Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Submission + - Barnes & Noble Has Been Quietly Refreshing Its Nook Hardware (itworld.com)

itwbennett writes: Peter Smith writes that he 'had more or less written off the Nook when Barnes & Noble farmed hardware duties out to Samsung.' But now that Amazon is aiming for the low end with its downgraded Fire tablet line, Barnes & Noble has an opportunity to 'carve out a niche on the higher end of things,' says Smith. And so it has been quietly moving in that direction. Yesterday, Venture Beat wrote about the newly (and stealthily) launched $250 Samsung Galaxy Tab E Nook. As Smith notes, 'the specs for this new tablet aren't anything special,' which might explain the stealthy launch, except that another, pricier Nook tablet apparently came out a month ago (again, according to VentureBeat), the Samsung Galaxy Tab S2 Nook.

Submission + - Did You Get the Best Chip In Your iPhone 6S? (itworld.com)

itwbennett writes: Apple is splitting the manufacture of the A9 processor for its iPhone 6S between TSMC (~60%) and rival Samsung (~40%) — 'and they are not created equal', writes Andy Patrizio. For starters, Chipworks noted that Samsung uses 14nm while TSMC uses 16nm. And a Reddit user posted tests of a pair of 6S Plus phones and found the TSMC chip had eight hours of battery life vs. six hours for the Samsung. Meanwhile, benchmark tests from the folks at MyDriver (if Mr. Patrizio's efforts with Google Translate got it right) also found that the Samsung chip is a bigger drain on the phone's battery, while the TSMC chip is slightly faster and runs a bit cooler. So how do you know which chip you got? There's an app for that.

Submission + - Dell, EMC Said To Be In Merger Talks (itworld.com)

itwbennett writes: According to a Wall Street Journal report, Dell might buy some or all of storage giant EMC (the grain of salt here is that the Journal's report cited unnamed sources, and cautioned that the the companies might not finalize any agreement.) If the report has it right, though, 'a total merger would be one of the biggest deals ever in the technology industry,' writes Stephen Lawson for the IDG News Service, 'with EMC holding a market value of about US$50 billion. It would also bring together two of the most important vendors to enterprise IT departments.'

Submission + - Nissan Creates The Ultimate Distracted Driving Machine (itworld.com)

jfruh writes: More and more research is suggesting that it isn't safe to text or even talk on our phones hands-free while driving, but one brave car company is pushing full-speed in the other direction. Nissan has created a concept car in which every surface, including the entire dashboard and even the seats, is a display device. The car is the result of "extensive" surveys with the younger generation that came to the conclusion that, according to Nissan, young people "feel that time spent in a car should be time for connecting and sharing experiences with friends."

Submission + - 30 years a sysadmin (itworld.com)

itwbennett writes: Sandra Henry-Stocker’s love affair with Unix started in the early 1980s when she 'was quickly enamored of the command line and how much [she] could get done using pipes and commands like grep.’ Back then, she was working on a Zilog minicomputer, a system, she recalls, that was 'about this size of a dorm refrigerator’. Over the intervening years, a lot has changed, not just about the technology, but about the job itself. 'We might be ‘just' doing systems administration, but that role has moved heavily into managing security, controlling access to a wide range of resources, analyzing network traffic, scrutinizing log files, and fixing the chinks on our cyber armor,’ writes Henry-Stocker. What hasn’t changed? Systems administration remains a largely thankless role with little room for career advancement, albeit one that she is quick to note is ‘seldom boring’ and ‘reasonably' well-paid.

Submission + - Researchers: Thousands of Medical Devices Are Vulnerable To Hacking (itworld.com)

itwbennett writes: At the DerbyCon security conference, researchers Scott Erven and Mark Collao explained how they located Internet-connected medical devices by searching for terms like 'radiology' and 'podiatry' in the Shodan search engine. Some systems were connected to the Internet by design, others due to configuration errors. And much of the medical gear was still using the default logins and passwords provided by manufacturers. 'As these devices start to become connected, not only can your data gets stolen but there are potential adverse safety issues,' Erven said.

Submission + - Apple, Microsoft Tout Their Privacy Policies To Get Positive PR (itworld.com)

jfruh writes: Apple hasn't changed its privacy policy in more than a year — but that didn't stop the company from putting up a glossy website explaining it in layman's terms. Microsoft too has been touting its respect for its users's privacy. This doesn't represent any high-minded altruism on those companies' parts, of course; it's part of their battle against Google, their archrival that offers almost all of its services for free and makes its money mining user data.

Submission + - Newly Found TrueCrypt Flaw Allows Full System Compromise

itwbennett writes: James Forshaw, a member of Google's Project Zero team has found a pair of flaws in the discontinued encryption utility TrueCrypt that could allow attackers to obtain elevated privileges on a system if they have access to a limited user account. 'It's impossible to tell if the new flaws discovered by Forshaw were introduced intentionally or not, but they do show that despite professional code audits, serious bugs can remain undiscovered,' writes Lucian Constantin.

