Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Censorship

South African Government Issues Plans To Censor Internet

Posted by Soulskill
from the not-learning-from-the-mistakes-of-others dept.
An anonymous reader writes: The South African department of communications is sitting on a draft paper drawn up by the local Film & Publication Board, which proposes strict regulation of the internet within in the country in order to bring online publishing inline with that of DVD, video and terrestrial TV ratings. The proposals are being called censorship and unconstitutional, and include plans to criminalize anyone who publishes material online — including uploading videos to YouTube — who doesn't pay a licence and submit to vetting by FPB agents.
Space

Strange Stars Pulse To the Golden Mean 36

Posted by Soulskill
from the math-is-beautiful dept.
An anonymous reader sends this excerpt from an article at Quanta Magazine: What struck John Learned about the blinking of KIC 5520878, a bluish-white star 16,000 light-years away, was how artificial it seemed. Learned, a neutrino physicist at the University of Hawaii, Mnoa, has a pet theory that super-advanced alien civilizations might send messages by tickling stars with neutrino beams, eliciting Morse code-like pulses. "It's the sort of thing tenured senior professors can get away with," he said. The pulsations of KIC 5520878, recorded recently by NASA's Kepler telescope, suggested that the star might be so employed.

A "variable" star, KIC 5520878 brightens and dims in a six-hour cycle, seesawing between cool-and-clear and hot-and-opaque. Overlaying this rhythm is a second, subtler variation of unknown origin; this frequency interplays with the first to make some of the star's pulses brighter than others. In the fluctuations, Learned had identified interesting and, he thought, possibly intelligent sequences, such as prime numbers (which have been floated as a conceivable basis of extraterrestrial communication). He then found hints that the star's pulses were chaotic. But when Learned mentioned his investigations to a colleague, William Ditto, last summer, Ditto was struck by the ratio of the two frequencies driving the star's pulsations. "I said, 'Wait a minute, that's the golden mean.'"
Open Source

Linux Kernel Adopts 'Code of Conflict' 30

Posted by Soulskill
from the be-excellent-to-each-other dept.
Motor was one of several readers to note that a small patch recently added to the Linux kernel contains guidelines for discourse and dispute resolution within the community. It's called the "Code of Conflict." Quoting: Your code and ideas behind it will be carefully reviewed, often resulting in critique and criticism. The review will almost always require improvements to the code before it can be included in the kernel. Know that this happens because everyone involved wants to see the best possible solution for the overall success of Linux. .... If however, anyone feels personally abused, threatened, or otherwise uncomfortable due to this process, that is not acceptable. ... As a reviewer of code, please strive to keep things civil and focused on the technical issues involved.
Transportation

Lawsuit Claims Major Automakers Have Failed To Guard Against Hackers 52

Posted by Soulskill
from the maybe-they'll-listen-when-lawyers-say-it dept.
Lucas123 writes: A Dallas-based law firm has filed a class-action lawsuit in the U.S. District Court for the Northern District of California claiming Ford, GM and Toyota all ignored basic electronic security measures that leave vehicles open to hackers who can take control of critical functions and endanger the safety of the driver and passengers. The suit, filed on behalf of three vehicle owners and "all others similarly situated" is seeking unspecified damages and an injunction that would force automakers to install proper firewalls or encryption in vehicle computer bus systems, which connect dozens of electronic control units. "Toyota, Ford and GM have deliberately hidden the dangers associated with car computer systems, misleading consumers," attorney Marc Stanley said. The lawsuit cites several studies revealing security flaws in vehicle electronics. A 2013 study by the Defense Advanced Research Projects Agency found researchers could make vehicles "suddenly accelerate, turn, [and] kill the brakes." A study released last month by Sen. Edward Markey (D-Mass.) also claims automakers have fallen far short in their responsibility to secure their vehicles' electronics.
Open Source

On Firing Open Source Community Members 100

Posted by Soulskill
from the can't-we-all-just-get-along dept.
An anonymous reader writes: As open source started booming, more people joined. Opinionated people. People who listened to the "we welcome everyone!" message and felt that their opinion could be their primary contribution. For some, they felt showing up at the gig gave them the right to dictate what the band played. From a leadership perspective, this was a tough spot to be in. On one hand, you want to foster an open, welcoming, and empowered community. You want that diversity of skills, but you also want value and quality. Low-quality contributors don't bring much other than noise: they are a net drain on resources because other good contributors have to take time away to support them.

