Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Businesses

One In Five Developers Now Works On IoT Projects 252

dcblogs writes Evans Data Corp., which provides research and intelligence for the software development industry, said that of the estimated 19 million developers worldwide, 19% are now doing IoT-related work. A year ago, the first year IoT-specific data was collected, that figure was 17%. But when developers were asked whether they plan to work in IoT development over the next year, 44% of the respondents said they are planning to do so, said Michael Rasalan, director of research at Evans.
Science

Spider Spins Electrically Charged Silk 42

sciencehabit writes In their quest to make ultrastrong yet ultrasmall fibers, the polymer industry may soon take a lesson from Uloborus spiders. Uloborids are cribellate spiders, meaning that instead of spinning wet, sticky webs to catch their prey, they produce a fluffy, charged, wool-like silk. A paper published online today in Biology Letters details the process for the first time. It all starts with the silk-producing cribellar gland. In contrast with other spiders, whose silk comes out of the gland intact, scientists were surprised to discover that uloborids' silk is in a liquid state when it surfaces. As the spider yanks the silk from the duct, it solidifies into nanoscale filaments. This "violent hackling" has the effect of stretching and freezing the fibers into shape. It may even be responsible for increasing their strength, because filaments on the nanoscale become stronger as they are stretched. In order to endow the fibers with an electrostatic charge, the spider pulls them over a comblike plate located on its hind legs. The technique is not unlike the so-called hackling of flax stems over a metal brush in order to soften and prepare them for thread-spinning, but in the spider's case it also gives them a charge. The electrostatic fibers are thought to attract prey to the web in the same way a towel pulled from the dryer is able to attract stray socks.
Businesses

Amazon Takes On Microsoft, Google With WorkMail For Businesses 65

alphadogg writes Amazon Web Services today launched a new product to its expansive service catalog in the cloud: WorkMail is a hosted email platform for enterprises that could wind up as a replacement for Microsoft and Google messaging systems. The service is expected to cost $4 per user per month for a 50GB email inbox. It's integrated with many of AWS's other cloud services too, including its Zocalo file synchronization and sharing platform. The combination will allow IT shops to set up a hosted email platform and link it to a file sharing system.
Privacy

Snowden Documents: CSE Tracks Millions of Downloads Daily 103

Advocatus Diaboli writes Canada's electronic spy agency sifts through millions of videos and documents downloaded online every day by people around the world, as part of a sweeping bid to find extremist plots and suspects, CBC News has learned. Details of the Communications Security Establishment project dubbed 'Levitation' are revealed in a document obtained by U.S. whistleblower Edward Snowden and recently released to CBC News. Under Levitation, analysts with the electronic eavesdropping service can access information on about 10 to 15 million uploads and downloads of files from free websites each day, the document says.
Medicine

Scientists Discover How To Track Natural Errors In DNA Replication 19

BarbaraHudson writes Researchers figured out how to label and keep track of new pieces of DNA, and learned to follow the enzyme responsible for copying those pieces. Their research focused on enzymes called polymerases. These enzymes create small regions in DNA that act as scaffolds for the copied DNA. Scientists assumed that the body deletes the scaffolds containing errors, or mutations, and the standard computer models supported this theory. However, the actual research showed that about 1.5 percent of those erroneous scaffolds are left over, trapped within the DNA. After running models, scientists now believe they can track how DNA replicates and find the most likely areas where these scaffolds with errors turn up. The erroneous scaffolds usually appear close to genetic switches, those regions that turn on when genes activate. The mutations damage the switch, which results in genetic disease, as well as increasing the likelihood of cancer.
Security

