Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Transportation

Autonomous Cars and the Centralization of Driving 181

New submitter arctother writes: Taxicab Subjects has posted a response to a Morgan Stanley analyst's recent take on how driverless cars will shape society in the future. From the article: [R]eally, 'autonomy' is still not the right word for it. Just as the old-fashioned 'automobile' was never truly 'auto-mobile,' but relied, not only on human drivers, but an entire concrete infrastructure built into cities and smeared across the countryside, so the interconnected 'autonomous vehicles' of the future will be even more dependent on the interconnected systems of which they are part. To see this as 'autonomy' is to miss the deeper reality, which will be control. Which is why the important movement reflected in the chart's up-down continuum is not away from 'Human Drivers' to 'Autonomous' cars, but from a relatively decentralized system (which relies on large numbers of people knowing how to drive) to an increasingly centralized system (relying on the knowledge of a small number of people)."
Education

Ask Slashdot: How To Introduce a 7-Year-Old To Programming? 315

THE_WELL_HUNG_OYSTER writes I'm a professional programmer and have been programming since I was a small boy. I want to introduce this to my 7-year-son but know nothing about teaching this to children. Since he enjoys Roblox and Minecraft very much, and knows how to use computers already, I suspect teaching him to write his own small games would be a good starting point. I'm aware of lists like this one, but it's quite overwhelming. There are so many choices that I am overwhelmed where to start. Anyone in the Slashdot in the community have recent hands-on experience with such tools/systems that he/she would recommend?
Software

Why Some Developers Are Live-Streaming Their Coding Sessions 131

itwbennett writes Adam Wulf recently spent two weeks live-streaming himself writing every line of code for a new mobile app. He originally started to live-stream as 'a fun way to introduce the code to the community.' But he quickly learned that it helps him to think differently than when he was coding without the camera on. "Usually when I work, so much of my thought process is internal monologue," he said, "but with live streaming I try to narrate my thought process out loud. This has forced me to think through problems a little differently than I otherwise would, which has been really beneficial for me."
United States

US Started Keeping Secret Records of International Telephone Calls In 1992 81

schwit1 writes Starting in 1992, the Justice Department amassed logs of virtually all telephone calls from the USA to as many as 116 countries. The now-discontinued operation, carried out by the DEA's intelligence arm, was the government's first known effort to gather data on Americans in bulk, sweeping up records of telephone calls made by millions of U.S. citizens regardless of whether they were suspected of a crime. It was a model for the massive phone surveillance system the NSA launched to identify terrorists after the Sept. 11 attacks. That dragnet drew sharp criticism that the government had intruded too deeply into Americans' privacy after former NSA contractor Edward Snowden leaked it to the news media two years ago. More than a dozen current and former law enforcement and intelligence officials described the details of the Justice Department operation to USA TODAY. Most did so on the condition of anonymity because they were not authorized to publicly discuss the intelligence program, part of which remains classified. The operation had 'been approved at the highest levels of Federal law enforcement authority,' including then-Attorney General Janet Reno and her deputy, Eric Holder.
Businesses

The New Struggles Facing Open Source 146

An anonymous reader writes in with this story about the open source movement's contentious beginnings and the points of trouble it faces today. "The early days of open source were fraught with religious animosities we feared would tear apart the movement: free software fundamentalists haggling with open source pragmatists over how many Apache licenses would fit on the head of a pin. But once commercial interests moved in to plunder for profit, the challenges faced by open source pivoted toward issues of control. While those fractious battles are largely over, giving way to an era of relative peace, this seeming tranquility may prove more dangerous to the open source movement than squabbling ever did. Indeed, underneath this superficial calm, plenty of tensions simmer. Some are the legacy of the past decade of open source warfare. Others, however, break new ground and arguably threaten open source far more than the GPL-vs.-Apache battle ever did."

Comment Re:"Experts" have a hidden agenda (Score 3, Interesting) 187

nearly one in 10 12-13 year olds were worried they were addicted
I would say this is more likely to be a problem with their social / religious upbringing making them think that it's messed up to want to look at porn more than a couple times per week.

Without knowing more about their definition of "addicted" we can't be sure, but introspection is socially accepted for things like "being offended" and whatnot, so I see no reason not to take their concern at face value.

