Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Comment Re: And you call the Americans anti-science (Score 1) 325

Half of All Children Will Be Autistic by 2025, Warns Senior Research Scientist at MIT seams to be somewhat serious problem. for a product that was invented as a descaling agent to clean out calcium and other mineral deposits in pipes and boilers

GMO/roundup exposed crops grown are deficient in minerals necessary for a healthy metabolism. While our bodies aren't directly affected by roundup residues. It kills off gut bacteria which symbiotically aids in our digestion.

Submission + - Scientists Invent a New Steel as Strong as Titanium ( 1

schwit1 writes: South Korean researchers have solved a longstanding problem that stopped them from creating ultra-strong, lightweight aluminum-steel alloys.

Today a team of material scientists at Pohang University of Science and Technology in South Korea announced what they're calling one of the biggest steel breakthroughs of the last few decades: an altogether new type of flexible, ultra-strong, lightweight steel. This new metal has a strength-to-weight ratio that matches even our best titanium alloys, but at one tenth the cost, and can be created on a small scale with machinery already used to make automotive-grade steel. The study appears in Nature.

Submission + - Poll: What electronics do you want in your car 1

sleepypsycho writes: What electronics do you want in you car?
- Self driving car
- Collision avoidance
- Integrated electronics system: gps, audio,tire pressure warnings
- Completed isolate systems: gps, fuel injection
- Nothing with a computer chip
- I don't want any kind of car
- Roof mounted death ray

Comment Re:Not surprising (Score 1) 303

I've dealt with dozens of lightning strikes here in lightning prone South Florida.
Direct lightning strikes usually take out a Enet port on the switch and whatever is connected to the other end PC/laptop enet port.

Lost my laptop PCI cardbus bus devices, 1Gb enet, Wifi, memory card reader and a switch port on the other end.
Usually extra grounding, and multiple layers of surge suppressors/chokes protects my electronics.

Note: The ethernet spec, includes isolation requirements in the several Kilo Volt range. Thus something like this won't do much damage. You'll need something more like a HV stun weapon to do some real damage.

Submission + - Was Carly a failure at HP? 7

MouseTheLuckyDog writes: With Carly Fiorina, now running for President, her tenure at HP is once again under a microscope. A recent article claims that her stay wasn't as bad as it seemed. The main argument is a graph of HP, IBM,, Dell and Sun's stock performance.

My own take is the graph is "cooked". Sun, for the most part, never generic desktops or laptops. Furthermore Sun mostly depended on Sparc chips which were on their last legs at the time. The end result is that the graph looks like one you would expect of three French vintners and one California vintner. Sun's 200% peak ( due to java ) makes variations in the other 3 companies performances look small.

Furthermore, Apple is glaringly missing. If Apple were included, the graph would be a flatline clearly showing the graph was cooked. With Apple in, they would have to cut the graph off at 2007 showing a more realistic view of Carly's performance.

So what do you think. Was the article correct? What do you think of Fiorina's job at HP? ( From what I remember "worst CEO ever" about sums it up. ) Links from that period of time would be appreciated, since I think it is going to be a long election season and the issue will not go away anytime soon.

Comment Re:Brian Krebs rocks (Score 1) 44

He got lucky, that these criminals aren't a bit smarter and invested a bit more effort into their hack. I.E.Adding a BT stealth mode.

Where the hacked modules shut down BT transmission, until they received certain mac id's. Which would make them completely undetectable except by close visual inspection. :-(

A somewhat reliable counter measure would be to,
1st, Separate the money loading into a different compartment that doesn't give access to the electronics.
2nd, Restrict down (people wise) and log all access to electronics section.
3rd, The moment the electronics bay is opened, the ATM is disabled. (Except for testing), until turned back on by head quarters.
4th, When the tech is done servicing the electronics sections he/she sends a time stamped photos of electronics+visible serial number+selfie (in front of locked up ATM still in diag mode) to HQ and then calls in to re-activate ATM

Submission + - Intel Kills a Top-of-the-Line Processor (

itwbennett writes: In June of this year, Intel announced a processor branded as Broadwell-C. Now, the company has confirmed that the part was cancelled but would not give an official reason. Why did Intel kill the Broadwell-C? ITworld's Andy Patrizio speculates that it's a 'combination of increased cost, lower yield and potential product cannibalization' — cannibalization of the company's newly-launched Skylake processor, which the Broadwell-C outperformed.