Adobe's Latest Zero-Day Exploit Repurposed, Targeting Adult Websites 203

MojoKid writes Adobe issued a patch for bug CVE-2015-0311, one that exposes a user's browser to become vulnerable to code injection, and the now infamous Angler EK (Exploit Kit). To fall victim to this kind of attack, all someone needs to do is visit a website with compromised Flash files, at which point the attacker can inject code and utilize Angler EK, which has proven to be an extremely popular tool over the past year. This particular version of Angler EK is different, however. For starters, it makes use of obfuscated JavaScript and attempts to detect virtual machines and anti-virus products. Its target audience is also rather specific: porn watchers. According to FireEye, which has researched the CVE-2015-0311 vulnerability extensively, this exploit has reached people via banner ads on popular adult websites. It was also noted that even a top 1000 website was affected, so it's not as though victims are surfing to the murkiest depths of the web to come in contact with it.
Medicine

Scientists 3D-Printing Cartilage For Medical Implants 23

Molly McHugh writes Scientists and physicians at The Feinstein Institute for Medical Research have discovered a way to use MakerBot's 3D-printing technologies to create cartilage and repair tissue damage in the trachea. From the article: "Researchers found that it’s possible to use the MakerBot Replicator 2X Experimental 3D Printer to print what’s called 'scaffolding,' made up of PLA, a bioplastic commonly used in in surgical implant devices. The team customized the printer so that living cells could be printed onto the scaffolding. The 3D-printed mixture of healthy cells found in cartilage, and collagen, eventually grew into the shape of a trachea that could be implanted into a patient."
Programming

Anonymous No More: Your Coding Style Can Give You Away 220

itwbennett writes Researchers from Drexel University, the University of Maryland, the University of Goettingen, and Princeton have developed a "code stylometry" that uses natural language processing and machine learning to determine the authors of source code based on coding style. To test how well their code stylometry works, the researchers gathered publicly available data from Google's Code Jam, an annual programming competition that attracts a wide range of programmers, from students to professionals to hobbyists. Looking at data from 250 coders over multiple years, averaging 630 lines of code per author their code stylometry achieved 95% accuracy in identifying the author of anonymous code (PDF). Using a dataset with fewer programmers (30) but more lines of code per person (1,900), the identification accuracy rate reached 97%.
Books

Book Review: Designing and Building a Security Operations Center 29

benrothke writes Many organizations are overwhelmed by the onslaught of security data from disparate systems, platforms and applications. They have numerous point solutions (anti-virus, firewalls, IDS/IPS, ERP, access control, IdM, single sign-on, etc.) that can create millions of daily log messages. In addition to directed attacks becoming more frequent and sophisticated, there are regulatory compliance issues that place increasing burden on security, systems and network administrators. This creates a large amount of information and log data without a formal mechanism to deal with it. This has led to many organizations creating a security operations center (SOC). A SOC in its most basic form is the centralized team that deals with information security incidents and related issues. In Designing and Building a Security Operations Center, author David Nathans provides the basics on how that can be done. Keep reading for the rest of Ben's review
Programming

The American App Economy Is Now "Bigger Than Hollywood" 135

Lemeowski writes Technology business analyst Horace Deidu found an interesting nugget while closely examining an Apple press release from earlier this year: "The iOS App Store distributed $10 billion to developers in 2014, which, Deidu points out, is just about as much as Hollywood earned off U.S. box office revenues the same year." That means the American app industry is poised to eclipse the American film industry. Additionally, Apple says its App Store has created 627,000 jobs, which Deidu contrasts with the 374,000 jobs Hollywood creates
Education

Nobel Laureate and Laser Inventor Charles Townes Passes 73

An anonymous reader writes Charles Hard Townes, a professor emeritus of physics at the University of California, Berkeley, who shared the 1964 Nobel Prize in Physics for invention of the laser and subsequently pioneered the use of lasers in astronomy, died early Tuesday in Oakland. He was 99. "Charlie was a cornerstone of the Space Sciences Laboratory for almost 50 years,” said Stuart Bale, director of the lab and a UC Berkeley professor of physics. “He trained a great number of excellent students in experimental astrophysics and pioneered a program to develop interferometry at short wavelengths. He was a truly inspiring man and a nice guy. We’ll miss him.”
Censorship

