Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Image

'Pluto Truthers' Are Pretty Sure That the NASA New Horizons Mission Was Faked Screenshot-sm 321

MarkWhittington writes: Forget about Apollo moon landing hoax theories. That is so 20th Century. Gizmodo reported that the "Pluto Truthers" have followed the astonishing images being sent back by NASA's New Horizons probe and have come to the conclusion that they are faked. After all, if the space agency could fake the entire moon landing, it would be child's play to fake a robotic probe to the edge of the Solar System.
Businesses

Neil Young Says His Music Is Too Good For Streaming Services 574

An anonymous reader writes: After years of complaining about modern music formats Neil Young today announced that he's pulling his music from all streaming services. He made the announcement on his official Facebook page saying: "Streaming has ended for me. I hope this is ok for my fans. It's not because of the money, although my share (like all the other artists) was dramatically reduced by bad deals made without my consent. It's about sound quality. I don't need my music to be devalued by the worst quality in the history of broadcasting or any other form of distribution. I don't feel right allowing this to be sold to my fans. It's bad for my music. For me, It's about making and distributing music people can really hear and feel. I stand for that. When the quality is back, I'll give it another look. Never say never."

Comment Re:For an alternative (Score 2) 581

What you raise, is an often raised response to discussions about free-speech and censorship.

What is often left out of these discussions, however, is the pervasive nature of corporate control over speech in the 'real' world (as well as the virtual). Corporations (and rich individuals) own newspapers (which trumpet *their* voice) TV stations (which do the same). The space for the mass dissemination of people's voices is small, and relegated to small groups, public meetings and protests (often barely tolerated by our democratic representatives).

When it comes to the mass dissemination of individuals voices, the internet is similarly coralled. Get a blog, people scream, on your own website! And there, the footfall is often small in scope. On sites where many people come together, those sites are owned by corporations and businesses, often merely looking for a proft..

The stark fact is, there are no public spaces on the internet. It's all owned by someone.

Privacy

Anonymizing Wi-Fi Device Project Unexpectedly Halted 138

An anonymous reader notes that a project to develop an anonymizing Wi-Fi device has been canceled under mysterious circumstances. The device, called Proxyham, was unveiled a couple weeks ago by Rhino Security Labs. They said it would use low-frequency radio channels to connect a computer to public Wi-Fi hotspots up to 2.5 miles away, thus obscuring a user's actual location. But a few days ago the company announced it would be halting development and canceling a talk about it at Def Con, which would have been followed with a release of schematics and source code. They apologized, but appear to be unable to say anything further.

"In fact, all [the speaker] can say is that the talk is canceled, the ProxyHam source code and documentation will never be made public, and the ProxyHam units developed for Las Vegas have been destroyed. The banner at the top of the Rhino Security website promoting ProxyHam has gone away too. It's almost as if someone were trying to pretend the tool never existed." The CSO article speculates that a government agency killed the project and issued a gag order about it. A post at Hackaday calls this idea absurd and discusses the hardware needed to build a Proxyham. They say using it would be "a violation of the Computer Fraud & Abuse Act, and using encryption over radio violates FCC regulations. That’s illegal, it will get you a few federal charges — but so will blowing up a mailbox with some firecrackers." They add, "What you’re seeing is just the annual network security circus and it’s nothing but a show."
Google

Google Accidentally Reveals Data On 'Right To Be Forgotten' Requests 51

Colin Castro points out an article from The Guardian, who noticed that Google's recent transparency report contained more data than intended. When perusing the source code, they found data about who was making requests for Google to take down links under the "right to be forgotten" law. The data they found covers 75% of all requests made so far. Less than 5% of nearly 220,000 individual requests made to Google to selectively remove links to online information concern criminals, politicians and high-profile public figures, the Guardian has learned, with more than 95% of requests coming from everyday members of the public. ... Of 218,320 requests to remove links between 29 May 2014 and 23 March 2015, 101,461 (46%) have been successfully delisted on individual name searches. Of these, 99,569 involve "private or personal information." Only 1,892 requests – less than 1% of the overall total – were successful for the four remaining issue types identified within Google’s source code: "serious crime" (728 requests), "public figure" (454), "political" (534) or "child protection" (176) – presumably because they concern victims, incidental witnesses, spent convictions, or the private lives of public persons.
Democrats

