Forgot your password?
typodupeerror

Follow Slashdot stories on Twitter

Open Source

Slashdot Asks: Appropriate Place For Free / Open Source Software Artifacts? 16

Posted by timothy
from the you-haul dept.
A friend of mine who buys and sells used books, movies, etc. recently came purchased a box full of software on CD, including quite a few old Linux distributions, and asked me if I'd like them. The truth is, I would like them, but I've already collected over the last two decades more than I should in the way of Linux distributions, on at least four kinds of media (starting with floppies made from a CD that accompanied a fat book on how to install some distribution or other -- very useful in the days of dialup). I've got some boxes (Debian Potato, and a few versions of Red Hat and Mandrake Linux), and an assortment of marketing knickknacks, T-shirts, posters, and books. I like these physical artifacts, and they're not dominating my life, but I'd prefer to actually give many of them to someplace where they'll be curated. (Or, if they should be tossed, tossed intelligently.) Can anyone point to a public collection of some kind that gathers physical objects associated with Free software and Open Source, and makes them available for others to examine? (I plan to give some hardware, like a pair of OLPC XO laptops, to the same Goodwill computer museum highlighted in this video, but they probably don't want an IBM-branded radio in the shape of a penguin.)
Privacy

Hacking Team Manuals: Sobering Reminder That Privacy is Elusive 14

Posted by timothy
from the legitimacy-generally-is-too dept.
Advocatus Diaboli writes with a selection from The Intercept describing instructions for commercial spyware sold by Italian security firm Hacking Team. The manuals describe Hacking Team's software for government technicians and analysts, showing how it can activate cameras, exfiltrate emails, record Skype calls, log typing, and collect passwords on targeted devices. They also catalog a range of pre-bottled techniques for infecting those devices using wifi networks, USB sticks, streaming video, and email attachments to deliver viral installers. With a few clicks of a mouse, even a lightly trained technician can build a software agent that can infect and monitor a device, then upload captured data at unobtrusive times using a stealthy network of proxy servers, all without leaving a trace. That, at least, is what Hacking Team's manuals claim as the company tries to distinguish its offerings in the global marketplace for government hacking software. (Here are the manuals themselves.)
Businesses

Cutting the Cord? Time Warner Loses 184,000 TV Subscribers In One Quarter 207

Posted by timothy
from the jacked-up-my-bill-lately-too dept.
Mr D from 63 (3395377) writes Time Warner Cable's results have been buoyed recently by higher subscriber numbers for broadband Internet service. In the latest period, however, Time Warner Cable lost 184,000 overall residential customer relationships [Note: non-paywalled coverage at Bloomberg and Reuters]. The addition of 92,000 residential high-speed data customers was offset by 184,000 fewer residential video customers in the quarter. Triple play customers fell by 24,000, while residential voice additions were 14,000.
Security

Drupal Warns Users of Mass, Automated Attacks On Critical Flaw 47

Posted by timothy
from the big-targets-get-hit-first dept.
Trailrunner7 writes The maintainers of the Drupal content management system are warning users that any site owners who haven't patched a critical vulnerability in Drupal Core disclosed earlier this month should consider their sites to be compromised. The vulnerability, which became public on Oct. 15, is a SQL injection flaw in a Drupal module that's designed specifically to help prevent SQL injection attacks. Shortly after the disclosure of the vulnerability, attackers began exploiting it using automated attacks. One of the factors that makes this vulnerability so problematic is that it allows an attacker to compromise a target site without needing an account and there may be no trace of the attack afterward.
Android

Lenovo Completes Motorola Deal 45

Posted by timothy
from the capital-is-mobile dept.
SmartAboutThings writes If somehow you missed the reports of Lenovo buying Motorola – which was also bought by Google for $12.5 billion back in 2011 – then you should know that the deal is now complete. Lenovo has announced today that Motorola is now a Lenovo company — which makes Lenovo not only the number one PC maker in the world but also the third-largest smartphone maker.
Transportation

