Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - Anthropologist Gusterson on the language of torture (thebulletin.org)

An anonymous reader writes: Powerful piece on the torture report: 'As an anthropologist, I am fascinated by the term “enhanced interrogation.” It must surely take pride of place in the American lexicon of government euphemisms for violence, alongside such phrases from nuclear discourse as “collateral damage” (for the mass killing of civilians), “event” (for a nuclear explosion), “countervalue strike” (for the nuclear destruction of a city), “surgical strike” (a targeted strike with nuclear weapons), and “clean bombs” (nuclear weapons designed to optimize blast over radiation).'

Submission + - How a Massachusetts man invented the global ice market

An anonymous reader writes: A guy from Boston walks into a bar and offers to sell the owner a chunk of ice. To modern ears, that sounds like the opening line of a joke. But 200 years ago, it would have sounded like science fiction—especially if it was summer, when no one in the bar had seen frozen water in months. In fact, it’s history. The ice guy was sent by a 20-something by the name of Frederic Tudor, born in 1783 and known by the mid-19th century as the “Ice King of the World.” What he had done was figure out a way to harvest ice from local ponds, and keep it frozen long enough to ship halfway around the world.

Today, the New England ice trade, which Tudor started in Boston’s backyard in 1806, sounds cartoonishly old-fashioned. The work of ice-harvesting, which involved cutting massive chunks out of frozen bodies of water, packing them in sawdust for storage and transport, and selling them near and far, seems as archaic as the job of town crier. But scholars in recent years have suggested that we’re missing something. In fact, they say, the ice trade was a catalyst for a transformation in daily life so powerful that the mark it left can still be seen on our cultural habits even today. Tudor’s big idea ended up altering the course of history, making it possible not only to serve barflies cool mint juleps in the dead of summer, but to dramatically extend the shelf life and reach of food. Suddenly people could eat perishable fruits, vegetables, and meat produced far from their homes. Ice built a new kind of infrastructure that would ultimately become the cold, shiny basis for the entire modern food industry.

Submission + - Viacom's lawsuit against YouTube (medium.com)

Presto Vivace writes:

Viacom’s claim wasn’t that YouTube was just turning a blind eye to users infringing copyright—it was that YouTube was offering filtering technology to its media partners that it wasn’t making available to companies who weren’t playing ball.

I think it is useful to document the historical record.

Submission + - The Magic of Pallets

HughPickens.com writes: Jacob Hodes writes in Cabinet Magazine that there are approximately two billion wooden shipping pallets in the holds of tractor-trailers in the United States transporting Honey Nut Cheerios and oysters and penicillin and just about any other product you can think of. According to Hodes the magic of pallets is the magic of abstraction. "Take any object you like, pile it onto a pallet, and it becomes, simply, a “unit load”—standardized, cubical, and ideally suited to being scooped up by the tines of a forklift. This allows your Cheerios and your oysters to be whisked through the supply chain with great efficiency; the gains are so impressive, in fact, that many experts consider the pallet to be the most important materials-handling innovation of the twentieth century." Although the technology was in place by the mid-1920s, pallets didn’t see widespread adoption until World War II, when the challenge of keeping eight million G.I.s supplied—“the most enormous single task of distribution ever accomplished anywhere,” according to one historian—gave new urgency to the science of materials handling. "The pallet really made it possible for us to fight a war on two fronts the way that we did." It would have been impossible to supply military forces in both the European and Pacific theaters if logistics operations had been limited to manual labor and hand-loading cargo.

To get a sense of the productivity gains that were achieved, consider the time it took to unload a boxcar before the advent of pallets. “According to an article in a 1931 railway trade magazine, three days were required to unload a boxcar containing 13,000 cases of unpalletized canned goods. When the same amount of goods was loaded into the boxcar on pallets or skids, the identical task took only four hours.” Pallets, of course, are merely one cog in the global machine for moving things and while shipping containers have had their due, the humble pallet is arguably "the single most important object in the global economy."

