Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
The Internet

Undersea Cable Break Disrupts Life In Northern Mariana Islands 102

An anonymous reader writes: The Commonwealth of the Northern Mariana Islands experienced a devastating undersea cable break on Wednesday, with phone, Internet, SMS, banking services, the National Weather Service office, and airliners all being affected. The US territory depends on a single undersea fiber optic connection with Guam for its connectivity to the outside world (except for a backup microwave link, which was itself damaged during a recent storm). While services are in the process of being restored, this may be a prime example of the need for reliable backup systems in our "always connected" mindset.
Space

Poll If I were being launched into space today ... 126

Looks like someone has already voted from this IP. If you would like to vote please login and try again.

0
Percentage of others that also voted for:

Submission + - Undersea Cable Break Disrupts Life in Northern Mariana Islands (guampdn.com)

An anonymous reader writes: The Commonwealth of the Northern Mariana Islands experienced a devastating undersea cable break on Wednesday, with phone, Internet, SMS, banking services, the National Weather Service office, and airliners all being affected. The US territory depends on a single undersea fiber optic connection with Guam for its connectivity to the outside world (except for a backup microwave link, which was itself damaged during a recent storm). While services are in the process of being restored, this may be a prime example of the need for reliable backup systems in our "always connected" mindset.
Businesses

Satoru Iwata, Head of Nintendo, Has Died At 55 56

An anonymous reader with the news, announced with a statement released by Nintendo on their homepage, that Nintendo president and CEO Satoru Iwata died of a bile duct growth on the 11th of July, 2015. The news is noted by Kotaku and by Engadget. Wikipedia notes that Iwata was the first of the company's presidents to be unrelated to the Yamauchi family through blood or marriage.
Movies

J.J. Abrams On "Star Wars" Cast's Racial and Sexual Diversity 504

Yesterday at Comic-Con, director J.J. Abrams held forth on the racial and sexual diversity of the actors portraying the characters of the Star Wars franchise. From CNET's article: For Star Wars, it's a complex debate. The franchise has included prominent and strong female characters, like Princess Leia, as well as central characters played by black actors, such as Cloud City administrator Lando Calrissian, played by Billy Dee Williams, and Jedi Mace Windu, played by Samuel L. Jackson. On the other hand, Jar Jar Binks, a computer-generated alien in 1999's "Star Wars Episode I: The Phantom Menace," drew fire from some critics, who said he called to mind demeaning black film characters such as those played by Stepin Fetchit in the 1930s. (Not to mention other cultural stereotypes that pop up in Episodes I, II, and III.)

Submission + - CSTA: Google Surveying Educators on Unconscious Biases of Students, Parents

theodp writes: According to a Computer Science Teachers Association tweet, Google is reportedly asking educators to assess the unconscious bias of students and their parents for the search giant. "We are in the early stages of learning how unconscious bias plays out in schools, and who would benefit most from bias busting materials," begins the linked-to 5-page Google Form, which sports a ub-edu@google.com email address, but lists no contact name. "This survey should take 15 minutes to complete, and your responses are confidential, meaning that your feedback will not be attributed to you and the data will only be used in aggregate form." The form asks educators to "list the names of organizations, tools, and resources that you have used to combat unconscious bias," which is defined as "the attitudes or stereotypes that affect our understanding, actions, and decisions in an unconscious manner." A sample question: "Who do you think would benefit most from unconscious bias training at your school (or program)? Rank the following people in order (1=would most benefit to 5=would benefit least) training: Student, Parent (or guardian), Teacher (or educator), Guidance counselor, Principal." Google deflected criticism for its lack of women techies in the past by blaming parents' unconscious biases for not steering their girls to study computer science, suggesting an intervention was needed. "Outreach programs," advised Google, "should include a parent education component, so that parents learn how to actively encourage their daughters."

Submission + - Apparent Technical Glitch Halts Trading on New York Stock Exchange (nbcnews.com)

edeefelt writes: Trading in all symbols was temporarily halted on the New York Stock Exchange floor Wednesday due to an apparent technical issue.

