Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment: Information overload (Score 4, Insightful) 46

There is simply no way human beings can sort through that much data. That means relying on gadgets and software to do the sorting for the humans. Anyone who manages big data can tell you how corrupt most data sets really are. Names spelled different ways, bits of information incorrectly transcribed, copy errors, format errors, import errors are all low probability events but, when you're dealing with billions of records, there are a lot of them. Just in general, gadget security doesn't work.

In nearly every terrorist event that's happened in the U.S., the FBI had tips from alert citizens. That was true for 9/11 and almost all of them in between. The FBI even interviewed the Boston Marathon bombers. HUMINT works.

Funny that the FBI screw ups don't get more media attention. In nearly every case they didn't effectively use the information they had, so how is more information going to make things better?

Comment: Prime example (Score 4, Insightful) 100

by HangingChad (#49550691) Attached to: Microsoft Increases Android Patent Licensing Reach

If anything points out that software patents should be completely thrown out it's this kind of nonsense. The computer world used to joke about the "Microsoft tax" on new computers due to the cost of Windows. This is, literally, a Microsoft tax on Android devices. At least with Windows you got something, this is money for nothing. This is not what the patent system was designed to do.

Comment: Always felt silly for doing that (Score 1) 210

That sounds like a good time for a duress password.

I always took the time to make two containers with one accessed through a duress password. I felt silly for doing it...less so now. It was something I did because I used to travel a lot internationally. That was before Customs started cloning people's device drives.

+ - Bees prefer nectar laced with Neonicotinoids->

Submitted by Taco Cowboy
Taco Cowboy writes: Neonicotinoids are a class of neuro-active insecticides chemically similar to nicotine

Neonicotinoids kill insect by overwhelming and short-circuting the insects' central nervous system (See http://lee.ifas.ufl.edu/Hort/V... )

Shell and Bayer started the development of Neonicotinoids back in the 1980's and 1990's

Since this new group of pesticide came to the market the bee population have been seriously devastated in regions where the pesticide are been widely used

In 2008 neonicotinoids came under increasing scrutiny over their environmental impacts starting in Germany

In 2012, studies have shown that neonicotinoid uses are linked to crash of bee population (See http://usnews.nbcnews.com/_new... )

New studies, however, have discovered that bees prefer nectars that are laced with neonicotinoids, over nectars that are free of any trace of neonicotinoids (See http://www.rsc.org/chemistrywo... )

According to researchers at Newcastle University the bees may "get a buzz" from the nicotine-like chemicals in the same way smokers crave cigarettes

BBC also covers this case (See http://www.bbc.com/news/scienc... )

Link to Original Source

Comment: Re:Common sense here folks (Score 1) 113

Sometimes common sense is just wrong, particularly when it comes to predicting the behavior of other people who might not agree with what you consider "common sense". If you check his publications in Google Scholar, this guy's been publishing surgical neuroscience papers in real journals since around 1990. I think he really intends to try this.

+ - Ubuntu 15.04 Released, First Version to Feature SystemD->

Submitted by jones_supa
jones_supa writes: The final release of Ubuntu 15.04 is now available. Only modest set of improvements are rolling out with this spring's Ubuntu. While this means the OS can't rival the heavy changelogs of releases past, the adage "don’t fix what isn't broke" is clearly one that 15.04 plays to. The headline change is SystemD being featured first time in a stable Ubuntu release, which replaces the inhouse UpStart init system. The Unity desktop version 7.3 receives a handful of small refinements, most of which aim to either fix bugs or correct earlier missteps (for example, application menus can now be set to be always visible). The Linux version is 3.19.3 further patched by Canonical. As usual, the distro comes with fresh versions of various familiar applications.
Link to Original Source

+ - Comcast Officially Gives Up on TWC Merger->

Submitted by Anonymous Coward
An anonymous reader writes: Confirming speculation from yesterday, Comcast announced this morning that its attempt to merge with Time Warner Cable has been terminated. The announcement was very brief, but indicated that regulatory pressure was the reason they killed the deal. CEO Brian Roberts said, "Today, we move on. Of course, we would have liked to bring our great products to new cities, but we structured this deal so that if the government didn't agree, we could walk away."
Link to Original Source

