Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Education

Geographic Segregation By Education 230

The wage gap between college-educated workers and those with just a high school diploma has been growing — and accelerating. But the education gap is also doing something unexpected: clustering workers with more education in cities with similar people. "This effectively means that college graduates in America aren't simply gaining access to higher wages. They're gaining access to high-cost cities like New York or San Francisco that offer so much more than good jobs: more restaurants, better schools, less crime, even cleaner air." Most people are aware of the gentrification strife occurring in San Francisco, but it's one among many cities experiencing this. "[Research] also found that as cities increased their share of college graduates between 1980 and 2000, they also increased their bars, restaurants, dry cleaners, museums and art galleries per capita. And they experienced larger decreases in pollution and property crime, suggesting that cities that attract college grads benefit from both the kind of amenities that consumers pay for and those that are more intangible." The research shows a clear trend of the desirable cities becoming even more desirable, to the point where it's almost a necessity for city planners to lure college graduates or face decline.

Comment Congrats (Score 1) 2

Nice job! That's a lot of sustained effort (far more than most people can accomplish) and it shows. Looking forward to the rest of the story!

Biotech

Biohackers Are Engineering Yeast To Make THC 159

meghan elizabeth writes How do you get weed without the weed? By genetically engineering yeast to produce THC, of course. Once theorized in a stoner magazine column more than a decade ago, a biotech startup working in Ireland is actively trying to transplant the genetic information that codes for both THC and another cannabinoid called CBD into yeast so that "marijuana" can be grown in a lab—no plants necessary.
Microsoft

New Microsoft CEO Vows To Shake Up Corporate Culture 204

jfruh (300774) writes New Microsoft CEO Satya Nadella said that he and his leadership team are taking "important steps to visibly change our culture" and that "nothing is off the table" on that score. While much of his declaration consists of vague and positive-sounding phrases ("increase the fluidity of information and ideas by taking actions to flatten the organization and develop leaner business processes"), he outlined his main goals for the shift: reduce time it takes to get things done by having fewer people involved in each decision; quantify outcomes for products and use that data to predict future trends; and increasing investment for employee training and development.
Transportation

Lyft's New York Launch Halted By Restraining Order 92

Forbes reports that Lyft's planned expansion into the New York market has been delayed by a restraining order. The article explains that State officials had asked Lyft to delay its launch. When Lyft refused, New York Attorney General Eric Schneiderman's office filed a temporary restraining order against the startup Friday morning to prevent its launch. Other statements said that the restraining order had been granted, though Simpson said that was untrue. Lyft and officials will reconvene in court Monday for a hearing. Lyft will not launch until it has reached an agreement with the city, Simpson said. Since Monday, when Lyft announced it was planning to launch in the two boroughs [of Queens and Brooklyn], the app has faced criticism from city officials. The taxi and limousine commission declared the app 'unauthorized' and said its riders were at risk and its drivers could be cited and fined if they were caught using it. Lyft seems to have left riders mostly unscathed in Boston, where it's been operating since early last year, and in numerous other cities. Also at Ars Technica.
China

Chinese State Media Declares iPhone a Threat To National Security 143

MojoKid writes: "When NSA whistleblower Edward Snowden came forth last year with U.S. government spying secrets, it didn't take long to realize that some of the information revealed could bring on serious repercussions — not just for the U.S. government, but also for U.S.-based companies. The latest to feel the hit? None other than Apple, and in a region the company has been working hard to increase market share: China. China, via state media, has today declared that Apple's iPhone is a threat to national security — all because of its thorough tracking capabilities. It has the ability to keep track of user locations, and to the country, this could potentially reveal "state secrets" somehow. It's being noted that the iPhone will continue to track the user to some extent even if the overall feature is disabled. China's iPhone ousting comes hot on the heels of Russia's industry and trade deeming AMD and Intel processors to be untrustworthy. The nation will instead be building its own ARM-based "Baikal" processor.
Wireless Networking