Submission + - WSJ: We Need the Right to Repair Our Gadgets (

An anonymous reader writes: An editorial in the Wall Street Journal rings a bell we've been ringing for years: "Who owns the knowledge required to take apart and repair TVs, phones and other electronics? Manufacturers stop us by controlling repair plans and limiting access to parts. Some even employ digital software locks to keep us from making changes or repairs. This may not always be planned obsolescence, but it’s certainly intentional obfuscation." The article shows that awareness of and frustration with this consumer-hostile behavior is going mainstream. The author links to several DIY repair sites like iFixit, and concludes, "Repairing stuff isn’t as complicated as they want you to think. Skilled gadget owners and independent repair pros deserve access to the information they need to do the best job they can."

Comment Re: Should be another entry... (Score 1) 159

Superstorm Katrina even as a CAT-3 was more powerful than your typical CAT-5. Katrina had an Eye wall over 60 miles in diameter, thus breaking all storm surge records. Even for the area that was hit by Cat-5 Hurricane Camile (1969, 11-12 miles) or Andrew (1992, 8 miles).

2005 spawned two more Cat-5 Superstorms, Rita, and Wilma.. Wilma later took aim at South Florida, even as weakened Cat-3 it did a lot of damage.

My area got hit by both Katrina(as a Cat-1), and by CAT-3 Wilma's eastern and southern eye walls. I lost power for a total of 15 days, for others it was much longer.

My observation, If any of these Super-storms had retained Cat-5 status while coming ashore. The resulting outcomes would have been far worse.

Submission + - Ashley Madison CEO Steps Down // Reporter Finds Clues To Hacker's Identity

Dave Knott writes: Following the recent hacks on the infidelity website Ashley Madison, Noel Biderman has stepped down as CEO of both and its parent company. Avid Life Media Inc., the company that owns the site and many others, announced Biderman's move in a short press release on Friday: "Noel Biderman, in mutual agreement with the company, is stepping down as chief executive officer of Avid Life Media Inc. (ALM) and is no longer with the company. Until the appointment of a new CEO, the company will be led by the existing senior management team." Before the data hack, the company was planning an IPO in London that would have taken in as much as $200 million US from investors. According to regulatory filings, the company had $115 million in revenue last year, more than four times the amount it obtained in 2009.

Meanwhile, in related news, Brian Krebs (the reporter who first uncovered the hack) says that he has uncovered clues to the possible identity of the hacker. Krebs says that he noticed that the Twitter account operated by a known hacker recently posted a link to Ashley Madison's stolen proprietary source code before it was made public. Intrigued by the poster's apparent access, he examined the account's posting history and noticed a predilection for the music of Australian hard rock band AC/DC. This jibes with the behaviour of the hacker(s), who had displayed threatening messages on the computers of Ashley Madison employees, accompanied by AC/DC song Thunderstruck. In a series of tweets, the owner of the account, one Thadeus Zu, appears to deny that he was behind the hack, and indeed makes several suggestions that the account itself isn't even run by one person, but is instead an amalgam of like-minded digital vigilantes.

Submission + - Google May Try to Recruit You for a Job Depending on What You Search For writes: If Google sees that you're searching for specific programming terms, they may ask you to apply for a job as Max Rossett writes that three months ago while working on a project, he Googled “python lambda function list comprehension.” The familiar blue links appeared on the search page, and he started to look for the most relevant one. But then something unusual happened. The search results split and folded back to reveal a box that said “You’re speaking our language. Up for a challenge?” Clicking on the link took Rossett to a page called "" that outlined a programming challenge and gave instructions on how to submit his solution. "I had 48 hours to solve it, and the timer was ticking," writes Rossett. "I had the option to code in Python or Java. I set to work and solved the first problem in a couple hours. Each time I submitted a solution, tested my code against five hidden test cases."

