Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - Un-truthful Carrier: Ten Lies T-Mobile Told Me About My Data Plan (jeffreifman.com)

reifman writes: Last June, my post “Yes, You Can Spend $750 in International Data Roaming in One Minute on AT&T” was slashdotted and this led to T-Mobile CEO John Legere tweeting 'how crappy @ATT is' and welcoming me to the fold. Unfortunately, now it’s TMobile that’s having trouble tracking data; it seems to be related to the rollout of their new DataStash promotion. Just like AT&T, they’re blaming the customer. Here are the ten lies T-Mobile told me about my data usage today.

Submission + - Ask Slashdot: parental content control for free OSs?

m.alessandrini writes: Children grow up, and inevitably they will start using internet and social networks, both for educational and recreational purposes. And it won't take long to them to learn to be autonomous, especially with all the smartphones and tablets around and your limited time.
Unlike the years of my youth, when internet started to enter our lives gradually, now I'm afraid of the amount of inappropriate contents a child can be exposed to unprepared: porn, scammers, cyberbullies or worse, are just a click away.
For Windows many solutions claim to exist, usually in form of massive antivirus suites. What about GNU/Linux? Or Android? Several solutions rely on setting up a proxy with a whitelist of sites, or similar, but I'm afraid this approach can make internet unusable, or otherwise be easy to bypass. Have you any experiences or suggestions? Do you think software solutions are only a part of the solution, provided children can learn hacking tricks better than us, and if so, what other "human" techniques are most effective?

Submission + - Counterfeiting with 3-D Printers Could Cost $100 Billion (wired.com)

An anonymous reader writes: Citing a report from the Gartner Group estimating $100 billion in intellectual property losses within five years, Joshua Greenbaum warns of "the threat of a major surge in counterfeiting" as cheap 3-D printers get more sophisticated materials. Writing for Wired, Greenbaum argues that preventing counterfeiting "promises to be a growth market," and suggests that besides updating IP laws, possible solutions include nanomaterials for "watermarking" authentic copies or even the regulation of 3-D printing materials. Major retailers like Amazon are already offering 3-D print-on-demand products — though right now their selection is mostly limited to novelties like customized bobbleheads and Christmas ornaments shaped like cannabis leaves.

Submission + - Inside a Room Built for Total Silence (vice.com)

An anonymous reader writes: "The room is totally covered in foam wedges, pointing inwards, the floor a metal grate suspended over them. Itâ(TM)s both archaic and otherworldly, a retro-futurist scene in dull brown. As Dance pulls the door shut behind us, the atmosphere deadens. Any sound waves are deflected by the multifaceted foam and are effectively sucked into the walls. Itâ(TM)s an oppressive sensation; much of our spatial awareness is defined by echo-location, and even with my eyes open the disorientation is irrefutable. We agree that Iâ(TM)ll stay in the chamber for an hour with the lights out, to divulge myself of extra sensory distractions. I lie down on slabs of foam laid out as a makeshift bed; the academics pile out, and the technician pulls the door shut and flicks out the light."

Submission + - The Robots That Will Put Coders Out of Work

snydeq writes: Researchers warn that a glut of code is coming that will depress wages and turn coders into Uber drivers, InfoWorld reports. 'The researchers — Boston University's Seth Benzell, Laurence Kotlikoff, and Guillermo LaGarda, and Columbia University's Jeffrey Sachs — aren't predicting some silly, Terminator-like robot apocalypse. What they are saying is that our economy is entering a new type of boom-and-bust cycle that accelerates the production of new products and new code so rapidly that supply outstrips demand. The solution to that shortage will be to figure out how not to need those hard-to-find human experts. In fact, it's already happening in some areas.'

Submission + - Homeland Security Urges Lenovo Customers to Remove Superfish

HughPickens.com writes: Reuters reports that the US Department of Homeland Security has advised Lenovo customers to remove "Superfish" software from their computers. According to an alert released through its National Cyber Awareness System the software makes users vulnerable to SSL spoofing and could allow a remote attacker to read encrypted web browser traffic, spoof websites and perform other attacks on Lenovo PCs with the software installed. Lenovo inititally said it stopped shipping the software because of complaints about features, not a security vulnerability. "We have thoroughly investigated this technology and do not find any evidence to substantiate security concerns," the company said in a statement to Reuters early on Thursday. On Friday, Lenovo spokesman Brion Tingler said the company's initial findings were flawed and that it was now advising customers to remove the software and providing instructions for uninstalling "Superfish". "We should have known about this sooner," Tingler said in an email. "And if we could go back, we never would have installed this software on our machines. But we can't, so we are dealing with this head on."

