Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - Unintended Consequences for Traffic Safety Feature (npr.org)

An anonymous reader writes: Traffic engineers had a problem to solve: too many pedestrians were getting hit by cars while using the crosswalks at intersections because they didn't know when the 'WALK' sign would change. Their solution was simple: implement a countdown timer. Countless cities have now adopted these timers, but it turns out to have an undesired consequence: motor vehicle crashes are actually increasing at intersections where the countdown timer is used. Researchers think this is because pedestrians aren't the only ones who see the timers. Drivers see them too, and it provides them with information on when the light will change. Then they anticipate the change by either speeding up to beat a change to red light, or anticipating a green light in order to get through before the pedestrians can move into the road. The researchers suggest finding some way to hide the countdown from the drivers, perhaps through the use of an audio countdown that would be difficult to hear from inside a car.

Comment Re:Sue them for all they're worth (Score 1) 495

Indeed. They claim, and you have to agree that there is some substance to that claim, that giving the victims prior notice will allow them to delete the pirated software from their computer, thus destroying evidence.

I hate the BSA and their way of operation, but within the framework they work in, I cannot refute that claim.

This is irrelevant to this case.

Shachar

Book Reviews

Submission + - Book review: Data-Driven Security: Analysis, Visualization and Dashboards

benrothke writes: Data-Driven Security: Analysis, Visualization and Dashboards

Author: Jay Jacobs and Bob Rudis

Pages: 352

Publisher: Wiley

Rating: 10/10

Reviewer: Ben Rothke

ISBN: 978-1118793725

Summary: Superb book for effective use of data for information security





There is a not so fine line between data dashboards and other information displays that provide pretty but otherwise useless and unactionable information; and those that provide effective answers to key questions. Data-Driven Security: Analysis, Visualization and Dashboardsis all about the later.



In this extremely valuable book, authors Jay Jacobs and Bob Rudis show you how to find security patterns in your data logs and extract enough information from it to create effective information security countermeasures. By using data correctly and truly understanding what that data means, the authors show how you can achieve much greater levels of security.



The book is meant for a serious reader who is willing to put in the time and effort to learn the programming necessary (mainly in Python and R) to truly understand what information exists deep in the recesses of their logs. As to R, it is a GNU project and a free software programming language and software environment for statistical computing and graphics. The R language is widely used among statisticians and data miners for developing statistical software and data analysis. For analysis the level of which Jacobs and Rudis prescribe, R is a godsend.



The following are the 12 densely packed chapters in the book:



1 : The Journey to Data-Driven Security

2 : Building Your Analytics Toolbox: A Primer on Using R and Python for Security Analysis

3 : Learning the "Hello World" of Security Data Analysis

4 : Performing Exploratory Security Data Analysis

5 : From Maps to Regression

6 : Visualizing Security Data

7 : Learning from Security Breaches

8 : Breaking Up with Your Relational Database

9 : Demystifying Machine Learning

10 : Designing Effective Security Dashboards

11 : Building Interactive Security Visualizations

12 : Moving Toward Data-Driven Security





After completing the book, the reader will have the ability to know which questions to ask to gain security insights, and use that data to ensure the overall security of their data and networks. Getting to that level is not a trivial at all a trivial task; even if there are vendors who can promise to do that.





For many people performing data analysis, the dependable Excel spreadsheet is their basic choice for data manipulation. The book calls the spreadsheet a gateway tool between a text editor and programming. The book notes that spreadsheets work as long as the data is not too large or complex. The book quotes a 2013 report to shareholders from J.P. Morgan in which parts of their 2012 $6 billion in losses was due in part to problems with their Excel spreadsheets.





The authors suggest using Excel as a temporary solution for quick one-shot tasks. For those that have repeating analytical tasks or models that are used repeatedly, it's best to move to some type of structured programming language, specifically those that the book suggest and for provides significant amounts of code examples; all of which are available on the companion website here.





