Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Submission + - FrontPoint Security System Reviews – Home Security Alarm Systems (youtube.com)

MarkSpencer90 writes: http://securitysystemdiscount.... 2 weeks before Christmas, somebody broke into my house and I was asleep because I work graveyard shift as a nurse. And as a result, I woke up trying to find somebody to come into the room where I was sleeping. I did chase them out butI knew that time that I need a home security alarm system.

Other home security alarm system companies don’t have that wireless or cellular feature that is compatible with mobile devices.FrontPoint, on the other hand, we ended up getting the entire security system installed in the house—we’ve got sensors all over the doors and windows, we have motion detectors, and everything can be remotely controlled as long as I get internet signal.

Submission + - Attain Accredited Emergency First Aid Training Procedures from Surety Group

An anonymous reader writes: The possibility of illness and mishaps amongst employees are a constant thorn in any organizations side. The assistance of the accredited emergency first aid training imparted by Surety Group will help minimise this threat. Surety safety training courses aid support in your organization in case of emergency.

Surety Group offers three training modules to your employees. These are based on three levels of certifications and involve progressive levels of proficiency. The first module is the Level 3 First Aid at Work module (QFC). It is a three-day program for anyone who wishes to be a first aider or is already a first aider, but wants to brush up their skills. Surety Group also cover Level 2 of the Emergency First Aid training at work, a one-day course dealing with any emergency situation employees may need to handle at work.

Level 2 involves ensuring that employees can help when incidents involve low-risk injuries such as minor cuts, bleeding, choking, and shock or if someone becomes unconscious. In Level 3 a wider variety of illnesses like fainting, angina, heart attack, bleeding (both major and minor) and burns of most kinds are covered. Additionally attendees will also receive Emergency First Aid training to handle more serious injuries such as injuries to the eyes, poisoning, seizures, asthma attacks, anaphylaxis and even strokes. Unfortunately, in today's hectic workplaces, a lot of the problems mentioned here can and do happen with increasing alacrity.

The certificate that employees receive on completion of the course is valid for three years. There are revalidation courses available for the Level 3 programme that allow candidates to renew their certification for another three years once they have completed the program successfully. A spokesman for Surety Group stated: “We have refresher trainings annually, and this help the first aiders in refreshing themselves in the absence of actual scenarios of use. Many times a momentary lapse can cost a life.” Surety Group wants to ensure that your organization will have full health & safety coverage, and employees will know how to react adequately at all times and in all cases of emergency.

Submission + - This fake phone has raised nearly $8,000 on Kickstarter (trymodern.com)

Jam07 writes: Phone addiction is real, and there’s a Kickstarter campaign geared towards combating that, or at least that’s what they want you to think. Forged from the fiery plastic cauldrons, the NoPhone is essentially a block of plastic that looks similar to an iPhone. You can’t make calls or send nude Snapchats to your lover because it’s not a phonereally.

Submission + - OpenBSD 5.6 Released

An anonymous reader writes: Just as per the schedule, OpenBSD 5.6 was released today, November 1, 2014. The theme of the 5.6 release is "Ride of the Valkyries". OpenBSD 5.6 will be the first version with LibreSSL. This version also removed sendmail from the base system, smtpd is the default mail transport agent (MTA). The installer no longer supports FTP, network installs via HTTP only. The BIND name server will be removed from the OpenBSD base system. Its replacement comes in the form of the two daemons nsd(8) for authoritative DNS service and unbound(8) for recursive resolver service. OpenSSH 6.7 is included along with GNOME 3.12.2, KDE 4.13.3, Xfce 4.10, Mozilla Firefox 31.0, Vim 7.4.135, LLVM/Clang 3.5 and more. See a detailed log of changes between the 5.5 and 5.6 releases for more information. If you already have an OpenBSD 5.5 system, and do not want to reinstall, upgrade instructions and advice can be found in the Upgrade Guide (a quick video upgrade demo is here). You can order the 5.6 CD set from the new OpenBSD Store and support the project.