Submission + - An Evidence-Based Approach to Online Dating

HughPickens.com writes: Rachel Nuwer writes in the NYT that Dr. Sameer Chaudhry’s online dating persona was garnering no response from the women he reached out to so he synthesized 86 literature studies on the subject of online dating in the fields of psychology, sociology, and computer, behavioral, and neurocognitive sciences.in hopes of improving his odds. As it turns out, success begins with picking a user name. While men are drawn to names linked to physical traits (e.g., Cutie), the researchers found, women prefer ones that indicate intelligence (e.g., Cultured). Both sexes respond well to playful names (e.g. Fun2bwith) and shy away from ones with negative connotations (e.g., Bugg). User names that begin with letters from the first half of the alphabet do better than those from the latter half. “As human beings, we have a tendency to give things at the top of a pile more value,” says Khan. As for your profile photo, pick a photo with a genuine smile, one that crinkles the eyes, and with a slight head tilt (it’s linked to attractiveness). And if you’re looking for a male partner, go for that photo of you in siren red—a color that enhances men's attraction to women. "For those attracted to browse into the profile, a description of personal traits increased likeability when it: showed who the dater was and what they were looking for in a 70:30 ratio; stayed close to reality; and employed simple language with humor added. Invitations were most successful in obtaining a response from the potential date when they: were short personalized messages addressing a trait in their profile; rhymed with their screen name or headline message; and extended genuine compliments." And finally, don't wait too long before arranging a face to face meeting.

Submission + - US State Department Can't Get Rid of Email Hackers (wsj.com)

An anonymous reader writes: Three months after the State Department confirmed hackers breached its unclassified email system, the government still hasnt been able to evict them from the network, say three people familiar with the investigation. Government officials, assisted by outside contractors and the National Security Agency, have repeatedly scanned the network and taken some systems offline. But investigators still see signs of the hackers on State Department computers, the people familiar with the matter said. Each time investigators find a hacker tool and block it, these people said, the intruders tweak it slightly to attempt to sneak past defenses. It isn’t clear how much data the hackers have taken, the people said. They reaffirmed what the State Department said in November: that the hackers appear to have access only to unclassified email. Still, unclassified material can contain sensitive intelligence.

Submission + - The best—and worst—places to drive your electric car (sciencemag.org)

sciencehabit writes: For those tired of winter, you’re not alone. Electric cars hate the cold, too. Researchers have conducted the first investigation into how electric vehicles fare in different U.S. climates. The verdict: Electric car buyers in the chilly Midwest and sizzling Southwest get less bang for their buck, where poor energy efficiency and coal power plants unite to turn electric vehicles into bigger polluters.

Submission + - No Tech Bubble Here, Says CNN, "This Time It's different." (cnn.com)

ErichTheRed writes: I saw this on the Money page of CNN today. Apparently, various stock analysts have declared that this run-up in stock prices is different than the 1999 version. OK, we don't have the pets.com sock puppet, Webvan or theglobe.com anymore, but when Uber is given a valuation of $40 billion, can a crash be far behind?

Submission + - Rapid test for Ebola now available (sciencemag.org)

sciencehabit writes: The World Health Organization (WHO) has approved the first rapid diagnostic test for Ebola. The test needs no electricity, requires just a few drops of blood from a finger prick, and can return results in 15 minutes. That will be a huge help to health workers in remote areas. Current PCR-based tests require a blood sample taken by needle, secure transport of the blood to a properly equipped laboratory with trained staff, and at least several hours to return results. Depending on how far away a suspected case is from a testing laboratory, it can take more than a day to receive test results.

Submission + - Hackin' At The Car Wash, (Yeah) (darkreading.com)

PLAR writes: Those LaserWash automatic car washes can be easily hacked via the Internet to get a free car wash or to manipulate the machines that clean the cars, a security researcher has found. Billy Rios says these car washes have web interfaces with weak/default passwords that if obtained, could allow an attacker to telent in and use an HTTP GET request to control the machines. And this very likely isn't the only car wash brand that's vulnerable, according to Rios.

Submission + - Australian ISPs to introduce '3-strike' style anti-piracy scheme (computerworld.com.au)

angry tapir writes: Australian ISPs are considering a draft industry code, developed in response to government threats to step in and do it for them, that will implement a 'three notice' scheme for alleged copyright infringement. If an ISP customer gets three notices in 12 months, a rights holder can go to court to obtain their details and potentially take legal action against them. (The other part of the government's copyright crackdown is the introduction of a scheme to have pirate websites blocked — the government has yet to introduce the legislation for it, however.)

Comment Re:Might be interesting... (Score 1) 393

I am currently investigating alternative operating systems because I don't want systemd on my boxes.

I have been running Fedora for years and basically have no issue with "systemd" since there is a GUI and command line for control. Unless you can explain why systemd is bad what you have said would be a cause for ridicule in a decision making meeting.

As an "old guy" I don't have any issue with Unix in general or Linux for that matter, I learn what is appropriate and change accordingly. I don't think the server market considers Linux a toy either since it is very popular.

Slashdot Top Deals

Trying to be happy is like trying to build a machine for which the only specification is that it should run noiselessly.

Working...