"NYSE/NYSE MKT has temporarily suspended trading in all symbols. Additional information will follow as soon as possible," the NYSE said in a statement on its status page.

A technical issue caused the trading halt, Reuters reported, citing a source. Trading stopped around 11:30 a.m. ET.

The Nasdaq reported no technical issues and said it continues to trade NYSE-listed stocks.

The Media

Ask Slashdot: Which Expert Bloggers Do You Read? 203

An anonymous reader writes: The crush of news sites today is almost overwhelming. For true bits of news — bare facts and alerts that something has happened — it doesn't really matter which site you read it on. Some tiny, no-name website can tell me $company1 bought $company2 just as well as Reuters, CNN, or the NY Times. When it comes to opinion pieces and analysis, though, it's a different story. One of the generalist tech bloggers at the NY Times probably isn't going to have many worthwhile posts comparing database sorting algorithms or explaining the Cassini spacecraft's orbital path or providing soldering techniques for fixing a busted monitor. An example most of us are familiar with: Bruce Schneier generally provides good advice on security and encryption. So: what expert bloggers do you keep tabs on? I'm not looking for any particular posting frequency. This type of person I'm thinking of is probably not a journalist, and may not post very often at all — posting frequency matters far less than the signal-to-noise ratio. My goal is to build a big list of smart people who write interesting things — mainly for topics you'd expect to see on Slashdot, but I'm open to other subjects, as well.
Microsoft

Microsoft To Cut 7,800 More Jobs, Take $7.6 Billion Writedown On Nokia 249

jones_supa writes: Microsoft is about to announce another round of layoffs. A company press release confirms the plan, saying that it will target up to 7,800 employees and will be aimed mostly at the hardware division. The hardware division includes the lion's share of former Nokia employees, which became part of Microsoft last year. In an e-mail to employees, chief executive officer Satya Nadella reiterated the company's commitment to its phone business, though he also said that some refocusing was necessary and that Microsoft's phone business would reflect the overall Windows strategy: "We are moving from a strategy to grow a standalone phone business to a strategy to grow and create a vibrant Windows ecosystem that includes our first-party device family," the e-mail reads. "As a result, the company will take an impairment charge of approximately $7.6 billion related to assets associated with the acquisition of the Nokia Devices and Services business in addition to a restructuring charge of approximately $750 million to $850 million."
Space

Astronomers Teach a Machine To Analyze Space Images 28

New submitter Jim Geach writes: Our team of astronomers and computer scientists has developed a novel unsupervised machine learning algorithm — a combination of Growing Neural Gas and Hierarchical Clustering — to automatically analyze astronomical images. In effect, the algorithm performs the same task as a human 'eyeballing' an image, automatically identifying and labeling the points of interest. We're aiming to deploy the algorithm on the next generation of astronomical surveys such as LSST and Euclid where no human, or even group of humans, could closely inspect every piece of data. The algorithm could also find application in other fields, such as medical imaging and early disease diagnosis. The results are being presented at the UK National Astronomy Meeting in Wales, and the details of the algorithm are described in this paper.

Submission + - Microsoft To Cut 7,800 More Jobs, Mostly Hardware People

jones_supa writes: Microsoft is about to announce another round of layoffs. A company press release confirms the plan, saying that it will target up to 7,800 employees and will be aimed mostly at the hardware division. The hardware division includes the lion's share of former Nokia employees, which became part of Microsoft last year. In an e-mail to employees, chief executive officer Satya Nadella reiterated the company's commitment to its phone business, though he also said that some refocusing was necessary and that Microsoft's phone business would reflect the overall Windows strategy: "We are moving from a strategy to grow a standalone phone business to a strategy to grow and create a vibrant Windows ecosystem that includes our first-party device family," the e-mail reads.
Advertising

