Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Education

2014 Geek Gift Guide 113

With the holidays coming up, Bennett Haselton has updated his geek-oriented gift guide for 2014. He says: Some of my favorite gifts to give are still the ones that were listed in several different previously written posts, while a few new cool gift ideas emerged in 2014. Here are all my current best recommendations, listed in one place. Read on for the list, or to share any suggestions of your own.
Shark

US Navy Authorizes Use of Laser In Combat 225

mi writes The U.S. Navy has declared an experimental laser weapon on its Afloat Forward Staging Base (AFSB) in the Persian Gulf an operational asset and U.S. Central Command has given permission for the commander of the ship to defend itself with the weapon. The 30 kilowatt Laser Weapon System (LaWS) was installed aboard USS Ponce this summer as part of a $40 million research and development effort from ONR and Naval Sea Systems Command (NAVSEA) to test the viability of directed energy weapons in an operational environment. No word yet on a smaller, shark-mounted version.
Twitter

An Algorithm To Prevent Twitter Hashtag Degeneration 162

Bennett Haselton writes The corruption of the #Ferguson and #Gamergate hashtags demonstrates how vulnerable the hashtag system is to being swamped by an "angry mob". An alternative algorithm could be created that would allow users to post tweets and browse the ones that had been rated "thoughtful" by other users participating in the same discussion. This would still allow anyone to contribute, even average users lacking a large follower base, while keeping the most stupid and offensive tweets out of most people's feeds. Keep reading to see what Bennett has to say.
Twitter

Twitter Should Use Random Sample Voting For Abuse Reports 132

Bennett Haselton writes: Twitter has announced new protocols for filing and handling abuse reports, making it easier to flag specific types of content (e.g. violence or suicide threats). But with the volume of abusive tweets being reported to the company every day, the internal review process will always be a bottleneck. The company could handle more abuse reports properly by recruiting public volunteers. Read what Bennett thinks below.
Open Source

Openwashing: Users and Adopters Beware 96

jenwike writes: With the success of open source software today, we are seeing organizations undertake more egregious marketing and promotion schemes that exaggerate their participation in, contributions to, and/or licensing of open source software. Their hope is to capitalize on the label of 'open source' and the success that goes along with it. The reality is that the responsibility is on the end-users to review the software and accompanying license to ensure it meets your expectations.
Cloud

Clarificiation on the IP Address Security in Dropbox Case 152

Bennett Haselton writes A judge rules that a county has to turn over the IP addresses that were used to access a county mayor's Dropbox account, stating that there is no valid security-related reason why the IP addresses should be exempt from a public records request. I think the judge's conclusion about IP addresses was right, but the reasoning was flawed; here is a technically more correct argument that would have led to the same answer. Keep Reading to see what Bennett has to say about the case.
Math

Big Talk About Small Samples 246

Bennett Haselton writes: My last article garnered some objections from readers saying that the sample sizes were too small to draw meaningful conclusions. (36 out of 47 survey-takers, or 77%, said that a picture of a black woman breast-feeding was inappropriate; while in a different group, 38 out of 54 survey-takers, or 70%, said that a picture of a white woman breast-feeding was inappropriate in the same context.) My conclusion was that, even on the basis of a relatively small sample, the evidence was strongly against a "huge" gap in the rates at which the surveyed population would consider the two pictures to be inappropriate. I stand by that, but it's worth presenting the math to support that conclusion, because I think the surveys are valuable tools when you understand what you can and cannot demonstrate with a small sample. (Basically, a small sample can present only weak evidence as to what the population average is, but you can confidently demonstrate what it is not.) Keep reading to see what Bennett has to say.
Businesses

Can Ello Legally Promise To Remain Ad-Free? 153

Bennett Haselton writes: Social networking company Ello has converted itself to a Public Benefit Corporation, bound by a charter saying that they will not now, nor in the future, make money by running advertisements or selling user data. Ello had followed these policies from the outset, but skeptics worried that venture capitalist investors might pressure Ello to change those policies, so this binding commitment was meant to assuage those fears. But is the commitment really legally binding and enforceable down the road? Read on for the rest.