+ - MIT Developing AI to Better Diagnose Cancer->

Submitted by stowie
stowie writes: Working with Massachusetts General Hospital, MIT has developed a computational model that aims to automatically suggest cancer diagnoses by learning from thousands of data points from past pathology reports. The core idea is a technique called Subgraph Augmented Non-negative Tensor Factorization (SANTF). In SANTF, data from 800-plus medical cases are organized as a 3D table where the dimensions correspond to the set of patients, the set of frequent subgraphs, and the collection of words appearing in and near each data element mentioned in the reports. This scheme clusters each of these dimensions simultaneously, using the relationships in each dimension to constrain those in the others. Researchers can then link test results to lymphoma subtypes.
Link to Original Source

+ - 3D display without the need for 3D glasses

Submitted by Qualitypointtech
Qualitypointtech writes: Researchers at Swinburne University of Technology have shown the capacity of a technique using graphene oxide and complex laser physics to create a pop-up floating display without the need for 3D glasses.At this moment, the demonstrated graphene 3D display can only allow images up to 1cm. But there is no limitation for the up scalability of this technique.This new generation floating 3D display technology also has potential applications for military devices, entertainment, remote education and medical diagnosis. In a paper, published in Nature Communications, they show how their technology realises wide viewing-angle and full-color floating 3D display in graphene based materials.

+ - Good: Companies care about data privacy. Bad: No idea how to protect it. 1

Submitted by Esther Schindler
Esther Schindler writes: Research performed by Dimensional Research demonstrated something most of us know: Just about every business cares about data privacy, and intends to do something to protect sensitive information. But when you cross-tabulate the results to look more closely at what organizations are actually doing to ensure that private data stays private, the results are sadly predictable: While smaller companies care about data privacy just as much as big ones do, they’re ill-equipped to respond. What’s different is not the perceived urgency of data privacy and other privacy/security matters. It’s what companies are prepared (and funded) to do about it.

For instance:

When it comes to training employees on data privacy, 82% of the largest organizations do tell the people who work for them the right way to handle personally identifiable data and other sensitive information. Similarly, 71% of the businesses with 1,000-5,000 employees offer such training.

However, even though smaller companies are equally concerned about the subject, that concern does not trickle down to the employees quite so effectively. Half of the midsize businesses offer no such training; just 39% of organizations with under 100 employees regularly train employees on data privacy.

Presumably, your employer cares about data security and privacy, too (if for no other reason than to keep its name out of the news). But what is it really doing to ensure that protection?

+ - Music Industry Argues Works Entering Public Domain Are Not in Public Interest->

Submitted by Anonymous Coward
An anonymous reader writes: With news that Canada intends to extend the term of copyright for sound recordings and performers, the recording industry is now pushing the change by arguing that works entering the public domain is not in the public interest. It is hard to see how anyone can credibly claim that works are "lost" to the public domain and that the public interest in not served by increased public access, but if anyone would make the claim, it would be the recording industry.
Link to Original Source

+ - Groupon refuses to pay security expert who found serious XSS site bugs->

Submitted by Mark Wilson
Mark Wilson writes: Bounty programs benefit everyone. Companies like Microsoft get help from security experts, customers gain improved security, and those who discover and report vulnerabilities reap the rewards financially. Or at least that's how things are supposed to work.

Having reported a series of security problems to discount and deal site Groupon, security researcher Brute Logic from XSSposed.org was expecting a pay-out — but the site refuses to stump up the cash. In all, Brute Logic reported more than 30 security issues with Groupon's site, but the company cites its Responsible Disclosure policy as the reason for not handing over the cash.

Link to Original Source

+ - Researcher Discloses Methods For Bypassing All OS X Security Protections

Submitted by Trailrunner7
Trailrunner7 writes: For years, Apple has enjoyed a pretty good reputation among users for the security of its products. That halo has been enhanced by the addition of new security features such as Gatekeeper and XProtect to OS X recently, but one researcher said that all of those protections are simple to bypass and gaining persistence on a Mac as an attacker isn’t much of a challenge at all.

Gatekeeper is one of the key technologies that Apple uses to prevent malware from running on OS X machines. It gives users the ability to restrict which applications can run on their machines by choosiing to only allow apps from the Mac App Store. With that setting in play, only signed, legitimate apps should be able to run on the machine. But Patrick Wardle, director of research at Synack, said that getting around that restriction is trivial.

“Gatekeeper doesn’t verify an extra content in the apps. So if I can find an Apple-approved app and get it to load external content, when the user runs it, it will bypass Gatekeeper,” Wardle said in a talk at the RSA Conference here Thursday. “It only verifies the app bundle.”

“If Macs were totally secure, I wouldn’t be here talking,” Wardle said. “It’s trivial for any attacker to bypass the security tools on Macs.”

BASIC is the Computer Science equivalent of `Scientific Creationism'.

Working...