Study: Women Less Likely To Be Shown Ads For High-paid Jobs On Google 233

An anonymous reader writes: A team of researchers from Carnegie Mellon University has found that women seeking jobs are less likely to be shown ads on Google for high-paying jobs than men. The researchers created more than 17,000 fake profiles, which were shown roughly 600,000 ads on career-finding websites (abstract). All of the profiles shared the same browsing behavior. "One experiment showed that Google displayed adverts for a career coaching service for '$200k+' executive jobs 1,852 times to the male group and only 318 times to the female group." The article notes, "Google allows users to opt out of behavioral advertising and provides a system to see why users were shown ads and to customize their ad settings. But the study suggests that there is a transparency and overt discrimination issue in the wider advertising landscape."
The Courts

Time Warner Cable Owes $229,500 To Woman It Would Not Stop Calling 215

HughPickens.com writes: Reuters reports that a Manhattan federal judge has ruled Time Warner Cable must pay Araceli King $229,500 for placing 153 automated calls meant for someone else to her cellphone in less than a year, even after she told them to stop. King accused Time Warner Cable of harassing her by leaving messages for Luiz Perez, who once held her cellphone number, even after she made clear who she was in a seven-minute discussion with a company representative. Time Warner Cable countered that it was not liable to King under the federal Telephone Consumer Protection Act, a law meant to curb robocall and telemarketing abuses, because it believed it was calling Perez, who had consented to the calls. In awarding triple damages of $1,500 per call for willfully violating that law, U.S. District Judge Alvin Hellerstein said "a responsible business" would have tried harder to find Perez and address the problem. While Time Warner argued that they were unaware King ever asked to be on the company's "do not call list," Hellerstein determined, "there is no doubt King made this revocation." He wrote that the company "could not be bothered" to update King's information, even after she filed suit against TWC in March of 2014. The judge said 74 of the calls had been placed after King sued and that it was "incredible" to believe Time Warner Cable when it said it still did not know she objected. "Companies are using computers to dial phone numbers," says King's lawyer Sergei Lemberg. "They benefit from efficiency, but there is a cost when they make people's lives miserable. This was one such case."

Submission + - Why location-based social media data is critical for security (net-security.org)

Errorcod3 writes: Sports games at stadiums, hurricanes along the coast, protests on city streets, guest complaints at hotels, customer praise at restaurants, bullying at schools Things happen at specific places. These human experiences impact all of us, everywhere, everyday.

  Technology is playing an increasingly large role in these very human experiences. It is estimated that two billion of us will carry smartphones by the end of this year. These very powerful devices enable us to share our experiences in real-time with anyone in the world with a click of a button. And people want to share, using social networks like Facebook, Instagram and Twitter to do so. With robust GPS capabilities allowing shared moments to be even more dynamic, the identification of exact locations helps to deliver an authentic experience.

  The volume of social content is massive – one billion monthly active users, 500M daily tweets, 70M photos and videos shared everyday based on data from Twitter, Instagram and YouTube alone. There must be an effective strategy in place for listening to and analyzing the sometimes-critical data it brings and turning it into valuable, actionable information for security purposes.

  When do people share? They share when something really great happens or when something bad happens. It is these types of signals that organizations value the most. They want to know behavior so that they can keep the peace, limit the risks and dangers from nefarious acts, protect assets, break news stories, etc. Understanding real-time human behavior and observation happening at any place, worldwide without actually being there has become incredibly important and impactful. The means of getting and synthesizing this information is critical.

  Location-tagged social media data is utterly revolutionary and represents unprecedented opportunity for organizations to support their missions and increase security in a fundamentally new and unique way. So how do you harness this information and make sense of it?

  Like any new technology, education is the biggest challenge and imperative first step. Many of the organizations that would benefit most from location-based social media content have never even considered making social media work for them. They might not even be aware that people share their exact locations in this way so openly (and so often). Organization decision-makers are often of generations that don't typically share the way younger users do. They might not even use social media. They don't know that this valuable data is available to manage and improve their operations.

