Forgot your password?
typodupeerror

+ - U.S. University Restricts Network Access to Social Media, Political Content 1

Submitted by onproton
onproton (3434437) writes "Northern Illinois University recently began restricting student access to webpages that contain "illegal or unethical" content which, according to University policy, includes resources used for "political activities...and the organization or participation in meetings, rallies and demonstrations." A student raised concerns after attempting to access the Wikipedia page for Westboro Baptist Church, and receiving a filter message informing him that his access of this page would likely violate the University's Acceptable Use Policy, along with a warning that "all violations would be reviewed." This has lead to questions about whether some policies that restrict student access to information are in the best interest of the primary goal of education."

+ - Apple CarPlay Rollout Delayed By Some Carmakers ->

Submitted by Lucas123
Lucas123 (935744) writes "Some car makers are delaying the implementation of Apple's CarPlay iPhone interface for vehicle infotainment systems. The delays, which are prompting manufacturers such as Mercedes, Volvo and Honda to push their announcement from 2014 to 2015, appear to be related to a few snags in the integration process or in choosing which model cars should have the middleware. At the same time, many of the automakers rolling out CarPlay are also implementing Android Auto, which will provide a vehicle head unit user interface for Android smartphones. Analysts believe the addition of Android Auto earlier this year may also be adding delays because manufacturers want to be able to announce availability of both platforms in their new model vehicles. According to IHS, adoption of Android Auto is expected to slightly outpace CarPlay with an annual growth rate of 179% compared to 165%. In 2020, for example, 40 million cars will roll off assembly lines with Android Auto versus 37 million with CarPlay."
Link to Original Source

+ - Researchers Made a Fake Social Network to Infiltrate China's Internet Censors

Submitted by Jason Koebler
Jason Koebler (3528235) writes "In order to get inside China's notorious internet filter, Harvard researcher Gary King created his own fake social network in order to gain access to the programs used to censor content, so he could reverse-engineer the system.
"From inside China, we created our own social media website, purchased a URL, rented server space, contracted with one of the most popular software platforms in China used to create these sites, submitted, automatically reviewed, posted, and censored our own submissions," King wrote in a study published in Science. "We had complete access to the software; we were even able to get their recommendations on how to conduct censorship on our own site in compliance with government standards.""

+ - Tech Looks to Obama to Save Them From "Just Sort of OK" U.S. Workers

Submitted by theodp
theodp (442580) writes "Following up on news that the White House met with big biz on immigration earlier this month, Bloomberg sat down with Joe Green, the head of Mark Zuckerberg's Fwd.US PAC, to discuss possible executive actions President Obama might take on high tech immigration (video) in September. "Hey, Joe," asked interviewer Alix Steel. "All we keep hearing about this earnings season though from big tech is how they're actually cutting jobs. If you look at Microsoft, Cisco, IBM Hewlett-Packard, why do the tech companies then need more tech visas?" Green explained why tech may not want to settle for laid-off U.S. talent when the world is its oyster. "The difference between someone who's truly great and just sort of okay is really huge," Green said. "Culture in tech is a very meritocratic culture," he added. "The vast, vast majority of tech engineers that I talked to who are from the United States are very supportive of bringing in people from other countries because they want to work with the very best.""

+ - 33 Months In Prison For Recording a Movie in a Theater->

Submitted by Anonymous Coward
An anonymous reader writes "Philip Danks made a video recording of the movie Fast & Furious 6 in a UK cinema. Later, he shared it via bittorrent and allegedly sold physical copies. Now, he's been sentenced to 33 months in prison for his actions. "In Court it was claimed that Danks’ uploading of Fast 6 resulted in more than 700,000 downloads costing Universal Pictures and the wider industry millions of pounds in losses." Danks was originally told police weren't going to take any action against him, but he unwisely continued to share the movie files after his initial interview with authorities."
Link to Original Source

+ - NSA Agents Leak Tor Bugs To Developers->

Submitted by Anonymous Coward
An anonymous reader writes "We've known for a while that NSA specifically targets Tor, because they want to disrupt one of the last remaining communication methods they aren't able to tap or demand access to. However, not everybody at the NSA is on board with this strategy. Tor developer Andrew Lewman says even as flaws in Tor are rooted out by the NSA and British counterpart GCHQ, other agents from the two organizations leak those flaws directly to the developers, so they can be fixed quickly. He said, "You have to think about the type of people who would be able to do this and have the expertise and time to read Tor source code from scratch for hours, for weeks, for months, and find and elucidate these super-subtle bugs or other things that they probably don't get to see in most commercial software." Lewman estimates the Tor Project receives these reports on a monthly basis. He also spoke about how a growing amount of users will affect Tor. He suggests a massive company like Google or Facebook will eventually have to take up the task of making Tor scale up to millions of users."
Link to Original Source

+ - States with faster Internet speeds have smarter people, study shows 1

Submitted by Anonymous Coward
An anonymous reader writes "The numbers—first crunched by the Internet provider comparison site HSI—show a distinct trend between faster Internet and higher ACT test scores. On the high end, Massachusetts scores big with an average Internet speed of 13.1Mbps, and an average ACT test score of 24.1. Mississippi, on the other hand, has an average speed of just 7.6Mbps and an average score of 18.9.

