Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - What Do Old Techies Do After They Retire?

HughPickens.com writes: Peter T. Kilborn writes in the NYT about the generation of the baby boomer programmers, engineers, and technical people who are now leaving the bosses, bureaucracies, commutes and time clocks of their workaday careers to tackle something consuming and new, whether for material reward or none at all. “Retirement gives them the opportunity to flex their experience,” says Dr. William Winn speaking of a postchildhood, postfamily-rearing, “third age” of “productive aging” and “positive aging.” Nancy K. Schlossberg calls men and women who exploit the skills of their old jobs “continuers" and those who take up something new “adventurers.” Continuers and adventurers make up the vigorous end of Dr. Schlossberg’s retirement spectrum, opposite those she calls “retreaters” who disengage from life and “spectators” who just watch.

For example, 75-year-old Seth R. Goldstein, with four degrees in mechanical and electrical engineering from MIT and retired for thirteen years, still calls himself an engineer. But where he was previously a biomedical engineer with the National Institutes of Health in Bethesda with 12 patents, he now makes kinetic sculptures in his basement workshop that lack any commercial or functional utility. But his work, some of which is on display at the Visionary Arts Museum in Baltimore, has purpose. Goldstein is pushing the envelope of engineering and hoping to stir the imaginations of young engineers to push their own envelopes. For example "Why Knot?” a sculpture Goldstein constructed, uses 10 electric motors to drive 10 mechanisms to construct a four-in-hand knot on a necktie that it wraps around its own neck. Grasping, pulling, aligning and winding the lengths of the tie, Mr. Knot can detect the occasional misstep or tear, untie the knot and get it right. Unlike Rube Goldberg’s whimsical contraptions, Mr. Goldstein’s is no mere cartoon. It works, if only for Mr. Knot.

According to Kilborn, people like Goldstein don't fit the traditional definition of retirement, which according to Webster's Dictionary means the "withdrawal from one's position or occupation or from active working life. Retirement implies that you're just leaving something; it doesn't reflect that you're going to something," says Schlossberg. "But it is really a career change. You are leaving something that has been your primary involvement, and you are moving to something else."

Submission + - Harvard climate skeptic scientist has made a fortune from corporate interests (nytimes.com)

Lasrick writes: Elected officials who want to block the EPA and legislation on climate change frequently refer to a handful of scientists who dispute anthropogenic climate change. One of scientists they quote most often is Wei-Hock Soon, a scientist at the Harvard-Smithsonian Center for Astrophysics who claims that variations in the sun’s energy can largely explain recent global warming. Newly released documents show the extent to which Dr. Soon has made a fortune from corporate interests. 'He has accepted more than $1.2 million in money from the fossil-fuel industry over the last decade while failing to disclose that conflict of interest in most of his scientific papers. At least 11 papers he has published since 2008 omitted such a disclosure, and in at least eight of those cases, he appears to have violated ethical guidelines of the journals that published his work.' The Koch Brothers are cited as a source of Dr. Soon's funding.

Submission + - Antitrust case against Google thrown out of SF court (betanews.com)

Mark Wilson writes: Just a few days ago Google was threatened with legal action for anti-competitive behavior in Russia. While we don't yet know if that will amount to anything, there has been some better news for the search giant in the US. A San Francisco judge dismissed a case brought against the firm by two men who thought the inclusion of Google services in Android pushed up the prices of their handsets.

Submission + - ask slashdot: How can we improve the judicial system with technology? 1

An anonymous reader writes: Technology has improved so many things in our lives. I have found myself wondering if it is not time for us to consider improvements to our judicial system. One of the cornerstones of any democracy is its judicial system. Fortunatelly, most of us never have to deal with it. On the other hand, the fact that we so seldom interact with it also means that most of us are not constantly thinking about it. It is possible our judicial system would be much better if most of us had to spend more time thinking about it.

I myself had not put much thought into it until I watched a documentary about Aaron Swartz. It is frightening to think that someone could have been left in a position like that. I also hear about so many cases were people end up pleaing guilty because they do not have enough money to fight a case in court. Is this really the best we can do? The Marshal Project is also an interesting source of information regarding the shortfalls of our current system.

