Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
It's funny.  Laugh.

Submission + - 'Nerd Auction' May Get Nerds Some Sorority Dates (cnn.com)

PJ1216 writes: "Looks like a few guys from the Linux Users Group at Washington State University may be lucky enough to date some sorority girls if all goes well. From the article, "Looking to recruit more women, and perhaps date some sorority women, the largest computer club at Washington State University hopes to hold a 'nerd auction.'" The nerds will "fix your computer, help you with stats homework, or if you're really adventurous, take you to dinner!" according to a statement from Ben Ford on their web site. Maybe sorority girls buying computer nerds will catch on?"
Handhelds

Submission + - Nokie threatens to blow iPhone away (peterjudge.com)

judgecorp writes: "Nokia didn't mention Apple at its Go Play launch in London — it didn't have to. The new Ovi service is, as predicted, a revived version of N-Gage, but it's also a combined music, games and location service, designed to let users get content and interact through both PCs and mobiles. The company also has some new phones that seem to address all the criticisms of the iPhone — they have 3G and they are open to developers, and they'll also do the touch-screen, 3D menu thing. Given Nokia is the largest consumer durable maker in the world, with a 900 million-strong truly global user base, I'd say Apple better watch out!"
Security

Submission + - Real Spiderman coming to a ceiling near you (networkworld.com) 1

coondoggie writes: "Italian researchers today said they have formulated a substance that mimics spider and Gecko sticking power that they claim are strong enough to suspend a person's full body weight against a wall or on a ceiling. University of California, Berkeley researchers are also developing sticky technology they say will support heavy weight on smooth surfaces. First, Italian researcher Nicola Pugno, an engineer and physicist at Polytechnic of Turin, Italy said he has come up with formulas for using carbon nanotubes to make superadhesive gloves and boots that could be used in the future to create a super sticky suit ala Spiderman. He said the same technology could be used to build invisible cables that could act as super-strong cobwebs. http://www.networkworld.com/community/node/18865"
The Courts

Submission + - UK police screw up evidence chain in error trial (bbc.co.uk) 1

Peil writes: "A total of five charges have been brought against 21-year-old Mohammed Atif Siddique, from Clackmannanshire, under the Terrorism Act of 2000.

It has been alleged that he had several articles in his possession which gave rise to a "reasonable suspicion" of a connection with a potential act of terrorism. These included documents containing terrorist propaganda, bomb making instructions and surveillance techniques.

The court heard the machine had been seized from Mr Siddique at Glasgow Airport in April last year. A report a forensic analyst with the e-crime unit attached to the police, stated it had been turned on before he examined it.

From the article: "An initial examination of this system revealed it was last activated between approximately 2219 BST and 2330 BST on 5 April 2006. "This immediately struck us as being unusual as we were informed that the computer had been seized from the accused's possession at about 2000 BST the same date."

Further examination revealed that the times and dates associated with more than 200 files on the system had been updated between these times.

Looks like any decent lawyer just blew away the chain of evidence, idiots."

Businesses

Submission + - Day-to-day IT challenges are biggest headache for (connect.co.uk)