Submission + - Did President Obama Infringe on 1995 Microsoft Patent for Teaching Kids to Code?

theodp writes: "Imagine further the difficulty of teaching programming to youngsters eight to twelve years in age," reads Microsoft's patent for its Graphical Programming System and Method for Enabling a Person to Learn Text-Based Programming, which was filed in July, 1995. "Only the most intelligent and motivated of children in this age group are likely to be successful in learning to program computers." Microsoft adds, "The ability to edit or create a program using graphical objects is an important aspect of the present invention, since it enables relatively unskilled programmers such as children to quickly make changes and develop programs, and enables them to grasp simple programming concepts. As will be noted below, a user also has the option and is encouraged to increase his/her understanding of text-based programming as it relates to the graphic program developed using graphic objects, by selectively editing the program in other views or modes that expose the underlying text-based programming steps." Which, some patent trolls might argue, is precisely what President Obama did during last week's Hour of Code, when he progressed from moving Disney Princess Elsa using Google's Blockly to advancing her 100 pixels with JavaScript. Which raises two questions: 1. Could Microsoft sue President Obama and the 80MM-and-counting others who "tried" an Hour of Code for patent infringement? 2. Why didn't Microsoft — who has now declared a national coding talent crisis with other Hour of Code backers — use their patent for teaching kids to code to actually teach kids to code over the last 20 years? By the way, the patent application itself is actually pretty thoughtful, which is not too surprising — fourth-grade kids tutored by one of the listed inventors, Microsoft's Devindra Chainani, wowed none other than MIT's legendary Seymour Papert with their programming chops back in 1993.

Submission + - Seattle Police Held Hackathon To Redact Footage From Body Cameras (geekwire.com) 1

An anonymous reader writes: Hackathons are common these days, but you don't often hear about events hosted by police departments. That's what the Seattle Police Department did on Friday, with the solitary goal of finding a good way to redact the video streams taken by police body cameras and dash cameras. "bout one-third were technology professionals or part-timers like Henry Kroll, who makes a living as a salmon fisherman but focuses on video and other technology issues in his spare time. The remainder were Seattle police and other public officials, a few members of the community, and a number of people from local companies such as Amazon Web Services and Evidence.com, plus a substantial media presence from local television stations and newspapers." Seven different teams demonstrated solutions, but none thought automation could realistically handle the task in the near future. "bout one-third were technology professionals or part-timers like Henry Kroll, who makes a living as a salmon fisherman but focuses on video and other technology issues in his spare time. The remainder were Seattle police and other public officials, a few members of the community, and a number of people from local companies such as Amazon Web Services and Evidence.com, plus a substantial media presence from local television stations and newspapers." The city just started a pilot program for body-worn police cameras.

Submission + - NASA emails a Socket Wrench to the ISS

HughPickens.com writes: Sarah LeTrent reports at CNN that NASA just emailed the design of a socket wrench to astronauts so that they could print it out in the orbit. The ratcheting socket wrench was the first "uplink tool" printed in space, according to Grant Lowery, marketing and communications manager for Made In Space, which built the printer in partnership with NASA. The tool was designed on the ground, emailed to the space station and then manufactured where it took four hours to print out the finished product. The space agency hopes to one day use the technology to make parts for broken equipment in space and long-term missions would benefit greatly from onboard manufacturing capabilities. "I remember when the tip broke off a tool during a mission," recalls NASA astronaut TJ Creamer, who flew aboard the space station during Expedition 22/23 from December 2009 to June 2010. "I had to wait for the next shuttle to come up to bring me a new one. Now, rather than wait for a resupply ship to bring me a new tool, in the future, I could just print it."

Submission + - 65,000 Complaints Later, Microsoft Files Suit Against Tech Support Scammers (hothardware.com) 2

MojoKid writes: Tech support scammers have been around for a long time and are familiar to most Slashdot readers. But last month, the Federal Trade Commission (FTC) announced that it had issued lawsuits against several culprits responsible for tech support scams. Now Microsoft has announced that it too is going after tech support scammers. According to the company, more than 65,000 complaints have been made about tech support scams since May of this year alone. Bogus technicians, pretending to represent Microsoft, call the house offering fake tech support and trick people into paying hundreds of dollars to solve a non-existent issue. If successful in their ruse, the scammer then gains access to a person's computer, which lets them steal personal and financial information and even install malware.

Submission + - The Singularity: Artificial Intelligence's "Great Schism" Debate

An anonymous reader writes: http://www.vanityfair.com/cult...

I'm sure this topic has been visited many times before here on Slashdot, but here is another (longish) article spelling out the "Great Schism" in AI — the argument between proponents of the Singularity and those who are not quite as gung ho. Which side has the monopoly on wisdom? Who really knows? It's like arguing politics, but folks like Ray Kurzweil, Mitch Kapor, Marc Andreesen, Jaron Lanier et al. present some profound insights.

Submission + - New data says volcanoes, not asteroids, killed dinosaurs

schwit1 writes: The uncertainty of science: A careful updating of the geological timeline has strengthened the link between the dinosaur extinction 66 million years ago and a major volcanic event at that time.