Why Phone Stores Should Stockpile Replacements 253

Bennett Haselton writes: I would be in favor of a regulation requiring cell phone stores to have replacement phones on hand, for any phone model covered by a customer's insurance policy. Then customers who have insurance protection on their phones could get the damaged phones replaced instantly, and the replacement phones that are normally mailed out by overnight mail to customers under their protection plan, could instead be mailed to the stores to replace the one they just gave out to the customer. Read on for the rest of Bennett's thoughts
Privacy

UK Government Report Recommends Ending Online Anonymity 282

An anonymous reader writes with a bit of pith from TechDirt: Every so often, people who don't really understand the importance of anonymity or how it enables free speech (especially among marginalized people), think they have a brilliant idea: "just end real anonymity online." They don't seem to understand just how shortsighted such an idea is. It's one that stems from the privilege of being in power. And who knows that particular privilege better than members of the House of Lords in the UK — a group that is more or less defined by excess privilege? The Communications Committee of the House of Lords has now issued a report concerning "social media and criminal offenses" in which they basically recommend scrapping anonymity online.
Cellphones

Why My LG Optimus Cellphone Is Worse Than It's Supposed To Be 291

Bennett Haselton writes My LG Optimus F3Q was the lowest-end phone in the T-Mobile store, but a cheap phone is supposed to suck in specific ways that make you want to upgrade to a better model. This one is plagued with software bugs that have nothing to do with the cheap hardware, and thus lower one's confidence in the whole product line. Similar to the suckiness of the Stratosphere and Stratosphere 2 that I was subjected to before this one, the phone's shortcomings actually raise more interesting questions — about why the free-market system rewards companies for pulling off miracles at the hardware level, but not for fixing software bugs that should be easy to catch. Read below to see what Bennett has to say.
Social Networks

Employees Staying Away From Internal Corporate Social Networks 131

jfruh (300774) writes As social networks proliferated in the early '10s, so did the idea of a corporate social network — a Facebook-like community on an intranet where employees could interact. Unfortunately, corporate users are staying away in droves, perceiving the systems as one more in-box they'd have to take care of and getting their social-networking fix from Facebook and the like. From what I've seen of these internal networks, another good reason is that they're not as good as the full-time social networks are, and offer access only to a small universe of particpants anyhow. They're like a central-casting "rock band" in '80s movies — they come off as conspicuously aping the real thing.
Cellphones

Florida Man Faces $48k Fine For Jamming Drivers' Cellphones 358

An anonymous reader writes with this news from The Independent: An American driver is facing a $48,000 fine after using a mobile signal jammer in his car to block motorists around him from using their phones on the road. Jason Humphreys reportedly used the jammer from the back seat of his Toyota Highlander for around two years before being caught by Florida police. The 60-year-old said that he used the jammer – which transmits radio signals that interfere with mobile phones – because he was 'fed up' with watching others use their phones on the road. A story from late April (before the fine was levied) gives more detail: The case along I-4 started on April 29, 2013, when the cellular company Metro PCS contacted the Federal Communications Commission because a transmission tower along I-4 would suffer in the morning and evening. A week later, agents from the FCC's enforcement division in Tampa staked out the freeway on May 7, 8, and 9 and pinpointed a “strong wideband emission” in the cellphone wireless range “emanating from a blue Toyota Highlander sport utility vehicle,” with Florida license plates, according to a complaint issued by the FCC on Tuesday. Another clue: When Hillsborough County Sheriffs deputies stopped the SUV, their own two-way radios were jammed."
Media

Virtual DVDs, Revisited 147

Bennett Haselton writes: "In March I asked why Netflix doesn't offer their rental DVD service in 'virtual DVD' form -- where you can 'check out' a fixed number of 'virtual DVDs' per month, just as you would with their physical DVDs by mail, but by accessing the 'virtual DVDs' in streaming format so that you could watch them on a phone or a tablet or a laptop without a DVD drive. My argument was that this is an interesting, non-trivial question, because it seems Netflix and (by proxy) the studios are leaving cash on the table by not offering this as an option to DVD-challenged users. I thought some commenters' responses raised questions that were worth delving into further." Read on for the rest of Bennett's thoughts.
Security

Do Embedded Systems Need a Time To Die? 187

chicksdaddy writes: "Dan Geer, the CISO of In-Q-Tel, has proposed giving embedded devices such as industrial control and SCADA systems a scheduled end-of-life in order to manage a future in which hundreds of billions of them will populate every corner of our personal, professional and lived environments. Individually, these devices may not be particularly valuable. But, together, IoT systems are tremendously powerful and capable of causing tremendous social disruption. 'Is all the technologic dependency, and the data that fuels it, making us more resilient or more fragile?' he wondered. Geer noted the appearance of malware like TheMoon, which spreads between vulnerable home routers, as one example of how a population of vulnerable, unpatchable embedded devices might be cobbled into a force of mass disruption. Geer proposes a novel solution: embedded systems that do not have a means of being (securely) managed and updated remotely should be configured with some kind of 'end of life,' past which they will cease to operate. Allowing embedded systems to 'die' will remove a population of remote and insecure devices from the Internet ecosystem and prevent those devices from falling into the hands of cyber criminals or other malicious actors, Geer argued."

Slashdot Top Deals

The moon is made of green cheese. -- John Heywood

Working...