The goal of all data extraction is to use data analysis to answer real questions. A large part of the book focuses on how to ask the right question. In chapter 1, the authors write that every good data analysis project begins with setting a goal and creating one or more research questions. Without a well-formed question guiding the analysis, you may wasting time and energy seeking convenient answers in the data, or worse, you may end up answering a question that nobody was asking in the first place.





The value of the book is that it shows the reader how to focus on context and purpose of the data analysis by setting the research question appropriately; rather than simply parsing large amounts of data. It's ultimately irrelevant if you can use Hadoop to process petabytes of data if you don't know what you are looking for.





Visualization is a large part of what this book is about, and in chapter 6 — Visualizing Security Data, the book notes that the most efficient path to human understanding is via the visual sense. It goes on to details the many advantages data visualization has, and the key to making it work.





As important as visualization is, describing the data is equally important. In chapter 7, the book introduces the VERIS(Vocabulary for Event Recording and Incident Sharing) framework. VERIS is a set of metrics designed to provide a common language for describing security incidents in a structured and repeatable manner. VERIS helps organizations collect useful incident-related information and to share that information, anonymously and responsibly with others.





The book shows how you can use dashboards for effective data visualization. But the authors warn that a dashboard is notan art show. They caution that given the graphical nature of dashboards, it's easy to fall into the trap of making them look like pieces of modern or fringe art; when they are far more akin to architectural and industrial diagrams that require more controlled, deliberate and constrained design.





As to dashboards the authors do not like, they consider the Cyber Security Situational Awarenessto be glitzy but not informative. Personally, I thought the dashboard has a lot of good information.





The book uses the definition of dashboardaccording to Stephen Few, in that it's a "visual display of the most important information needed to achieve one or more objectives that has been consolidated in a single computer screen so it can be monitored at a glance". The book enables the reader to create dashboards like that.





Data-Driven Security: Analysis, Visualization and Dashboardsis a superb book written by two experts who provide significant amounts of valuable information in every chapter. For those that are willing to put the time and effort into the serious amount of work that the book requires, they will find it a vital resource that will certainly help them achieve much higher levels of security.







Reviewed by Ben Rothke
Censorship

Russia Moves From Summer Time To Standard Time 158

jones_supa writes: Russia's legislature, often accused of metaphorically turning back the clock, has decided to do it literally – abandoning the policy of keeping the country on daylight-saving time all year. The 2011 move to impose permanent "summer time" in 2011 was one of the most memorable and least popular initiatives of Dmitry Medvedev's presidency. It forced tens of millions to travel to their jobs in pitch darkness during the winter. In the depths of December, the sun doesn't clear the horizon in Moscow until 10am. The State Duma, the lower house of parliament, voted 442-1 on Tuesday to return to standard time this autumn and stay there all year. The article also discusses a ban on swearing in books, plays, and films that went into effect today in Russia.

Comment Re:The only way to end "big money" politics (Score 1) 148

People who hear the word mayday and politics will think communist Russia- that is if they know anything about the cold war.

Willfully ignorant, I will give you. Stupid I cannot. It is a legitimate thought process to anyone who who lived through the cold war. It drives half the country's knee jerk hatred against socialism today.

Comment Re:Seriously? (Score 1) 203

they arrest him, know who he is and that he is not a threat, realise the charges are more or less for being annoying in public, put him in the holding while processing the paperwork. He asks to make a phone call, they hand him his cell phone, he makes the post while being bored.

They likely never would have allowed it. Knowing cops, they probably didn't know they were allowing it either.

That is, I have no idea how true this would be. It's just a possible scenario to how they could have allowed it without knowing they allowed it. The part that has me is, if it was posted as him, they would have had to get his user name and password else it would have showed as someone else posting it. That's possible with the crap they have to suck info from phones, but it makes the story a little more hard to digest. Of course they could have made him log in and post it. But then Facebook would have an IP set for the police department if you could ever get to the logs.

