Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Submission + - Ubuntu phone isn't important enough to demand an open source baseband (networkworld.com)

colinneagle writes: Canonical is producing a version of the Ubuntu Linux distribution specifically for smartphones, but Richard Tynan, writing for PrivacyInternational.org, recently pointed out that the baseband in Ubuntu-powered phones will remain closed source (and highly proprietary). So, while Ubuntu itself is Open Source, the super-critical firmware on the phones will not be. This creates the immediate practical problem of leaving the information transmitted by your phone open to snooping by organizations that take advantage of issues in the Closed Source firmware.

Some have criticized Canonical for missing an opportunity to push for a fully Open Source smartphone, but in order to fix this problem (and open up the code for this super-critical bit of software), we need companies that have a large amount of clout, in the smartphone market, to make it a priority. Canonical (with Ubuntu) just doesn't have that clout yet. They're just now dipping their toes into the smartphone waters. But you know who does have that clout? Google.

Google has made a point of touting Open Source (at least sometimes), and they are the undisputed king of the smartphone operating system world. And yet I hear no big moves by Google to encourage phone manufacturers to utilize Open Source basebands, such as OsmocomBB. So has Canonical missed an opportunity? No. Not yet. If (some may say "when") Ubuntu gains a critical amount of market share in the phone world, that will be their chance to pressure manufacturers to produce a truly Open Source phone. Until then, Canonical needs to continue to work within the world we have today.

Submission + - In defense of Microsoft's leak investigation (networkworld.com)

colinneagle writes: By now, you've probably heard about the former Microsoft employee arrested for spilling trade secrets to a French website, and the impact it has had throughout the underground community that thrived on leaks. How Microsoft was able to get him might be trust-damaging to some, but not to me. Here's what I find stunning — Microsoft caught the guy because he was using MSN Messenger, SkyDrive, and Hotmail.com to coordinate the leaks. From that point, Microsoft’s Office of Legal Compliance (OLC) approved content pulls of the blogger’s Hotmail account. Yes, they have permission to do that. You accepted it when you signed up for Hotmail. From there, they found evidence in his SkyDrive and Hotmail accounts. The fact that it took another 18 months to pull the trigger and arrest Kibkalo shows the careful deliberation Microsoft took.

There's a mindset out there that unfashionable companies, those that are OK to dislike, have no right to defend themselves. I've read some amazing things over the weekend regarding Microsoft's actions. They didn't do this on a hunch or a fishing expedition. They had clear evidence that someone internally was leaking intellectual property and every right to find out who it was.

Submission + - He Pressed The Brakes, His Tesla Model S Didn't Stop. Why?

cartechboy writes: When things go wrong with the Tesla Model S electric car, its very loyal--and opinionated--owners usually speak up. And that's just what David Noland has done. An incident in which his Model S didn't stop when he pressed the brake pedal scared him--and got him investigating. He measured pedal spacing on 22 different new cars at dealers--and his analysis suggests that the Tesla pedal setup may be causing what aviation analysts call a "design-induced pilot error". And pedal design, as Toyota just learned to the tune of $1.2 billion, is very important indeed in preventing accidents.

Submission + - A call for rollbacks to previous versions of software (networkworld.com)

colinneagle writes: In a blog post, Andy Patrizio laments the trend — made more common in the mobile world — of companies pushing software updates ahead without the ability to roll-back to previous versions in the event that the user simply doesn't like it. iOS 7.1, for example, has reportedly been killing some users' battery power, and users of the iTunes library app TuneUp will remember how the much-maligned version 3.0 effectively killed the company behind it (new owners have since taken over TuneUp and plans to bring back the older version).

The ability to undo a problematic install should be mandatory, but in too many instances it is not. That's because software developers are always operating under the assumption that the latest version is the greatest version, when it may not be. This is especially true in the smartphone and tablet world. There is no rollback to be had for anything in the iOS and Android worlds.

Until the day comes when software developers start releasing perfectly functioning, error-free code, we need the ability to go backwards with all software.

Submission + - How one of the richest countries in the world got debt-ridden (xn--forbrukslnguide-plb.no)

kentjohansen writes: According to Forbrukslånguide.no, Norway is one of the most debt-ridden countries in the world. At first, this might appear as strange, especially as Norway is one of the richest countries in the world. However, there are many financial products available and the banks don't ask too many questions before giving out loans.

Submission + - MIT Scientists Engineer World's First Bionic Plant (ibtimes.co.uk)

DavidGilbert99 writes: They are capable of absorbing light 30% more effectively than normal plants and could be used to monitor pollution or the distribution of chemical weapons. The bionic plants integrate carbon nanotubes into the leaves of regular plants, and the scientists from Massachusetts Institute of Technology (MIT) were able to replicate and improve upon a plant's natural ability to photosynthesise.

Submission + - Embarrassing stories shed light on U.S. officials' technological ignorance (networkworld.com)

colinneagle writes: Speaking at the SXSW Conference recently, Dr. Peter W. Singer, director of the Center for 21st Century Security and Intelligence, recalled one U.S. official who was "about to negotiate cybersecurity with China" asking him to explain what the term "ISP" (Internet Service Provider) means. This wasn't the only example of this lack of awareness.

"That’s like going to negotiate with the Soviets and not knowing what ‘ICBM’ means," Dr. Singer said. "And I’ve had similar experiences with officials from the UK, China and Abu Dhabi."

Similarly, Dr. Singer recalled one account in which Janet Napolitano, the Secretary of the U.S. Homeland Security Department from 2009 to 2013, admitted that she didn't use email "because she just didn’t think it was useful."