A primeval volcanic range in western India known as the Deccan Traps, which were once three times larger than France, began its main phase of eruptions roughly 250,000 years before the Cretaceous-Paleogene, or K-Pg, extinction event, the researchers report in the journal Science. For the next 750,000 years, the volcanoes unleashed more than 1.1 million cubic kilometers (264,000 cubic miles) of lava. The main phase of eruptions comprised about 80-90 percent of the total volume of the Deccan Traps’ lava flow and followed a substantially weaker first phase that began about 1 million years earlier.

The results support the idea that the Deccan Traps played a role in the K-Pg extinction, and challenge the dominant theory that a meteorite impact near present-day Chicxulub, Mexico, was the sole cause of the extinction. The researchers suggest that the Deccan Traps eruptions and the Chicxulub impact need to be considered together when studying and modeling the K-Pg extinction event.

The general public might not know it, but the only ones in the field of dinosaur research that have said the asteroid was the sole cause of the extinction have been planetary scientists.

Feed Google News Sci Tech: ISS astronaut needs a wrench, NASA successfully 'emails' him one - CNET (google.com)


CNET

ISS astronaut needs a wrench, NASA successfully 'emails' him one
CNET
An astronaut aboard the International Space Station needed a socket wrench, so NASA engineers emailed him designs for 3D-printing one. What a world we're living in. by Anthony Domanico @ajdomanico; 19 December 2014 9:46 pm GMT. comments. 0.
3-D Printer System Beams Up a New Tool to Space StationNBCNews.com
The One-Year Crew: Twin NASA Astronauts Scott And Mark Kelly To Reveal ... International Business Times
This Is How You Email A Wrench Into SpaceJalopnik

all 37 news articles

Submission + - The maddening confusion of dark matter vs. dark energy

StartsWithABang writes: We all know that dark energy has come to dominate the Universe, and will lead to a cold, empty Universe in short order. But everywhere we look, we find galaxies and clusters: regions where gravity has defeated the cosmic expansion in the greatest struggle in the Universe. So how is it possible that both of these things are true? A great explanation of the difference between "local" and "global" when it comes to the expanding Universe!

Submission + - Five Craziest Space Missions (bbc.com)

An anonymous reader writes: We’ve landed on a comet – so where next? The BBC Future lists its choice of the five craziest space missions currently being proposed. They may sound wild, but all of these are missions that have been seriously discussed as possible future missions: Floating astronauts in the clouds of Venus, sailing on the methane seas of Titan, melting a torpedo probe through the ice of Europa, catching an asteroid in a net and bringing it to lunar orbit, and a 100-year starship mission to the Alpha Centauri and beyond.

Feed Techdirt: The MPAA's Secret Plan To Reinterpret The DMCA Into A Vast Censorship Machine Th (google.com)

Yes, all the attention these days about the Sony hack is on the decision to not release The Interview, but it still seems like the big story to come out of the hack is the sneaky plans of the MPAA in its bizarre infatuation with attacking the internet. We've already covered the MPAA's questionably cozy relationship with state Attorneys General (to the point of both funding an investigation into Google and writing documents for those AGs to send in their names), as well as the continued focus on site blocking, despite an admission that the MPAA and the studios still don't have the slightest clue about the technology implications of site blocking.

Last week, TorrentFreak noted the various options that were under discussion by the MPAA for blocking sites, and now The Verge has published more information, including the analysis by MPAA's favorite hatchetmen lawyers at Jenner & Block about how site blocking might work in practice [pdf] by breaking DNS.

For years, actual technology experts have explained why DNS blocking is a really bad idea , but the MPAA just can't let it go apparently. It's just, this time, it's looking for ways to do it by twisting existing laws, rather than by getting a new SOPA-like law passed.

To understand the plan, you have to first understand the DMCA section 512, which is known as the safe harbor section, but which includes a few different sections, with different rules applying to different types of services. 512(a) is about "transitory digital network communications" and basically grants very broad liability protection for a network provider who isn't storing anything -- but just providing the network. There are good reasons for this, obviously. Making a network provider liable for traffic going over the network would be a disaster for the internet on a variety of levels.

The MPAA lawyers appear to recognize this (though they make some arguments for getting around it, which we'll get to in a follow-up post), but they argue that a specific narrow attack via DMCA might be used to force ISPs to break the basic internet by disabling entries in their own DNS databases. The trick here is twisting a different part of the DMCA, 512(d), which is for "information location tools." Normally, this is what's used against search engines like Google or social media links like those found on Twitter. But the MPAA argues that since ISPs offer DNS service, that DNS service is also an "information location tool" and... ta da... that's how the MPAA can break DNS. The MPAA admits that there's an easy workaround for end-users -- using third-party DNS providers like OpenDNS or Google's DNS service -- but many users won't do that. And the MPAA would likely go after those guys as well.

