Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Let's do the math (Score 2) 307

The laws of probability suggest humanity is doomed, at least in our current form. We as human ponderers are roughly a sampling of the average human pondering their existence. About 60 billion humans have come before us, which suggests roughly just 60 billion will come after us since we are most likely to be in the middle of the pack rather than near the beginning or the end of the pack. (Roughly the Copernican principle as applied to human population density and time.)

If most of our future is to be Borg-like, then we'd more likely be Borgs contemplating our existence, not humans. But us (here now) being at such a coincidental position would be violating the Copernican principle. Either way, we are either doomed to end soon or become Borg-like, neither is a pleasant thought.

Of course coincidences do happen and we may indeed coincidentally be at the start of the human expansion curve; but if I were in Vegas, I wouldn't bet on it. We're doomed, guys.

Comment Blowback 101 [Re:Bound to fail] (Score 1, Insightful) 117

Indeed. Fear and paranoia are often the main ingredients to colossal disasters.

USA's post-9/11 fears drove us to invade Iraq for no decent reason whatsoever, and create a power-vacuum that haunts us and the Middle East to this day. Saddam may have been a jerk, but he served to stabilize other jerks (Iran gov't, ISIS, etc.). We upset the Balance of Jerks (we lost Jerk Jenga).

"Let's throw Terminators at the problem. What can possibly go wrong, go wrong, go wrong, go wrong, go wrong, go wrong, go wrong..."

Comment My take is tech makes radios sound like noise. (Score 5, Insightful) 307

I also subscribe to the "great filter" theory. About 25 years after the radio was invented, we were busy gassing each other in trenches, followed closely by a global pandemic, then mass genocide, then teetering on the edge of nuclear war. That's not a very wide window for aliens to notice our presence, if they rely on artificial radio waves to detect intelligent life.

My take is that technological improvements make radio sound like noise after a few decades. Early radios systems are very simple things which have signals (CW, AM, FM, ...) that are very distinct from electrical and thermal noise. Their signals were both drastically different from, and drastically stronger than, the background, enabling simple detectors to separate a signal's information from all that chaff.

Modern radios (such as spread spectrum systems, especially OFDM) squeeze nearly the Shannon Limit out of precious bandwidth (and also be frugal with transmit power) by using nearly all of it to carry information. This makes them virtually indistinguishable from a celestial object with a little extra heat (buried among things like stars, which have a LOT of heat).

It was only about 120 years from when Hertz and Tesla started making easily detectable radio waves to the Analog Television Shutdown, a significant milepost in the decommissioning of easily detectable radio signatures. I expect that, within anther few decades, the Earth will be emitting very little that might be recognizable as a radio signature of intelligent life, unless we expend a bunch of energy sending such a signature deliberately.

So my solution to the mystery expressed in the Drake Equation is that L (the length of time for which such civilizations release detectable signals into space) is short, not due to the falls of civilizations, but to economic incentives to use the aether only in ways that are no longer noticeable at a distance.

Security

Regin Malware In EU Attack Linked To US and British Intelligence Agencies 131

Advocatus Diaboli writes The Regin malware, whose existence was first reported by the security firm Symantec on Sunday, is among the most sophisticated ever discovered by researchers. Symantec compared Regin to Stuxnet, a state-sponsored malware program developed by the U.S. and Israel to sabotage computers at an Iranian nuclear facility. Sources familiar with internal investigations at Belgacom and the European Union have confirmed to The Intercept that the Regin malware was found on their systems after they were compromised, linking the spy tool to the secret GCHQ and NSA operations.
Chrome

Google Chrome Will Block All NPAPI Plugins By Default In January 107

An anonymous reader writes Google today provided an update on its plan to remove Netscape Plugin Application Programming Interface (NPAPI) from Chrome, which the company says will improve the browser's security, speed, and stability, as well as reduce complexity in the code base. In short, the latest timeline is as follows: Block all plugins by default in January 2015, disable support in April 2015, and remove support completely in September 2015. For context, Google first announced in September 2013 that it was planning to drop NPAPI. At the time, Google said anonymous Chrome usage data showed just six NPAPI plugins were used by more than 5 percent of users, and the company was hoping to remove support from Chrome "before the end of 2014, but the exact timing will depend on usage and user feedback."

Submission + - Sony Comes To A Screeching Halt Targeted By Massive Ransomware Hack (hothardware.com)

MojoKid writes: It appears that Sony has become the victim of a massive ransomware hack which has resulted in the company basically shutting down. An unnamed source has noted this, claiming that the company shut down after its computers in New York and around the nation were infiltrated. The source is an ex-employee of Sony Pictures who has a friend that still works for the company. According to the source's friend, allegedly, every computer in Sony's New York Office, and every Sony Pictures office across the nation, bears an image from the hacker with the headline "Hacked By #GOP" which is then followed by a warning. The hacker, or group, claims to have obtained corporate secrets and has threatened to reveal those secrets at 11:00 PM GMT tonight if Sony doesn't meet their demands. What those demands are and what is #GOP has yet to be determined.
United States