Also, feel free to make as many kid-friendly whitelists as you want but proposals to rate/blacklist the entire thing are horribly insidious. Why are we still falling for this old scam? In addition to being insanely hard to do effectively, this sort of censorship is ALWAYS stealthily aimed at adults, not children. Case in point: NC-17 ratings for movies and AO ratings for videogames. Both are on their face completely redundant (R rating and M+ rating), but their real use is to prevent certain content from being produced through self-censorship pressure by retailers/theaters refusing to carry the highest rating.

No, they're not redundant. R/M+ are intended for adults, and children with parental consent. NC-17/AO are intended for adults only and not children, even with parental consent. It's not legally enforceable in most jurisdictions, but bowing to public pressure most mainstream cinemas will enforce as a matter of corporate policy the relevant age restrictions. In the US, "NC-17" was specifically created to allow it to be used for movies that warranted the restriction but weren't "pornography" in the sense associated with the previous rating, "X".

The main reason more "mainstream" movies don't come out as NC-17 is simple... They're likely to make more money the more people are easily able to see them. Frankly, this is why a fair number of movies try to end up as a strong PG-13 instead of an R rating -- bigger audience, and less worry for the parents about having to decide whether they really want their kid seeing the film before they accompany them.

Ironically, it goes the other way for 'G' films. Especially nowadays (morals and community standards change over time, naturally), there are plenty of films that could and would be rated 'G', but unless you're making an animated feature it's considered something that will keep the audiences away (what teen wants to see something G rated?). Often studios and producers will put some sort of slightly-unnecessary smack or violence, or a mild curse, or something exceedingly brief *just* to nudge a film up into the PG category, so it brings in more revenue.

Goes both ways.

The Military

Why the Framework Nuclear Agreement With Iran Is Good For Both Sides 383

Lasrick writes: Ariane Tabatabai breaks down the details of the framework agreement between Iran and the P5+1 that was announced Thursday. It appears to be better than most analysts expected, with positive outcomes for both sides. It truly seems historic: "A number of these steps will, in effect, be irreversible. They will not just limit Iran's nuclear capability for 10 to 15 years, but will reshape it entirely and indefinitely. ... [B]oth sides stand to gain from the framework agreement, which should also be considered a victory for the global nonproliferation regime. Ahead of the Nuclear Non-Proliferation Treaty Review Conference that begins in late April, where no major achievements in nonproliferation are likely to be announced, the framework agreement is a very important success."
Encryption

TrueCrypt Audit: No NSA Backdoors 142

Mark Wilson writes: A security audit of TrueCrypt has determined that the disk encryption software does not contain any backdoors that could be used by the NSA or other surveillance agencies. A report prepared by the NCC Group (PDF) for the Open Crypto Audit Project found that the encryption tool is not vulnerable to being compromised. However, the software was found to contain a few other security vulnerabilities, including one relating to the use of the Windows API to generate random numbers for master encryption key material. Despite this, TrueCrypt was given a relatively clean bill of health with none of the detected vulnerabilities considered severe enough to lead "to a complete bypass of confidentiality in common usage scenarios."
Security

DHS: Drug Infusion Pumps Vulnerable To Trivial Hacks 37

chicksdaddy writes with news of a DHS warning about the vulnerability of a popular brand of drug pumps. "The Department of Homeland Security warned that drug infusion pump management software sold by Hospira contains serious and exploitable vulnerabilities that could be used to remotely take control of the devices.

The MedNet server software manages drug libraries, firmware updates, and configurations of Hospira intravenous pumps. DHS's Industrial Control System Computer Emergency Response Team (ICS-CERT) said in an advisory issued Tuesday that the MedNet software from the firm Hospira contains four critical vulnerabilities – three of them capable of being exploited remotely. The vulnerabilities could allow a malicious actor to run malicious code on and take control of the MedNet servers, which could be used to distribute unauthorized modifications to medication libraries and pump configurations.

