Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Submission + - Public libraries tinker with offering makerspaces (medium.com)

eggboard writes: Public libraries are starting to build temporary and permanent labs that let patrons experiment with new arts, crafts, and sciences, many of them associated with the maker movement. It's a way to bring this technology and training to those without the money or time to join makerspaces or buy gear themselves. It seems to extend the mission of libraries to educate, inform, and enrich, but is a seemingly rare move in the direction of teaching people to create for pleasure and professionally. Many libraries are experimenting with experimenting.

Submission + - Smart Racquets Could Transform Tennis

Hugh Pickens DOT Com writes: L. J. Rick reports at BBC that Babolat has released a tennis racket with gyroscopes, accelerometers and a piezoelectric sensor in the handle that can assess your every shot, sensing where the ball strikes the racquet and the quality of the contact. It counts forehands and backhands, serves and smashes and provides stats in the form of tennis data that can be analysed, stored and compared. The sensor can gather data such as ball speed, accuracy, and angle, and will pair the info with devices such as Bluetooth, phones, computers and USB connections. "We integrated sensors inside the handle of the racquet, but it does not change the specification. And these sensors will analyse your tennis game, so your swing — your motion — and all this information will be collected by the racquet," says Gael Moureaux. The International Tennis Federation, aware of the growing influx of hi-tech equipment into the sport, has set up a program called Player Analysis Technology (PAT) to regulate such "virtual coaches" as the Babolat racquet. The governing body wants to be calling the shots on where and how innovation can be used, as in the past it has found itself having to ban some products like the so-called "spaghetti-strung" racquets (with double stringing that are already on the market and in use. In conjunction with its PAT approval program, the ITF has also brought in a new rule — Rule 31 — to reflect the growing use of connected equipment, and its possible role in tournament play. Approved devices need to be secure and protected against unauthorised access, to prevent "sporting espionage'" whereby data could be stolen. Knowing when an opponent's right hand gets tired during the second set would be a huge advantage. Despite the innovations, one trainer does not think he is in danger of being upstaged by a smart racquet. "I think that it's great for feedback but you still need someone to analyze it," says tennis coach says Nik Snapes. "At the end of the day it's the practice and the ability of someone that makes the player, not necessarily the equipment in their hand."

Submission + - Edward Snowden says NSA engages in industrial espionage (www.cbc.ca) 2

Maow writes: Snowden has been interviewed by a German TV network and stated that the NSA is involved in industrial espionage, which is outside the range of national security.

He claims that Siemens is a prime example of a target for the data collection.

I doubt this would suprise AirBus or other companies, but it shall remain to be seen what measures global industries take (if any) to prevent their internal secrets from falling into NSA's — and presumably American competitors' — hands.

Comment Re:Now the next step... (Score 1) 143

This is actually current fee table. www.uspto.gov/curr_fees
While no single item costs the $10,000 i quoted, there are separate fees for application filing, extra claims, more than 100 pages etc, search, examination, issuance and most importantly maintenance fees which are quite high over period of the patent(applicable only of course if awarded). I didn't want to get into the details, but believe me it will cost you in that range easily.
My point being the current fees system is carefully designed to prevent people from abusing with sheer load. If there is load it is generating enough money, USPTO is simply not hiring enough people to handle it, that is merely a execution problem not a system design failure.

Comment Re:Now the next step... (Score 4, Interesting) 143

(e.g. submitting the same fucking thing 100 different times hoping one submission will slip by an overworked patent reviewer)

I am not a fan of the current patenting system, but this is BS, a patent application costs $10,000, if the patent reviewer is overworked it has nothing to do with the abuse of the system, even considering a cost of $200,000 to the USPTO per patent reviewer including all the overheads a reviewer has to only review 20 patents a year to make the system viable.

Comment Re:Stand their ground (Score 1) 247

It's like PCI Express or USB. Sure it's patented but end users don't pay patent fees.

Perhaps you did not pay it directly but if you bought the device then you did pay the fees for the patents, along with the illegal pollutants in it, the Chinese sweatshops making it for you. The minute you pay for it, It is your endorsement of all the things behind making that product.