"A Supreme Court justice also told me ‘I haven’t got round to email yet’ — and this is someone who will get to vote on everything from net neutrality to the NSA negotiations," Dr. Singer said.

Submission + - Microsoft Research project turns walls of a room into display (networkworld.com)

colinneagle writes: Microsoft Research has just taken the wraps off SurroundWeb, research prototype to display webpages on multiple projectors to display information on the walls of the room you are in. Microsoft describes SurroundWeb as "a 3D Browser that displays webpages across multiple surfaces in a room, adapt their appearance to objects present in that room, and interact using natural user input."

A Room Skeleton is rendered using the Kinect motion sensor from the Xbox. It scans the room to see what kinds of surfaces are available and what areas are not, such as windows or art on the walls. Next, SurroundWeb learns what projection equipment is available, such as just a monitor, projects, phones, and anything else with a display. The monitor shows the main presentation information while the projector shows additional content "spilling out" of the slide and onto the wall of the room. Phones can be used for interacting with the content and you can use the Kinect's hand-gesture support as well.

Microsoft states rather clearly that it is sensitive to privacy concerns around scanning the room. "From mobile phones, we have learned how dangerous it is to give devices unrestricted access to sensor output ... Similarly, from raw video and depth streams inside a home, it is likely possible to infer economic status, health information, and other sensitive information. Therefore we do not want to expose raw sensor data to webpages," the researchers said in their paper.

Submission + - How to hack an Android smartphone to get broadband, TV for $8 per month

colinneagle writes: It wasn't easy, but Steve Patterson hacked an HTC First smartphone to deliver cheap over-the-air internet for PCs and live TV. He details the process here, which involved switching the SIM card to get on T-Mobile's network, using Aereo for OTA internet and TV, and rooting the First to make it into a Wi-Fi router. While admitting that the process would have been easier with a different, more easily unlock-able smartphone, he did accomplish it.

For those with thousands of television channels and a fondness for exclusive services like HBO and ESPN — which were not available through this method — this approach may not provide enough choice. But for the consumer who regularly looks at his or her cable guide and wonders why hundreds of shows are listed but only a handful are interesting, it's a good way to save some money.

Submission + - Google Glass backlash escalates to violence (networkworld.com)

colinneagle writes: A lot of people really don't like Google Glass when they come across it. This week, it turned to violence.

Sarah Slocum, whose LinkedIn profile lists her as a contributing editor at Newsdab, said in a Facebook post that she was assaulted by two women at a San Francisco bar after initially showing other patrons how the device works. The women were reportedly part of a group of bar patrons who were concerned with being recorded by the Glass.

Shortly after Slocum was attacked, a male patron reportedly stole her Google Glass device off her face, and when she chased after him, someone else stole her wallet and cellphone, Slocum explained in a Facebook post.

Submission + - If Apple's making an iWatch, it won't measure glucose levels (networkworld.com)

colinneagle writes: The purported iWatch project — a smart wrist-worn device that rumors suggest Apple has been working on — may come to fruition at some point this year. Tim Cook has hinted at the company entering new product categories in 2014, and Apple has been hiring experts in wearable technologies and medical sensors like crazy lately.

This has spawned some extreme rumors, to the extent that some expect a device that can do things like automatically and continuously monitor glucose levels, or even detect heart attacks before they occur.

Some digging around the wearable medical device community shows just how impossible this is.

Submission + - WhatsApp co-founder Brian Acton was once rejected by both Facebook and Twitter (networkworld.com)

colinneagle writes: WhatsApp was originally founded in 2009 by Brian Acton and Jan Koum, both former Yahoo engineers. What's particularly interesting, if not downright inspirational, is that Acton — himself a former Apple engineer — applied for jobs at both Twitter and Facebook way before WhatsApp became a wildly popular mobile app. Both times he was rejected. In May 2009 he tweeted, "Got denied by Twitter HQ. That's ok. Would have been a long commute." And then in August 2009, he tweeted, "Facebook turned me down. It was a great opportunity to connect with some fantastic people. Looking forward to life's next adventure."

His co-founder, Jan Koum, was also reportedly denied for a job at Facebook as well.

Submission + - With 'virgin' developers, Microsoft could fork Android (networkworld.com)

colinneagle writes: Amid all the talk about Microsoft forking Android for a smartphone OS, one suggestion involves a look back to Microsoft's DOS days. Microsoft DOS was designed per IBM’s specification to run exclusively on IBM’s PC hardware platforms. Phoenix Technologies employed software developers it nicknamed “virgins,” who hadn’t been exposed to IBM’s systems to create a software layer between Microsoft’s DOS system and PCs built by IBM’s competitors. This helped Microsoft avoid infringing on IBM’s patents or copyrights, and subsequently helped fuel the explosive growth of PC clones.

Microsoft could use the same approach to “clone” the proprietary Android components in its own Android fork. This would prevent copyright infringement while giving Microsoft access to Google Play apps, as well as Android's massive base of developers.

Submission + - Criminals Tailoring Mobile Malware Depending on Where Victims Live (ibtimes.co.uk)

DavidGilbert99 writes: Just as marketeers and advertisers will tailor ad campaigns depending on what audience they are talking to, the criminals behind mobile malware campaigns are now evolving to create malicious apps which target a specific region or country depending on regulation, smartphone usage and which app stores they use.

Submission + - Apple appears to be stockpiling biosensor experts (networkworld.com)

colinneagle writes: Some digging around on LinkedIn found a lot of relatively recent hires at Apple involving people with experience in wearable devices, medical sensor technology, and other areas that may relate to Apple's long-rumored iWatch initiative.

Slashdot Top Deals

The hardest part of climbing the ladder of success is getting through the crowd at the bottom.

Working...