Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

+ - 229 Patent trolls getting the attention of the Feds-> 1

Submitted by crazyvas
crazyvas (853396) writes "The New York Times has published an article on the FTC which is planning to investigate the patent system, and likely patent trolls such as Intellectual Ventures. From the article: 'To its defenders, Intellectual Ventures is a revolutionary company unfairly viewed, in the words of its co-founder Peter N. Detkin, “as the poster child of everything that is wrong with the patent system.” To its critics, it is a protection racket otherwise known as a patent troll. This summer, the Federal Trade Commission is expected to begin a sweeping investigation of the patent system after the agency’s chairwoman, Edith Ramirez, urged a crackdown. She has singled out a particular kind of miscreant, one that engages in “a variety of aggressive litigation tactics,” including hiding behind shell companies when it sues.'

How does Intellectual Ventures describe itself? See for yourself here."

Link to Original Source

+ - 236 Ask Slashdot: Scientific Research Positions for Programmers?

Submitted by Anonymous Coward
An anonymous reader writes "I recently (within the past couple years) graduated from college with a bachelor's degree in Computer Science and currently work as a programmer for a large software consulting firm. However, I've become gradually disillusioned with the financial-obsession of the business world and would like to work for the overall betterment of humanity instead. With that in mind, I'm looking to shift my career more toward the scientific research side of things. My interest in computer science always stemmed more from a desire to use it toward a fascinating end — such as modeling or analyzing scientific data — than from a love of business or programming itself. My background is mostly Java, with some experience in C++ and a little C. I have worked extensively with software analyzing big data for clients. My sole research experience comes from developing data analysis software for a geologic research project for a group of grad students; I was a volunteer but have co-authorship on their paper, which is pending publication.

Is it realistic to be looking for a position as a programmer at a research institution with my current skills and experiences? Do such jobs even exist for non-graduate students? I'm willing to go to grad school (probably for geology) if necessary. Grad school aside, what specific technologies should I learn in order to gain an edge? Although if I went back to school I'd focus on geology, I'm otherwise open to working as a programmer for any researchers in the natural sciences who will take me."

+ - 151 Seventy Videos From Linaro Connect Europe 2013->

Submitted by DeviceGuru
DeviceGuru (1136715) writes "Linaro has just published videos and slides from keynotes, technical presentations, and panel discussions at last week's Linaro Connect Europe 2013 event held in Dublin, Ireland. Linaro is a nonprofit organization focused on consolidating and optimizing open source software for the ARM architecture, including the GCC toolchain, the Linux kernel, ARM power management, graphics and multimedia interfaces. The conference's sessions spanned a wide range of topics, including Android, Builds and Baselines, Enterprise, Graphics and Multimedia, Linux Kernel, Network, Project Management Tools, Training, and more."
Link to Original Source

+ - 174 Red Planet Riviera: Ancient Mars Ocean Found?->

Submitted by astroengine
astroengine (1577233) writes "With the help of rover Curiosity, we now know that ancient Mars had large quantities of liquid water flowing across its surface. However, evidence for large bodies of water — i.e. seas/oceans — has been hard to come by. But using high-resolution orbital data, Caltech scientists now think they’ve found a long-dry river delta that once flowed into a very large body of water. Welcome to the Aeolis Riviera — the strongest evidence yet for a Martian coastline. “This is probably one of the most convincing pieces of evidence of a delta in an unconfined region — and a delta points to the existence of a large body of water in the northern hemisphere of Mars,” said Roman DiBiase, Caltech postdoctoral scholar and lead author of the paper that was published in the Journal of Geophysical Research."
Link to Original Source

+ - 176 Office 365, Amazon, others vulnerable to exploit Microsoft knew about in 2012

Submitted by colinneagle
colinneagle (2544914) writes "Ethical hacking professor Sam Bowne recently put a cookie re-use method to test on several major web services, finding that Office 365, Yahoo mail, Twitter, LinkedIn, Amazon, eBay, and WordPress all failed the security test. Both Amazon and eBay can be tied directly to your money via the method of payment you have on record. And, just for kicks, we tried it with Netflix. And it worked.