Comment Re:Like 100 years ago... (Score 1) 464

no your assertion was they are not illegal, which may as well be, but that doesn't say anything about requiring training.
Just cause legally training is not mandated does not mean training is not required. I don't need any special certification outside being an engineer to run say a power plant but that doesn't mean i don't need loads of training to do it.

Comment Re:That's a tiny number (Score 1) 464

I m not a security expert or a systems architect, this is purely from a layman's perspective but this is what i would do

Log everything, every file access every read and write call, some one with root access may clean up the logs you might say, then integrate it into the file sytem architecture, still really talented hackers might circumvent the File-system and directly access it. Even better built into the hardware of the storage devices to make it really tamper proof. Once you do log everything, it is not too difficult to setup alerts on suspicious patterns especially for large scale theft.

If some of the above it too disruptive, too costly, too difficult to implement then alternative is to simply have peers review your access in sensitive systems. Meaning every time some one needs root access to those system, other sysadmins preferably needs monitor/approve etc, sure it creates more red tape and bureaucracy and decrease in productivity, but better than the loosing data of national importance. In general more the people having monitoring information access, less chance of theft, as it then requires more people to collateralize on your wrong doing making it statistically less probable.

Finally I would suggest encryption at multiple levels, I don't know what exact role snowden actually performed, but I cannot visualize many cases where he needed access to the contents of a file or object to do sysadmin work. Even if it required such decryption, NSA could easily setup dedicated servers which will decrypt file and of course log the requests.

These are crude ideas and are probably full of holes, but any with serious experience and sufficient time and thought can design robust systems making it much harder to steal. No system is perfect, but it could been made far harder and amount of information leaked could have been minimized far better.

I think this more a symptom of the american security apparatus rather than a problem with the NSA only, look at how easy it was for Manning to take information, he was no techie, not particularly given special access.

Far more than spooks collecting data I am worried at how badly they are securing it. To clarify I am not supporting this invasion of privacy, but merely saying that this data can end easily up in the hands of people who will do far worse than what NSA will do.

Comment Re:That's a tiny number (Score 5, Insightful) 464

what makes you think that foreign Governments didn't have already access to the information?,

if Snowden could get access so easily to so much without getting noticed, what makes you think any state couldn't have just easily bribed any other sysadmin and kept getting the same info?

You should really question the NSA security policies, for an organization which infiltrates networks regularly to have such poor security is appalling.

Surprisingly that doesn't seem to come up in this whole dialog about Snowden leaks. Everyone seems to think NSA is some all knowing efficient organization, the perfect big brother.

To me it seems they are woefully incompetent in even keeping basic access control policies in place.

Before anyone starts explaining about how it is difficult not to give root access to sys admins etc, it is not exactly rocket science to have peer reviewed access control polices even for sys admins, and alert systems in place depending on the amount of data being accessed over a period of time etc. if I think of 5 different measures of the cuff, I am sure any serious security consultant worth his fees should be able to do much much better.

I cannot stress this enough if a company losses data like this as happening fairly frequently these days, while worrying, I can on some level understand that it is not their core business, and perhaps they didn't spend enough on security and missed a step or two, but for an organization whose main objective is to do break into networks, this is plain stupid.

Comment Re:system design cross training & nostalgia (Score 1) 277

It is not that difficult I am sure there are plenty of ppl out here who have done better than me but here is what i do I routinely work with 56K, with latency hitting 800-1200ms(extremely poor ISP). Just need to adjust your browsing behavior accordingly. Unless I absolutely must, almost always have images and plugins are disabled. I prefer using links as a browser for reading news and blogs, by and large these sites do not require JS for the basic functioning. As a bonus, it is probably as safe as using noscript stringently, and also perhaps protect against the obscure img hacks? Also if possible i avoid using browser based applications when i can use desktop applications using appropriate protocols such mail clients, chat apps etc, or use apps that really use web storage properly, so you don't really feel the speed issue. By and large I find more than speed it the latency is this bigger problem. Of course i enjoy normal speeds like everyone else when i return to civilization so to speak.

Slashdot Top Deals

"And remember: Evil will always prevail, because Good is dumb." -- Spaceballs

Working...