Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Communications

Norway Will Switch Off FM Radio In 2017 293

New submitter titten writes The Norwegian Ministry of Culture has announced that the transition to DAB will be completed in 2017. This means that Norway, as the first country in the world to do so, has decided to switch off the FM network. Norway began the transition to DAB in 1995. In recent years two national and several local DAB-networks has been established. 56 per cent of radio listeners use digital radio every day. 55 per cent of households have at least one DAB radio, according to Digitalradio survey by TNS Gallup, continuously measuring the Norwegian`s digital radio habits.
Biotech

A 2-Year-Old Has Become the Youngest Person Ever To Be Cryonically Frozen 313

merbs writes: After losing a long battle with brain cancer, 2-year-old Matheryn Naovaratpong became the first minor ever to be cryogenically frozen. This article is the story of how a Thai girl was frozen in Bangkok and shipped to Arizona to have her brain preserved in liquid nitrogen, while medical science works on a cure. "Typically we’d move the head from the trunk of the body. We didn't know what their reaction would be from the family, the mortuary, from border officials; this has to go through a number of shipping venues, customs, the TSA and so on. To see a frozen head in a box might have raised a number of red flags. In the U.S. that’s not a big deal, but there, they may not be accustomed."
Technology

The Crazy-Tiny Next Generation of Computers 104

An anonymous reader writes University of Michigan professors are about to release the design files for a one-cubic-millimeter computer, or mote. They have finally reached a goal set in 1997, when UC Berkeley professor Kristopher Pister coined the term "smart dust" and envisioned computers blanketing the Earth. Such motes are likely to play a key role in the much-ballyhooed Internet of Things. From the article: "When Prabal Dutta accidentally drops a computer, nothing breaks. There’s no crash. The only sound you might hear is a prolonged groan. That’s because these computers are just one cubic millimeter in size, and once they hit the floor, they’re gone. 'We just lose them,' Dutta says. 'It’s worse than jewelry.' To drive the point home, Dutta, an assistant professor of electrical engineering at the University of Michigan, emails me a photo of 50 of these computers. They barely fill a thimble halfway to its brim."
Transportation

Autonomous Cars and the Centralization of Driving 181

New submitter arctother writes: Taxicab Subjects has posted a response to a Morgan Stanley analyst's recent take on how driverless cars will shape society in the future. From the article: [R]eally, 'autonomy' is still not the right word for it. Just as the old-fashioned 'automobile' was never truly 'auto-mobile,' but relied, not only on human drivers, but an entire concrete infrastructure built into cities and smeared across the countryside, so the interconnected 'autonomous vehicles' of the future will be even more dependent on the interconnected systems of which they are part. To see this as 'autonomy' is to miss the deeper reality, which will be control. Which is why the important movement reflected in the chart's up-down continuum is not away from 'Human Drivers' to 'Autonomous' cars, but from a relatively decentralized system (which relies on large numbers of people knowing how to drive) to an increasingly centralized system (relying on the knowledge of a small number of people)."
Education

Ask Slashdot: How To Introduce a 7-Year-Old To Programming? 315

THE_WELL_HUNG_OYSTER writes I'm a professional programmer and have been programming since I was a small boy. I want to introduce this to my 7-year-son but know nothing about teaching this to children. Since he enjoys Roblox and Minecraft very much, and knows how to use computers already, I suspect teaching him to write his own small games would be a good starting point. I'm aware of lists like this one, but it's quite overwhelming. There are so many choices that I am overwhelmed where to start. Anyone in the Slashdot in the community have recent hands-on experience with such tools/systems that he/she would recommend?
Software

Why Some Developers Are Live-Streaming Their Coding Sessions 131

itwbennett writes Adam Wulf recently spent two weeks live-streaming himself writing every line of code for a new mobile app. He originally started to live-stream as 'a fun way to introduce the code to the community.' But he quickly learned that it helps him to think differently than when he was coding without the camera on. "Usually when I work, so much of my thought process is internal monologue," he said, "but with live streaming I try to narrate my thought process out loud. This has forced me to think through problems a little differently than I otherwise would, which has been really beneficial for me."
United States