In addition to this, those entitled, special-snowflakes who felt they deserved to be listened to would invariably start whining on their blogs about what they considered to be poor decisions. This caused heat in a community, heat causes sweating, sweating causes irritability, and irritability causes more angry blog posts. Critical blog posts were not the problem; un-constructive, critical blog posts were the problem. So what's the best way to foster a welcoming environment while still being able to remove the destructive elements?
Space

The Milky Way May Be 50 Percent Bigger Than Previously Thought 40

Posted by Soulskill
from the performance-enhancing-telescopes dept.
astroengine writes: A ring-like filament of stars wrapping around the Milky Way may actually belong to the galaxy itself, rippling above and below the relatively flat galactic plane. If so, that would expand the size of the known galaxy by 50 percent and raise intriguing questions about what caused the waves of stars. Scientists used data collected by the Sloan Digital Sky Survey to reanalyze the brightness and distance of stars at the edge of the galaxy. They found that the fringe of the disk is puckered into ridges and grooves of stars, like corrugated cardboard. "It looks to me like maybe these patterns are following the spiral structure of the Milky Way, so they may be related," said astronomer Heidi Newberg. In other Milky Way new, a Cambridge team has found nine new dwarf satellites orbiting our galaxy. Some of them are definitely dwarf galaxies, and the others may be the same, or globular clusters.
Businesses

Reactions to the New MacBook and Apple Watch 247

Posted by Soulskill
from the wrist-not-hip-enough dept.
As the dust settles from Apple's press conference yesterday, there have been a broad variety of reactions around the web. Robinson Meyer at The Atlantic says Apple's $10,000 watch demonstrates the company has lost its soul. "The prices grate. And they grate not because they’re so expensive, but because they’re gratuitously expensive. ... To many commentators, this is unsurprising. It’s good business sense, really. Apple has made its world-devouring profits by ratcheting up profit margins on iPhones. There is no better target for these massive margins than the super-rich. But high margins do not a luxury brand make." Others suspect the high-end watches are targeted more at rich people in China.

As for the less expensive watches, perhaps they're around not so much to become a new major sales category for Apple, but rather to drive more iPhone sales. Meanwhile, the redesigned MacBook may signify a bigger change for the laptop industry than people realize: "We don’t need all those other ports, Apple says. We are living in a wireless world now, where we can connect most of our peripherals without cords." The new MacBook has also fueled speculation that Apple could be working on a more powerful tablet, something that could compete with Microsoft's Surface Pro line.
Medicine

Sugar Industry Shaped NIH Agenda On Dental Research 40

Posted by Soulskill
from the persuasion-via-greenbacks dept.
sciencehabit writes: The sugar industry convinced the U.S. National Institutes of Health that studies that might persuade people to cut back on sugary foods should not be part of a national plan to fight childhood tooth decay, a new study of historical documents argues. The authors say the industry's activities, which occurred more than 40 years ago, are reminiscent of the tobacco companies' efforts to minimize the risks of smoking.
Programming

Was Linus Torvalds Right About C++ Being So Wrong? 343

Posted by Soulskill
from the harsh-language-about-a-harsh-language dept.
Nerval's Lobster writes: Perhaps the most famous rant against C++ came from none other than Linus Torvalds in 2007. "C++ is a horrible language," he wrote, for starters. "It's made more horrible by the fact that a lot of substandard programmers use it, to the point where it's much much easier to generate total and utter crap with it." He's not alone: A lot of developers dislike how much C++ can do "behind the scenes" with STL and Boost, leading to potential instability and inefficiency. And yet there's still demand for C++ out there. Over at Dice, Jeff Cogswell argues that C++ doesn't deserve the hatred. "I've witnessed a lot of 'over-engineering' in my life, wherein people would write reusable classes with several layers of inheritance, even though the reusable class wasn't actually used more than once," he wrote. "But I would argue that's the exception, not the norm; when done right, generic programming and other high-level aspects of C++ can provide enormous benefits." Was Linus going overboard?
Microsoft

Incomplete Microsoft Patch Left Machines Exposed To Stuxnet LNK Vulnerability 30

Posted by Soulskill
from the fixing-the-fix-that-fixed-not-much-at-all dept.
msm1267 writes: A five-year-old Microsoft patch for the .LNK vulnerability exploited by Stuxnet failed to properly protect Windows machines, leaving them exposed to exploits since 2010. Microsoft today is expected to release a security bulletin, MS15-020, patching the vulnerability (CVE-2015-0096). It is unknown whether there have been public exploits of patched machines. The original LNK patch was released Aug. 2, 2010. "That patch didn't completely address the .LNK issue in the Windows shell, and there were weaknesses left behind that have been resolved in this patch," said Brian Gorenc, manager of vulnerability research with HP's Zero Day Initiative. Gorenc said the vulnerability works on Windows machines going back to Windows XP through Windows 8.1, and the proof of concept exploit developed by Heerklotz and tweaked by ZDI evades the validation checks put in place by the original Microsoft security bulletin, CVE-2010-2568.
United Kingdom