Submission + - IE11 Finally Passes IE8 To Become The World's Most Popular Browser 1

An anonymous reader writes: Ever since its release in October 2013, IE11 has been unable to pass IE8 in market share. It made steady gains, but then plateaued before it could become the world’s most popular browser. Now, Microsoft’s latest and greatest has finally done it. IE11 gained a huge 6.92 percentage points to hit 17.13 percent. IE10 gained 0.51 points to 6.09 percent while IE9 slipped 0.66 points to 8.68 percent. Most importantly, IE8 fell 4.94 points to 17.31 percent.

Submission + - A smart electric bike: taking the Copenhagen Wheel out for a spin (xconomy.com)

mlamonica writes: Bikes are a great way to get around the city. But what if it's just too hilly or far to commute by bike? That's where Superpedestrian wants to come in. With a license from MIT's Senseable City Lab, they're commercializing the Copenhagen Wheel, a bike wheel replacement that gives riders electric assist, and through 12 embedded sensors, lots of information on a smart phone app. I took the bike for a ride at the Cambridge office and offer this review.

Feed Google News Sci Tech: FCC Chairman Tom Wheeler considers proposing new rules to ensure real ... - The (google.com)


The Westside Story

FCC Chairman Tom Wheeler considers proposing new rules to ensure real ...
The Westside Story
Tom Wheeler, Chairman at the US Federal Communications Commission (FCC), revealed on Friday that new rules might be proposed to guarantee real consumer choice. This announcement comes at a time when the giants in the telecommunication...
FCC Will Consider 'Hybrid' Approach to Net Neutralityio9
FCC Head Seeks to Retain Last-Mile Wholesale Access for CLECsChannel Partners
FCC seeks to expand phone net neutrality rules to broadbandDaily Digest
Tech Times-Uncover California-Modern Readers
all 227 news articles

Feed Google News Sci Tech: FCC Will Consider 'Hybrid' Approach to Net Neutrality - io9 (google.com)


Forbes

FCC Will Consider 'Hybrid' Approach to Net Neutrality
io9
The Federal Communications Commission will soon consider a proposal that would grant the agency regulatory authority over the flow of Internet traffic between content providers and Internet service providers, the New York Times reports.
FCC Head Seeks to Retain Last-Mile Wholesale Access for CLECsChannel Partners
FCC seeks to expand phone net neutrality rules to broadbandDaily Digest
FCC's Wheeler may become ISPs' worst nightmare with hybrid approach: Here's ... Tech Times
Uncover California-Modern Readers-Businessweek
all 225 news articles

Submission + - Is Public Debate of Trade Agreements Against the Public Interest? 1

onproton writes: The Trans Pacific Partnership (TPP), currently being negotiated in secret, has been subject to numerous draft leaks that indicate these talks are potentially harmful to everything from public health to internet freedom. So why isn’t the public involved, and why are the terms of the agreement being debated bend closed doors? According to New Zealand's current Trade Minister, Tim Groser, full disclosure of what is being discussed would likely lead to “public debate on an ill-informed basis before the deal has been done.” Leaving one to question how revealing the full context and scope of the agreement talks would lead to an increase in misinformation rather than clarity.

Feed Techdirt: After Protests Continue, Hungary Dumps Stupid Internet Tax Idea (google.com)

Earlier this week, we wrote about widespread demonstrations against a monumentally stupid plan by the Hungarian government to tax internet usage on a per-gigabyte-downloaded plan. The protests caused the government to "modify" the plan and put a cap on how much tax would be charged, but that seemed to do little to stop the complaints -- and thus, the government is shelving the plan entirely, with Prime Minister Viktor Orban announcing that the "tax in its current form cannot be introduced." Of course, that leaves open the possibility of it coming back in "another" form. But perhaps Orban is learning not to take on the internet. An analysis from the BBC talks about why Orban backed down:

Viktor Orban does not often back down, but he has done so on this occasion for several reasons.
  • He saw how unpopular the tax was. He managed with one stroke to do something which opposition leaders had tried and failed to do for five years: unify his opponents
  • He took on the best-organised community in the country - internet users - and lost
  • The government's communication methods failed again - as they have with almost every major decision since Fidesz came to power
  • "We are not Communists. We don't go against the will of the people," he said - a sign that growing comparisons between Fidesz and the old Hungarian Socialist Workers' Party are hitting the mark.
At the very least, this is yet another example of how the public is not willing to just roll over when politicians attack the internet.

