Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Submission + - US Navy Tests 3D-Printing Custom Drones On Its Ships->

itwbennett writes: Researchers at the Naval Postgraduate School are testing the use of 3D printers on ships to produce custom drones outfitted for specialized missions. The idea, said Alan Jaeger, a faculty research associate at the school, is that ships could set sail with kits of the core electronics parts, since they are common to most drones, but have the bodies designed according to specific requirements for each mission. A prototype drone was designed by engineers on shore based on requirements of the sailors at sea, and the 3D design file was emailed to the USS Essex over a satellite link. Flight tests revealed some of the potential problems, most of which were associated with operating the drone rather than the printing itself, Jaeger said. 'Even with a small amount of wind, something this small will get buffeted around,' he said. They also had to figure out the logistics of launching a drone from a ship, getting it back, how it integrated with other flight operations, and interference from other radio sources like radar.
Link to Original Source

Submission + - Symantec: Hacking Group Black Vine Behind Anthem Breach->

itwbennett writes: Symantec said Tuesday in a report that the hacking group Black Vine, which has been active since 2012 and has gone after other businesses that deal with sensitive and critical data, including organizations in the aerospace, technology and finance industries, is behind the hack against Anthem. The Black Vine malware Mivast was used in the Anthem breach, according to Symantec.
Link to Original Source

Submission + - Maliciously Crafted MKV Video Files Can Be Used To Crash Android Phones->

itwbennett writes: Just days after the so-called 'Stagefright' flaw, which could allow attackers to compromise devices with a simple MMS message, was revealed, researchers have found another Android media processing flaw. The latest vulnerability is located in Android’s mediaserver component, more specifically in how this service handles files that use the Matroska video container (MKV), the Trend Micro researchers said in a blog post Wednesday.
Link to Original Source

Submission + - Survey: Software Engineering Isn't "Meaningful" Work->

itwbennett writes: A recent PayScale survey set out to rank the meaningfulness of more than 500 job titles (as measured by a yes response to the question 'Does your work make the world a better place?'). Not surprisingly, the clergy and surgeons ranked their jobs very high on the meaningfulness scale, while parking lot attendants, again, not surprisingly, were at the bottom. Where did tech jobs fall? Most were in the bottom half, with software engineer coming in last among tech job titles (484 out of 505 job titles).
Link to Original Source

Submission + - Computer science enrollments match NASDAQ's rises and fall ->

dcblogs writes: In March 2000, the NASDAQ composite index reached a historic high of 5,048, at just about the same time undergrad computer science enrollments hit a peak of nearly 24,000 students at Ph.D.-granting institutions in the U.S. and Canada, according to data collected by the Computing Research Association in its most recent annual Taulbee Survey. By 2005, computer science enrollments had halved, declining to just over 12,000. On July 17, the NASDAQ hit its highest point since 2000, reaching a composite index of 5,210. In 2014, computer science undergrad enrollments reached nearly, 24,000, almost equal to the 2000 high. Remarkably, it has taken nearly 15 years to reach the earlier enrollment peak.
Link to Original Source

Submission + - Trillion-Dollar World Trade Deal Aims To Make IT Products Cheaper->

itwbennett writes: A new (tentative) global trade agreement, struck on Friday at a World Trade Organization meeting in Geneva, eliminates tariffs on more than 200 kinds of IT products, ranging from smartphones, routers, and ink cartridges to video game consoles and telecommunications satellites. A full list of products covered was published by the Office of the U.S. Trade Representative, which called the ITA expansion 'great news for the American workers and businesses that design, manufacture, and export state-of-the-art technology and information products, ranging from MRI machines to semiconductors to video game consoles.' The deal covers $1.3 trillion worth of global trade, about 7 percent of total trade today.
Link to Original Source

Submission + - Researchers: Mobile Users Will Trade Mobile Data For Fun and Profit->

itwbennett writes: Even as mobile users become more security and privacy conscious, researchers and other mobile data collectors still to collect user data in order to build products and services. The question: How to get users to give up that data? Researchers at the New Jersey Institute of Technology tested two incentives: gamification and micropayments. The test involved building a campus Wi-Fi coverage map using user data collected from student participants who either played a first-person shooter game or who were payed to complete certain tasks (e.g., taking photos). The game turned out to be a quick and efficient way to build the Wi-Fi coverage map. But data from the micropayments group was found to be 'sometimes unreliable, and individuals were trying to trick the system into thinking they had accomplished tasks.'