UK ISPs Quietly Block Sites That List Pirate Bay Proxies 90

Posted by Soulskill
from the don't-link-to-sites-that-link-to-sites-that-link-to-unapproved-sites dept.
An anonymous reader tips news that six ISPs in the UK are now blocking sites that simply link to proxies for The Pirate Bay. This follows efforts from copyright holders to block access to the proxy sites themselves — which they've done to limited success through orders from the UK's High Court. [R]estricting access to proxies did not provide a silver bullet either as new ones continue to appear. This week the blocking efforts were stepped up a notch and are now targeting sites that merely provide an overview of various Pirate Bay proxies. ... One of the other blocked sites, piratebayproxy.co.uk, doesn’t have any direct links to infringing material. Instead, it provides an overview of short Pirate Bay news articles while listing the URLs of various proxies on the side. Apparently, providing information about Pirate Bay proxies already warrants a spot on the UK blocklist. ... It is not a secret that the High Court orders give copyright holders the option to continually update the list of infringing domains. However, it’s questionable whether this should also include sites that do not link to any infringing material.
Science

Scientists Insert a Synthetic Memory Into the Brain of a Sleeping Mouse 92

Posted by Soulskill
from the best-party-you-never-had dept.
the_newsbeagle writes: Scientists are learning how to insert fake memories into the brain via precise electrical stimulation (abstract). In the latest experiment, they gave sleeping mice a synthetic memory that linked a particular location in a test chamber to a pleasurable sensation. (At least they gave the mice a nice memory.)

The researchers first recorded the electrical signals from the mice's brains while the mice were awake and exploring the test chamber, until the researchers identified patterns of activity associated with a certain location. Then, when the mice slept, the researchers watched for those neural patterns to be replayed, indicating that the mice were consolidating the memory of that location. At that moment, they zapped a reward center of the mice's brains. When the mice awoke and went back into the chamber, they hung around that reward-associated location, presumably expecting a dose of feel-good.
Data Storage

Ask Slashdot: Video Storage For Time Capsule? 139

Posted by timothy
from the what-would-vint-cerf-do? dept.
New submitter dwywit, anticipating World Backup Day, writes I've been asked to film this year's ANZAC services in my town. This is a big one, as it's the centenary of the Gallipoli campaign, and dear to our hearts here in Oz. The organisers have asked me to provide a camera-to-projector setup for remote viewing (they're expecting big crowds this year), and a recording of the parade and various services throughout the morning. Copies will go to the local and state library as a record of the day, but they would also like a copy to go into a time capsule. I have two issues to solve: 1. a storage medium capable of lasting 50 or 100 years and still be readable, and 2. a wrapper/codec that will be available and usable when the capsule is opened. I have the feeling that a conversion to film might be the only way to satisfy both requirements — it's easy enough to build a projector, or even re-scan the images for viewing. Has anyone got a viable alternative? Cloud storage isn't an option — this is going underground in a stainless steel container. See also this similar question from 2008; how have the options changed in the meantime?
Cellphones

CIA Tried To Crack Security of Apple Devices 106

Posted by timothy
from the hey-fellas-we-were-expecting-you dept.
According to a story at The Guardian passed on by an anonymous reader, The CIA led sophisticated intelligence agency efforts to undermine the encryption used in Apple phones, as well as insert secret surveillance back doors into apps, top-secret documents published by the Intercept online news site have revealed. he newly disclosed documents from the National Security Agency's internal systems show surveillance methods were presented at its secret annual conference, known as the "jamboree."
Government

Secret Service Testing Drones, and How to Disrupt Them 58

Posted by timothy
from the for-us-but-not-for-you dept.
schwit1 writes with this news from the Associated Press: Mysterious, middle-of-the-night drone flights by the U.S. Secret Service during the next several weeks over parts of Washington — usually off-limits as a strict no-fly zone — are part of secret government testing intended to find ways to interfere with rogue drones or knock them out of the sky, The Associated Press has learned.

A U.S. official briefed on the plans said the Secret Service was testing drones for law enforcement or protection efforts and to look for ways, such as signal jamming, to thwart threats from civilian drones. The drones were being flown between 1 a.m. and 4 a.m. The official spoke on condition of anonymity because this person was not authorized to publicly discuss the plans. The Secret Service has said details were classified. ... The challenge for the Secret Service is quickly detecting a rogue drone flying near the White House or the president's location, then within moments either hacking it to seize control over its flight or jamming its signal to send it off course or make it crash.