Hillary Clinton Takes Aim At 'Gig Economy' 432

SonicSpike writes with an excerpt from Marketwatch that says at least one major candidate in the 2016 electoral fight has made the "sharing economy" epitomized by Uber and Airbnb a campaign issue. In a major campaign speech in New York City, the former secretary of state didn't mention the ride-sharing service by name. But it was pretty clear what sort of companies she was talking about when she got to how some Americans earn money. "Many Americans are making extra money renting out a spare room, designing websites, selling products they design themselves at home, or even driving their own car," she said at the New School. But that sort of work comes with its own problems, she said. "This 'on demand' or so-called 'gig economy' ... is raising hard questions about workplace protections and what a good job will look like in the future," Clinton added.
Microsoft

For Microsoft, Windows 10 Charity Begins At Home 74

theodp writes: "We're investing $10 million in organizations that are upgrading the world," Microsoft announced on in its new Upgrade Your World website, which was created in conjunction with the Windows 10 launch. "We've identified nine global nonprofits, and we'd like your help choosing the 10th." The missions of the selected nonprofits include fighting global poverty, preventing children living with HIV from needlessly dying, increasing access to quality education for children in the developing world, conserving the lands and waters on which all life depends, and ensuring that all kindergartners learn 'computer science.' To paraphrase Sesame Street, can you guess which cause is not like the others? If you guessed Code.org, which wants CS made a "core" K-12 subject in U.S. schools, you're right! Coincidentally, Code.org's biggest donors include Microsoft ($3M+), Ballmer Family Giving ($3M+), and Bill Gates ($1M+). And Code.org CEO Hadi Partovi, who once reported to Satya Nadella, is coincidentally a sometimes jogging partner of Steve Ballmer, as well as the next-door neighbor of Microsoft General Counsel and Code.org Board member Brad Smith, whose FWD.us bio notes is responsible for Microsoft's philanthropic work. Code.org emerged on the scene shortly after Smith suggested that action on Microsoft's 'two-pronged' National Talent Strategy to increase K-12 CS education and the number of H-1B visas could be galvanized by 'producing a crisis'.
Privacy

Automakers Unwilling To Share Driver Data (Yet) 151

An anonymous reader writes: With Apple and Google both vying for a place in your car's dashboard, you might start wondering to what extent the data you generate while driving might be analyzed or shared with advertisers. The good news is that car manufacturers are not keen to give this data away — some have specifically said they won't let Google or Apple get their hands on it. The bad news is that they feel this way because they see your data as a new source of profit — they're just deciding how best to harvest it. One executive at Ford said, "We need to control access to that data. We need to protect our ability to create value." According to the article, "Auto companies hope to profit from in-vehicle data in a variety of ways, including the provision of travel planning services and auto repair and service information they hope will bring drivers to dealerships. They also expect to work with insurance companies, providing information that would allow insurers to base their rates on a driver's behavior behind the wheel."
The Internet

Undersea Cable Break Disrupts Life In Northern Mariana Islands 102

An anonymous reader writes: The Commonwealth of the Northern Mariana Islands experienced a devastating undersea cable break on Wednesday, with phone, Internet, SMS, banking services, the National Weather Service office, and airliners all being affected. The US territory depends on a single undersea fiber optic connection with Guam for its connectivity to the outside world (except for a backup microwave link, which was itself damaged during a recent storm). While services are in the process of being restored, this may be a prime example of the need for reliable backup systems in our "always connected" mindset.
Democrats

