Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Submission + - Engineers Devise a Way to Harvest Wind Energy from Trees (vice.com)

derekmead writes: Harvesting electrical power from vibrations or other mechanical stress is pretty easy.Turns out all it really takes is a bit of crystal or ceramic material and a couple of wires and, there you go, piezoelectricity. As stress is applied to the material, charge accumulates, which can then be shuttled away to do useful work. The classic example is an electric lighter, in which a spring-loaded hammer smacks a crystal, producing a spark.

Another example is the heart of a piezoelectric system described in a new paper in the Journal of Sound and Vibration courtesy of engineers at Ohio State's Laboratory of Sound and Vibration Research. The basic idea behind the energy harvesting platform: exploit the natural internal resonances of trees within tiny artificial forests capable of generating enough voltage to power sensors and structural monitoring systems.

Submission + - Even with Telemetry Disabled, Windows 10 Talks to Dozens of Microsoft Servers (voat.co) 1

Motherfucking Shit writes: Curious about the various telemetry and personal information being collected by Windows 10, one user installed Windows 10 Enterprise and disabled all of the telemetry and reporting options. Then he configured his router to log all the connections that happened anyway. Even after opting out wherever possible, his firewall captured Windows making around 4,000 connection attempts to 93 different IP addresses during an 8 hour period, with most of those IPs controlled by Microsoft. Even the enterprise version of Windows 10 is checking in with Redmond when you tell it not to — and it's doing so frequently.

Comment Re:This will sound harsh, at first... (Score 3, Interesting) 243

The sad state of things is such that even though they are using H-1B improperly, those affected are mostly college-educated white males.

I disagree. Given the disproportional representation of Asians in STEM fields, I would say that those affected are mostly college-educated Americans - yes, more white than black, but certainly includes Asians and women.

Obviously, this depends on the location (e.g., more Asians in California and East Coast vs. Midwest), but I think this affects all skilled Americans in IT.

And I think the mistake is in characterizing it as something that only affects white people. It's all about narrative -- bring in other groups, then see the magic unfold.

Comment Pair sysadminning (Score 1) 186

Pair sysadminning is something I have actually done, and that has its uses. The guy who knows most has the keyboard, and the other guy has one finger tracing the manual's instructions, as well as a notebook where he writes down what happens and why, especially including things that won't be in the terminal session script like "I'll correct that later" or "This value should work, let's check".

But nowadays with Infrastructure as Code and Network as Code and what have you, you check your sysadminning code into git and you do reviews on it!

Comment Re:Here we go. (Score 1) 432

Please explain fully just what you mean. Or are you one of them guys who thinks no really means yes? I ask a women for a date she says no thanks. I ask her the next day she no thanks and please don't ask me again. I would say sorry for having bothered you and move on..YOU...??

Personally, I wouldn't even have asked the second time. It's called respecting boundaries and it leads to less conflicts in the workspace. However, there's a huge (and there should be) gap between social and cultural norms and legally actionable harassment.

I think asking said woman out every single day she comes in to work is incredibly crass, annoying, and makes you look like a pathetic loser. It's not harassment until you imply she may face consequences if she continues to say no. That she'll be fired, looked over for promotion. Or until you physically touch her. Or you start stalking her instead of just taking opportunity of being at the same place at the same time because you both work at the same place at the same time.

The law isn't a way of enforcing etiquette.

Comment Re:Email (Score 1) 146

Yes over 2 dollars per megabyte. I shit you not.

Using Sosh (a sub-brand of French Orange, whose client I have been since 1997, even though the monthly price is substantially higher than that of competitor Free), I got two different SMSs when arriving in the US. The voice price was substantially different between the two, but the data price was over USD 13 per megabyte. My fellow travelers use Free, the newest big French mobile phone company. They got an SMS saying that all their voice and data were counted like at home: unlimited with no surcharge, restricted bandwidth after 50 MB in 4G and 3GB in 3G, max 35 days/year/destination/person. For less that 2 MB using the Sosh price, I could have bought a month with Free just to visit the US. I'm wondering why my carrier still has clients.