Mark Houlding writes: "PRESS RELEASE London, 29th August, 2007 Day-to-day IT challenges are biggest headache for UK SMEs says new research from Connect www.connect.co.uk Connect, the IT support company for small to medium-sized businesses, today releases new research showing that everyday IT problems are the biggest headache for SMEs in the UK. The research project, which polled 200 IT managers and directors, found that 37% of UK SMEs said that regular IT hassles were their biggest headache. Their second biggest worry was IT security — 32% identified this as a major problem. However, security was more of a problem for smaller businesses (those with less than 50 employees) — 35% of these firms said security was one of their top two headaches, as opposed to just 27% of the larger firms (those with 50-250 employees). Mark MacGregor, Connect's Chief Executive said: "Much of the IT debate currently revolves around what we'd call 'big ticket' items — concepts like mobile working, Web 2.0 or open source software dominate the news agenda for IT. While we're certainly not dismissing those concepts, the reality is that for the entrepreneurs and owner-managers that drive much of the innovation and growth in our economy, the issues are really much simpler. They just want robust, cost-effective IT systems that actually work. One of the challenges we need to address as an industry is how we can deliver more of that type of IT to this vital part of UK plc." The other key issues cited by the companies surveyed also related to 'day-to-day' IT issues, for instance: 30% cited lack of understanding by staff in use of IT as one of their two biggest IT headaches. However, while only 20% of smaller (less than 50 employees) companies perceived this to be a problem, the comparable figure for companies with 51-250 employees was 42% 27% cited cost as one of their two biggest headaches (30% of this was from the smaller companies, just 22% from the larger players); MacGregor continues: "Although there is widespread agreement as to the critical issues, there are some revealing discrepancies between the smaller ( 50 employees) and the bigger firms (51-250). It's not unexpected to see that the smaller firms are more worried about cost — but it is surprising to find that bigger firms are more worried than smaller firms that their staff do not understand IT. You'd expect bigger firms to have larger training budgets — so there's a clear disconnect there in terms of how the larger firms we spoke to communicate with employees and develop their IT skills. "Also, 19% of all of those surveyed see email/internet downtime as a one of their top two headaches — but it's much more of an issue for the smaller companies (24%) than the bigger ones (12%). Again, the IT supply industry needs to assess this kind of discrepancy carefully and to find better ways to ensure that small companies have the internet and email tools they need to run and expand their businesses." ...ends... About Connect: Connect has been providing IT support to a range of small and mid sized companies since 1993. The company has grown rapidly and now has over 300 different clients across the UK and abroad. Connect provides a variety of IT services including helpdesk and on-site support, project management and business continuity. The company is based at Canary Wharf in London with on-site engineers based at different locations across the world. For further enquiries please email mark.macgregor@connect.co.uk or visit the web at www.connect.co.uk. The survey was conducted by Vanson Bourne on behalf of Connect between June-July 2007. The research company questioned 200 IT Directors and Managers from companies and organisations ranging from 5 to 250 employees across the UK. Press / Media enquiries please contact: Suzy Fish PR Consultant to Connect Rostrum Communications suzy@rostrumpr.com 020 7749 7301 / 07931 456 214"
Security

Submission + - DoJ Hides National Security Records. (cryptome.org)

Sniper223 writes: "On May 8, 2007, at 72 FR 26037, the Department of Justice
issued a proposed rule to amend Title 28 of the Code of Federal
Regulations, Part 16, to exempt the following new system of records
from certain provisions of the Privacy Act: The National Security
Division (NSD), ``Foreign Intelligence and Counterintelligence Records
System (JUSTICE/NSD-001),'' which incorporated three previous systems
of records of the Office of Intelligence Policy and Review (OIPR). This
records system must be exempted from sections of the Privacy Act since,
in most cases, disclosure of the existence of records pertaining to an
individual would hinder authorized United States intelligence
activities by informing that individual of the existence, nature, or
scope of information that is properly classified pursuant to Executive
Order 12958, as amended, and thereby cause damage to the national
security. Further it is necessary to exempt this system to ensure
unhampered and effective collection and analysis of foreign
intelligence and counterintelligence information and to protect the
identities of confidential sources.

EFFECTIVE DATE: This final rule is effective August 8, 2007.

FOR FURTHER INFORMATION CONTACT: GayLa Sessoms, (202) 616-5460 or Mary
Cahill (202) 307-1823.

SUPPLEMENTARY INFORMATION: The notice of the proposed rule with
invitation to comment was published in the Federal Register on May 8,
2007, at 72 FR 26073. No comments were received. The Department of
Justice is exempting JUSTICE/NSD-001 from 5 U.S.C. 552a(c)(3) and (4);
(d); (e)(1), (2), (3), (4)(G), (H), and (I), (5) and (8); (f); (g); and
(h).
        This order relates to individuals rather than small business
entities. Nevertheless, pursuant to the requirements of the Regulatory
Flexibility Act, 5 U.S.C. 601-612, this order will not have a
significant impact on a substantial number of small business entities.

List of Subjects in 28 CFR Part 16

        Administrative Practices and Procedures, Courts, Freedom of
Information, and Privacy.

0
Pursuant to the authority vested in the Attorney General by 5 U.S.C.
552a and delegated to me by Attorney General Order No. 793-78, amend 28
CFR part 16 as follows:

PART 16 — PRODUCTION OR DISCLOSURE OF MATERIAL OR INFORMATION

0
1. The authority for part 16 continues to read as follows:

        Authority: 5 U.S.C. 301, 551, 552a, 552b(g), and 553; 18 U.S.C.
4203(a)(1); 28 U.S.C. 509, 510, 534; 31 U.S.C. 3717, and 9701.

0
2. Section 16. 74 is revised to read as follows:

Sec. 16.74 Exemption of National Security Division Systems — limited
access.

