×
Software

Researchers Develop Surveillance System That Can Watch & Predict 106

hypnosec writes "Carnegie Mellon university researchers have developed a surveillance system that can not only recognize human activities but can also predict what might happen next. Scientists, through the Army-funded research dubbed Mind's Eye, have created intelligent software that recognizes human activities in video and can predict what might just happen next; sounding an alarm if it detects anomalous behavior. "
Canada

Canadian Researchers Create Wireless Charger For Electric Cars 179

An anonymous reader writes "University of British Columbia researchers have developed a wireless charging system for electric cars. It involves a spinning magnet beneath the parked vehicle which turns another magnet in the underside of the car. Charging takes four hours and is about 90% as efficient as plugging in. From the article: '"One of the major challenges of electric vehicles is the need to connect cords and sockets in often cramped conditions and in bad weather," says David Woodson, managing director of UBC Building Operations. "Since we began testing the system, the feedback from drivers has been overwhelmingly positive." Four wireless charging stations have been installed at UBC's building operations parking lot. Tests show the system is more than 90 per cent efficient compared to a cable charge. A full charge takes four hours and enables the vehicle to run throughout an eight-hour shift.'"
Networking

Ask Slashdot: Ideas For a Geek Remodel? 372

An anonymous reader writes "What would you do to 'go geek' if you had a major remodel on your hands? My wife and I are re-modeling my in-law's 3000 sq foot single-level house, and we're both very wired, tech-savvy individuals. We will both have offices, as well as TVs in the bedroom and dining room. My question to the community is: What would you do if you had 10-20,000 to spend for this kind of remodel project? What kind of hardware/firmware would you install? I'd love to have a digital 'command center' to run an LCD wall-calendar for the family, and be able to play my PS3 from anywhere in the house (ie, if everyone wants to watch Netflix while I'm in the middle of some Borderlands). What else have geeks done/planned to do? This is a test run for a much, much nicer house down the road, so don't be overly afraid of cost concerns for really great ideas. We will be taking most of the house down to studs, so don't factor demolition into costs. For culinary-minded geeks, I'd love any ideas you have to surprise my wife with cool kitchen gadgets or designs."
Google

To Google Friends Or Not To Google, That Is the Question 117

Hugh Pickens writes writes "Henry Alford writes that in an ideal world, we would all use Google to be better friends by having better recall and to research our new friends and acquaintances to get to know them better. 'It's perfectly natural and almost always appropriate,' says social anthropologist Kate Fox. 'Obviously, one is always going to have to be discreet when talking about what you've found. But our brains haven't changed since the Stone Age, and humans are designed to live in small groups in which everyone knows one another. Googling is an attempt to recreate a primeval, preindustrial pattern of interaction.' But the devil is in the details. If we tell a new friend that we've read her LinkedIn entry or her wedding announcement, it probably won't be perceived as trespassing, as long we bear no ulterior motives. If we happen to reveal that we've also read her long-ago abandoned blog about her cat, we're more likely to be seen as chronically bored than menacing. 'I'm so baffled by this idea that we're not supposed to Google people,' says Dean Olsher. 'Why would there be a line? Like everyone else is allowed to know something but I'm not?' But doesn't taking the google shortcut to a primeval, preindustrial pattern of recognition sometimes rob encounters of their inherent mystery or even get us in trouble? Tina Jordan, an executive in book publishing who has the same name as a former girlfriend of Hugh Hefner, says, 'I typically tell any blind dates before I meet them that they probably shouldn't Google my name, otherwise they'll be sorely disappointed when they meet me.'"
Canada

7.7 Magnitude Quake Hits British Columbia 65

schwit1 writes "A magnitude 7.7 earthquake hit Canada's Pacific coast province of British Columbia on Saturday night, the U.S. Geological Survey reported. The quake was centered 123 miles south-southwest of Prince Rupert at a depth of 6.2 miles. 'Earthquakes Canada said the quake in the Haida Gwaii region has been followed by numerous aftershocks as large as 4.6 and said a small tsunami has been recorded by a deep ocean pressure sensor. 'It was felt across much of north-central B.C., including Haida Gwaii, Prince Rupert, Quesnel, and Houston. There have been no reports of damage at this time,' the agency said in a statement on its website.'"
Canada

Canadian Police Want New Internet Surveillance Tools 64

danomac writes "Police agencies in Canada want to have better tools to do online surveillance. Bill C-30 was to include new legislation (specifically Section 34) that would give police access to information without a warrant. This can contain your name, your IP address, and your mobile phone number. This, of course, creates all sorts of issues with privacy online. The police themselves say they have concerns with Section 34. Apparently, the way it is worded, it is not just police that can request the information, but any government agent. Would you trust the government with this kind of power?"
Google

Google Nexus 4 Prototype Lost In a Bar 200

theodp writes "A little over a year ago, an iPhone 4s prototype walked into a San Francisco bar, prompting a controversial manhunt by a now-deceased Apple investigator and the SFPD. Now, Wired reports that a Nexus 4 prototype walked into a San Francisco bar last month, prompting Google to sic its security team on 'Sudsy,' a San Francisco bartender who notified Google that he'd found their phone, which was slated to make its debut at a since-cancelled Android event on Oct. 29. When the 'Google Police' showed up at the bar, Sudsy's co-worker sent the 'desperate' Google investigator on a wild goose chase which landed him in an under-siege SFPD Station, from which he and Sudsy's lawyer had to be escorted out of under the watch of police in full riot gear with automatic weapons so the pair could arrange a 1 a.m. pickup of the phone."
Government