Microsoft has apparently known that accounts can be hijacked since at least 2012 when The Hacker News reported the Hotmail and Outlook cookie-handling vulnerability, so Bowne was curious if Microsoft closed the hole or if stolen cookies could still be re-used. He claims he "easily reproduced it using Chrome and the Edit This Cookie extension."

Bowne is asking other people to test more services and tweet the results to him @sambowne."

+ - 159 Piracy Rates Plummet as Legal Alternatives Find Norway

Submitted by jones_supa
jones_supa (887896) writes "Entertainment industry groups in Norway have spent years lobbying for tougher anti-piracy laws, finally getting their way earlier this month. But with fines and site blocking now on the agenda, an interesting trend has been developing. According to a new report published by Ipsos, between 2008 and 2012 piracy of movies and TV shows collapsed in Norway, along with music seeing a massive drop to less than one fifth of the original level. Olav Torvund, former law professor at the University of Oslo, attributes this to good legal alternatives which are available today. Of those questioned for the survey, 47% (representing around 1.7 million people) said they use a streaming music service such as Spotify. And of those, just over half said that they pay for the premium option."

+ - 173 Small, electric-powered nano-lasers may help keep Moore's Law valid->

Submitted by coondoggie
coondoggie (973519) writes "Some experts believe that the idea behind Moore’s Law — that the number of transistors embedded on integrated circuits would double about every two years — will ultimately fail as the difficulty of shrinking such technology any smaller will cause all sorts of untenable problems. But a research team with Arizona State University this week said a seven year project has culminated with an electrically powered nano-laser that would let developers put ever more lasers into the same space, to achieve far greater processing speeds and ultimately making it makes possible to build future generations of computers that would comply with the Moore’s Law theory."
Link to Original Source

+ - 216 EFF Sues NSA, Justice Department, FBI

Submitted by Jawnn
Jawnn (445279) writes "The Washington Post reports that the EFF has filed suit in Federal Court in San Francisco, on behalf of multiple groups. Those groups include, "...Rights activists, church leaders and drug and gun rights advocates..." Apparently, not everyone out there is believing the "If you have nothing to hide..." excuses being offered up from various government quarters."

+ - 259 10 Sci-Fi Stories That Predicted the Surveillance State->

Submitted by Daniel_Stuckey
Daniel_Stuckey (2647775) writes "Just to address one thing straight away: one of your favorite science fiction stories dealing, whether directly or indirectly, with surveillance is bound to be left off this list. And 1984's a given, so it's not here.

At any rate, the following books deal in their own unique way with surveillance. Some address the surveillance head-on, while others speculate on inter-personal intelligence gathering, or consider the subject in more oblique ways. Still others distill surveillance down to its essence: as just one face of a much larger, all-encompassing system of control, that proceeds from the top of the pyramid down to its base.
"

Link to Original Source

+ - 210 W3C Rejects Ad Industry's Do-Not-Track Proposal->

Submitted by itwbennett
itwbennett (1594911) writes "The W3C's Tracking Protection Working Group, which is mainly concerned with standardizing the mechanisms for server-side compliance with do-not-track requests, has rejected a proposal by from the Digital Advertising Alliance (DAA) that would have allowed advertisers to continue profiling users who had asked not to be tracked. The proposal would also have allowed them to 'retarget' ads to those users by showing ads relevant to one site or transaction on all subsequent sites they visited, according to the co-chairs of the W3C's Tracking Protection Working Group. The working group co-chairs also said that they planned to reject proposals similar to those made by the DAA."
Link to Original Source

+ - 192 Students, Start-Up Team To Create Android APK Patch App->

Submitted by chicksdaddy
chicksdaddy (814965) writes "The saga of the application-signing flaw affecting Google’s Android mobile phones (https://securityledger.com/2013/07/flaw-leaves-900m-android-devices-vulnerable/) took another turn Tuesday when a Silicon Valley startup teamed with graduate students from Northeastern University in Boston to offer their own fix-it tool for hundreds of millions of Android phones that have been left without access to Google’s official patch.

Duo Security announced the availability of an Android utility dubbed “ReKey” (http://www.rekey.io/) on Tuesday. The tool allows Droid users to patch the so-called “Master Key” vulnerability on Android devices, even in the absence of a security update from Android handset makers (OEMs) and carriers who service the phones, according to a post on the Duo Security blog.

