Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Submission + - Google Releases "Pigeon" Update to Local Search Algorithm (atomicdesign.net)

Atomic_Design writes: Late last week Google rolled out an update to their local search algorithm. Search Engine Land broke the story, dubbing this algorithm change the “Pigeon” update.

The update includes factors from the web search, incorporating more traditional signals into the local search and Google Places algorithms.

Perceptive users will feel the effects of this update; the updated search features include a knowledge graph, and spelling amendments. Google’s local search results and Google Places searches will return more accurate and relevant results to users.

Search rankings have been significantly affected, but none of the reports indicate any spam changes to the algorithm. Google did not release the percentage of queries this update has affected.

Submission + - Why TiVo's founders crashed and burned with Qplay (digitaltrends.com)

Velcroman1 writes: Michael Ramsay and Jim Barton created a revolution with TiVo, a device that challenged the notion that we had to watch TV shows when they aired. And they hoped to do it again with Qplay, a device that challenged the notion that short-form videos had to be consumed one at a time, like snacks instead of meals. Qplay streamed curated queues of short-form Internet video to your TV using a small, simple box controlled by an iPad app. So what went wrong? Unlike TiVo, the Qplay box was difficult to justify owning, and thevalue of the service itself is questionable. And as of last week, Qplay is closed.

Submission + - Ask Slashdot: When is It Better to Modify the ERP vs. Interfacing It?

yeshuawatso writes: I work for one of the largest HVAC manufacturers in the world. We've currently spent millions of dollars investing in an ERP system from Oracle (via a third-party implementor and distributor) that handles most of our global operations, but it's been a great ordeal getting the thing to work for us across SBUs and even departments without having to constantly go back to the third-party, whom have their hands out asking for more money. What we've also discovered is that the ERP system is being used for inputting and retrieving data but not for managing the data. Managing the data is being handled by systems of spreadsheets and access databases wrought with macros to turn them into functional applications. I'm asking you wise and experienced readers on your take if it's a better idea to continue to hire our third-party to convert these applications into the ERP system or hire internal developers to convert these applications to more scalable and practical applications that interface with the ERP (via API of choice)? We have a ton of spare capacity in data centers that formerly housed mainframes and local servers that now mostly run local Exchange and domain servers. We've consolidated these data centers into our co-location in Atlanta but the old data centers are still running, just empty. We definitely have the space to run commodity servers for an OpenStack, Eucalyptus, or some other private/hybrid cloud solution, but would this be counter productive to the goal of standardizing processes. Our CIO wants to dump everything into the ERP (creating a single point of failure to me) but our accountants are having a tough time chewing the additional costs of re-doing every departmental application. What are your experiences with such implementations?

Submission + - Woman arrested after posting photo of George Osborne at Dominatrix's flat (wordpress.com)

An anonymous reader writes: A woman was arrested today after posting a photograph on Twitter of chancellor George Osborne at her flat when she worked as a madame at an escort agency.

Then today Natalie was arrested by the police for “abusive behaviour”:

Natalie’s home was also searched last year by police after she tried to publish her memoirs in which she mentions Osborne took cocaine and used her services as a dominatrix called Miss Whiplash.

IT

Ask Slashdot: What Would You Do With Half a Rack of Server Space? 208

New submitter Christian Gainsbrugh (3766717) writes I work at a company that is currently transitioning all our servers into the cloud. In the interim we have half a rack of server space in a great datacenter that will soon be sitting completely idle for the next few months until our lease runs out. Right now the space is occupied by around 8 HP g series servers, a watchguard xtm firewall, Cisco switch and some various other equipment. All in all there are probably around 20 or so physical XEON processors, and probably close to 10 tb of storage among all the machines. We have a dedicated 10 mbs connection that is burstable to 100mbs.

I'm curious what Slashdot readers would do if they were in a similar situation. Is there anything productive that could be done with these resources? Obviously something revenue generating is great, but even if there is something novel that could be done with these servers we would be interested in putting them to good use.