FCC Approves Plan To Spend $5B Over Next Five Years On School Wi-Fi 54

itwbennett writes: The Federal Communications Commission, in a 3-2 party-line vote Friday, approved a plan to revamp the 17-year-old E-Rate program, which pays for telecom services for schools and libraries, by phasing out funding for voice service, Web hosting and paging services, and redirecting money to Wi-Fi. FCC Chairman Tom Wheeler had proposed a $5 billion budget for Wi-Fi, but Republican commissioners and some lawmakers had questioned where the money would come from. Still, the E-Rate revamp (PDF) approved Friday contemplates a $1 billion-a-year target for Wi-Fi projects "year after year," Wheeler said.
The Military

DARPA Successfully Demonstrates Self-Guiding Bullets 188

Lucas123 writes: A DARPA-funded project has successfully developed a .50 caliber sniper round capable of maneuvering during flight in order to remain on target. The self-guiding EXACTO bullet, as it's being called, is optically guided by a laser that must remain on target for the bullet to track. The EXACTO round is capable of accurately tracking a target up to 1.2 miles away, DARPA stated. The technology, which is being developed by Teledyne Scientific and Imaging, is targeted at helping snipers remain at longer distances from targets as well as improving night shots. While DARPA's tracking bullet is the first to use a standard, small-arms caliber round, in 2012 Sandia National Laboratories (SNL) successfully demonstrated a prototype self-guided bullet that was more like like a four-inch dart.
Supercomputing

A Peek Inside D-Wave's Quantum Computing Hardware 55

JeremyHsu writes: A one-second delay can still seem like an eternity for a quantum computing machine capable of running calculations in mere millionths of a second. That delay represents just one of the challenges D-Wave Systems overcame in building its second-generation quantum computing machine known as D-Wave Two — a system that has been leased to customers such as Google, NASA and Lockheed Martin. D-Wave's rapid-scaling approach to quantum computing has plenty of critics, but the company's experience in building large-scale quantum computing hardware could provide valuable lessons for everyone, regardless of whether the D-Wave machines live up to quantum computing's potential by proving they can outperform classical computers. (D-Wave recently detailed the hardware design changes between its first- and second-generation quantum computing machines in the the June 2014 issue of the journal IEEE Transactions on Applied Superconductivity.)

"We were nervous about going down this path," says Jeremy Hilton, vice president of processor development at D-Wave Systems. "This architecture requires the qubits and the quantum devices to be intermingled with all these big classical objects. The threat you worry about is noise and impact of all this stuff hanging around the qubits. Traditional experiments in quantum computing have qubits in almost perfect isolation. But if you want quantum computing to be scalable, it will have to be immersed in a sea of computing complexity.
Transportation

The First Person Ever To Die In a Tesla Is a Guy Who Stole One 443

mrspoonsi sends this news from The Verge: Elon Musk can no longer say that no one's ever died in a Tesla automobile crash. But few people will be pointing fingers at the electric car maker for this senseless tragedy. Earlier this month, 26-year-old Joshua Slot managed to successfully ride off with a Model S he'd stolen from a Tesla service center in Los Angeles, but police quickly spotted the luxury vehicle and gave chase. According to Park Labrea News, the high-speed pursuit was eventually called off after officers were involved in a fender bender of their own, leaving the police department strained for resources and without any feasible way of catching up to Slot. Reports claim he was traveling at speeds of "nearly 100 mph," but losing the police tail apparently didn't convince Slot to hit the brakes. Instead he sped on, eventually colliding with three other vehicles and a pair of street poles. The final impact was severe enough to "split the Tesla in half" and eject Slot from the car's remains. The Tesla's front section wound up in the middle of the road and caught fire. Its rear portion flew through the air with such force that it slammed into the side of a local Jewish community center and became wedged there.
Privacy

William Binney: NSA Records and Stores 80% of All US Audio Calls 278

stephendavion sends a report at The Guardian about remarks from whistleblower William Binney, who left the NSA after its move toward overreaching surveillance following the September 11th attacks. Binney says, "At least 80% of all audio calls, not just metadata, are recorded and stored in the U.S. The NSA lies about what it stores." He added, "The ultimate goal of the NSA is total population control, but I’m a little optimistic with some recent Supreme Court decisions, such as law enforcement mostly now needing a warrant before searching a smartphone." One of Binney's biggest concerns about government-led surveillance is its lack of oversight: "The FISA court has only the government’s point of view. There are no other views for the judges to consider. There have been at least 15-20 trillion constitutional violations for U.S. domestic audiences and you can double that globally."