In an e-mail exchange with The Security Ledger, Jon Oberheide, the CTO of Duo Security, said that ReKey provides an in-memory patch for the master key vulnerability, dynamically instrumenting the Dalvik bytecode routines where the vulnerability originates, patching it in-memory. Oberheide said that ReKey will also”hook” (or monitor) those routines to notify you if any malicious applications attempt to exploit the vulnerability.

Despite the availability of a patch since March, many Android users remain vulnerable to attacks that take advantage of the application signing flaw. That is because Android handset makers have been slow to issue updates for their Droid handsets. For platforms (HTC and Samsung) that have been patched, carriers delayed the rollout to customers further.

“The security of Android devices worldwide is paralyzed by the slow patching practices of mobile carriers and other parties in the Android ecosystem,” said Oberheide. However, the fragmentation of the Android ecosystem is significant enough that it is no longer feasible for Google to take over responsibility for distributing patches. Third parties may need to step in to fill the void."

Link to Original Source

+ - 202 New Thermocell could turn 'Waste Heat' into Electricity->

Submitted by dryriver
dryriver (1010635) writes "Harvesting waste heat from power stations and even vehicle exhaust pipes could soon provide a valuable supply of electricity. A small team of Monash University researchers working under the Australian Research Council (ARC) Centre of Excellence for Electromaterials Science (ACES) has developed an ionic liquid-based thermocell. Thermocell technology is based on harnessing the thermal energy from the difference in temperature between two surfaces and converting that energy into electricity. The new thermocell could be used to generate electricity from low grade steam in coal fired power stations at temperatures around 130C. This would be implemented by having the steam pass over the outer surface of the hot electrode to keep it hot while the other electrode is air or water cooled."
Link to Original Source

+ - 196 Describe any location on earth in 3 words

Submitted by jameshumphreys
jameshumphreys (2985945) writes "London startup what3words has successfully launched a new website which has carved the world map into almost 57 trillion 3m x 3m squares, assigning each square a simple, unique 3 word address. For instance, the 'what3words' for the famous Peter Pan statue in London’s Hyde Park is ‘union.prop.enjoy’. This means you can easily describe even remote locations with great precision. CEO, Chris Sheldrick, says "We see our service being most useful where current methods of describing location (e.g. postcodes or ZIP codes) don’t do the job well enough or don’t do the job at all — but of course it has applications as a preferred alternative even where the existing solutions do a decent job, but perhaps less precise/customised than w3w."
An API is planned "in the coming weeks"."

+ - 191 Hurricane Sandy A 1-in-700-Year Event Says NASA Study->

Submitted by Rebecka
Rebecka (2914231) writes "Hurricane Sandy, which pelted multiple states in Oct. and created billions of dollars in damage, was a freak occurrence and not an indication of future weather patterns according to NASA's Goddard Institute for Space Studies via LiveScience. The study, which calculated a statistical analysis of the storms trajectory and monitored climate changes’ influences on hurricane tracks, claims that the tropical storm was merely a 1-in-700-year event.

"The particular shape of Sandy's trajectory is very peculiar, and that's very rare, on the order of once every 700 years," said senior scientist at NASA and study co-author, Timothy Hall. According to Hall, the extreme flooding associated with the storm was also due to the storm’s trajectory which was described as being “near perpendicular.” The storm’s unusual track was found to have been caused by a high tides associated with a full moon and high pressure that forced the storm to move off the coast of the Western North Atlantic."