        (a) The following system of records is exempted from subsections
(c)(3) and (4); (d); (e)(1), (2), (3), (4)(G),(H) and (I), (5) and (8);
(f); (g); and (h) of the Privacy Act pursuant to 5 U.S.C. 552a(j)(2),
(k)(1), (2) and (5): Foreign Intelligence and Counterintelligence
Records System (JUSTICE/NSD-001). These exemptions apply only to the
extent that information in the system is subject to exemption pursuant
to 5 U.S.C. 552a(j)(2), (k)(1), (2), and (5).
        (b) Exemptions from the particular subsections are justified for
the following reasons:
        (1) Subsection (c)(3). To provide the target of a surveillance or
collection activity with the disclosure accounting records concerning
him or her would hinder authorized United States intelligence
activities by informing that individual of the existence, nature, or
scope of information that is properly classified pursuant to Executive
Order 12958, as amended, and thereby cause damage to the national
security.
        (2) Subsection (c)(4). This subsection is inapplicable to the
extent that an

[[Page 44383]]

exemption is being claimed for subsection (d).
        (3) Subsection (d)(1). Disclosure of foreign intelligence and
counterintelligence information would interfere with collection
activities, reveal the identity of confidential sources, and cause
damage to the national security of the United States. To ensure
unhampered and effective collection and analysis of foreign
intelligence and counterintelligence information, disclosure must be
precluded.
        (4) Subsection (d)(2). Amendment of the records would interfere
with ongoing intelligence activities thereby causing damage to the
national security.
        (5) Subsections (d)(3) and (4). These subsections are inapplicable
to the extent exemption is claimed from (d)(1) and (2).
        (6) Subsection (e)(1). It is often impossible to determine in
advance if intelligence records contained in this system are relevant
and necessary, but, in the interests of national security, it is
necessary to retain this information to aid in establishing patterns of
activity and provide intelligence leads.
        (7) Subsection (e)(2). Although this office does not conduct
investigations, the collection efforts of agencies that supply
information to this office would be thwarted if the agencies were
required to collect information with the subject's knowledge.
        (8) Subsection (e)(3). To inform individuals as required by this
subsection could reveal the existence of collection activity and
compromise national security. For example, a target could, once made
aware that collection activity exists, alter his or her manner of
engaging in intelligence or terrorist activities in order to avoid
detection.
        (9) Subsections (e)(4)(G), (H) and (I), and (f). These subsections
are inapplicable to the extent that this system is exempt from the
access provisions of subsection (d).
        (10) Subsection (e)(5). It is often impossible to determine in
advance if intelligence records contained in this system are accurate,
relevant, timely and complete, but, in the interests of national
security, it is necessary to retain this information to aid in
establishing patterns of activity and providing intelligence leads.
        (11) Subsection (e)(8). Serving notice could give persons
sufficient warning to evade intelligence collection and anti-terrorism
efforts.
        (12) Subsections (g) and (h). These subsections are inapplicable to
the extent that this system is exempt from other specific subsections
of the Privacy Act.

        Dated: July 27, 2007.
Lee J. Lofthus,
Assistant Attorney General for Administration.
  [FR Doc. E7-15455 Filed 8-7-07; 8:45 am]

BILLING CODE 4410-AW-P"

Microsoft

Submission + - Vista SP1 picked apart: performance increases (apcmag.com) 1

SlinkySausage writes: "APCmag.com has obtained the Vista SP1 beta and taken it apart, analysing all the changes it makes to Vista's codebase and the registry. The update includes hundreds of install packages, many of which have not been released via Windows Update. And APC says there are significant performance increases, which will fuel the fires of critics who said Microsoft released Vista too early. Amusingly, the paths to Microsoft's internal network distribution shares are still embedded in the beta."
Privacy

Police Data-Mining Done Right 321

enharmonix writes "Courtesy of Bruce Schneier, it's nice to hear something good about data mining for a change: predicting and stopping crime. For example, police in Redmond, VA, 'started overlaying crime reports with other data, such as weather, traffic, sports events and paydays for large employers. The data was analyzed three times a day and something interesting emerged: Robberies spiked on paydays near cheque cashing storefronts in specific neighbourhoods. Other clusters also became apparent, and pretty soon police were deploying resources in advance and predicting where crime was most likely to occur.'"

Slashdot Top Deals

Force needed to accelerate 2.2lbs of cookies = 1 Fig-newton to 1 meter per second

Working...