Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

+ - Will Machine Intelligence Be So Human That It Will Get Religion?-> 1

Submitted by itwbennett
itwbennett writes: Earlier this month Reverend Dr. Christopher J. Benek raised eyebrows on the Internet by stating his belief that Christians should seek to convert Artificial Intelligences to Christianity if and when they become autonomous. Of course that's assuming that robots are born atheists, not to mention that there's still a vast difference between what it means to be autonomous and what it means to be human.
Link to Original Source

+ - IEEE standards group wants to bring order to Internet of Things->

Submitted by alphadogg
alphadogg writes: The IEEE is embarking on an ambitious effort to build a overarching architecture for the Internet of Things, spanning a multitude of industries and technologies. IEEE P2413, which the Institute of Electrical and Electronics Engineers officially started work on in July, would form a framework for interoperability among connected devices and related applications in home automation, industrial systems, telematics and all other sectors that are expected to use IoT in the coming years. While leaving room for differences across those industries, the standard would allow for sharing of data across IoT systems, according to Oleg Logvinov, chair of the IEEE P2413 Working Group.
Link to Original Source

+ - Why TCP/IP is on the way out->

Submitted by jcatcw
jcatcw writes: Researchers at Aalborg University in Denmark, in association with MIT and Caltech, reckon that the Internet can be made faster, and more secure, by abandoning the whole concept of packets and error correction. Error correction slows down traffic because the chunks of data, in many cases, have to be sent more than once.
The researchers are using a mathematical equation instead. The formula figures out which parts of the data didn't make the hop. They say it works in lieu of the packet-resend.

Link to Original Source

+ - Foxconn Factory Workers Can Now Afford The iPhones They Make->

Submitted by jfruh
jfruh writes: In 2010, a series of negative reports about Foxconn's Apple production facilities in China hit a nadir with a series of workplace suicides. Since then, though, things seem to be looking up somewhat, if Foxconn's campus in Zhengzhou is any indication. While employees there still put in very long hours and consider the cutting edge iPhones out of reach, many now sport iPhone 4 and 4S models. And a variety of other businesses are springing up to cater to employees at the enormous factory.
Link to Original Source

+ - Researchers show how easy it is to manipulate online opinions->

Submitted by jcatcw
jcatcw writes: A recent study shows that a single random up-vote, randomly chosen, created a herding behavior in ratings that resulted in a 25% increase in the ratings but the negative manipulation had no effect. An intuitive explanation for this asymmetry is that we tend to go along with the positive opinions of others, but we tend to be skeptical of the negative opinions of others, and so we go in and correct what we think is an injustice. The third major result was that these effects varied by topic. So in business and society, culture, politics, we found substantial susceptibility to positive herding, whereas in general news, economics, IT, we found no such herding effects in the positive or negative direction.
Link to Original Source

+ - White Shark RFID/Sattellite Tracking Shows Long Journeys, Many Beach Visits->

Submitted by Lucas123
Lucas123 writes: Marine biologists from OCEARCH, a non-profit shark research project, have been tagging scores of great whites and other shark species with an array of wireless technologies, gathering granular data on the sharks over the past year or more. For example, Mary Lee, a great white shark that's the same weight and nearly the same length as a Buick, was tagged off of Cape Cod and has made beach visits up and down the U.S. East Coast and Bermuda. She came so close to beaches that the research team alerted local authorities. The team attaches an array of acoustic and satellite tags as well as accelerometers to the sharks, which collect more than 100 data points every second — 8.5 million data points per day. The data has provided a detailed, three-dimensional view of the shark's behavior, which the team has been sharing in real time on its website. OCEARCH plans to expand that data sharing over the next few weeks to social networks and classrooms.
Link to Original Source

+ - Russia follows in footsteps of SOPA with unsettling new anti-piracy laws->

Submitted by jcatcw
jcatcw writes: In a controversial move by the Kremlin, Russia has followed in the footsteps of SOPA by hurriedly passing two new anti-piracy bills. The first bill is an extrajudicial blacklist for websites, meaning that any website containing content deemed to be 'unsuitable' or harmful can be shut down without the need for court judgment or investigation. The main problem with the blacklisting method is that IP addresses are targeted instead of specific URLs. The second is a radical anti-piracy law but it is targeting the middlemen as opposed to the pirates themselves. The wider implication of these laws is that they can be used to effectively limit and in some cases even remove altogether the opportunity for alternative viewpoints through the censorship of independent media
Link to Original Source

+ - Feminism explained to computer scientists (Video)