Comment Re:Why do you want pieces of plastic (Score 1) 354

You mean because of the torrent option? Can't speak for others but personally I don't fall into the hyperactive content consumer category. With a little priming of the queue, it's easy to plan to ahead and just get the disk instead of messing with a seedbox or other vpn option. And if I mess up and don't get a disk for Friday night, there always seems to be something worth watching via streaming for an hour or two.

So for less than $20 a month including the streaming option it's a pretty good deal for access just about every movie or series out there. Especially for cord cutters (raises hand).

Comment Re:For those that don't know: (Score 3, Informative) 113

I doubt a registrar would sell their internal customer billing database to an entity whose sole purpose is to take their business away. If you want to speculate, try this. When DROA scraped whois for targets, they filtered by Godaddy customers instead of Fabulous or Moniker. The thought being that more average Joes use GD and therefore easier to fool.

On the other hand it doesn't mean they didn't target the lesser known registrars. I've gotten plenty of DROA scam letters targeted toward my domains in the small registrars.

IOW, I don't think you can draw a conclusion that they filtered by registrar. If they did target, it would make sense to blanket those whois records with an organization name (i.e. formal businesses). And the bigger the better so it has a chance of hitting AP in accounting. Getting a $500 renewal on 5 years is much more likely to happen in that scenario.

Security

Critroni Crypto Ransomware Seen Using Tor for Command and Control 122

Trailrunner7 writes There's a new kid on the crypto ransomware block, known as Critroni, that's been sold in underground forums for the last month or so and is now being dropped by the Angler exploit kit. The ransomware includes a number of unusual features and researchers say it's the first crypto ransomware seen using the Tor network for command and control.

The Critroni ransomware is selling for around $3,000 and researchers say it is now being used by a range of attackers, some of whom are using the Angler exploit kit to drop a spambot on victims' machines. The spambot then downloads a couple of other payloads, including Critroni. Once on a victim's PC, Critroni encrypts a variety of files, including photos and documents, and then displays a dialogue box that informs the user of the infection and demands a payment in Bitcoins in order to decrypt the files.

"It uses C2 hidden in the Tor network. Previously we haven't seen cryptomalware having C2 in Tor. Only banking trojans," said Fedor Sinitsyn, senior malware analyst at Kaspersky Lab, who has been researching this threat. "Executable code for establishing Tor connection is embedded in the malware's body. Previously the malware of this type, this was usually accomplished with a Tor.exe file. Embedding Tor functions in the malware's body is a more difficult task from the programming point of view, but it has some profits, because it helps to avoid detection, and it is more efficient in general."

Comment Re:Really? (Score 2) 125

Heh, you're more devious than me. No, there's no limit but I suspect there will be some blowback if you start doing that. I just wanted a simple way of breaching their defenses, winning a battle vs. the war so to speak. Like the last act of defiance. Most people see the fake caller id, put a post on 800notes, and figure there's nothing they can do.

And it should be noted that this really only works against business services like merchant processing and SEO, getting past Rachel's defenses is probably different. That scam has a simple goal of getting the credit card number at all costs. Once they've got it they've succeeded; I suspect there's little need to field incoming calls.

But a crowdsourced project towards gathering target numbers/info about Rachel would be interesting. Like what anonymous does, with the sole purpose of exposing her inner sanctum.

Comment Re:I always come here for the gnashing of teeth (Score 1) 152

Bullshit. I was talking about adopting critical mass by the general population, not wall street.

In 95 when Netscape was climbing there was nothing but negativity. The media was saturated with stuff like what's the internet good for, the stock price is absurd, browsers are clunky and crash all the time, any search engine was limited to a small set of sites (rings), usenet is a haven for porn/bins, I'd never trust putting my credit card in a browser. Probably another 10 things on top of that.