What does the slashot crowd think about it? How can we improve our judicial system? Is there any interesting way that techonology could be used to improve the system?

Submission + - Linux Foundation: Bugs Can Be Made Shallow With Proper Funding (esecurityplanet.com)

jones_supa writes: The record amount of security challenges in 2014 undermined the confidence many had in high quality of open source software. Jim Zemlin, executive director of the Linux Foundation, addressed the issue head-on during last week's Linux Collaboration Summit. Zemlin quoted the oft-repeated Linus' law, which states that given enough eyes, all bugs are shallow. "In these cases the eyeballs weren't really looking", Zemlin said. "Modern software security is hard because modern software is very complex", he continued. Such complexity requires dedicated engineers, and thus the solution is to fund projects that need help. To date, the foundation's Core Infrastructure Initiative has helped out the NTP, OpenSSL and GnuPG projects, with more likely to come. The second key initiative is the Core Infrastructure Census, which aims to find the next Heartbleed before it occurs. The census is looking to find underfunded projects and those that may not have enough eyeballs looking at the code today.

Submission + - Un-truthful Carrier: Ten Lies T-Mobile Told Me About My Data Plan (jeffreifman.com)

reifman writes: Last June, my post “Yes, You Can Spend $750 in International Data Roaming in One Minute on AT&T” was slashdotted and this led to T-Mobile CEO John Legere tweeting 'how crappy @ATT is' and welcoming me to the fold. Unfortunately, now it’s TMobile that’s having trouble tracking data; it seems to be related to the rollout of their new DataStash promotion. Just like AT&T, they’re blaming the customer. Here are the ten lies T-Mobile told me about my data usage today.

Submission + - Ask Slashdot: parental content control for free OSs?

m.alessandrini writes: Children grow up, and inevitably they will start using internet and social networks, both for educational and recreational purposes. And it won't take long to them to learn to be autonomous, especially with all the smartphones and tablets around and your limited time.
Unlike the years of my youth, when internet started to enter our lives gradually, now I'm afraid of the amount of inappropriate contents a child can be exposed to unprepared: porn, scammers, cyberbullies or worse, are just a click away.
For Windows many solutions claim to exist, usually in form of massive antivirus suites. What about GNU/Linux? Or Android? Several solutions rely on setting up a proxy with a whitelist of sites, or similar, but I'm afraid this approach can make internet unusable, or otherwise be easy to bypass. Have you any experiences or suggestions? Do you think software solutions are only a part of the solution, provided children can learn hacking tricks better than us, and if so, what other "human" techniques are most effective?

Submission + - Counterfeiting with 3-D Printers Could Cost $100 Billion (wired.com)

An anonymous reader writes: Citing a report from the Gartner Group estimating $100 billion in intellectual property losses within five years, Joshua Greenbaum warns of "the threat of a major surge in counterfeiting" as cheap 3-D printers get more sophisticated materials. Writing for Wired, Greenbaum argues that preventing counterfeiting "promises to be a growth market," and suggests that besides updating IP laws, possible solutions include nanomaterials for "watermarking" authentic copies or even the regulation of 3-D printing materials. Major retailers like Amazon are already offering 3-D print-on-demand products — though right now their selection is mostly limited to novelties like customized bobbleheads and Christmas ornaments shaped like cannabis leaves.

Submission + - Inside a Room Built for Total Silence (vice.com)

An anonymous reader writes: "The room is totally covered in foam wedges, pointing inwards, the floor a metal grate suspended over them. Itâ(TM)s both archaic and otherworldly, a retro-futurist scene in dull brown. As Dance pulls the door shut behind us, the atmosphere deadens. Any sound waves are deflected by the multifaceted foam and are effectively sucked into the walls. Itâ(TM)s an oppressive sensation; much of our spatial awareness is defined by echo-location, and even with my eyes open the disorientation is irrefutable. We agree that Iâ(TM)ll stay in the chamber for an hour with the lights out, to divulge myself of extra sensory distractions. I lie down on slabs of foam laid out as a makeshift bed; the academics pile out, and the technician pulls the door shut and flicks out the light."