The vulnerabilities were discovered by independent security researcher Billy Rios and reported to both Hospira and ICS-CERT. The vulnerabilities vary in their severity. Among the most serious is Rios's discovery of a plaintext, hard-coded password for the SQL database used by the MedNet software (CVE-2014-5405e). By obtaining that password, an attacker could compromise the MedNet SQL server and gain administrative access to the workstation used to manage deployed pumps."
Security

Laptop Destroyed Over Snowden Leaks Is Now an Art Exhibit 52

An anonymous reader sends word that a busted MacBook Air and a Western Digital hard drive that once held Snowden revelations are going on display at the Victoria and Albert Museum in London. "The remains of computer hardware which had contained the Guardian's London trove of Snowden documents – and which was destroyed on the rather spiteful demands of GCHQ personnel – have gone on display at the Victoria and Albert Museum. While the frankly unremarkable remnants of a MacBook Air are uninteresting in and of themselves – who among us has not taken an angle grinder to an errant machine? – the causes of the MacBook Air's destruction are seemingly interesting enough to merit those remnants being considered art and subsequently included in V&A's new exhibition about 'the museum as a public space and the role of public institutions in contemporary life.' Disconcertingly titled All of This Belongs to You, the exhibition is to include 'three specially curated displays,' among which is Ways to be Secret, which will examine what the curators describe as 'the contradiction between our concern for online privacy and our obsession with sharing via social media.'"
Science

Ankle Exoskeleton Takes a Load Off Calf Muscles To Boost Walking Efficiency 128

Zothecula writes We might have started off in the water, but humans have evolved to be extremely efficient walkers, with a walk in the park being, well, a walk in the park. Human locomotion is so efficient that many wondered whether it was possible to reduce the energy cost of walking without the use of an external energy source. Now researchers at Carnegie Mellon and North Carolina State have provided an answer in the affirmative with the development of an unpowered ankle exoskeleton."
Transportation

World's First 1 Megawatt All-Electric Race Car 106

New submitter MotoJ writes: A Latvian company has announced plans to race a one megawatt all-electric race car. It has a 50 kWh lithium-ion battery pack and is propelled by six YASA-400 electric motors. It provides 1020 kW (1368 hp) and a top speed of 260 km/h. It has a real chance to become the first overall winner of the Pikes Peak International Hill Climb competition with an electric vehicle. That's something to look forward to and curious who will pilot this machine. The race is on June 28, 2015. The same company has an equally interesting all-electric off-road racer.

Comment Re:Oh this is easy .... (Score 1) 394

I have a 5 digit ID and there's no way I'd be able to manage my social connections without Facebook.

LinkedIn is slightly less mandatory, but has served as a great source of job offers and industry reach-outs.

To be fair, though I'm an elder Slashdotter, I also stayed involved with "undergrad life" at a university for over 10 years, which means I adapted to the incoming generations' usage of social networking as it was happening. Perhaps that made me more prone to integrating it into my lifestyle.

China

China's Foreign Ministry: China Did Not Attack Github, We Are the Major Victims 137

An anonymous reader writes At the Regular Press Conference on March 30, China's Foreign Ministry Spokesperson Hua Chunying responded on the charge of DDoS attack over Github. She said: "It is quite odd that every time a website in the US or any other country is under attack, there will be speculation that Chinese hackers are behind it. I'd like to remind you that China is one of the major victims of cyber attacks. We have been underlining that China hopes to work with the international community to speed up the making of international rules and jointly keep the cyber space peaceful, secure, open and cooperative. It is hoped that all parties can work in concert to address hacker attacks in a positive and constructive manner."
Government

Apple's Tim Cook Calls Out "Religious Freedom" Laws As Discriminatory 1168

An anonymous reader writes It will come as no surprise that Apple's CEO Tim Cook doesn't agree with so-called religious freedom laws. Cook says, "[they] rationalize injustice by pretending to defend something many of us hold dear," and has penned an op-ed piece for The Washington Post which reads in part: "A wave of legislation, introduced in more than two dozen states, would allow people to discriminate against their neighbors. Some, such as the bill enacted in Indiana last week that drew a national outcry and one passed in Arkansas, say individuals can cite their personal religious beliefs to refuse service to a customer or resist a state nondiscrimination law. Others are more transparent in their effort to discriminate. Legislation being considered in Texas would strip the salaries and pensions of clerks who issue marriage licenses to same-sex couples — even if the Supreme Court strikes down Texas' marriage ban later this year. In total, there are nearly 100 bills designed to enshrine discrimination in state law. These bills rationalize injustice by pretending to defend something many of us hold dear. They go against the very principles our nation was founded on, and they have the potential to undo decades of progress toward greater equality."

Slashdot Top Deals

Real Programmers don't eat quiche. They eat Twinkies and Szechwan food.

Working...