Submitted by jcatcw
jcatcw writes: Gender inequality is a bug, not a feature, according to Beth Andres-Beck — a full-stack software engineer at TripAdvisor, working in Java, JavaScript, HTML5, and Objective-C. Using the analytical tools from her feminist education, Andres-Beck provides some very practical advice to women in technology who are tired of being belittled, hit on at conferences, and otherwise treated poorly in an industry that should be embracing all who are good at generating new technological solutions.
Windows

+ - 10 Windows 8 Tips, Tricks -- And, of Course, Hacks->

Submitted by
CWmike
CWmike writes: "Faced with an unfamiliar operating system that at first glance seems more difficult to customize than earlier versions of Windows? What to do — give up and simply use it as it came out of the box? Nope. There are plenty of ways to tweak, hack and make Windows 8 do things you wouldn't think were possible. Windows expert Preston Gralla shows you how to cobble together your own quick-and-dirty Start menu as well as customize the hidden Power User menu. Looking for 'God Mode,' want to hack the lock screen and Start screen, or to master File Explorer? Fire up Windows 8 and get ready to hear it cry 'Uncle.'"
Link to Original Source
Government

+ - Should smartphone chips be used to deactivate guns?->

Submitted by Lucas123
Lucas123 writes: Putting smartphone tech/GPS into guns to deactivate them in certain zones — say public places where they're not supposed to be carried — may be one way to address mass shootings in the future. Is there anyone who doesn't believe that in twenty years GPS and databases will drive our cars and coordinate the safe flow of traffic? Technology moves forward. Innovation doesn't stop. Without a doubt, gun manufacturers already recognize that innovation is faster and cheaper in software than hardware. How long until a digital interface will allow the recreational shooter to change the rate of fire, burst patterns and even tactile and audible characteristics of the gun to increase enjoyment and personalize preferences? To be sure there are issues associated with smart gun technology. Some gun owners would rightly say that their gun activities could be monitored and their guns could be shut down by government in violation of their constitutional rights.
There was also concern about trusting complex technology. There was a concern that if the technology was not flawless the gun could fail at a time when the gun was needed for protection. I understand the right and want of individuals to have guns for protection or sport. I also believe that it is a fundamental right of all individuals to be kept safe from the devastation guns can bring.

Link to Original Source
Cloud

+ - What It's Like to Work for a Cloud Service Provider->

Submitted by Lucas123
Lucas123 writes: As enterprises increasingly consider moving their computing infrastructure to the cloud, IT professionals wonder whether they should follow the migration. Jake Robinson said he remembers the day he really understood what it means to work on "the other side of the cloud." It was Thanksgiving, a couple of years ago. A customer posted an iPhone app designed to give users access to coupons and discounts the following day, Black Friday. The retailer had vastly underestimated demand for the app, and the ASP's database crashed. A solutions architect, Robinson was called in and spent most of the holiday tuning the client's database server to handle the traffic. Computerworld spoke to a half-dozen IT professionals who worked for cloud service providers to get their their experiences.
Link to Original Source
Java

+ - 1 Billion at Risk from Java Vulnerability->

Submitted by
jcatcw
jcatcw writes: "Just as Oracle is ramping up for the September 30 start of JavaOne 2012 in San Francisco, researchers from the Polish firm Security Explorations disclosed yet another critical Java vulnerability that might "spoil the taste of Larry Ellison's morning ... Java." According to Security Explorations researcher Adam Gowdiak, who sent the email to the Full Disclosure Seclist, this Java exploit affects one billion users of Oracle Java SE software, Java 5, 6 and 7. It could be exploited by apps on Chrome, Firefox, Internet Explorer, Opera and Safari. Wow, thanks a lot Oracle."
Link to Original Source
Security

+ - ToorCamp: Adventures in an American hacker camp->

Submitted by jcatcw
jcatcw writes: While a tech camping event might sound like an oxymoron, hackers, makers, breakers and shakers assembled at the northwestern tip of the USA for ToorCamp and dispelled the notion that all hackers avoid sunshine and the great outdoors. As you would expect from a hacker conference, there were workshops like the one for lock picking and a plethora of presentations from “hacking computers to brain hacking, from brewing soda to fighting robots, from civil rights to lightning guns.” Then unique aspects of this cool hacker camp get more bizarre . . like the laser that was so bright it required FAA clearance to deploy it, the ShadyTel community 'payphone,' the Temple of Robotron, an RFID implantation station, bike jousting, dancing robots and of course campfires. Need an even stranger adventure that's also in the ToorCon family of hacking conferences? There's the upcoming WorldToor, the first ever hacker conference in Antarctica.
Link to Original Source

"When it comes to humility, I'm the greatest." -- Bullwinkle Moose

Working...