Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - Next-gen USB connector will be reversible (v3.co.uk)

TinTops writes: The next micro-usb equivalent will be a thin, USB 3.0 speed connector which can be inserted either way up. Hopefully this will let the rest of the smartphone industry catch up with Apple's Lightning.

"The new specification is currently under development and will be called USB Type-C, according to the USB 3.0 Promoter Group. In addition to an orientation-neutral design, the Type-C will feature USB 3.0 speeds – around 640MBps – with the addition of scalable charging, meaning devices with larger batteries can be charged more quickly."

Submission + - Best resources for job searching internationally?

thesandbender writes: I'm a U.S. Citizen and my spouse is Japanese (with a U.S. green card) . Recently we've had serious discussions about relocating to Japan for various personal reasons. What sites and resources does the /. community recommend for finding employment overseas? Also, are there any issues I should watch out for (e.g. companies using H1-B sponsorship for near extortion here in the U.S.)? I'm specifically interested in Japan (obviously) but I'm sure a lot of people have the same question for other countries.

Submission + - Australian Devs Launch Crowd Funding for Open Software, Open Hardware, Router 3

An anonymous reader writes: Australian devs have launched a crowd funding campaign to market an open software, open hardware platform to protect against wholesale snooping. Stilgherrian from ZDNet writes:

If Redfish's crowdfunding campaign is successful, the ORP1 will fill a valuable niche in the marketplace: A high-performance router that's available commercially with all the right certifications, rather than having to be built by a hobbyist, which has the potential to dramatically improve privacy protection for ordinary households.

While it's clear from the specs that they're targeting commercial grade routers, the hardware could just as easily run other applications requiring higher performance than is available on platforms like the rPi and Beaglebone. Can a completely open system compete against tier 2 and tier 3 companies in this field?

Submission + - Xerox to correct dangerous software bug in their scan copiers

An anonymous reader writes: To all of those making fun of the German dude and saying he didn't read the manual: The guy was perfectly right, and it's good he insisted, Xerox press statement says.

http://realbusinessatxerox.blogs.xerox.com/2013/08/07/update-on-scanning-issue-software-patches-to-come/

There was indeed a dangerous bug mangling numbers across all compression modes (serious candidate for the "mother of all bugs" award).

They didn't believe him at first, too. They do now, and they probably warm up their lawyers in advance to withstand all the upcoming class action lawsuits.

Original article:
http://www.dkriesel.com/en/blog/2013/0802_xerox-workcentres_are_switching_written_numbers_when_scanning

Current blog post confirming Xerox statement:
http://www.dkriesel.com/en/blog/2013/0812_xerox_scanning_issue_fully_confirmed

Submission + - Rooting Transcend WiFi SD Cards

Freshly Exhumed writes: This is the story of a clever blogger who discovered that Transcend WiFi SD Cards are not just small memory devices that can store 16GB (a 32GB version is available) in a tiny space, but are also embedded Linux systems fully capable of running applications and shells: Busybox, a webserver, and their own wireless networks. With some clever hacks that took advantage of some OEM programming blunders, the blogger was able to root the devices to do his bidding.

Submission + - Behind the story of the iPhone's default text tone (tuaw.com) 1

An anonymous reader writes: In a fascinating post from Kelly Jacklin, the long time Apple software engineer details how he helped create the default text alert sound on the iPhone — a sound otherwise known as "Tri-tone".

The history of the the pleasant text alert sound that we've all come to know and love stretches all the way back to 1998, nearly 10 years before the iPhone ever hit store shelves.

Comment Re:keyspace negawatts (Score 1) 207

It's weird that PHK framed it this way, but he's on the right track, regardless. Compromised entropy is one of the largest persistent attack surfaces in the state surveillance war. It's darn hard to notice when your client-side random key is leaking key space from prior exchanges, unless we're all running perfectly vetted software every day of the week and twice on Sunday and nothing bad ever happens to the golden master distribution chain. Developers never lose their private keys ...

Compromising the entropy of 100 major web sites (Google, Yahoo, MS, etc) may be possible. Compromising the entropy of hundreds of millions of clients would be vastly more difficult. OK, the evil government may persuade MS to modify every copy of Windows - after they tried that years ago with US vs Export versions of crypto - but what about Linux and other open source OS's? Any attempt to play with the client side of crypto is going to get noticed very quickly.