US Started Keeping Secret Records of International Telephone Calls In 1992 81

schwit1 writes Starting in 1992, the Justice Department amassed logs of virtually all telephone calls from the USA to as many as 116 countries. The now-discontinued operation, carried out by the DEA's intelligence arm, was the government's first known effort to gather data on Americans in bulk, sweeping up records of telephone calls made by millions of U.S. citizens regardless of whether they were suspected of a crime. It was a model for the massive phone surveillance system the NSA launched to identify terrorists after the Sept. 11 attacks. That dragnet drew sharp criticism that the government had intruded too deeply into Americans' privacy after former NSA contractor Edward Snowden leaked it to the news media two years ago. More than a dozen current and former law enforcement and intelligence officials described the details of the Justice Department operation to USA TODAY. Most did so on the condition of anonymity because they were not authorized to publicly discuss the intelligence program, part of which remains classified. The operation had 'been approved at the highest levels of Federal law enforcement authority,' including then-Attorney General Janet Reno and her deputy, Eric Holder.
Businesses

The New Struggles Facing Open Source 146

An anonymous reader writes in with this story about the open source movement's contentious beginnings and the points of trouble it faces today. "The early days of open source were fraught with religious animosities we feared would tear apart the movement: free software fundamentalists haggling with open source pragmatists over how many Apache licenses would fit on the head of a pin. But once commercial interests moved in to plunder for profit, the challenges faced by open source pivoted toward issues of control. While those fractious battles are largely over, giving way to an era of relative peace, this seeming tranquility may prove more dangerous to the open source movement than squabbling ever did. Indeed, underneath this superficial calm, plenty of tensions simmer. Some are the legacy of the past decade of open source warfare. Others, however, break new ground and arguably threaten open source far more than the GPL-vs.-Apache battle ever did."

Comment Re:"Experts" have a hidden agenda (Score 3, Interesting) 187

nearly one in 10 12-13 year olds were worried they were addicted
I would say this is more likely to be a problem with their social / religious upbringing making them think that it's messed up to want to look at porn more than a couple times per week.

Without knowing more about their definition of "addicted" we can't be sure, but introspection is socially accepted for things like "being offended" and whatnot, so I see no reason not to take their concern at face value.

Also, feel free to make as many kid-friendly whitelists as you want but proposals to rate/blacklist the entire thing are horribly insidious. Why are we still falling for this old scam? In addition to being insanely hard to do effectively, this sort of censorship is ALWAYS stealthily aimed at adults, not children. Case in point: NC-17 ratings for movies and AO ratings for videogames. Both are on their face completely redundant (R rating and M+ rating), but their real use is to prevent certain content from being produced through self-censorship pressure by retailers/theaters refusing to carry the highest rating.

No, they're not redundant. R/M+ are intended for adults, and children with parental consent. NC-17/AO are intended for adults only and not children, even with parental consent. It's not legally enforceable in most jurisdictions, but bowing to public pressure most mainstream cinemas will enforce as a matter of corporate policy the relevant age restrictions. In the US, "NC-17" was specifically created to allow it to be used for movies that warranted the restriction but weren't "pornography" in the sense associated with the previous rating, "X".

The main reason more "mainstream" movies don't come out as NC-17 is simple... They're likely to make more money the more people are easily able to see them. Frankly, this is why a fair number of movies try to end up as a strong PG-13 instead of an R rating -- bigger audience, and less worry for the parents about having to decide whether they really want their kid seeing the film before they accompany them.

Ironically, it goes the other way for 'G' films. Especially nowadays (morals and community standards change over time, naturally), there are plenty of films that could and would be rated 'G', but unless you're making an animated feature it's considered something that will keep the audiences away (what teen wants to see something G rated?). Often studios and producers will put some sort of slightly-unnecessary smack or violence, or a mild curse, or something exceedingly brief *just* to nudge a film up into the PG category, so it brings in more revenue.

Goes both ways.