Police Organization Wants Cop-Spotting Dropped From Waze App 468

An anonymous reader writes "The Register reports on a request from the US National Sheriffs' Association, which "wants Google to block its crowd-sourced traffic app Waze from being able to report the position of police officers, saying the information is putting officer's lives at risk." From the article: "'The police community needs to coordinate an effort to have the owner, Google, act like the responsible corporate citizen they have always been and remove this feature from the application even before any litigation or statutory action,' AP reports Sheriff Mike Brown, the chairman of the NSA's technology committee, told the association's winter conference in Washington....Brown called the app a 'police stalker,' and said being able to identify where officers were located could put them at personal risk. Jim Pasco, executive director of the Fraternal Order of Police, said his members had concerns as well. 'I can think of 100 ways that it could present an officer-safety issue,' Pasco said. 'There's no control over who uses it. So, if you're a criminal and you want to rob a bank, hypothetically, you use your Waze.'"
Portables

Video Getting Charged Up Over Chargers at CES (Video) 33

First we look at Skiva Technology and their Octofire 8-port USB charger that pulled in nearly five times the requested amount from a Kickstarter campaign. (The 'pulled in X times the requested Kickstarter amount' is becoming a common product boast, isn't it?) Then, for MacBook owners who are tired of having their chargers or charger cords break, we take a brief look at the Juiceboxx Charger Case. These two power-oriented products and WakaWaka, which we posted about on January 9, are just a tiny, random sample of the many items in this category that were on display at CES 2015. Timothy was the only Slashdot person working CES, so it's shocking that he managed to cover as many (hopefully interesting) products as he did, considering that even the biggest IT journo mills don't come close to total coverage of the overwhelming muddle CES has become in recent years. (Alternate Video Link)
United States

Plan C: The Cold War Plan Which Would Have Brought the US Under Martial Law 313

v3rgEz writes with this story of a top secret Cold War plan which would have brought the U.S. under martial law. Starting on April 19, 1956, the federal government practiced and planned for a near-doomsday scenario known as Plan C. When activated, Plan C would have brought the United States under martial law, rounded up over ten thousand individuals connected to 'subversive' organizations, implemented a censorship board, and prepared the country for life after nuclear attack. There was no Plan A or B....Details of this program were distributed to each FBI field office. Over the following months and years, Plan C would be adjusted as drills and meetings found holes in the defensive strategy: Communications were more closely held, authority was apparently more dispersed, and certain segments of the government, such as the U.S. Attorneys, had trouble actually delineating who was responsible for what. Bureau employees were encouraged to prepare their families for the worst, but had to keep secret the more in-depth plans for what the government would do if war did break out. Families were given a phone number and city for where the relocated agency locations would be, but not the exact location.
Bug

NVIDIA GTX 970 Specifications Corrected, Memory Pools Explained 113

Vigile writes Over the weekend NVIDIA sent out its first official response to the claims of hampered performance on the GTX 970 and a potential lack of access to 1/8th of the on-board memory. Today NVIDIA has clarified the situation again, this time with some important changes to the specifications of the GPU. First, the ROP count and L2 cache capacity of the GTX 970 were incorrectly reported at launch (last September). The GTX 970 has 52 ROPs and 1792 KB of L2 cache compared to the GTX 980 that has 64 ROPs and 2048 KB of L2 cache; previously both GPUs claimed to have identical specs. Because of this change, one of the 32-bit memory channels is accessed differently, forcing NVIDIA to create 3.5GB and 0.5GB pools of memory to improve overall performance for the majority of use cases. The smaller, 500MB pool operates at 1/7th the speed of the 3.5GB pool and thus will lower total graphics system performance by 4-6% when added into the memory system. That occurs when games request MORE than 3.5GB of memory allocation though, which happens only in extreme cases and combinations of resolution and anti-aliasing. Still, the jury is out on whether NVIDIA has answered enough questions to temper the fire from consumers.

Slashdot Top Deals

Without life, Biology itself would be impossible.

Working...