Barney Frank Defends Political Hypocrisy, Game Theory Explains It 191

HughPickens.com writes with a link to Steven I. Weiss's Atlantic article which says game theory can shed light both on what is happening in Washington and on how the bargaining power of its negotiating parties may evolve over time and comes to the conclusion that hypocrisy is essential to the functioning of Congress -- in fact, it's the only tool legislators have after they've rooted out real corruption. "Legislators do not pay each other for votes, and every member of a parliament in a democratic society is legally equal to every member," writes Congressman Barney Frank in his new memoir, Frank: A Life in Politics From the Great Society to Same-Sex Marriage. For legislators, cooperation is a form of political currency. They act in concert with other legislators, even at the expense of their own beliefs, in order to bank capital or settle accounts."

Game theory sets out conditions under which negotiating parties end up cooperating, and why they sometimes fail to do so. It does so based on analyzing what drives individuals in the majority of bargaining situations: incentives, access to information, initial power conditions, the extent of mutual trust, and accountability enforcement. Instead of seeing political flip-flopping as a necessary evil, Frank suggests it is inherent to democracy and according to Frank if there's any blame to be doled out in connection with political hypocrisy, it's to be placed on the heads of voters who criticize legislators for it, instead of accepting it as a necessary part of democratic politics.
AI

An Organic Computer Using Four Wired-Together Rat Brains 190

Jason Koebler writes: The brains of four rats have been interconnected to create a "Brainet" capable of completing computational tasks better than any one of the rats would have been able to on its own. Explains Duke University's Dr. Miguel Nicolelis: "Recently, we proposed that Brainets, i.e. networks formed by multiple animal brains, cooperating and exchanging information in real time through direct brain-to-brain interfaces, could provide the core of a new type of computing device: an organic computer. Here, we describe the first experimental demonstration of such a Brainet, built by interconnecting four adult rat brains."
Graphics

NVIDIA Shakes Its Flowing Mane With Life-Like HairWorks 1.1 Demo 61

MojoKid writes: Previously, you might not have thought much about a wig on a manikin, but checking out NVIDIA's latest tech demo, as a gamer or 3D graphics artists, hair can be pretty interesting. The video is of NVIDIA HairWorks 1.1, a simulation and rendering tool for creating lifelike hair and fur in video games. In the clip, NVIDIA shows off a Fabio-style hairdo with about 500,000 hairs that bounce and sway as the camera circles and forces move the hair. If this was a real wig, it might unseat one of the most boring videos ever. However, as an example of what modern 3D graphics can do with hair physics, it's pretty darn cool. Previous demos of HairWorks showed up to 22,000 strands of hair, making the jump to half a million much much more significant. The video was recorded with ShadowPlay on a GeForce GTX 980, which has some serious muscle, though it's not the most powerful card in NVIDIA's lineup. What's cooler than making life-like human hair? Putting flowing manes on vicious monsters, of course. Apparently, NVIDIA HairWorks simulation technology also plays a role in bringing more than a dozen creatures to life in The Witcher 3: Wild Hunt.
Security

Crypto Experts Blast Gov't Backdoors For Encryption 102

loid_void writes with a link to a New York Times report about some of the world's best-known cryptography experts, who have prepared a report which concludes that there is no viable technical solution which "would allow the American and British governments to gain "exceptional access" to encrypted communications without putting the world's most confidential data and critical infrastructure in danger." From the article: [T]he government’s plans could affect the technology used to lock financial institutions and medical data, and poke a hole in mobile devices and the countless other critical systems — including pipelines, nuclear facilities, the power grid — that are moving online rapidly. ... “The problems now are much worse than they were in 1997,” said Peter G. Neumann, a co-author of both the 1997 report and the new paper, who is a computer security pioneer at SRI International, the Silicon Valley research laboratory. “There are more vulnerabilities than ever, more ways to exploit them than ever, and now the government wants to dumb everything down further.” The authors include Neumann, Harold Abelson, Susan Landau, and Bruce Schneier.

Slashdot Top Deals

Intel CPUs are not defective, they just act that way. -- Henry Spencer

Working...