At the same time, even this narrow limitation on ISPs’ immunity could have the salutary effect of requiring ISPs to respond to takedown notices by disabling DNS lookups of pirate sites through the ISPs’ own DNS servers, which is not currently a general practice. Importantly, the argument for such a requirement need not turn on the Communications Act, but can instead be based on the DMCA itself, which expressly limits ISPs’ immunity to each “separate and distinct” function that ISPs provide. See 17 U.S.C. 512(n). A reasonable argument can be made that DNS functionality is an “information location tool” as contemplated by DMCA Section 512(d) and, therefore, that ISPs are required, as a condition of the safe harbor, to cease connecting users to known infringing material through their own DNS servers. Should this argument hold – and we believe that it has a reasonable prospect of success – copyright owners could effectively require ISPs to implement a modest (albeit easily circumvented) form of DNS-based site blocking on the basis of only a takedown notice rather than litigation.
In short, since DMCA takedown notices apply to "information location tools," but not to "transitory network communications," the MPAA would like to argue that just the DNS lookup functionality is an information location tool -- and can thus be censored with just a takedown notice. This is both really slimy (though brilliant in its nefariousness) and insanely dangerous for the internet and free speech . We see so many bogus DMCA takedowns of basic content today, and here the MPAA is looking to effectively, and sneakily expand that to whole sites by misrepresenting the law (badly).

DNS is not an "information location tool" in the sense of a search engine. It's the core underpinning of how much of the internet works. At no point in the 16 years the DMCA has been around has anyone made an argument that the DNS system was covered by the "information location tools" definition. Because that's clearly not what it was written to cover. The MPAA's lawyers (in this "confidential" memo) appear to recognize that this argument doesn't fully make sense because of that, but they seem to think it's worth a go:

To be sure, the argument is not guaranteed to succeed, as unlike a “pointer” or “hyperlink text,” DNS provides a user’s browser with specific information (IP routing information) that the user has requested by other means (alphanumeric internet addresses), as opposed to providing the user with an active interface allowing the user to request information online, as they might from a clickable page of search results. But at least in the literal sense, DNS appears to fit within the list of Section 512(d) functions and a reasonable argument can be made that DNS is more like a “directory” than the provision of “routing” and should be treated accordingly under the statute as a Section 512(d) function rather than a Section 512(a) function.
Pushing this argument would raise many of the problems found with the original DNS-breaking proposal in PIPA/SOPA. It would raise even more serious questions about the First Amendment and prior restraint. Effectively, it would be moving the definition of "information location tool" down the stack, such that rather than requiring the removal of access to the specific infringing content, it would require removal of access to an entire site based on a single accusation of infringement. Someone uploaded an infringing video to YouTube? Under this interpretation, the MPAA can force Verizon to make YouTube disappear from the internet for all users relying on Verizon's DNS. The censorship implications are massive here, especially with no court proceeding at all. This wouldn't require anything in court -- just a single takedown notice, of which copyright holders send millions. Rather than sending all those notices to Google and getting them delisted from search, copyright holders could turn the firehose towards Verizon, AT&T and Comcast, and basically take down half the internet on their say so alone. Yes, sites could counternotice, but ISPs would have 10 business days in which they can keep sites off their DNS entirely.

The results would be insane.

And that doesn't even touch on the technical havoc this would wreak. As we've noted earlier, the MPAA admits it's not clear on the technical implications of this plan, but let's just point back to Paul Vixie's discussion of how SOPA/PIPA would break the internet by mucking with the core DNS functionality, no matter how it was implemented.

What this goes back to is the core purpose of DNS, which is merely to translate a URL into a numeric equivalent to connect. It's not an information location tool for helping people "find" information -- it's just the basic plumbing of how the internet works. It's how basically all pieces of the internet expect to work. If you put in a URL here, then DNS returns the proper IP addresses to follow through there. Breaking that, effectively fracturing the internet, and creating a patchwork of different DNS systems would create a huge list of problems not easily fixed.

And, yet, because the MPAA can't figure out how to adapt to the times, it appears to be willing to give it a shot. Because, hey, it's better than innovating.

Permalink | Comments | Email This Story








Submission + - AnandTech bought by Purch, same owner as Tom's Hardware

DrunkenTerror writes: Following founder Anand Lal Shimpi's departure a few months back, seminal tech site AnandTech has been bought by Purch, the same company that owns their 1990s era competitor, Tom's Hardware. Long-time readers shouldn't worry, however, since "AnandTech and Tom’s Hardware remain editorially independent, and though no longer competitors, the goal is to learn from one another. "

Slashdot Top Deals

The one day you'd sell your soul for something, souls are a glut.

Working...