 

Link to Original Source

Submission + - Nineteen-year-old Gets DARPA Contract for Chip Design->

itwbennett writes: Thomas Sohmers, an electrical engineering prodigy who started working at the MIT Institute for Soldier Nanotechnologies at age 13, has just scored $1.25 million from DARPA to develop a new kind of chip that could deliver on exascale high performance computing. Sohmers told The Platform that Neo cores are 1/145 the size of a fourth-generation Haswell core. He expects to deliver a 256 core chip by the end of 2016 at the earliest using a 28 nanometer process, which will offer 65 gigaflops per watt. It will also offer 256 gigaFLOPS of double precision math.
Link to Original Source

Submission + - Study: Push Notifications As Distracting As Taking A Call->

itwbennett writes: Researchers at Florida State University have found that simply being aware of a missed call or text can have the same damaging effect on task performance as actually using a mobile phone. 'Although these notifications are short in duration, they can prompt task-irrelevant thoughts, or mind-wandering,' the researchers wrote in their paper. In further bad news for chronic multitaskers, a new study by researchers at the University of Connecticut finds that 'students who multitasked while doing homework had to study longer, and those who frequently multitasked in class had lower grades on average than their peers who multitasked less often.'
Link to Original Source

Submission + - US Court: 'Pocket-Dialed' Calls Are Not Private->

itwbennett writes: In a case of a pocket-dialed call, a conscientious secretary, and sensitive personnel issues, a federal appeals court in Ohio has ruled pocket-dialers shouldn't have any expectation of privacy. 'Under the plain-view doctrine, if a homeowner neglects to cover a window with drapes, he would lose his reasonable expectation of privacy with respect to a viewer looking into the window from outside of his property,' the court said. The same applies to pocket-dialed calls, according to the court. If a person doesn’t take reasonable steps to keep their call private, their communications are not protected by the Wiretap Act.
Link to Original Source

Submission + - New York Judge Rules Against Facebook In Search Warrant Case->

itwbennett writes: Last year, Facebook appealed a court decision requiring it to hand over data, including photos and private messages, relating to 381 user accounts. (Google, Microsoft, and Twitter, among other companies backed Facebook in the dispute). On Tuesday, Judge Dianne Renwick of the New York State Supreme Court ruled against Facebook, saying that Facebook has no legal standing to challenge the constitutionality of search warrants served on its users.
Link to Original Source

Submission + - Bug Exposes OpenSSH Servers To Brute-Force Password Guessing Attacks->

itwbennett writes: OpenSSH servers with keyboard-interactive authentication enabled, which is the default setting on many systems, including FreeBSD ones, can be tricked to allow many authentication retries over a single connection, according to a security researcher who uses the online alias Kingcope, who disclosed the issue on his blog last week. According to a discussion on Reddit, setting PasswordAuthentication to 'no' in the OpenSSH configuration and using public-key authentication does not prevent this attack, because keyboard-interactive authentication is a different subsystem that also relies on passwords.
Link to Original Source

Submission + - What's the Oldest Technology You've Used In a Production Environment?->

itwbennett writes: Sometimes it's a matter of 'if it ain't broke, don't fix it,' sometimes corporate inertia is to blame, but perhaps even more often what keeps old technology plugging away in businesses large and small is the sense that it does a single, specific job the way that someone wants it done. George R.R. Martin's preference for using a DOS computer running WordStar 4 to write his Song of Ice and Fire series is one such example, but so is the hospital computer whose sole job was to search and print medical images, however badly or slowly it may have done the job. We all have such stories of obsolete tech we've had to use at one point or another. What's yours?
Link to Original Source

Submission + - Former Hacking Team Supplier Stops Selling Zero-Day Exploits On Ethical Grounds->

itwbennett writes: Italian surveillance software maker Hacking Team may not have lost any customers after it was hacked two weeks ago, or at least not yet. But it has lost at least one business partner. Over the weekend, U.S.-based penetration testing specialist and zero-day exploit broker Netragard announced that it is terminating its long-time running Exploit Acquisition Program (EAP), citing revelations about Hacking Team’s customers as one of the reasons.
Link to Original Source

Like punning, programming is a play on words.

Working...