Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Desktops (Apple)

Submission + - Kaspersky:Apple's Walled Garden Is More Secure - For Now (techweekeurope.co.uk)

judgecorp writes: "Apple's walled garden is more secure than the open approach of Windows or Android Kaspersky CEO Eugene Kaspersky says. However, he thinks the approach is storing up trouble. Apple's security is where Microsoft's was 12 years ago, he says, and he expects Apple to suffer the same issues Microsoft has had to face. One problen: if Apple opens up enough to allow AV on iOS devices, that very act would open it up to malware."
Politics

Submission + - A 4000mph Train From D.C. To Beijing In 2 Hrs (singularityhub.com)

kkleiner writes: "Evacuated Tube Transport, or ETT, combines the efficiency of maglev trains, already in use in Europe and Asia, with the efficiency of moving through an airless environment. Not only does ETT lack an engine – and a need for fossil fuel propulsion – but because it can glide along almost indefinitely through the vacuum it takes full advantage of Newton’s age-old “an object in motion stays in motion.” If ETT does see the light of day it is estimated to travel at a top speed of 4,000 mph, fast enough to go from Washington DC to Beijing in just two hours."
Programming

Submission + - 7 Programming Myths (infoworld.com) 1

snydeq writes: "InfoWorld's Neil McAllister offers up seven myths of modern programming practices, noting that while programming tools have gotten sharper, software development remains rife with misconceptions on productivity, code efficiency, offshoring, and more. 'Even among people as logical and rational as software developers, you should never underestimate the power of myth. Some programmers will believe what they choose to believe against all better judgment,' McAllister wrties. 'The real shame is that, in many cases, our elders pointed out our errors years ago, if only we would pay attention. Here are just a few examples of modern-day programming myths, many of which are actually new takes on age-old fallacies.'"
Science

Submission + - Brain Scan Can Predict Math Mistakes (itworld.com)

itwbennett writes: "Computer Science Ph.D. candidate Federico Cirett says that he can predict with 80 percent accuracy when someone is about to make a mistake on a math question. Using an EEG machine, Cirett can identify the patterns in a volunteer's thinking that are likely to result in an error 20 seconds or so before it's made. 'If we can detect when they are going to fail, maybe we can change the text or switch the question to give them another one at a different level of difficulty, but also to keep them engaged,' Cirett said. 'Brain wave data is the nearest thing we have to really know when the students are having problems.' He will present a paper on his findings at the User Modeling, Adaptation and Personalization conference in July."
Java

Submission + - Oracle vs. Google: Who Owns The Java APIs? (infoworld.com)

snydeq writes: "Fatal Exception's Neil McAllister sees Oracle's suit against Google boiling down to calling dibs on the Java APIs, and if the court agrees, this will be bad news for developers everywhere. 'Oracle's argument is roughly akin to me claiming that because I own the copyright to a book of commonly used English phrases, publishers of Shakespeare need to pay me royalties. If it holds true for Java, it will hold true for any programming language, from any source. That could radically change the relationship between developers and platform vendors,' McAllister writes. 'For one thing, it raises questions about programming language licensing. If the most basic language APIs can be copyrighted, would that not in effect make any program written in any language a derivative work of that language's APIs? How would that work in practice? Who would developers have to pay? What rights would they have to sign away?'"
DRM

Submission + - HBO Adds Additional Encryption to Prevent Piracy (techdirt.com)

OccamsRazorTime writes: HBO activated new HDCP encryption on their feed to cut down on piracy but at the encryption also blocks many common user functions in media centers not enabled for this type of encryption including DVR and HDMI output.
From the article:
"HBO is terrified of piracy—so terrified, in fact, that they're willing to toss roadblocks in the path of their subscribing customers as well. Ars Technica saw some complaints on a satellite forum, and discovered that DirecTV users with older DVRs and TVs are suddenly unable to watch HBO shows, thanks to newly-activated encryption."