Even Ebay was surrounded with extreme negativity when it IPOed in late '98. Why would anyone want to pay for someone else's junk and pay shipping to boot? Amazon was criticized as never being able to compete against bricks and mortar, why pay for a book to be shipped when I can go to the mall and buy it now?

The negativity among the general population slowly waned during 98-99 when the infrastructure was built out enough for people to realize that really useful stuff could be done on the internet. That was the point of the analogy in my original post.

Comment Re:Really? (Score 4, Interesting) 125

If you're the type willing to spend time messing with them, consider adding this to your arsenal:

If you have Callcentric or another VOIP provider, you then have the option to create call treatments for forwarding a good percentage of telemarketing calls to any number you want, including the telemarketers themselves.

For example, one of the ways I get target numbers to forward to, is by responding to the Google SEO guys then pretend to be cut off mid conversation. When they call back since they think they have a good lead, the caller ID (surprisingly) is almost always a valid number to the call center. That's the target number. Even just faking an emergency and asking for their number so you can call them back usually works. Once you have that, Bob's your uncle since there's not much reason for them to change their block of unpublished incoming numbers.

Then it's simply a matter of going into the dashboard, creating a forwarding treatment of all obvious caller ids (i.e. any 800*, anonymous, +1, etc.) to the target number and voila, the call center gets hit with all my forwarded telemarketing calls transparently. And of course forward the target number back to itself, or even better, another target.

The best way is if you can whitelist your incoming calls and simply forward any non-matching numbers, especially since most telemarketing calls these days use a random out-of-area code caller id number. Not realistic if you're running a business but for personal lines you can whitelist the area codes you might expect valid calls to come from.

Obviously this doesn't work all the time. But when it does, it's pretty satisfying to check the online report at the end of the week to see all the forwarded calls that transparently went to Raj and Rachel. My way of paying forward the opportunity to lower their interest rates.

Comment Re:I always come here for the gnashing of teeth (Score 1) 152

Well said. There was the same kind of negativity back in the 90's when the internet as a whole was taking off. The ones who missed out gradually turn from whining to reluctantly adopting, then it went mainstream like it was perfectly natural from the get-go.

The same will happen with digital currency. The mentality is not unlike the stock market. The ones who whine the most are the ones who didn't expend the effort to understand stuff early and therefore missed out. It's happened before and will happen again, there's a perfect example right here in this thread.

http://slashdot.org/comments.p...

Comment Re:Black hole? (Score 1) 277

It looks like that is specifically tied to using false whois info if there is a subsequent copyright or trademark infringement, not if Joe Average decides to put 123 Main St. as his contact address. Seems like the law is a tool that can be used to help prosecution of Lanham violations (there probably aren't many criminals who keep their whois info up to date ;)

Here's the text copied from wikia:

http://itlaw.wikia.com/wiki/Fr...

"Fraudulent Online Identity Sanctions Act, Tit. II of the Intellectual Property Protection and Courts Amendments Act of 2004, Pub. L. No. 108-482, 118 Stat. 3912, 3916 (Dec. 23, 2004).
Overview Edit

This Act increases criminal penalties for those who submit false contact information when registering a domain name that is subsequently used to commit a crime or engage in copyright or trademark infringement."

If it's broader than that then please correct me (IANAL).

Comment Re:Black hole? (Score 4, Informative) 277

There's no law per se, but there is a recent ICANN requirement called "Whois Accuracy Data Specification". It requires registrars to contact the registrant and click an emailed link as validation that their whois info is correct. The domain can be suspended if the validation isn't done within 15 days.

The intent is good but the implementation is pretty mindboggling. They're expecting every owner of a domain name to check that the email sent to them is not a phishing attempt...how that's supposed to work reliably is anyone's guess.

So, yeah, owners are supposed to verify to the registrars that the info is accurate which you could say is "ICANN's law". But not legally. Here's one of many articles that goes deeper into the issue:

http://blog.easydns.org/2014/0...

Slashdot Top Deals

For God's sake, stop researching for a while and begin to think!

Working...