After solving another five problems the page gave Rossett the option to submit his contact information and much to his surprise, a recruiter emailed him a couple days later asking for a copy of his resume. Three months after the mysterious invitation appeared, Rossett started at Google. Apparently Google has been using this recruiting tactic for some time. " is a brilliant recruiting tactic," concludes Rossett. "Overall, I enjoyed the puzzles that they gave me to solve, and I’m excited for my first day as a Googler."

Comment Re:Judging by the story.. AM == Scammers R Us.. (Score 1) 372

From an analysis of the leaked database. Nearly all the 5.5 million female profiles (>99.8%) were faked. I.E. AM was a SCAMMING FRAUD and those hackers did the world a public service by exposing it.

Some enterprising DA needs to take the lead and put the exec's of AM on trial.

A quote from the person who did the analysis

When hacker group Impact Team released the Ashley Madison data, they asserted that "thousands" of the women's profiles were fake. Later, this number got blown up in news stories that asserted "90-95%" of them were fake, though nobody put forth any evidence for such an enormous number. So I downloaded the data and analyzed it to find out how many actual women were using Ashley Madison, and who they were.

What I discovered was that the world of Ashley Madison was a far more dystopian place than anyone had realized. This isn't a debauched wonderland of men cheating on their wives. It isn't even a sadscape of 31 million men competing to attract those 5.5 million women in the database. Instead, it's like a science fictional future where every woman on Earth is dead, and some Dilbert-like engineer has replaced them with badly-designed robots.

Needless to say the backstory about this hack is that AM was a huge scam.

Submission + - In Praise of the Solo Programmer writes: Jean-Louis Gassée writes that once upon a time, we were awestruck by the solo programmer who could single-handedly write a magnum opus on a barebones machine like the Apple ][ with its 64 kilobytes of memory and an 8-bit processor running at 1MHz. Once such giant was Paul Lutus, known as the Oregon Hermit, who won a place next to Jobs and Wozniak in the Bandley Drive Hall of Fame for his Apple Writer word processor. "Those were the days Computers and their operating systems were simple and the P in Personal Computers applied to the programmer," writes Gassée. "There’s no place for a 2015 Paul Lutus. But are things really that dire?"

As it turns out, the size and complexity of operating systems and development tools do not pose completely insurmountable obstacles; There are still programs of hefty import authored by one person. One such example is Preview, Mac’s all-in-one file viewing and editing program. The many superpowers of Apple’s Preview does justice to the app’s power and flexibility authored by a solo, unnamed programmer who has been at it since the NeXT days. Newer than Preview but no less ambitious, is Gus Mueller’s Acorn, an “Image Editor for Humans”, now in version 5 at the Mac App Store. Mueller calls his Everett, WA company a mom and pop shop because his spouse Kristin does the documentation when she isn’t working as a Physical Therapist. Gus recently released Acorn 5 fixing hundreds of minor bugs and annoyances. "It took months and months of work, it was super boring and mind numbing and it was really hard to justify, and it made Acorn 5 super late," writes Mueller. "But we did it anyway, because something in us felt that software quality has been going downhill in general, and we sure as heck weren't going to let that happen to Acorn."

Submission + - Google ordered to remove links to stories about Google removing links to stories (

vivaoporto writes: Ars Technica UK reports that the UK's Information Commissioner's Office (ICO) has ordered Google to remove links from its search results that point to news stories reporting on earlier removals of links from its search results. The nine further results that must be removed point to Web pages with details about the links relating to a criminal offence that were removed by Google following a request from the individual concerned.

The Web pages involved in the latest ICO order repeated details of the original criminal offence, which were then included in the results displayed when searching for the complainant’s name on Google. Toe company has 35 days to comply with the enforcement notice. If it does not, it faces financial sanctions, which can be significant.

The most exciting phrase to hear in science, the one that heralds new discoveries, is not "Eureka!" (I found it!) but "That's funny ..." -- Isaac Asimov