely because of Fellowes's television background and his ability to keep audiences engaged in a story over months and even years. "I've always been intrigued by the idea of publishing a novel in short episodic bites. He gets how to keep the story paced so that you're caught up in the current episode, then you're left with a cliffhanger."

Space

Alpha Centauri Turns Out Not To Have a Planet After All. At Least, Not Yet (forbes.com) 72

StartsWithABang writes: In 2012, astronomers announced that the nearest star system to us, the Alpha Centauri system, possessed at least one exoplanet around it. A periodic signal that recurred just every 3.24 days was consistent with an Earth-sized exoplanet orbiting and gravitationally tugging on the second largest member of the star system: Alpha Centauri B. That planet, named Alpha Centauri Bb, turns out not to actually be there. A reanalysis of the data shows that a combination of stellar properties and the times at which the observations were made conspired to produce this spurious signal: a signal that goes away if the data is handled correctly. Accounting for everything correctly reveals something else of interest, a periodic 20-day signal, which may turn out — with better observations — to be Alpha Centauri's first exoplanet after all.
Power

Ukraine Power Outage May Be the First One Caused By Hackers (arstechnica.com) 56

bricko notes a report on what appears to be the first power outage known to have been caused by hackers: Highly destructive malware that infected at least three regional power authorities in Ukraine led to a power failure that left hundreds of thousands of homes without electricity last week, researchers said. ... On Monday, researchers from security firm iSIGHT Partners said they had obtained samples of the malicious code that infected at least three regional operators. They said the malware led to "destructive events" that in turn caused the blackout. If confirmed it would be the first known instance of someone using malware to generate a power outage.

Over the past year, the group behind BlackEnergy has slowly ramped up its destructive abilities. Late last year, according to an advisory from Ukraine's Computer Emergency Response Team, the KillDisk module of BlackEnergy infected media organizations in that country and led to the permanent loss of video and other content. The KillDisk that hit the Ukrainian power companies contained similar functions but was programmed to delete a much narrower set of data, ESET reported. KillDisk had also been updated to sabotage two computer processes, including a remote management platform associated with the ELTIMA Serial to Ethernet Connectors used in industrial control systems.

The Almighty Buck

How an IRS Agent Stole $1M From Taxpayers (onthewire.io) 145

Trailrunner7 writes: Few, if any, companies or government agencies store more sensitive personal information than the IRS, and consumers have virtually no insight into how that data is used and secured. But, as the results of a recent Justice Department investigation show, when you start poking around in those dark corners, you sometimes find very ugly things.

Beginning in 2008, a small group of people–including an IRS employee who worked in the Taxpayer Advocate Service section–worked a simple and effective scam that involved fake tax returns, phony refunds, dozens of pre-loaded debit cards, and a web of lies. The scheme relied upon one key ingredient for its success: access to taxpayers' personal information. And it brought the alleged perpetrators more than $1 million.

What sets this case apart is that the accused IRS employee, Nakeisha Hall, was tasked specifically with helping people who had been affected by some kind of tax-related identity theft or fraud.

Data Storage

Gene Roddenberry's Floppy Disks Recovered (pcworld.com) 241

Press2ToContinue writes: When Gene Roddenberry's computer died, it took with it the only method of accessing some 200 floppy disks of his unpublished work. To make matters worse, about 30 of the disks were damaged, with deep gouges in the magnetic surface. "Cobb said a few of the disks were formatted in DOS, but most of them were from an older operating system called CP/M. CP/M, or Control Program for Microcomputers, was a popular operating system of the 1970s and early 1980s that ultimately lost out to Microsoft's DOS. In the 1970s and 1980s it was the wild west of disk formats and track layouts, Cobb said. The DOS recoveries were easy once a drive was located, but the CP/M disks were far more work. " So what was actually on the disks? Lost episodes of Star Trek? The secret script for a new show? Or as Popular Science once speculated, a patent for a transporter?

Unfortunately, we still don't know. The Roddenberry estate hasn't commented yet, and the data recovery agency is bound by a confidentiality agreement.

Slashdot Top Deals