Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Businesses

GitHub Founder Resigns Following Harassment Investigation 182

An anonymous reader writes "Late Yesterday, GitHub concluded its investigation regarding sexual harassment within its work force, and although it found no evidence of 'legal wrongdoing,' Tom Preston-Werner, one of its founding members implicated in the investigation resigned. In its statement, GitHub vows to implement 'a number of new HR and employee-led initiatives as well as training opportunities to make sure employee concerns and conflicts are taken seriously and dealt with appropriately.' Julie Ann Horvath, the former GitHub employee whose public resignation last month inspired the sexual harassment investigation, found the company's findings to be gratuitous and just plain wrong."
The Almighty Buck

Scammers Lower Comcast Bills, Get Jail Time 103

An anonymous reader writes with news about a scam with a twist. The scammers purchased login details to internal Comcast systems from an employee using them to lower the bills of Comcast customers, for a price. "Alston Buchanan, the mastermind of a two-man scam to lower the bills of Comcast customers for a price, pleaded guilty last week and awaits sentencing. His accomplice, Richard Justin Spraggins, who also pleaded guilty in February, will serve 11-23 months in prison and pay Comcast $66,825. Their operation purportedly cost Comcast $2.4 million, and Comcast claims that the loss has forced them to raise the rates on all their customers. However, the allegedly huge financial loss went undetected until a Comcast customer reported his/her suspicions to Comcast customer service."
Transportation

Experts Say Hitching a Ride In an Airliner's Wheel Well Is Not a Good Idea 239

Hugh Pickens DOT Com (2995471) writes "Hasani Gittens reports that as miraculous as it was that a 16-year-old California boy was able to hitch a ride from San Jose to Hawaii and survive, it isn't the first time a wheel-well stowaway has lived to tell about it. The FAA says that since 1947 there have been 105 people who have tried to surreptitiously travel in plane landing gear — with a survival rate of about 25 percent. But agency adds that the actual numbers are probably higher, as some survivors may have escaped unnoticed, and bodies could fall into the ocean undetected. Except for the occasional happy ending, hiding in the landing gear of a aircraft as it soars miles above the Earth is generally a losing proposition. According to an FAA/Wright State University study titled 'Survival at High Altitudes: Wheel-Well Passengers,' at 20,000 feet the temperature experienced by a stowaway would be -13 F, at 30,000 it would be -45 in the wheel well — and at 40,000 feet, the mercury plunges to a deadly -85 F (PDF). 'You're dealing with an incredibly harsh environment,' says aviation and security expert Anthony Roman. 'Temperatures can reach -50 F, and oxygen levels there are barely sustainable for life.' Even if a strong-bodied individual is lucky enough to stand the cold and the lack of oxygen, there's still the issue of falling out of the plane. 'It's almost impossible not to get thrown out when the gear opens,' says Roman.

So how do the lucky one-in-four survive? The answer, surprisingly, is that a few factors of human physiology are at play: As the aircraft climbs, the body enters a state of hypoxia—that is, it lacks oxygen—and the person passes out. At the same time, the frigid temperatures cause a state of hypothermia, which preserves the nervous system. 'It's similar to a young kid who falls to the bottom of an icy lake," says Roman. "and two hours later he survives, because he was so cold.'"
Education

Our Education System Is Failing IT 306

Nemo the Magnificent (2786867) writes "In this guy's opinion most IT workers can't think critically. They are incapable of diagnosing a problem, developing a possible solution, and implementing it. They also have little fundamental understanding of the businesses their employers are in, which is starting to get limiting as silos are collapsing within some corporations and IT workers are being called upon to participate in broader aspects of the business. Is that what you see where you are?"
Beer

The Science Behind Powdered Alcohol 176

Daniel_Stuckey (2647775) writes "Last week, the US Alcohol and Tobacco Tax and Trade Bureau approved Palcohol, a powdered alcohol product that you can either use to turn water into a presumably not-that-delicious marg or to snort if you don't care too much about your brain cells. It's the first time a powdered alcohol product has been approved for sale in the US, but not the first time someone has devised one, and such products have been available in parts of Europe for a few years now. Now you may be wondering, as I was, how the heck do you go about powdering alcohol? As you might expect, there's quite a bit of chemistry involved, but the process doesn't seem overly difficult; we've known how to do it since the early 1970s, when researchers at the General Foods Corporation (now a subsidiary of Kraft) applied for a patent for an 'alcohol-containing powder.'" It turns out the labels were issued in error, so don't expect it to be available soon. But it does appear to be a real thing that someone is trying to have approved.
Networking