Submission + - The Robots That Will Put Coders Out of Work

snydeq writes: Researchers warn that a glut of code is coming that will depress wages and turn coders into Uber drivers, InfoWorld reports. 'The researchers — Boston University's Seth Benzell, Laurence Kotlikoff, and Guillermo LaGarda, and Columbia University's Jeffrey Sachs — aren't predicting some silly, Terminator-like robot apocalypse. What they are saying is that our economy is entering a new type of boom-and-bust cycle that accelerates the production of new products and new code so rapidly that supply outstrips demand. The solution to that shortage will be to figure out how not to need those hard-to-find human experts. In fact, it's already happening in some areas.'

Submission + - Homeland Security Urges Lenovo Customers to Remove Superfish

HughPickens.com writes: Reuters reports that the US Department of Homeland Security has advised Lenovo customers to remove "Superfish" software from their computers. According to an alert released through its National Cyber Awareness System the software makes users vulnerable to SSL spoofing and could allow a remote attacker to read encrypted web browser traffic, spoof websites and perform other attacks on Lenovo PCs with the software installed. Lenovo inititally said it stopped shipping the software because of complaints about features, not a security vulnerability. "We have thoroughly investigated this technology and do not find any evidence to substantiate security concerns," the company said in a statement to Reuters early on Thursday. On Friday, Lenovo spokesman Brion Tingler said the company's initial findings were flawed and that it was now advising customers to remove the software and providing instructions for uninstalling "Superfish". "We should have known about this sooner," Tingler said in an email. "And if we could go back, we never would have installed this software on our machines. But we can't, so we are dealing with this head on."

Submission + - An Evidence-Based Approach to Online Dating

HughPickens.com writes: Rachel Nuwer writes in the NYT that Dr. Sameer Chaudhry’s online dating persona was garnering no response from the women he reached out to so he synthesized 86 literature studies on the subject of online dating in the fields of psychology, sociology, and computer, behavioral, and neurocognitive sciences.in hopes of improving his odds. As it turns out, success begins with picking a user name. While men are drawn to names linked to physical traits (e.g., Cutie), the researchers found, women prefer ones that indicate intelligence (e.g., Cultured). Both sexes respond well to playful names (e.g. Fun2bwith) and shy away from ones with negative connotations (e.g., Bugg). User names that begin with letters from the first half of the alphabet do better than those from the latter half. “As human beings, we have a tendency to give things at the top of a pile more value,” says Khan. As for your profile photo, pick a photo with a genuine smile, one that crinkles the eyes, and with a slight head tilt (it’s linked to attractiveness). And if you’re looking for a male partner, go for that photo of you in siren red—a color that enhances men's attraction to women. "For those attracted to browse into the profile, a description of personal traits increased likeability when it: showed who the dater was and what they were looking for in a 70:30 ratio; stayed close to reality; and employed simple language with humor added. Invitations were most successful in obtaining a response from the potential date when they: were short personalized messages addressing a trait in their profile; rhymed with their screen name or headline message; and extended genuine compliments." And finally, don't wait too long before arranging a face to face meeting.

Submission + - US State Department Can't Get Rid of Email Hackers (wsj.com)

An anonymous reader writes: Three months after the State Department confirmed hackers breached its unclassified email system, the government still hasnt been able to evict them from the network, say three people familiar with the investigation. Government officials, assisted by outside contractors and the National Security Agency, have repeatedly scanned the network and taken some systems offline. But investigators still see signs of the hackers on State Department computers, the people familiar with the matter said. Each time investigators find a hacker tool and block it, these people said, the intruders tweak it slightly to attempt to sneak past defenses. It isn’t clear how much data the hackers have taken, the people said. They reaffirmed what the State Department said in November: that the hackers appear to have access only to unclassified email. Still, unclassified material can contain sensitive intelligence.

Submission + - The best—and worst—places to drive your electric car (sciencemag.org)

sciencehabit writes: For those tired of winter, you’re not alone. Electric cars hate the cold, too. Researchers have conducted the first investigation into how electric vehicles fare in different U.S. climates. The verdict: Electric car buyers in the chilly Midwest and sizzling Southwest get less bang for their buck, where poor energy efficiency and coal power plants unite to turn electric vehicles into bigger polluters.

Slashdot Top Deals

2.4 statute miles of surgical tubing at Yale U. = 1 I.V.League

Working...