Submission + - Introverts STILL don't get respect

Esther Schindler writes: A few years ago, Susan Cain's book, Quiet: The Power of Introverts in a World That Can’t Stop Talking seemed to give the world a bit of enlightenment about getting the most out of people who don't think they should have to be social in order to succeed. For a while, at least some folks worked to respect the needs and advantages of introversion, such as careful, reflective thinking based on the solitude that idea-generation requires.

But in When Schools Overlook Introverts, Michael Godsey writes, "The way in which certain instructional trends — education buzzwords like “collaborative learning” and “project-based learning” and “flipped classrooms” — are applied often neglect the needs of introverts. In fact, these trends could mean that classroom environments that embrace extroverted behavior — through dynamic and social learning activities — are being promoted now more than ever." It's a thoughtful article, worth reading. As I think many people on slashdot will agree, Godsley observes, "This growing emphasis in classrooms on group projects and other interactive arrangements can be challenging for introverted students who tend to perform better when they’re working independently and in more subdued environments."

So the larger question is... why does this society still treat introverts as second-class citizens, when most of us are aware of the value of introverts' contributions? Why do all those "open floor plans" continue to be adopted in the tech industry, when some of us need peace and quiet in order to do our best? Even though I'm a relentless extrovert, I need my "cocoon time," and few work environments (or educational institutions training us for work) respect that. I don't have answers. Maybe you do.

Submission + - Europe Agrees To Agree With Everyone Except US What 5G Should Be

itwbennett writes: Following agreements signed by the EU with South Korea in June 2014 and with Japan in May 2015, the EU and China 'have agreed to agree by the end of the year on a working definition for 5G,' reports Peter Sayer. 'About the only point of agreement so far is that 5G is what we'll all be building or buying after 4G, so any consensus between the EU and China could be significant,' says Sayer.

Submission + - Saudi Arabia Almost Bought Hacking Team

itwbennett writes: If hacked emails posted by WikiLeaks are to be believed, the Saudi Arabian government came close to buying control of Italian surveillance software company Hacking Team, Philip Wilan reports. 'The negotiations were handled by Wafic Said, a Syrian-born businessman based in the U.K. who is a close friend of the Saudi royal family, and also involved Ronald Spogli, a former U.S. ambassador to Italy, who had an indirect investment in Hacking Team,' writes Wilan. The deal collapsed in early 2014.

Submission + - EFF To Offer Trusted SSL Certificates To the Public, For Free (itworld.com)

itwbennett writes: The Electronic Frontier Foundation (EFF) has jumped through all the necessary hoops to become a certificate authority and soon will begin offering trusted SSL certificates to the public, for free. The official certificate authority is called Let's Encrypt and it just issued its first certificate 10 days ago, but it has not yet been added as a trusted authority. Let's Encrypt has set a public availability date of November 14th 2015, at which time their root certificate will have been cross-signed and the general public will be able to obtain free, trusted certificates.

Submission + - IBM's Watson Is Now Analyzing Your Vacation Photos (itworld.com)

jfruh writes: IBM's Jeopardy-winning supercomputer Watson is now suite of cloud-based services that developers can use to add cognitive capabilities to applications, and one of its powers is visual analysis. Visual Insights analyzes images and videos posted to services like Twitter, Facebook and Instagram, then looks for patterns and trends in what people have been posting. Watson turns what it gleans into structured data, making it easier to load into a database and act upon — which is clearly appealing to marketers and just as clearly carries disturbing privacy implications.

Submission + - HP Adds Protection Against Firmware Attacks to Enterprise Printers (itworld.com)

itwbennett writes: Researchers have been demonstrating attacks against printers for years. Now, Hewlett-Packard has started building defenses directly into its printers' firmware instead of just patching individual vulnerabilities. The company's new M506, M527 and M577 series of LaserJet Enterprise printers, set to go on sale in October and November, will have built-in detection for unauthorized BIOS and firmware modifications.

Submission + - Hack iOS 9 and Get $1 Million, Cybersecurity Firm Says (itworld.com)

itwbennett writes: Exploit acquisition company Zerodium has $3 million to buy iOS jailbreaks. 'Eligible submissions must include a full chain of unknown, unpublished, and unreported vulnerabilities/exploits (aka zero-days) which are combined to bypass all iOS 9 exploit mitigations including: ASLR, sandboxes, rootless, code signing, and boot chain,' Zerodium said on its iOS 9 Bug Bounty page

"Lead us in a few words of silent prayer." -- Bill Peterson, former Houston Oiler football coach