Comment Re: John Oliver (Score 1) 954

Maybe you have enough gun laws where you live, and I'll not even contradict you if you say there are too many, I don't know in which state you live and I actually somewhat like the armed citizen concept.

On the other hand, there are lots of people on the so-called No-Fly list, who are not informed that they are on it and who cannot learn why they were put on it and have the greatest difficulties in getting off it.

These people are deprived of their constitutional right to travel from one state to another, they are supposedly too dangerous to board a plane after being X-Rayed and frisked, but they keep their constitutional right to buy machine pistols specially designed to be hidden under a coat or in a purse. Don't you see a contradiction there?

Submission + - NASA offers $15k for wicked cool air traffic technology (networkworld.com)

coondoggie writes: The space agency this week announced a $15,000 public contest — called the “Sky for All challenge” — to develop technologies that could be part of what it calls “a clean-slate, revolutionary design and concept of operations for the airspace of the future.” The challenge opens Dec. 21, and participants may pre-register now. The deadline for submissions is Feb. 26, 2016 and is being administered by crowdsourcing site HeroX.

Submission + - Contradicting previous study, cancer risk has strong environmental component (nature.com)

The Real Dr John writes: A new study published in the journal Nature provides evidence that intrinsic risk factors contribute only modestly (less than ~10–30% of lifetime risk) to cancer development in humans. The researchers found that the more stem-cell divisions that occurred in a given tissue over a lifetime, the more likely it was to become cancerous. They said that though some cancers clearly had strong outside links – such as liver cancers caused by hepatitis C or lung cancer resulting from smoking – there were others for which the variation was explained mainly by defects in stem-cell division.The researchers showed that the correlation between stem-cell division and cancer risk does not distinguish between the effects of internal (genetic) and external (environmental) factors such as chemical toxicity and radiation.They also found that the rates of endogenous mutation accumulation by internal processes are not sufficient to account for the observed cancer risks. The authors conclude that cancer risk is heavily influenced by environmental factors.

Submission + - Top 10 Predictions of the IT Predictions for 2016 (castsoftware.com)

OnQuality writes: Tired of Top 10 IT predictions? Well, we are. Mostly because they are usually too obvious. So to have a little fun, Lev Lesokhin, VP Strategy and Analytics, CAST software put this list together:

Top 10 Tech Predictions of Predictions

#1 — Robots will replace humans

Source – Robot manufacturers and robotics professors looking for funding

Our Prediction — The entire human population will soon be living a luxurious life of leisure as-yet-unrevealed robots, wholly unlike the unconvincing wire-strewn devices we currently see, will so remove any reason to get out of bed each day.

Automotive manufacturers and others will indeed further automate existing uses for machines. The task of integrating the various layers of software required to perform even such basic tasks in a ‘smart way’ will be harder than ever. On the brightside, software development will also be taken over by robots and the promise of standardized, interoperable and compliance systems may have a chance after all.

#2 — Your parents discuss the ’Internet of Everything’

Source – Telcos and Big Data vendors

Our Prediction — The irrational urge to connect every domestic and industrial appliance to the internet becomes unstoppable. More new uses will be found to link sensors, smartphones and corporate systems.

Integration of multiple devices and interfaces will cause more security holes because the app security industry hasn’t yet figured out that real security problems happen because of poor interfaces at the whole-system level

#3 – SQL Injections will be bigger than Drugs and Malware, Hack and Phishing will empty your bank accounts

Source – IT Security Vendors

Our Prediction – The cyber security hype cycle will continue to churn as companies keep throwing money at cyber training, tools and consulting. Yet still after billions spent over the past 10 years, several name brands will experience significant breaches. Customers will be up in arms, experts will continue to be mystified and CEOs will head for the door.

Those who continue to ignore the underlying structural integrity of their software will once again make headlines. SQL injection is the most common technique among hackers for stealing confidential. personal and financial information. In fact, the scars of multiple SQL injections can be seen on almost any critical app. Programmers will spread the epidemic by sharing tainted

compilers.