DHS Set To Destroy "Einstein" Surveillance Records 71

schwit1 sends word that The Department of Homeland Security plans on disposing of all the records from a 3-year-long surveillance program without letting the public have access to them. The Department of Homeland Security is poised to ditch all records from a controversial network monitoring system called "Einstein" that are at least three years old, but not for security reasons. DHS reasons the files — which include data about traffic to government websites, agency network intrusions and general vulnerabilities — have no research significance. But some security experts say, to the contrary, DHS would be deleting a treasure chest of historical threat data. And privacy experts, who wish the metadata wasn't collected at all, say destroying it could eliminate evidence that the government wide surveillance system does not perform as intended. The National Archives and Records Administration has tentatively approved the disposal plan, pending a public comment period.
Space

Complex Life May Be Possible In Only 10% of All Galaxies 307

sciencehabit writes The universe may be a lonelier place than previously thought. Of the estimated 100 billion galaxies in the observable universe, only one in 10 can support complex life like that on Earth, a pair of astrophysicists argues. Everywhere else, stellar explosions known as gamma ray bursts would regularly wipe out any life forms more elaborate than microbes. The detonations also kept the universe lifeless for billions of years after the big bang, the researchers say.
Books

Book Review: Bulletproof SSL and TLS 92

benrothke writes If SSL is the emperor's new clothes, then Ivan Ristic in Bulletproof SSL and TLS has shown that perhaps the emperor isn't wearing anything at all. There is a perception that if a web site is SSL secured, then it's indeed secure. Read a few pages in this important book, and the SSL = security myth is dispelled. For the first 8 of the 16 chapters, Ristic, one of the greatest practical SSL./TLS experts around, spends 230 pages showing countless weaknesses, vulnerabilities, attacks and other SSL weaknesses. He then spends the next 8 chapters showing how SSL can, if done correctly, be deployed to provide adequate security. Keep reading for the rest of Ben's review.

Submission + - Poll Suggestion - Holiday Party

P0ck3tR4wk3t writes: My Employer's Holiday Party...

1) Isn't happening — Budget Cutbacks
2) Isn't happening — Never has
3) Wasn't planned properly — in super-tiny meeting room with crappy food
4) Is happening, +1 invite (spouses) no longer allowed
5) Is happening, +1 allowed
6) We are all skiing with Cowboy Neal in Aspen, you insensitive clod!
Businesses

LinkedIn Study: US Attracting Fewer Educated, Highly Skilled Migrants 338

vinces99 writes The U.S. economy has long been powered in part by the nation's ability to attract the world's most educated and skilled people to its shores. But a new study of the worldwide migration of professionals to the U.S. shows a sharp drop-off in its proportional share of those workers – raising the question of whether the nation will remain competitive in attracting top talent in an increasingly globalized economy. The study, which used a novel method of tracking people through data from the social media site LinkedIn, is believed to be the first to monitor global migrations of professionals to the U.S., said co-author Emilio Zagheni, a University of Washington assistant professor of sociology and fellow of the UW eScience Institute. Among other things, the study, presented recently in Barcelona, Spain, found that just 13 percent of migrating professionals in the sample group chose the U.S. as a destination in 2012, down from 27 percent in 2000.
Canada

Married Woman Claims Facebook Info Sharing Created Dating Profile For Her 189

jenningsthecat writes A happily married Ontario woman was shocked and dismayed last January to discover that she had an active account with dating site Zoosk.com. Mari Sherkin saw a pop-up ad on Facebook for Zoosk, but wasn't interested, so she "clicked on the X to close it. At least I thought I did." She immediately began to receive messages from would-be Zoosk suitors in her Facebook mailbox. When she had a look on Zoosk she was horrified to find a dating profile with her Facebook picture, name, and postal code. Zoosk denies ever setting up profiles in this way, yet their terms of service explicitly allow them to do it, and there are apparently several Facebook pages with complaints of similar occurrences.
Science

Interviews: Ask the Hampton Creek Team About the Science and Future of Food 145

samzenpus writes Hampton Creek is a food technology company that makes food healthier by utilizing a specially made egg substitute in food products. The company was selected by Bill Gates to be featured on his website in a story called, The Future of Food, and has raised $30 million in funding. Hampton Creek's latest product is called, Just Cookies, which is an eggless chocolate chip cookie dough, but it is their eggless mayo that has been in the news lately. Unilever, which manufactures Hellmann's and Best Foods mayonnaise, is suing Hampton Creek claiming that the name Just Mayo is misleading to consumers. Named one of Entrepreneur Magazine's 100 Brilliant Companies and one of CNBC's Top 50 Disruptors, Hampton Creek has picked up some impressive talent including the former lead data scientist at Google Maps, Dan Zigmond. With Thanksgiving just around the corner, Dan and the Hampton Creek team have agreed to answer any questions you may have. As usual, ask as many as you'd like, but please, one per post.
Security

Nuclear Weapons Create Their Own Security Codes With Radiation 106

Zothecula writes "Nuclear weapons are a paradox. No one in their right mind wants to use one, but if they're to act as a deterrent, they need to be accessible. The trick is to make sure that access is only available to those with the proper authority. To prevent a real life General Jack D Ripper from starting World War III, Livermore National Laboratory's (LLNL) Defense Technologies Division is developing a system that uses a nuclear weapon's own radiation to protect itself from tampering.

Slashdot Top Deals

I've noticed several design suggestions in your code.

Working...