Here is the story over at Ars Technica:

Perhaps worst of all is the fact that the encryption used has already been cracked so the only people suffering are their actual customers.

Hardware

Submission + - Future smartphone cameras to see through walls (geek.com)

An anonymous reader writes: A team at the University of Texas in Dallas have managed to create a terahertz band imaging chip manufactured using CMOS. It's a major breakthrough as it means we could all one day be carrying around smartphones with cameras that can see through walls. It also means doctors could use their phones as portable X-ray units, as well as for a range of other medical tests. We can check out what's in a wall before drilling into it, and manufacturers can test products for faults by taking a picture of their insides.
Privacy

Submission + - Europe agrees to send airline passenger data to US (computerworlduk.com) 1

Qedward writes: The European Parliament has approved the controversial data transfer agreement, the bilateral PNR (passenger name register), with the US which requires European airlines to pass on passenger information, including name, contact details, payment data, itinerary, email and phone numbers to the Department of Homeland Security.

Under the new agreement, PNR data will be "depersonalised" after six months and would be moved into a "dormant database" after five years. However the information would still be held for a further 15 years before being fully "anonymised".

The PNR data will be stored in the US's Automated Targeting System (ATS). ATS is used to improve the collection, use, analysis, and dissemination of information that is gathered for the primary purpose of targeting, identifying, and preventing potential terrorists and terrorist weapons from entering the US...

Comment Not a surprise... (Score 1) 247

The story yesterday said that they were having a problem with certificate validation. The routine they were using to validate certificate expiration must not have been able to handle the leap year. I wonder what non-standard API they were using to process the expiration date. That reminds me of another article that I read yesterday.

Comment Re:Dear Customers... (Score 1) 219

With RSA doing the keyfill at point of manufacture, the customer just needs to load the seed file for the entire batch onto their authentication server and then hand out the token

Don't forget that the tokens also expire every couple of years. If it customers were able to load a new seed themselves, then they wouldn't need to purchase new ones as often.

Ubuntu

Submission + - 2011: The Year of the Linux Tablet? (vsipad.com)

An anonymous reader writes: For what seems like forever, we’ve been hearing Linux fans proclaiming that the coming year will be the “Year of the Linux Desktop.” I don’t know if we’ll ever see the year of the Linux Desktop or not, but it looks like 2011 is going to be the year of the Linux Tablet. With new tablets being announced almost daily, 2011 should be an exciting year for Linux fans!
Security

Submission + - Facebook: Tunisian Govt. tried country-wide hack (threatpost.com)

chicksdaddy writes: Facebook's security team has been saying for months that account integrity is a top priority, and that so-called "social authentication"- using your knowledge of your own network to help authenticate yourself — was their preferred method to secure account access. Now an exclusive report in The Atlantic says that the company employed social authentication earlier this month to secure the accounts of Tunisian protesters calling for the ouster of that country's ruthless dictator, Zine El Abidine Ben Ali. According to the report, Facebook security engineers detected large scale efforts by Tunisian ISPs to intercept user logins to Facebook and to remove protest pages set up on the social network. They responded by forcing Tunisian users to connect through a secure HTTP server and required Tunisian users to complete social authentication challenges before accessing their accounts. The company's efforts seem to have worked — the protests succeeded in driving Zine El Abidine Ben Ali from the country on January 15. Vive la Facebook!

Comment Bug Free Code (Score 1) 314

Interesting article, especially this little snippet:

re: surprise at lack of QA or automated unit tests — “most engineers are capable of writing bug-free code. it’s just that they don’t have an incentive to do so at most companies. when there’s a QA department, it’s easy to just throw it over to them to find the errors.” [EDIT: please note that this was subjective opinion, I chose to include it in this post because of the stark contrast that this draws with standard development practice at other companies]

This guy's obviously fresh out of college. It would be interesting to hear from someone with a little more real-world experience.

Slashdot Top Deals

"What man has done, man can aspire to do." -- Jerry Pournelle, about space flight

Working...