New Crash Test Dummies Reflect Rising American Bodyweight 77

Posted by timothy
from the my-self-esteem-has-certainly-taken-a-beating dept.
Ever thought that all those crash-test dummies getting slammed around in slow-motion were reflecting an unrealistic, hard-to-achieve body image? One company is acting to change that, with some super-sized (or right-sized) dummies more in line with current American body shapes: Plymouth, Michigan-based company Humanetics said that it has been manufacturing overweight crash test dummies to reflect growing obesity trends in the U.S. Humanetics has been the pioneer in crash test dummies segment since the 1950s. But now, the company's crash test dummies are undergoing a makeover, which will represent thicker waistlines and large rear ends of Americans.
Australia

Australian Gov't Tries To Force Telcos To Store User Metadata For 2 Years 42

Posted by timothy
from the authority-problem dept.
AlbanX writes The Australian Government has introduced a bill that would require telecommunications carriers and service providers to retain the non-content data of Australian citizens for two years so it can be accessed — without a warrant- by local law enforcement agencies. Despite tabling the draft legislation into parliament, the bill doesn't actually specify the types of data the Government wants retained. The proposal has received a huge amount of criticism from the telco industry, other members of parliament and privacy groups. (The Sydney Morning Herald has some audio of discussion about the law.)
Medicine

Ebola Forecast: Scientists Release Updated Projections and Tracking Maps 123

Posted by timothy
from the hashtag-ebola dept.
An anonymous reader writes Scientists of the Northeastern University, in collaboration with European scientists, developed a modeling approach aimed at assessing the progression of the Ebola epidemic in West Africa and its international spread under the assumption that the outbreak continues to evolve at the current pace. They also considered the impact of travel restrictions, and concluded that such restrictions may delay by only a few weeks the risk that the outbreak extends to new countries. Instead, travel bans could hamper the delivery of medical supplies and the deployment of specialized personnel to manage the epidemic. In the group's page, there's also an updated assessment of the probability of Ebola virus disease case importation in countries across the world, which was also invoked during the Congressional Ebola debate. The group also released a map with real-time tracking of conversations about Ebola on Twitter. Policy makers and first responders are the main target audience of the tool, which is able to show a series of potential warnings and events (mostly unconfirmed) related to Ebola spreading and case importation.
Space

MIT Professor Advocates Ending Asteroid Redirect Mission To Fund Asteroid Survey 76

Posted by samzenpus
from the identify-the-problem dept.
MarkWhittington writes Professor Richard Binzel published a commentary in the journal Nature that called for two things. He proposed that NASA cancel the Asteroid Redirect Mission currently planned for the early 2020s. Instead, he would like the asteroid survey mandated by the George E. Brown, Jr. Near-Earth Object Survey Act of 2005, part of the 2005 NASA Authorization Act, funded at $200 million a year. Currently NASA funds the survey at $20 million a year, considered inadequate to complete the identification of 90 percent of hazardous near-Earth objects 140 meters or greater by 2020 as mandated by the law.
Government

Labor Department To Destroy H-1B Records 146

Posted by samzenpus
from the removed-from-the-game dept.
Presto Vivace writes H-1B records that are critical to research and take up a small amount of storage are set for deletion. "In a notice posted last week, the U.S. Department of Labor said that records used for labor certification, whether in paper or electronic, 'are temporary records and subject to destruction' after five years, under a new policy. There was no explanation for the change, and it is perplexing to researchers. The records under threat are called Labor Condition Applications (LCA), which identify the H-1B employer, worksite, the prevailing wage, and the wage paid to the worker. The cost of storage can't be an issue for the government's $80 billion IT budget: A full year's worth of LCA data is less than 1GB."
Education

The Most Highly Cited Scientific Papers of All Time 62

Posted by samzenpus
from the popularity-contest dept.
bmahersciwriter writes Citation is the common way that scientists nod to the important and foundational work that preceded their own and the number of times a particular paper is cited is often used as a rough measure of its impact. So what are the most highly cited papers in the past century plus of scientific research? Is it the determination of DNA's structure? The identification of rapid expansion in the Universe? No. The top 100 most cited papers are actually a motley crew of methods, data resources and software tools that through usability, practicality and a little bit of luck have propelled them to the top of an enormous corpus of scientific literature.
United Kingdom