Intentional Backdoor In Consumer Routers Found 236

New submitter janoc (699997) writes about a backdoor that was fixed (only not). "Eloi Vanderbeken from Synacktiv has identified an intentional backdoor in a module by Sercomm used by major router manufacturers (Cisco, Linksys, Netgear, etc.). The backdoor was ostensibly fixed — by obfuscating it and making it harder to access. The original report (PDF). And yeah, there is an exploit available ..." Rather than actually closing the backdoor, they just altered it so that the service was not enabled until you knocked the portal with a specially crafted Ethernet packet. Quoting Ars Technica: "The nature of the change, which leverages the same code as was used in the old firmware to provide administrative access over the concealed port, suggests that the backdoor is an intentional feature of the firmware ... Because of the format of the packets—raw Ethernet packets, not Internet Protocol packets—they would need to be sent from within the local wireless LAN, or from the Internet service provider’s equipment. But they could be sent out from an ISP as a broadcast, essentially re-opening the backdoor on any customer’s router that had been patched."
Privacy

Eyes Over Compton: How Police Spied On a Whole City 190

Advocatus Diaboli (1627651) writes with some concerning news from the Atlantic. From the article: "In a secret test of mass surveillance technology, the Los Angeles County Sheriff's Department sent a civilian aircraft over Compton, California, capturing high-resolution video of everything that happened inside that 10-square-mile municipality. Compton residents weren't told about the spying, which happened in 2012. 'We literally watched all of Compton during the times that we were flying, so we could zoom in anywhere within the city of Compton and follow cars and see people,' Ross McNutt of Persistence Surveillance Systems told the Center for Investigative Reporting, which unearthed and did the first reporting on this important story. The technology he's trying to sell to police departments all over America can stay aloft for up to six hours. Like Google Earth, it enables police to zoom in on certain areas. And like TiVo, it permits them to rewind, so that they can look back and see what happened anywhere they weren't watching in real time."
The Internet

404-No-More Project Seeks To Rid the Web of '404 Not Found' Pages 72

First time accepted submitter blottsie (3618811) writes "A new project proposes to do away with dead 404 errors by implementing a new HTML attribute that will help access prior versions of hyperlinked content. With any luck, that means that you'll never have to run into a dead link again. ... The new feature would come in the form of introducing the mset attribute to the <a> element, which would allow users of the code to specify multiple dates and copies of content as an external resource." The mset attribute would specify a "reference candidate:" either a temporal reference (to ease finding the version cited on e.g. the wayback machine) or the url of a static copy of the linked document.
Handhelds

Intel Pushes Into Tablet Market, Pushes Away From Microsoft 110

jfruh (300774) writes "The Wintel cartel appears to be well and truly dead, as Intel chases after ARM with grim determination into the rapidly growing world of Android tablets. 'Our mix of OSes reflects pretty much what you see in the marketplace,' the company's CEO said, a nice way of saying they see more potential growth from white-box Chinese tablet makers than from Microsoft Surface. Intel managed to ship 5 million tablet chips in the first quarter of the year, although plunging PC sales meant that company profit overall was still down."
Space

Astronomers Solve Puzzle of the Mountains That Fell From Space 51

KentuckyFC (1144503) writes "Iapetus, Saturn's third largest moon, was first photographed by the Cassini spacecraft on 31 December 2004. The images created something of a stir. Clearly visible was a narrow, steep ridge of mountains that stretch almost halfway around the moon's equator. The question that has since puzzled astronomers is how this mountain range got there. Now evidence is mounting that this mountain range is not the result of tectonic or volcanic activity, like mountain ranges on other planets. Instead, astronomers are increasingly convinced that this mountain range fell from space. The latest evidence is a study of the shape of the mountains using 3-D images generated from Cassini data. They show that the angle of the mountainsides is close to the angle of repose, that's the greatest angle that a granular material can form before it landslides. That's not proof but it certainly consistent with this exotic formation theory. So how might this have happened?