In between those two states, the other 48 fall in a positive correlation that, while not perfect, is quite undeniable. According to HSI's Edwin Ivanauskas, the correlation is stronger than that between household income and test scores, which have long been considered to be firmly connected to each other. The ACT scores were gathered from ACT.org, which has the official rankings and averages for the 2013 test, and the speed ratings were taken from Internet analytics firm Akamai’s latest report."

+ - How Does Tesla Build A Supercharger Charging Site?

Submitted by cartechboy
cartechboy (2660665) writes "Tesla's Superchargers are the talk of the electric car community. These charging stations can take a Model S battery pack from nearly empty to about 150 miles or range in around 30 minutes. That's crazy fast, and it's nothing short of impressive. But what does it take to actually build a Tesla Supercharger site? Apparently a lot of digging. A massive trench is created to run high-capacity electric cables before the charging stations themselves are even installed. A diagram and photos of the Electric Conduit Construction build out have surfaced on the Internet. The conduits connect the charging stations to a power distribution center, which in turn is connected to a transformer that provides the power for charging cars. It took 11 days to install the six charging stalls in Goodland, Kansas. If you thought it was a quick process to build a Supercharger station, you were clearly wrong. Now, what ever happened to those battery swapping stations?"

+ - The latest Wikipedia code-word for "dysfunction" is "Superprotection" 3

Submitted by metasonix
metasonix (650947) writes "As if the problems brought up during the recent 2014 Wikimania conference weren't enough, now Wikipedia is having an outright revolt by its editor and administrator community, especially on the German-language Wikipedia. A new Wikipediocracy blog post goes into some detail on the story. The WMF, currently awash in cash from its donors, keeps trying to force flawed new software systems onto the community, and they have repeatedly responded very negatively. This time, however, WMF Deputy Director Erik Moeller had the bright idea to create a new level of page protection to prevent the new software from being disabled. "Superprotection" has resulted in an outright revolt on German Wikipedia and subsequent coverage in the German press, plus demands that Moeller, one of Wikipedia's oldest insiders, be removed from his job. And one English Wikipedia insider started a change.org petition demanding the removal of "superprotection"."

+ - Future hack: New cybersecurity tool predicts breaches before they happen->

Submitted by Anonymous Coward
An anonymous reader writes "A new research paper outlines new software that scans and scrapes web sites from today and the past, learns patters about what happens prior to a security breach, and then accurately predicts what websites will be hacked in the future. The new tool is up to 66% accuracy.

The classifier is focused on Web server malware or, put more simply, the hacking and hijacking of a website that is then used to attack all its visitors.

If it is possible to accurately predict which sites and servers are most at-risk, it becomes easier to keep an eye on and warn against dangerous websites, the researchers say. Website operators can be alerted ahead of an attack, and search engines can easily know which websites to keep an eye on for potential exclusion from search results.

The algorithm is designed to automatically detect whether a Web server is likely to become malicious in the future by analyzing a wide array of the site’s characteristics: For example, what software does the server run? What keywords are present? How are the Web pages structured? If your website has a whole lot in common with another website that ended up hacked, the classifier will predict a gloomy future.

The classifier itself always updates and evolves, the researchers wrote. It can “quickly adapt to emerging threats.”

"

Link to Original Source

+ - NASA's Space Launch System searches for a mission

Submitted by schwit1
schwit1 (797399) writes "Managers of NASA’s Space Launch System (SLS) are searching for a mission that they can propose and convince Congress to fund.

Any honest read of this article will conclude that this very expensive rocket system is an absurd waste of money. It has no mission now, and will never get one considering the cost. Instead, NASA will spend billions to fly two test flights, both unmanned, and then the money will run out."

+ - What's After Big Data?->

Submitted by gthuang88
gthuang88 (3752041) writes "As the marketing hype around “big data” subsides, a recent wave of startups is solving a new class of data-related problems and showing where the field is headed. Niche analytics companies like RStudio, Vast, and FarmLink are trying to provide insights for specific industries such as finance, real estate, and agriculture. Data-wrangling software from startups like Tamr and Trifacta is targeting enterprises looking to find and prep corporate data. And heavily funded startups such as Actifio and DataGravity are trying to make data-storage systems smarter. Together, these efforts highlight where emerging data technologies might actually be used in the business world."
Link to Original Source

+ - I Contain Multitudes->

Submitted by Anonymous Coward
An anonymous reader writes "Your DNA is supposed to be your blueprint, your unique master code, identical in every one of your tens of trillions of cells. It is why you are you, indivisible and whole, consistent from tip to toe.

But that’s really just a biological fairy tale. In reality, you are an assemblage of genetically distinctive cells, some of which have radically different operating instructions. This fact has only become clear in the last decade. Even though each of your cells supposedly contains a replica of the DNA in the fertilized egg that began your life, mutations, copying errors and editing mistakes began modifying that code as soon as your zygote self began to divide. In your adult body, your DNA is peppered by pinpoint mutations, riddled with repeated or rearranged or missing information, even lacking huge chromosome-sized chunks. Your data is hopelessly corrupt."

Link to Original Source

Money doesn't talk, it swears. -- Bob Dylan

Working...