Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Network

Submission + - LinkedIn Uses FBI to Investigate 6.5 Million Password Leak (batblue.com)

JohnBert writes: "As reported last week, LinkedIn had 6.5 million users' passwords leaked. The company is now working with the FBI to track down the party responsible for stealing their data. None of the member information has been published other than a small list of passwords themselves. LinkedIn director, Vicente Silveira, stated that the company has disabled passwords of members who they believe were at risk and that they "take this criminal activity very seriously so we are working closely with the FBI as they aggressively pursue the perpetrators of this crime.""
Google

Submission + - Google gets into AI with an API (i-programmer.info)

mikejuk writes: The new Google Prediction API is classification in a black box. You can send it your data, train a model to recognise data and then use it to classify new data.

Is the web service the future of AI?

Government

In Argentina, Law Against Plagiarism Plagiarized 165

An anonymous reader writes "An Argentinian politician who introduced a law to send plagiarists to jail for three to eight years appears to have plagiarized the explanation of his bill directly from Wikipedia. The bulk of his explanation is three paragraphs that are taken, verbatim, from Wikipedia, without acknowledgment."
Apple

Submission + - Apple to buy ARM? (thisislondon.co.uk)

gyrogeerloose writes: An article in the London Evening Standard claims that Apple has made an $8 billion offer to acquire ARM Holdings. For those few Slashdotters who don't already know, ARM makes the processor chips that power Apple's iPad, iPhone and iPod Touch. However, ARM processors are also used by other manufacturers, including Palm and, perhaps most significantly, companies building Android phones. This explains why Apple might be willing to spend so much on the deal--almost 20% of it's cash reserves. Being able to control who gets to use the processors (and, more importantly, who doesn't) would give Apple a huge advantage over it's competitors.
Government

UK University Researchers Must Make Data Available 352

Sara Chan writes "In a landmark ruling, the UK's Information Commissioner's Office has decided that researchers at a university must make all their data available to the public. The decision follows from a three-year battle by mathematician Douglas J. Keenan, who wants the data to do his own analysis on it. The university researchers have had the data for many years, and have published several papers using the data, but had refused to make the data available. The data in this case pertains to global warming, but the decision is believed to apply to any field: scientists at universities, which are all public in the UK, can now not claim data from publicly-funded research as their private property." There's more at the BBC, at Nature Climate Feedback, and at Keenan's site.

Submission + - Stranted Norwegian PM runs the country remotely (cnn.com)

unity100 writes: On a hilarious sidenote to all the stranded travelers' misery, Norwegian PM, stranded in Madrid due to volcano ash disrupting flights in Europe, is running Norway from Madrid by using phone, computer and iPad through internet. This is quite an interesting case for the cause of telecommuting.

Submission + - Ubisoft DRM problems remain unsolved (ubi.com) 1

ocean_soul writes: "More than three weeks after the release of The Settlers 7, with the controversial "always on-line" DRM, a lot of people still can't connect to Ubisoft's DRM servers. The forum threads where people can post if they are unable to connect keeps growing daily. The reason for the lack of fixes or responses from support seems to be that the people responsible were on vacation during the Easter holiday, despite the promis of 24/7 monitoring of the servers. The moral of this story seems to be that it is a bad idea to buy a game just before a major holiday. Something to keep in mind for Christmas shopping..."
Idle

Submission + - The 20 Worst Superheroes (heavy.com)

WrongSizeGlass writes: Heavy.com has put together a list of the 20 Worst Superheroes after seeing the movie Kick-Ass. The list isn't "tech", and it isn't "news", but it's pretty funny. From "Squirrel Girl" to "Dazzle" and "Manikin" to "Wild Dog", these are some superheroes that may make you want the villains to win.
Firefox

Submission + - Hardware Accelerated Ogg Theora for Firefox Mobile (blog.mjg.im)

An anonymous reader writes: Matthew Gregan is working on bringing David Schleef's DSP accelerated port of Theora to Firefox Mobile. He writes on his blog, 'The C64x+ DSP is often found in systems built upon TI’s OMAP3 SoC, such as the Palm Pre, Motorola Droid, and Nokia N900. Last year, Mozilla funded a port, named Leonora, of Xiph’s Theora video codec to the TI C64x+ DSP. David Schleef conducted the port impressively quickly and published his results. The intention of this project was to provide a high quality set of royalty free media codecs for a common mobile computing platform. The initial focus is Firefox Mobile on the N900, so I am working on integrating David’s work into Firefox. To experiment with other facilities Firefox could use to accelerate video playback, and test integration, I’ve been hacking on a branch of a stand-alone Ogg Theora and Vorbis player originally written by Chris Double called plogg.'
Java

Submission + - Anatomy of the Java Flaw Exploit (threatpost.com)

Trailrunner7 writes: The Java Web Start vulnerability that has been getting so much attention of late is being attacked by a number of different sites now, with a relatively simple and easily reproducible exploit, researchers say. The Java flaw, which Google researcher Tavis Ormandy disclosed publicly on April 9, was patched by Sun yesterday with an emergency out-of-cycle fix after evidence surfaced that it was being exploited on one Web site. But researchers have seen some other sites using the exploit against visitors, as well. One of the sites using the simple attack was registered the day before Ormandy disclosed the vulnerability. The exploit uses several stages of redirection, obfuscation and downloads to install a Trojan that's part of the Piptea pay-per-install network and a large botnet.
Security

Submission + - OnStar 'ignition block' to disable stolen vehicles (autoweek.com)

suraj.sun writes: AutoWeek : http://www.autoweek.com/article/20090721/CARNEWS/907219996

OnStar, General Motors' in-vehicle safety and communications system, has launched a service to keep car thieves from starting a vehicle that has been reported stolen.

As of July 20, three stolen cars had been disabled by the technology, called "remote ignition block."

The feature is available on select 2009 and 2010 GM models. Subscribers must report their vehicles stolen to police officials and request assistance from OnStar, which then sends a signal that prevents the car from restarting.

The block adds to a suite of stolen-vehicle products, ranging from tracking by global positioning systems to a service designed to curtail high-speed police chases by conveying a signal that idles a stolen vehicle.

OnStar Press Release : http://www.onstar.com/us_english/jsp/new_at_onstar/remote_ignition_block.jsp

The process for deployment:

        * An OnStar subscriber reports their vehicle stolen to authorities and requests stolen vehicle assistance from OnStar.
        * Law enforcement provides confirmation to the OnStar Advisor that the vehicle is in fact stolen.
        * The OnStar Advisor pinpoints the vehicle's exact GPS location and sends a remote signal to prevent stolen vehicle from starting the next time someone attempts to start it.
        * On select models, authorities can also request Stolen Vehicle Slowdown if they have a clear line of sight of the stolen vehicle and confirm that conditions are safe to slow down the vehicle.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...