As for compromised private keys, yes it can happen, but only on a small scale. All serious SSL crypto (banks, Gmail etc) is done using Hardware Security Modules. HSM's store the private keys securely, performing all key operations internally. The only time the private key will leave the HSM is when it's backed up onto a smart card (which is itself a form of HSM). So large scale compromising of Private Keys is not practical.

Alternatively, the Evil Government could theoretically persuade Google, Yahoo et al to use one of a number of pre-approved Private Keys. Even that would be noticed very quickly. There are a number of monitoring sites which collect X.509 certificates regularly for most major sites. We are looking for forged certificates being used for Man in the Middle Attacks. So if a key is ever used across multiple web sites it will be detected very quickly.

I still think the whole scenario is a Movie Plot Threat.

Submission + - ARM In Supercomputers - "Get Ready For The Change" (montblanc-project.eu)

An anonymous reader writes: Commodity ARM CPUs are poised to to replace x86 CPUs just as commodity x86 CPUs replaced vector CPUs in early supercomputers. An analysis by the EU Mountblanc Project (using Nvidia Tegra 2/3, Samsung Exynos 5 & Intel Core i7 CPUs) highlights the suitability & energy efficiency of ARM based solutions. They finish off by saying that 'Current limitations due to target market condition — not real technological challenges' and 'A Whole set of ARM server chips is coming — solving most of the limitations identified'

Submission + - Ex-Marine detained under Operationn Vigilant Eagle for his political views sues (wtvr.com)

stry_cat writes: You may remember the story of Brandon Raub, who was detained withtout due process over some facebook posts he made. Now with the help of the Rutherford Institute, he is suing his captors.

According to his complaint [PDF], his detention was part of a federal government program code-named “Operation Vigilant Eagle,” which monitors military veterans with certain political views.

Submission + - Agent sparks another smartwatch funding frenzy on Kickstarter (gizmag.com)

cylonlover writes: The Pebble smartwatch is one of the standout Kickstarter success stories, attracting over US$10 million in funds to exceed its $100,000 target more than 100 times over. Another smartwatch is following a similar trajectory on the crowdfunding site, exceeding its own $100,000 goal in a day. While the Agent smartwatch shares some things in with common with the Pebble, it also boasts a number of features that set it apart.

Comment Re:How about tri-ligual, quad-ligual ? (Score 3, Interesting) 221

Places like Africa, India, and Papua New Guinea have a lot of spoken languages, but there is _ONE_ big problem - that's all they have, spoken words, no written word, no way to jot down what they say on paper, et cetera

Total, utter poppycock.

How can you educate children using a second language? Educators found generations ago that teaching in a language other than the child's first language simply does not work for young children. So, to teach the child, books and other material written in their native language, which requires a written form - an orthography - has to have been developed.

Here in Australia, two generations of linguist graduate students (from the 1950's onwards) were employed creating written forms of the various Aboriginal languages. They recorded words (dictionaries) and grammar. They wrote down the local tribes children's stories. They translated the standard primary school texts into the local language. All of this is essential to run a primary-level education system. Similar programs have run in PNG, Canada, Central America and Africa over the last fifty years.

Science

Submission + - Bowerbirds Woo Mates Using Optical Illusions

Hugh Pickens writes writes: "The bowerbirds of northern Australia are known for the elaborate shelters or "bowers" they build to attract females decorating the ground or "court" in front of a thatched avenue of sticks with stones, shells, bones and other grey objects they have collected. When a female enters the avenue, the male displays over the court "showing off" brightly colored or unusual items they have collected, as well as flashing the crest on the back of their head. Now Dr Laura Kelley and Dr John Endler at Deakin University in Geelong, Australia report that by placing larger items in the distance and smaller items close to the females, the males could be distorting the perspective of their potential mates and that females are impressed by the trick that could make males appear larger. "Either the pattern required to create forced perspective is an indicator of male quality [that attracts females]... or the illusion holds the female's attention for longer, making mating more likely," says Dr Kelley. ""Males that produce the more even patterns required for a high-quality visual illusion gained more mates (video) than males that had less even patterns." Over a two-month period in late 2010, they collected over 1,600 hours of footage, containing 129 courtship displays and 23 matings and took photographs of the bowers so that they could analyze the arrangement of the objects and the quality of the illusions they produced from the perspective of the females. "Better gradients produce more even patterns when seen from within the avenue," says Endler, adding that the males go to great lengths examining their work and rearranging objects to make the pattern as even as possible."

Slashdot Top Deals

Software production is assumed to be a line function, but it is run like a staff function. -- Paul Licker

Working...