Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 23 declined, 17 accepted (40 total, 42.50% accepted)

×
Cellphones

Submission + - Verizon's "Open Network" is Not Really tha (techcrunch.com)

saccade.com writes: "TechCrunch is reporting that Verizon's "Open Network" is not really so open. Reporter Erick Schonfeld "...asked Verizon whether any of the new apps developed for the bring-your-own devices would also be available to its existing customers who bought their phones through Verizon. The answer for now is, 'No.' Although a spokesperson tells me that they are looking into it. Unless it figures that out, Verizon is not really building an open network. It is building a two-tiered network: One for its preferred customers who play by its rules (i.e., its current 64 million subscribers), and one for the rabble not satisfied with its choice of phones and apps.

...If there is no crossover capability on the apps, then the "open" part of Verizon's network will be barren. The appeal of developing an open app for Verizon would be to gain access to those 64 million subscribers. Nobody is going to go through the trouble of creating apps just for the handful of people who want a CDMA phone that Verizon does not already sell. Making the whole open network even less appealing will be the fact that these phones are not likely to be subsidized by Verizon, and thus far more expensive.""

Robotics

Submission + - DARPA Turning Moths into CyberSpies (zdnet.com)

saccade.com writes: "The Times reports on a project where the Defense Advanced Research Projects Agency is growing insects around computer chips to turn them into surveillance cyber-bugs:

DARPA is implanting computer chips in moths while still in the pupa stage. The moth grows around the the chip and its nervous system can be controlled by a remote control.

The project is called the Hybrid Insect Micro-Electro-Mechanical Systems (HI-MEMS) and it also includes outfitting other insects with miniscule sensors and a wireless transmitter which could send data from places inaccessible to humans.

Ultimately, the moth will be able to land in enemy camps in remote location unobserved, beaming video and other information back via what its developers refer to as a reliable tissue-machine interface."
This gives new meaning to the term 'computer bug'."

Google

Submission + - Google's Blogger output fails XHTML standards

saccade.com writes: "The headers generated by Google's Blogger web site assert it's output is complient with the "XHTML 1.0 Strict" document type definition. Well, John Walker tested it against that standard, and discovered even the simplest Blogger page fails with 73 errors. Walker comments:

...whatever standard you choose, you should be willing to be held to it, and in this case the blogging platform used by tens of millions of people falls flat on its face. Personally, I would be stone ashamed to ship something in this state. That Google, with what amounts to unlimited funds in our talent-constrained industry, plus the putatively smartest and certainly most smug technical staff, contents themselves with this is perhaps an indication that before expounding on issues of good and evil, one should first address the more mundane matter of competence.
"
Privacy

Submission + - Thumbprint required to buy a car in Southern CA

saccade.com writes: "Here's an insidious use of biometrics: A southern California car dealership actually refuses to sell you a car unless you submit your thumbprint. From the posting:

The dealership claimed that the fingerprinting was for my protection. To make sure I'm really who I say I am, and haven't just stolen someone's social security number.

But I don't get it. How does that work? No one's checking to make sure the fingerprint I leave matches the one on file with the DMV. There's no forensics expert on staff. And I don't have data on this but I feel pretty certain that any car thief worth his salt probably already has more than one set of prints on file.
...
Dollar Rent-A-Car tried fingerprinting their customers for a while. They gave up after realizing that it had no effect on fraud or theft. Simply, treating your customers like felons is bad for business.
"
Security

Submission + - Hotel WiFi Tracks You as You Surf

saccade.com writes: "During my last hotel stay, I thought it was a pretty strange that it took two browser re-directs before the hotel's Wi-Fi would show me the web page I browsed to. Picasa developer Michael Herf noticed the same the thing and dug a little deeper. He discovered: "...their page does some tracking of each new page you visit in your browser, outside what a normal proxy (which would have access to all your cookies and other information it shouldn't have, anyway) would do. This "adlog" hit appears to also track a "hotel ID" and some other data that identifies you more directly. Notably, I've observed these guys tracking HTTPS URLs, and of course you can't track those through a proxy.". Herf notes the WiFi service provider, SuperClick, advertises that it "allows hoteliers and conference center managers to leverage the investment they have made in their IP infrastructure to create advertising revenue, deliver targeted marketing and brand messages to guests and users on their network...""
It's funny.  Laugh.

Submission + - Google Code Search Reveals the Evil of all Source

saccade.com writes: "The new Google Code Search isn't just for hackers sniffing for passwords. Jason Kottke & friends have discovered the new feature reveals all sorts of dark corners hidden in our code. And you thought nobody ever read your comments! From the article:
Code search is a great resource for web developers and programmers, but like the making available of all previously unsearched bodies of information, it's given lots of flashlights to people interested in exploring dark corners.
"

Slashdot Top Deals

Saliva causes cancer, but only if swallowed in small amounts over a long period of time. -- George Carlin

Working...