  Corporate security groups are able to improve situational awareness by “listening” to geo-tagged social media posts. Incorporating location-based technology, they are able to map a location anywhere in the world and monitor real-time social content from multiple sources, with one click. These teams are then better equipped to secure facilities, protect executives, identify intellectual property leakage, and monitor unrest. There are myriad ways this type of monitoring is being used – and paying off.

  Consider a recent intellectual property leakage at one of the world’s largest technology companies. Following a gathering of the company’s senior executives from all over the globe, the organization’s intelligence unit was able to uncover the unapproved sharing of proprietary intellectual property regarding upcoming, unannounced products via social media. By incorporating location-tagged data from the corporate meeting and listening to the social media chatter coming from the meeting site, the company was able to quickly curtail the dissemination of this proprietary information.

At one of the world’s largest online retail companies, the social media activity of the famous CEO’s stalkers is monitored. Based on the intelligence the team has gleaned from social media, the organization increases security levels during elevated threats identified via location-based social media monitoring.

  A popular sportswear company used geo-tagged social media data in its brand protection efforts to monitor the residences of a leading counterfeiter of its products. Social media intelligence led to the successful apprehension of the counterfeiter.

  A major e-commerce provider uses location-tagged social media data to closely monitor critical infrastructure where photos and social media posts are not allowed. The team has successfully detected highly confidential posts of prototypes coming directly from their headquarters, posts and information that they were unable to pick up on without the geography-based monitoring.

  A Fortune 50 media company used location-based social media to monitor a disgruntled ex-employee who made threatening remarks toward the company CEO during an exit interview. The team established a “geo-fence” around the ex-employee’s home and identified death threats to the CEO across Twitter, Instagram and Facebook. The company was able to track all subsequent posts to monitor threat levels as well as proximity-based alerts to their CEO, keeping the CEO and his family safe.

  Location-based social media monitoring empowers corporate security in the following ways:

Understand your personnel’s surroundings at all times

  See what’s happening around your executives, employees, partners and other personnel wherever they are through video, photo and text content.

Real-time, location-based brand protection

  Identify fraud and minimize loss by adding a layer of hyper-targeted geographical data to your intelligence set.

Monitor and protect all of your physical assets

  Location-based content streaming means offices, facilities, event areas and other physical spaces can be monitored simultaneously to identify and respond to potential threats.

Strengthen your overall business continuity plan

  The ability to monitor any location in the world, in real time, allows for preemptive action and improved response times during crisis situations.

  Educate yourself on the power of social media and location-based data. There is incredible value in all of this data emerging across the social networks when filtered for the signals. Without that filtering, it’s just noise – and lots of it.

Submission + - Time Warner Cable Owes $229,500 to Woman it Would Not Stop Calling

HughPickens.com writes: Reuters reports that a Manhattan federal judge has ruled that Time Warner Cable Inc must pay Araceli King $229,500 for placing 153 automated calls meant for someone else to her cellphone in less than a year, even after she told them to stop. King accused Time Warner Cable of harassing her by leaving messages for Luiz Perez, who once held her cellphone number, even after she made clear who she was in a seven-minute discussion with a company representative. Time Warner Cable countered that it was not liable to King under the federal Telephone Consumer Protection Act, a law meant to curb robocall and telemarketing abuses, because it believed it was calling Perez, who had consented to the calls. In awarding triple damages of $1,500 per call for willfully violating that law, U.S. District Judge Alvin Hellerstein said "a responsible business" would have tried harder to find Perez and address the problem. While Time Warner argued that they were unaware King ever asked to be on the company’s “do not call list,” Hellerstein determined “there is no doubt King made this revocation.” He wrote that the company “could not be bothered” to update King’s information, even after she filed suit against TWC in March of 2014. The judge said 74 of the calls had been placed after King sued in March 2014 and that it was "incredible" to believe Time Warner Cable when it said it still did not know she objected. "Companies are using computers to dial phone numbers," says King's lawyer Sergei Lemberg. "They benefit from efficiency, but there is a cost when they make people's lives miserable. This was one such case."

Slashdot Top Deals

Today is a good day for information-gathering. Read someone else's mail file.

Working...