Submission + - A Peek Inside D-Wave's Quantum Computing Hardware (ieee.org)

JeremyHsu writes: A one-second delay can still seem like an eternity for a quantum computing machine capable of running calculations in mere millionths of a second. That delay represents just one of the challenges D-Wave Systems overcame in building its second-generation quantum computing machine known as D-Wave Two — a system that has been leased to customers such as Google, NASA and Lockheed Martin. D-Wave's rapid-scaling approach to quantum computing has plenty of critics, but the company's experience in building large-scale quantum computing hardware could provide valuable lessons for everyone, regardless of whether the D-Wave machines live up to quantum computing's potential by proving they can outperform classical computers. (D-Wave recently detailed the hardware design changes between its first- and second-generation quantum computing machines in the the June 2014 issue of the journal IEEE Transactions on Applied Superconductivity.)

"We were nervous about going down this path," says Jeremy Hilton, vice president of processor development at D-Wave Systems. "This architecture requires the qubits and the quantum devices to be intermingled with all these big classical objects. The threat you worry about is noise and impact of all this stuff hanging around the qubits. Traditional experiments in quantum computing have qubits in almost perfect isolation. But if you want quantum computing to be scalable, it will have to be immersed in a sea of computing complexity."

(This story is the latest in a series of quantum computing stories I've written for IEEE Spectrum.)

Submission + - The First Person Ever To Die In A Tesla Is A Guy Who Stole One

mrspoonsi writes: Elon Musk can no longer say that no one's ever died in a Tesla automobile crash. But few people will be pointing fingers at the electric car maker for this senseless tragedy. Earlier this month, 26-year-old Joshua Slot managed to successfully ride off with a Model S he'd stolen from a Tesla service center in Los Angeles, but police quickly spotted the luxury vehicle and gave chase. According to Park Labrea News, the high-speed pursuit was eventually called off after officers were involved in a fender bender of their own, leaving the police department strained for resources and without any feasible way of catching up to Slot. Reports claim he was traveling at speeds of "nearly 100 mph," but losing the police tail apparently didn't convince Slot to hit the brakes. Instead he sped on, eventually colliding with three other vehicles and a pair of street poles. The final impact was severe enough to "split the Tesla in half" and eject Slot from the car's remains. The Tesla's front section wound up in the middle of the road and caught fire. Its rear portion flew through the air with such force that it slammed into the side of a local Jewish community center and became wedged there.
Botnet

Gameover ZeuS Re-Emerges As Fast-Fluxing Botnet 62

New submitter tylke (621801) writes: "Brian Krebs is reporting that the Gameover ZeuS botnet recently taken down by the U.S. Justice Department in June has re-emerged. The new variant of the Trojan is "stripped of the P2P code, and relies instead on an approach known as fast-flux hosting," a kind of round-robin technique that lets botnets hide phishing and malware delivery sites behind a network of compromised systems. Krebs says, "[T]his variant also includes a 'domain name generation algorithm' or DGA, which is a failsafe mechanism that can be invoked if the botnet’s normal communications system fails. The DGA creates a constantly-changing list of domain names each week (gibberish domains that are essentially long jumbles of letters). In the event that systems infected with the malware can’t reach the fast-flux servers for new updates, the code instructs the botted systems to seek out active domains from the list specified in the DGA. All the botmasters need to do in this case to regain control over his crime machine is register just one of those domains and place the update instructions there." (Disclosure: I work for Malcovery Security, the company credited with identifying the new variant.)

Slashdot Top Deals

Without life, Biology itself would be impossible.

Working...