Permalink | Comments | Email This Story








Submission + - Vulnerabilities Found In More Command-Line Tools (itworld.com) 2

itwbennett writes: The critical Shellshock vulnerabilities found last month in the Bash Unix shell have motivated security researchers to search for similar flaws in old, but widely used, command-line utilities. Two remote command execution vulnerabilities were patched this week in the popular wget download agent and tnftp client for Unix-like systems. This comes after a remote code execution vulnerability was found last week in a library used by strings, objdump, readelf and other command-line tools.

Submission + - First Detailed Data Analysis Shows Exactly How Comcast Jammed Netflix

An anonymous reader writes: John Oliver calls it "cable company fuckery" and we've all suspected it happens. Now on Steven Levy's new Backchannel publication on Medium, Susan Crawford delivers decisive proof, expertly dissecting the Comcast-Netflix network congestion controversy. Her source material is a detailed traffic measurement report (.pdf) released this week by Google-backed M-Lab — the first of its kind — showing severe degradation of service at interconnection points between Comcast, Verizon and other monopoly "eyeball networks" and "transit networks" such as Cogent, which was contracted by Netflix to deliver its bits. The report shows that interconnection points give monopoly ISPs all the leverage they need to discriminate against companies like Netflix, which compete with them in video services, simply by refusing to relieve network congestion caused by external traffic requested by their very own ISP customers. And the effects victimize not only companies targeted but ALL incoming traffic from the affected transit network. The report proves the problem is not technical, but rather a result of business decisions. This is not technically a Net neutrality problem, but it creates the very same headaches for consumers, and unfair business advantages for ISPs. In an accompanying article, Crawford makes a compelling case for FCC intervention.

Submission + - Secret manuals show the spyware sold to despots and cops worldwide (firstlook.org)

Advocatus Diaboli writes: The manuals describe Hacking Team’s software for government technicians and analysts, showing how it can activate cameras, exfiltrate emails, record Skype calls, log typing, and collect passwords on targeted devices. They also catalog a range of pre-bottled techniques for infecting those devices using wifi networks, USB sticks, streaming video, and email attachments to deliver viral installers. With a few clicks of a mouse, even a lightly trained technician can build a software agent that can infect and monitor a device, then upload captured data at unobtrusive times using a stealthy network of proxy servers, all without leaving a trace. That, at least, is what Hacking Team’s manuals claim as the company tries to distinguish its offerings in the global marketplace for government hacking software.

Submission + - Comet Summer Siding's about to graze Mars' orbit. Could we use this? (cnet.com)

tqk writes: The linked article explains that this thing started on its way here a million years ago. It's going to be going back out there. That would be one seriously celestial bird's eye view. That got me thinking.

We already have another mission about to harpoon an asteroid. Well, how about we try to harpoon Summer Siding and hitch a ride. It's handling the propulsion problem. We just have to meet it on its way through our neighbourhood. I'm imagining some sort of automated observatory.

Has this idea been considered (and shot down for a million reasons) before? If we can't use Summer Siding this way (it was only discovered in 2013), how about we gin something up for the next traveller that comes through? And the next one, and the next one, ... Pretty soon, we'd have a constellation of these things way the hell out there reporting back everything they can see.

That would be really cool, I think, not to mention pretty useful.

Slashdot Top Deals

The moon is made of green cheese. -- John Heywood

Working...