Secret Policy Allows GCHQ Bulk Access To NSA Data 85

Posted by samzenpus
from the have-some-data dept.
hazeii writes Though legal proceedings following the Snowden revelations, Liberty UK have succeeded in forcing GCHQ to reveal secret internal policies allowing Britain's intelligence services to receive unlimited bulk intelligence from the NSA and other foreign agencies and to keep this data on a massive searchable databases, all without a warrant. Apparently, British intelligence agencies can "trawl through foreign intelligence material without meaningful restrictions", and can keep copies of both content and metadata for up to two years. There is also mention of data obtained "through US corporate partnerships". According to Liberty, this raises serious doubts about oversight of the UK Intelligence and Security Committee and their reassurances that in every case where GCHQ sought information from the US, a warrant for interception signed by a minister was in place.

Eric King, Deputy Director of Privacy international, said: "We now know that data from any call, internet search, or website you visited over the past two years could be stored in GCHQ's database and analyzed at will, all without a warrant to collect it in the first place. It is outrageous that the Government thinks mass surveillance, justified by secret 'arrangements' that allow for vast and unrestrained receipt and analysis of foreign intelligence material is lawful. This is completely unacceptable, and makes clear how little transparency and accountability exists within the British intelligence community."
Cloud

Technology Group Promises Scientists Their Own Clouds 41

Posted by samzenpus
from the back-off-man-I'm-a-scientist dept.
jyosim writes On Tuesday, Internet2 announced that it will let researchers create and connect to their own private data clouds on the high-speed network (mainly used by colleges), within which they will be able to conduct research across disciplines and experiment on the nature of the Internet. The private cloud is thanks to a $10-million grant from the NSF. "They will have complete visibility into [the clouds] so they can really treat this as a scientific instrument and not a black box," the project's lead investigator told The Chronicle of Higher Education.
Google

Google Announces Project Ara Developer Conference, Shows Off First Prototype 58

Posted by samzenpus
from the save-the-date dept.
An anonymous reader writes Google today announced it will be hosting the second iteration of its Project Ara Module Developers Conference for its modular device project early next year. The first event will be in Mountain View on January 14, 2015, with satellite locations at Google offices in New York City, Buenos Aires, and London. The same agenda will be repeated in Singapore on January 21, 2015, with satellite locations at Google offices in Bangalore, Tokyo, Taipei, and Shanghai. The company also released a video showing off the first prototype from Project Ara. Until now, all we've seen so far are industrial design models. This one actually boots up.
Earth

Imagining the Future History of Climate Change 340

Posted by samzenpus
from the it's-getting-hot-in-here dept.
HughPickens.com writes "The NYT reports that Naomi Oreskes, a historian of science at Harvard University, is attracting wide notice these days for a work of science fiction called "The Collapse of Western Civilization: A View From the Future," that takes the point of view of a historian in 2393 explaining how "the Great Collapse of 2093" occurred. "Without spoiling the story," Oreskes said in an interview, "I can tell you that a lot of what happens — floods, droughts, mass migrations, the end of humanity in Africa and Australia — is the result of inaction to very clear warnings" about climate change caused by humans." Dramatizing the science in ways traditional nonfiction cannot, the book reasserts the importance of scientists and the work they do and reveals the self-serving interests of the so called "carbon combustion complex" that have turned the practice of science into political fodder.

Oreskes argues that scientists failed us, and in a very particular way: They failed us by being too conservative. Scientists today know full well that the "95 percent confidence limit" is merely a convention, not a law of the universe. Nonetheless, this convention, the historian suggests, leads scientists to be far too cautious, far too easily disrupted by the doubt-mongering of denialists, and far too unwilling to shout from the rooftops what they all knew was happening. "Western scientists built an intellectual culture based on the premise that it was worse to fool oneself into believing in something that did not exist than not to believe in something that did."

Why target scientists in particular in this book? Simply because a distant future historian would target scientists too, says Oreskes. "If you think about historians who write about the collapse of the Roman Empire, or the collapse of the Mayans or the Incans, it's always about trying to understand all of the factors that contributed," Oreskes says. "So we felt that we had to say something about scientists.""

If a listener nods his head when you're explaining your program, wake him up.

Working...