Science

Reproducing a Monet Painting With Aluminum Nanostructures 27

MTorrice writes: Plasmonic printing is a recently developed method to create color images using different shapes and sizes of gold or silver nanostructures. It relies on the oscillations of electrons in the metal surfaces and can produce images with a resolution 100 times that of a common desktop printer. Now researchers have expanded the color palette of the technique using tiny aluminum-capped nanopillars. Each pixel consists of four nanopillars; tuning the diameters and arrangement of the pillars produced a palette of more than 300 different colors. Using these pixels, the researchers created a microscale reproduction of Claude Monet's "Impression, Sunrise."
Businesses

Time Warner Cable Customers Beg Regulators To Block Sale To Comcast 80

An anonymous reader sends this report from Ars Technica: New York is shaping up as a major battleground for Comcast's proposed acquisition of Time Warner Cable. While the $45.2 billion merger will be scrutinized by federal officials, it also needs approval at the state level. TWC has 2.2 million cable TV, Internet, and phone customers in 1,150 New York communities, and hundreds of them have called on the New York Public Service Commission to block the sale to Comcast. Comcast doesn't compete against TWC for subscribers, and its territory in New York is limited but includes a VoIP phone service offered to residential and business customers in 10 communities. "Both Time Warner Cable and Comcast already have monopolies in each and every territory in which they do business today, and combining the companies will reinforce those individual territorial monopolies under a single corporate umbrella, with NBC-Universal thrown in to boot," resident Frank Brice argued in a comment to the PSC posted yesterday.

Comment Re:Didn't answer anyone's questions directly, did (Score 2) 42

Ditto. Textual information trapped in a linear non-searchable video has always pissed me off. It serves the interests of the talking head and his masters more than it does my interest of having maximal access to information. Talking-head videos are a means of controlling and limiting access to information. But I digress and was trying to stay focused in my rant....

Comment Re:Seriously? (Score 1) 203

Probably by putting his head in the way of the cop's fist.

This probably happens in real life. I got slammed against a brick wall when I was 23 or so by a cop for asking him what he just said to me as I was putting some things into the trunk of a car. I filed a complaint and he wrote in his statement that he put his hands up to signal me to stop approaching and I stumbled into them and fell back against the wall a few times.

It didn't matter that it was right after a bachelor party and there were about 4 video cameras that captured it all and the cop was obviously lying (long before cell phones had cameras in them). I was charged with obstructing justice, assaulting a police officer, disturbing the peace, in control of a motor vehicle while intoxicated and destruction of public property (he siad he tore his shirt slamming me into the wall). Luckily, he was going through a bitter divorce and my lawyer knew it. He said loudly, "we talked with his wife, she said he is a habitual liar and talks a lot about the people he screws over by claiming shit that never happened and is willing to testify for us". This was in the hall waiting for the pretrial conference to start. About 20 minutes later, the prosecutor came out and offered a deal with pleading to disorderly conduct and everything else dropped. My lawyer took it.

Power

Renewable Energy Saves Fortune 100 Companies $1.1B Annually 116

Lucas123 writes: A new report authored by several environmental groups say data shows more than half of Fortune 100 companies collectively saved more than $1.1B annually by reducing carbon emissions and rolling out renewable energy projects. According to the report, 43% of Fortune 500 companies, or 215 in all, have also set targets in one of three categories: greenhouse gas reduction, energy efficiency and renewable energy. When narrowed to just the Fortune 100, 60% of the companies have set the same clean energy goals. Some of the companies leading the industry in annual clean energy savings include UPS ($200M), Cisco ($151M), PepsiCo ($121M) and United Continental ($104M).

Comment Re:The only way to end "big money" politics (Score 1) 148

I'm not drawing you a picture. If they are so similar that you just had to spend a second entire post describing the differences, my point still stands- people will confuse the one with the other and ignore it until it gets going and then without looking into it, fight against it.

Why do I know this? Because it happens all the time. It's like when John Stewart explained that a SOFA agreement being talked about with Iraq was an agreement on how long you can crash on somebody's couch before having to pay rent. the joke only worked because it was similar but different and you knew there would be a couple of people going "right on brother" until he explained the rest of the story.

Slashdot Top Deals

The hardest part of climbing the ladder of success is getting through the crowd at the bottom.

Working...