#4 — Software will be measurable (as if..)

Source – IT departments

Our Prediction — The dark art of code development will soon become, just a little, more like a science. Just as many other advances in technology the ability to improve quality will spur more innovation.

At this heavenly time of year, it is perhaps relevant to remember, the father of quality himself, W Edward Deming, once said “"In God we trust, all others bring data”. The combination of automated function points, a recognised set of global standards and tools to visualise progress on quality will finally provide some certainty to the effort and the costs in developing software, both in-house and by outsourcers.

#5 – Big Data and analytics will be evenBigger

Source – Big Data vendors (again)

Our Prediction — Even cleverer insights are possible, yet arguably, not necessarily needed, thanks to super clever software that analyzes every micro moment of every smartphone and web session. The data of the future will be so, er, Big.

As data pools increase the data hype will decrease. The vast amount of Big Data created will finally focus attention on real issues, like application health.

#6 — DevOps becomes Dev-Oops

Source – Storage and Data Management vendors

Our Prediction — DevOps, the bastard son of Developers and Operations, has become the ‘Jack of All Trades’ who is ‘Master of None’. The losers in this, the guys down in the basement, with the still-spinning disks, make a bid to reclaim their ‘rightful place’.

The de-skilling of IT operations and smaller teams, will produce worse code more quickly, which will result in IT systems which are fragile, not just agile.

#7 – 3D Printers Print 3D Printers

Source – 3D Printer manufacturers

Our Prediction — Just like PCs, iPhones and microwaves, every household will soon have its very own 3D printer. Reliability, safety and standards will be overrun by convenience and speed as the Hacker Manufacturercripples the consumer electrons sector, displacing millions jobs worldwide as Mom and Dad print whatever they need rather than buying it online. “Hey Mom can you print me a new IPhone? This one is cracked.”

#8 – The Cloud Turns to Smog

Source – Cloud-based enterprise software vendors

Our Prediction – Now that the rush to the cloud is mainstream, clear choice to cloudify everything will get a bit murky as legacy apps and brittle architecture fail to hold up to the demands in the cloud. To solve cloud performance, reliability and stability issues, business will simply move apps back on premise.

#9– Outsourcing becomes Outcome-based at last

Source – Systems integrators

Our Prediction – Instead of just paying for bodies, clients will start to pay for outcomes, or at least paying by output for software-related work. As automated software measurement becomes a broader reality, application service providers will be able to meter their output and provide a meaningful invoice to clients.

#10 Tech predictions will cease to exist by 2018

Source — CAST

Our Prediction – As the hype around vendor’s tech predictions gets a bit too cynical, the media will stop publishing these types of articles.

So what?

As has been proven time and again, in many cases, the effects of new innovations are overestimated in the short term and under-estimated in the long term. The common theme CAST sees in all of these predictions, one we thoroughly agree with is that the importance of software and so its quality, will be significantly greater in 2016.

Submission + - Security+, Ethical Hacking Top Security Certs (cybrary.it)

Nerval's Lobster writes: In its recent survey of 435 senior-level cybersecurity professionals, security-training firm Cybrary found that the demand for people who can protect IT infrastructure against attacks is only increasing. According to the data, the most in-demand certifications included (sequentially) Security+, Ethical Hacking, Network+, CISSP, and A+. The high ranking of the Ethical Hacking certification is interesting, given the longtime debate over its worth to security professionals.(Dice link) Whatever certifications they earn, however, tech pros will face a number of significant challenges in 2016 if they want to keep their workplaces secure, including vulnerabilities in the Internet of Things, the rise of “super bad guys” with increasingly sophisticated tools, and a generalized lack of funding to invest in relevant people and technologies. (For those interested, there’s also an interesting piece in Business Insider on how Ran Corey, who co-founded Cybrary, had to deal with Google abruptly banning his company’s app from the Google Play Store. For developers, it’s a good tutorial on what to do if you ever find yourself in a similar situation, and need to get your app unblocked.)

Slashdot Top Deals

The Wright Bothers weren't the first to fly. They were just the first not to crash.

Working...