Link to Original Source

+ - 166 America's First Eco-City: Doomed From the Start->

Submitted by Anonymous Coward
An anonymous reader writes "Despite backing from the Clinton Climate Initiative, and a $111 million investment from Subway Restaurant mogul Fred DeLuca, a planned city for Central Florida called "Destiny" was doomed from the start, according to memos retrieved from Florida's Department of Community Affairs. According to state officials, despite a great deal of hype about Destiny, Florida, becoming the first fully sustainable city in the US, plans to build the city were rejected almost immediately due to concerns over "possible urban sprawl, energy inefficient land use patterns, the endangerment of natural resources, and the undermining of agriculture.""
Link to Original Source

+ - 146 Visual Studio vs. Eclipse: A Programmer's Comparison->

Submitted by Nerval's Lobster
Nerval's Lobster (2598977) writes "Developer and editor Jeff Cogswell is back with a comparison of Eclipse and Visual Studio, picking through some common complaints about both platforms and comparing their respective features. "First, let’s talk about usability," he writes, "and let’s be frank: Neither Eclipse nor Visual Studio is a model for sound usability." That being said, as an open-source project, Eclipse wins some points for its customizability and compatibility with languages; it's more difficult to modify Visual Studio to meet some programmer needs, which has led to any number of abandoned projects over the years. Microsoft choosing to eliminate macros in recent versions of Visual Studio has also led to some programmer frustrations (and a need for external tools). "A developer with sufficient skills can be productive in both Visual Studio and Eclipse, although each platform has its own aggravations," he concludes. "But in the end, both can get the job done." Read on for a more extensive comparison of features, as well as some discussion about whether IDEs are really helping programmers all that much. What do you think?"
Link to Original Source

+ - 151 How to compete with NSA by hacking a Verizon network extender

Submitted by Anita Hunt (lissnup)
Anita Hunt (lissnup) (2913179) writes "This snooping hack-in-a-backpack could become a hot Summer accessory, since Reuters reported that "researchers at iSec hacked into a Verizon network extender, which anyone can buy online, and turned it into a cell phone tower small enough to fit inside a backpack capable of capturing and intercepting all calls, text messages and data sent by mobile devices within range" complete with video interview"

+ - 220 HBO Asks Google to Take Down "Infringing" VLC Media Player-> 1

Submitted by another random user
another random user (2645241) writes "It’s no secret that copyright holders are trying to take down as much pirated content as they can, but their targeting of open source software is something new. In an attempt to remove pirated copies of Game of Thrones from the Internet, HBO sent a DMCA takedown to Google, listing a copy of the popular media player VLC as a copyright infringement. An honest mistake, perhaps, but a worrying one.


Usually these notices ask Google to get rid of links to pirate sites, but for some reason the cable network also wants Google to


The same DMCA notice also lists various other links that don’t appear to link to HBO content, including a lot of porn related material, Ben Harper’s album Give Till It’s Gone, Naruto, free Java applets and Prince of Persia 5."

Link to Original Source

+ - 198 Arizona Republicans Propose Bill That Would Not Allow Atheists Graduate->

Submitted by Anonymous Coward
An anonymous reader writes "the republicans in AZ are trying to force kids to swear an oath to get a diploma.

A quote from the proposed bill Arizona House Bill 2467
"Beginning in the 20132014 school year, In addition to fulfilling the course of study and assessment requirements prescribed in this chapter, before a pupil is allowed to graduate from a public high school in this state, the principal or head teacher of the school shall verify in writing that the pupil has recited the following oath:

I, _________, do solemnly swear that I will support and defend the Constitution of the United States against all enemies, foreign and domestic, that I will bear true faith and allegiance to the same; that I take this obligation freely, without any mental reservation or purpose of evasion; and that I will well and faithfully discharge these duties; So help me God. ""

Link to Original Source

+ - 192 Automatically sanitising PDF email attachments

Submitted by supachupa
supachupa (823309) writes "It seems the past couple of years that spearfishing is getting very convincing and it is becoming more and more likely someone (including myself) will accidentally click on a PDF attachment with malicious javascript embedded. It would be impossible to block PDFs as they are required for business. We do disable javascript on Adobe reader, but I would sleep a lot better knowing the code is removed completely.

I have looked high and low but could not find a cheap out of the box solution or a "how to" guide for automatically neutralising PDFs by stripping out the javascript. The closest thing I could find is using PDF2PS and then reversing the process with PS2PDF.

I wonder if any of you slashies have worked a solution for this that is not too complex, works preferably at the SMTP relay, and can work with ZIPed PDFs as well, or otherwise have some common sense advice for dealing with this so that once its in place, there is no further action required by myself or by users."

We don't know who it was that discovered water, but we're pretty sure that it wasn't a fish. -- Marshall McLuhan

Working...