The Military

Why the Framework Nuclear Agreement With Iran Is Good For Both Sides 383

Lasrick writes: Ariane Tabatabai breaks down the details of the framework agreement between Iran and the P5+1 that was announced Thursday. It appears to be better than most analysts expected, with positive outcomes for both sides. It truly seems historic: "A number of these steps will, in effect, be irreversible. They will not just limit Iran's nuclear capability for 10 to 15 years, but will reshape it entirely and indefinitely. ... [B]oth sides stand to gain from the framework agreement, which should also be considered a victory for the global nonproliferation regime. Ahead of the Nuclear Non-Proliferation Treaty Review Conference that begins in late April, where no major achievements in nonproliferation are likely to be announced, the framework agreement is a very important success."
Encryption

TrueCrypt Audit: No NSA Backdoors 142

Mark Wilson writes: A security audit of TrueCrypt has determined that the disk encryption software does not contain any backdoors that could be used by the NSA or other surveillance agencies. A report prepared by the NCC Group (PDF) for the Open Crypto Audit Project found that the encryption tool is not vulnerable to being compromised. However, the software was found to contain a few other security vulnerabilities, including one relating to the use of the Windows API to generate random numbers for master encryption key material. Despite this, TrueCrypt was given a relatively clean bill of health with none of the detected vulnerabilities considered severe enough to lead "to a complete bypass of confidentiality in common usage scenarios."
Security

DHS: Drug Infusion Pumps Vulnerable To Trivial Hacks 37

chicksdaddy writes with news of a DHS warning about the vulnerability of a popular brand of drug pumps. "The Department of Homeland Security warned that drug infusion pump management software sold by Hospira contains serious and exploitable vulnerabilities that could be used to remotely take control of the devices.

The MedNet server software manages drug libraries, firmware updates, and configurations of Hospira intravenous pumps. DHS's Industrial Control System Computer Emergency Response Team (ICS-CERT) said in an advisory issued Tuesday that the MedNet software from the firm Hospira contains four critical vulnerabilities – three of them capable of being exploited remotely. The vulnerabilities could allow a malicious actor to run malicious code on and take control of the MedNet servers, which could be used to distribute unauthorized modifications to medication libraries and pump configurations.

The vulnerabilities were discovered by independent security researcher Billy Rios and reported to both Hospira and ICS-CERT. The vulnerabilities vary in their severity. Among the most serious is Rios's discovery of a plaintext, hard-coded password for the SQL database used by the MedNet software (CVE-2014-5405e). By obtaining that password, an attacker could compromise the MedNet SQL server and gain administrative access to the workstation used to manage deployed pumps."
Security

Laptop Destroyed Over Snowden Leaks Is Now an Art Exhibit 52

An anonymous reader sends word that a busted MacBook Air and a Western Digital hard drive that once held Snowden revelations are going on display at the Victoria and Albert Museum in London. "The remains of computer hardware which had contained the Guardian's London trove of Snowden documents – and which was destroyed on the rather spiteful demands of GCHQ personnel – have gone on display at the Victoria and Albert Museum. While the frankly unremarkable remnants of a MacBook Air are uninteresting in and of themselves – who among us has not taken an angle grinder to an errant machine? – the causes of the MacBook Air's destruction are seemingly interesting enough to merit those remnants being considered art and subsequently included in V&A's new exhibition about 'the museum as a public space and the role of public institutions in contemporary life.' Disconcertingly titled All of This Belongs to You, the exhibition is to include 'three specially curated displays,' among which is Ways to be Secret, which will examine what the curators describe as 'the contradiction between our concern for online privacy and our obsession with sharing via social media.'"
Science

Ankle Exoskeleton Takes a Load Off Calf Muscles To Boost Walking Efficiency 128

Zothecula writes We might have started off in the water, but humans have evolved to be extremely efficient walkers, with a walk in the park being, well, a walk in the park. Human locomotion is so efficient that many wondered whether it was possible to reduce the energy cost of walking without the use of an external energy source. Now researchers at Carnegie Mellon and North Carolina State have provided an answer in the affirmative with the development of an unpowered ankle exoskeleton."

Slashdot Top Deals

Nothing happens.

Working...