Cash-Strapped States Burdened By Expensive Data Security Breaches 58

CowboyRobot writes "As budgets are pinched by reduced tax collection, many U.S. states are facing a possibility of not being able to handle the ever-increasing number of data breaches. 70% of state chief information security officers (CISOs) reported a data breach this year, each of which can cost up to $5M in some states. 'Cybersecurity accounts for about 1 to 2 percent of the overall IT budget in state agencies. ... 82 percent of the state CISOs point to phishing and pharming as the top threats to their agencies, a threat they say will continue in 2013, followed by social engineering, increasingly sophisticated malware threats, and mobile devices.' The full 2012 Deloitte-National Association of State Chief Information Officers (NASCIO) Cybersecurity Study is available online (PDF)."
The Internet

The Internet Archive Has Saved Over 10,000,000,000,000,000 Bytes of the Web 135

An anonymous reader writes "Last night, the Internet Archive threw a party; hundreds of Internet Archive supporters, volunteers, and staff celebrated that the site had passed the 10,000,000,000,000,000 byte mark for archiving the Internet. As the non-profit digital library, known for its Wayback Machine service, points out, the organization has thus now saved 10 petabytes of cultural material." The announcement coincided with the release of an 80-terabyte dataset for researchers and, for the first time, the complete literature of a people: the Balinese.
Security

Industrial Control Software Easily Hackable 194

jfruh writes "CoDeSys, a piece of software running on industrial control systems from hundreds of vendors, has been revealed to be easily hackable by security researchers, giving rise to a scenario where computer hacking could cross the line into the physical world. Worse, many of these systems are unneccessarily connected to the Internet, which is a terrible, terrible idea."
Canada

Canadian Teenager Arrested For Photographing Mall Takedown 770

blackfrancis75 writes "An aspiring teenage journalist in B.C., Canada who witnessed a mall takedown and decided to photograph it (using a real-film camera), was told to 'delete' the photo by security guards. He (quite legally) refused to do so, and when local police arrived they assisted mall security in pushing him to the ground, handcuffing him, cutting off his backpack with a utility knife and searching it. 'He said the security guards held him, attempting to grab his camera, and he was pushed to the ground. He said he then tried to use his body to protect two cameras he carried in his bag. "They're just yelling and screaming, and just telling me to stop resisting," Markiewicz said.'"
Space

Paintball Pellets As a Tool To Deflect Asteroids 153

A reader sends this quote from an article at MIT's Technology Review: "In the event that a giant asteroid is headed toward Earth, you'd better hope that it's blindingly white. A pale asteroid would reflect sunlight — and over time, this bouncing of photons off its surface could create enough of a force to push the asteroid off its course. How might one encourage such a deflection? The answer, according to an MIT graduate student: with a volley or two of space-launched paintballs. Sung Wook Paek, a graduate student in MIT's Department of Aeronautics and Astronautics, says if timed just right, pellets full of paint powder, launched in two rounds from a spacecraft at relatively close distance, would cover the front and back of an asteroid, more than doubling its reflectivity, or albedo. The initial force from the pellets would bump an asteroid off course; over time, the sun's photons would deflect the asteroid even more."
Networking

Cisco Pricing Undercut By $100M In Big Cal State University Network Project 220

alphadogg writes "The $100 million price differential between the Alcatel-Lucent and Cisco proposals to refresh California State University's 23-campus network revealed earlier this week was based on an identical number of switches and routers in various configurations. CSU allowed Network World to review spreadsheets calculating the eight-year total cost of ownership of each of the five bidders for the project. 'Everybody had to comply with this spreadsheet,' said CSU's director of cyberinfrastructure. 'Alcatel-Lucent won the project with a bid of $22 million. Cisco was the high bidder with a cost just under $123 million. Not only was Cisco's bid more than five-and-a-half times that of Alcatel-Lucent's, it was three times that of the next highest bidder: HP, at $41 million.'"
Businesses

Ask Slashdot: What To Do When Finding a Security Breach On Shared Hosting? 168

An anonymous reader writes "A few months ago I stumbled across an interesting security hole with my webhost. I was able to access any file on the server, including those of other users. When I called the company, they immediately contacted the server team and said they would fix the problem that day. Since all you need when calling them is your username, and I was able to list out all 500 usernames on the server, this was rather a large security breach. To their credit, they did patch the server. It wasn't a perfect fix, but close enough that moving to a new web host was moved down on my list of priorities. Jump a head to this week: they experienced server issues, and I asked to be moved to a different server. Once it was done, the first thing I did was run my test script, and I was able to list out everyone's files again. The hosting company only applied the patch to old server. I'm now moving off this web host all together. However, I do fear for the thousands of customers that have no clue about this security issue. With about 10 minutes of coding, someone could search for the SQL connection string and grab the username/password required to access their hosting account. What's the best way to handle this type of situation?"
Programming

Does Coding Style Matter? 479

theodp writes "Over at Smashing Magazine, Nicholas C. Zakas makes the case for Why Coding Style Matters. 'Coding style guides are an important part of writing code as a professional,' Zakas concludes. 'Whether you're writing JavaScript or CSS or any other language, deciding how your code should look is an important part of overall code quality. If you don't already have a style guide for your team or project, it's worth the time to start one.' So, how are coding style guidelines working (or not) in your world?"

Slashdot Top Deals