Slashdot stories can be listened to in audio form via an RSS feed, as read by our own robotic overlord.

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

+ - FCC votes along party lines to regulate entire Internet

Submitted by jbdigriz
jbdigriz (8030) writes "In a stunning power grab, the FCC has extended Title II, not just to the loosely and flexibly defined "broadband" market, but to the Internet as a whole, wired and wireless, including even interconnects, making ISPs common carriers of telecom services, with the possible exception of dial-up providers (dunno, haven't seen the order yet). The commission voted also to override state law in NC and TN to remove restrictions on community broadband. Ars Technica has more info here. Lawyers, start filing. I'm sure the upshot will not be enshrinement of incumbents, of course. Or "openness" as defined by Fairness Committees of "Stake Holders." Right, suckers."

+ - AMD Carrizo APU With Excavator Core Architecture Unveiled->

Submitted by MojoKid
MojoKid (1002251) writes "AMD just unveiled new details about their upcoming Carrizo APU architecture and the company is claiming the processor, which is still built on Global Foundries' 28nm 28SHP node like its predecessor, will nonetheless deliver big advances in both performance and efficiency. When it was first announced, AMD detailed support for next generation Radeon Graphics (DX12, Mantle, and Dual Graphics support), H.265 decoding, full HSA 1.0 support, and ARM Trustzone compatibility. But perhaps one of the biggest advantages of Carrizo is the fact that the APU and Southbridge are now incorporated into the same die; not just two separates dies built into and MCM package. This not only improves performance, but also allows the Southbridge to take advantage of the 28SHP process rather than older, more power-hungry 45nm or 65nm process nodes. In addition, the Excavator cores used in Carrizo have switched from a High Performance Library (HPL) to a High Density Library (HDL) design. This allows for a reduction in the die area taken up by the processing cores (23 percent, according to AMD). This allows Carrizo to pack in 29 percent more transistors (3.1 billion versus 2.3 billion in Kaveri) in a die size that is only marginally larger (250mm2 for Carrizo versus 245mm2 for Kaveri). When all is said and done, AMD is claiming a 5 percent IPC boost for Carrizo and a 40 percent overall reduction in power usage."
Link to Original Source

+ - Gemalto Heist Could Affect Online And Mobile Pyments

Submitted by eWonga
eWonga (4020767) writes "Apple Pay and Google Wallet both use Gemalto-based technology to operate. That technology is provided by Softcard, which was created by a coalition of US cellular firms including AT&T, Verizon, and T-Mobile.

The report said it was "unclear" if contactless payment services were compromised by the two intelligence agencies. Gemalto may know more when it talks on Wednesday."

+ - Facebook users at risk from malicious face-ageing app->

Submitted by Anonymous Coward
An anonymous reader writes "A malicious Facebook app, purporting to show users what they will look like in 20 years, has been uncovered which solicited usernames and passwords to hijack accounts and spread spam. The app, which pops up on newsfeeds, walls and in advertising spots, takes the oblivious user to a fake Facebook phishing site designed to harvest login details by asking for usernames and passwords from the users to gain access to the ‘ageing’ app. The hook message currently features an image of actress Katie Holmes alongside her aged mock-up. Once the credentials are stolen and the account hijacked, the cybercriminals can easily spread the scam among the users’ Facebook friends and can use the account to other malicious ends with permission to access photos, inbox messages, and to post status updates and photos without authorization from the account owner."
Link to Original Source

Comment: Look closer (Score 1) 1

by LeadSongDog (#49094795) Attached to: Ask /dot: Gmail Spammers
Gmail allows that "+nnnn" on any existing address. It's useful for minimizing the damage when a spammer harvests the address. If the account owner of watkinsaddie38009(at)gmail.com never uses the basic address, just ones with the tracking suffix, then those suffixes can be individually filtered on receipt, treated as spamful-or-not, etc. It's a way of reducing the stakes, handy for things like ebay or craigslist posts.

Comment: Re:Curse you gizmag! (Score 1) 2

by LeadSongDog (#48931525) Attached to: Telomere-Lengthening Procedure Turns Clock Back Years in Human Cells
Doh! What I meant to cite was:
John Ramunas, Eduard Yakubov, Jennifer J. Brady, Stéphane Y. Corbel, Colin Holbrook, Moritz Brandt, Jonathan Stein, Juan G. Santiago, John P. Cooke, and Helen M. Blau "Transient delivery of modified mRNA encoding TERT rapidly extends telomeres in human cells" FASEB J fj.14-259531; published ahead of print January 22, 2015, doi:10.1096/fj.14-259531
Abstract: http://www.fasebj.org/content/...

Comment: Curse you gizmag! (Score 1) 2

by LeadSongDog (#48931507) Attached to: Telomere-Lengthening Procedure Turns Clock Back Years in Human Cells
A better source is the press release without all the gizmag clickbait:
http://med.stanford.edu/news/a...
The actual paper is:
Klaus G. Schmetterer, Alina Neunkirchner, Daniela Wojta-Stremayr, Judith Leitner, Peter Steinberger, and Winfried F. Pickl "STAT3 governs hyporesponsiveness and granzyme B-dependent suppressive capacity in human CD4+ T cells" FASEB J fj.14-257584; published ahead of print November 14, 2014, doi:10.1096/fj.14-257584
Abstract: http://www.fasebj.org/content/...

+ - Kim Dotcom offers up secure 'Skype Killer' voice chat->

Submitted by colinneagle
colinneagle (2544914) writes "Kim Dotcom, the controversial German expat living in New Zealand whose file-sharing site was busted by U.S. federal agents, has launched an end-to-end encrypted voice and video chat service that operates through the browser called MegaChat, which will now be available for free to the 15 million registered users of his file-sharing service Mega.

MegaChat aims to provide an alternative to the current voice and video chat services which Dotcom himself has accused of cooperating with government snooping. "No U.S.-based online service provider can be trusted with your data," Dotcom once claimed. "Skype has no choice. They must provide the U.S. government with backdoors."

However, Dotcom has also claimed that there are backdoors in Chrome and Firefox, so if you are using them to browse, how can he guarantee end-to-end encryption? And while Mega is great for file sharing, its track record for security is a little dubious. Right after its launch, there was criticism of the implementation of the site's security, from cross-site scripting flaws to poorly implemented encryption, and later it was found that Mega passwords could be extracted with basic hacking tools."

Link to Original Source

+ - Entanglement on a chip promises ultra-fast secure computing, communication->

Submitted by hypnosec
hypnosec (2231454) writes "Entanglement of photons has been one of the most intriguing phenomenon of physics with promises for ultra-fast and security computing as well as communications, but practical implementation on silicon chips has been elusive until now. Researchers over Università degli Studi di Pavia in Italy have managed to do just that — developed a microscopic micro-ring that entangles individual particles of light. Researchers used the well-established optoelectronic components called ring resonators and etched them onto a silicon wafer in the same manner that other components on semiconductor chips are fashioned. To power this resonator, researchers directed a laser beam along an optical fiber to the input side of the sample. Then coupled to the resonator where the photons race around the ring creating an an ideal environment for the photons to mingle and become entangled. Researchers observed that as the photons exited the resonator, a high percentage of them exhibited the telltale characteristics of entanglement."
Link to Original Source

A man is not complete until he is married -- then he is finished.

Working...