Astronomers think that early in its life, Iapetus must have been hit by another moon, sending huge volumes of ejecta into orbit. Some of this condensed into a new moon that escaped into space. However, the rest formed an unstable ring that gradually spiraled in towards the moon, eventually depositing the material in a narrow ridge around the equator. Cassini's next encounter with Iapetus will be in 2015 which should give astronomers another chance to study the strangest mountain range in the Solar System."
The Courts

Lavabit Loses Contempt Appeal 128

After being forced to turn over encryption keys (being held in contempt of court for several weeks after initially refusing to comply), secure mail provider Lavabit halted all operations last year. With the assistance of the EFF, an appeal was mounted. Today, the appeals court affirmed the district court decision and rejected the appeal. From Techdirt: "The ruling does a decent job explaining the history of the case, which also details some of the (many, many) procedural mistakes that Lavabit made along the way, which made it a lot less likely it would succeed here. ... The procedural oddities effectively preclude the court even bothering with the much bigger and important question of whether or not a basic pen register demand requires a company to give up its private keys. The hail mary attempt in the case was to argue that because the underlying issues are of 'immense public concern' (and they are) that the court should ignore the procedural mistakes. The court flatly rejects that notion: 'exhuming forfeited arguments when they involve matters of “public concern” would present practical difficulties. For one thing, identifying cases of a “public concern” and “non-public concern” –- divorced from any other consideration –- is a tricky task governed by no objective standards..... For another thing, if an issue is of public concern, that concern is likely more reason to avoid deciding it from a less-than-fully litigated record....'"
Microsoft

Microsoft Brings Office Online To Chrome OS; Ars Reviews Windows Phone 8.1 69

SmartAboutThings (1951032) writes "While we are still waiting for the official Windows 8.1 touch-enabled apps to get launched on the Windows Store, Microsoft went and decided that it's time to finally bring the Office online apps to the Chrome Web Store, instead. Thus, Microsoft is making the Web versions of its Word, Excel, PowerPoint and OneNote apps available to users through the Chrome Web Store and also improving all of them with new features, along with several bug fixes and performance improvements." More on the Microsoft front: an anonymous reader wrote in with a link to Ars Technica's review of the upcoming Windows Phone 8.1 release: "It is a major platform update even if it is just a .1 release. Updates include the debut of Cortana, using the same kernel as Windows 8.1 and the Xbox One, a notebook reminder app, inner circle friend management, IE 11, Nokia's camera app by default, lock screen and background customizations, a much improved email client with calendar support, more general Windows 8.1 API inclusion for better portability, and a notification center. Ars rated it more of a Windows Phone 9 release than .1 update."
United States

Retired SCOTUS Justice Wants To 'Fix' the Second Amendment 1633

CanHasDIY (1672858) writes "In his yet-to-be-released book, Six Amendments: How and Why We Should Change the Constitution, John Paul Stevens, who served as an associate justice of the Supreme Court for 35 years, believes he has the key to stopping the seeming recent spate of mass killings — amend the Constitution to exclude private citizens from armament ownership. Specifically, he recommends adding 5 words to the 2nd Amendment, so that it would read as follows: 'A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms when serving in the Militia shall not be infringed.'

What I find interesting is how Stevens maintains that the Amendment only protects armament ownership for those actively serving in a state or federal military unit, in spite of the fact that the Amendment specifically names 'the People' as a benefactor (just like the First, Fourth, Ninth, and Tenth) and of course, ignoring the traditional definition of the term militia. I'm personally curious about his other 5 suggested changes, but I guess we'll have to wait until the end of April to find out."
Media

Bill Gates Patents Detecting, Responding To "Glassholes" 140

theodp (442580) writes "As Google Glass goes on sale [ed: or rather, went on sale] to the general public, GeekWire reports that Bill Gates has already snagged one patent for 'detecting and responding to an intruding camera' and has another in the works. The invention proposes to equip computer and device displays with technology for detecting and responding to any cameras in the vicinity by editing or blurring the content on the screen, or alerting the user to the presence of the camera. Gates and Nathan Myhrvold are among the 16 co-inventors of the so-called Unauthorized Viewer Detection System and Method, which the patent application notes is useful 'while a user is taking public transportation, where intruding cameras are likely to be present.' So, is Bill's patent muse none other than NYC subway rider Sergey Brin?" A more cynical interpretation: closing the analog hole. Vaguely related, mpicpp pointed out that Google filed a patent for cameras embedded in contact lenses.

Submission + - Maynard Launches As Lightweight Wayland Desktop For The Pi (phoronix.com)

An anonymous reader writes: Maynard has been announced as a joint Collabora and Raspberry Pi Foundation venture to create a lightweight Wayland desktop suitable for running on the Rasbperry Pi. Maynard can run on the Raspberry Pi as well as conventional desktops while being very lightweight, except it goes without support for XWayland to run legacy X11 apps and it also doesn't handle GTK apps well.

Slashdot Top Deals

So you think that money is the root of all evil. Have you ever asked what is the root of money? -- Ayn Rand

Working...