Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Google

Google Wants To Rank Websites Based On Facts Not Links 179

Posted by samzenpus
from the just-the-facts dept.
wabrandsma writes about Google's new system for ranking the truthfulness of a webpage. "Google's search engine currently uses the number of incoming links to a web page as a proxy for quality, determining where it appears in search results. So pages that many other sites link to are ranked higher. This system has brought us the search engine as we know it today, but the downside is that websites full of misinformation can rise up the rankings, if enough people link to them. Google research team is adapting that model to measure the trustworthiness of a page, rather than its reputation across the web. Instead of counting incoming links, the system – which is not yet live – counts the number of incorrect facts within a page. 'A source that has few false facts is considered to be trustworthy,' says the team. The score they compute for each page is its Knowledge-Based Trust score. The software works by tapping into the Knowledge Vault, the vast store of facts that Google has pulled off the internet. Facts the web unanimously agrees on are considered a reasonable proxy for truth. Web pages that contain contradictory information are bumped down the rankings."

+ - ISIS threatens life of Twitter founder after thousands of account suspensions->

Submitted by Patrick O'Neill
Patrick O'Neill (3863175) writes "After a wave of account bannings that marks Twitter's most aggressive move ever against ISIS, new images circulated from militants shows founder Jack Dorsey in crosshairs with the caption "Twitter, you started this war." The famously tech-savy ISIS has met a number of defeats on American-built social media recently with sites like Twitter and YouTube banning the group's efforts in unprecedented numbers."
Link to Original Source
Space

20-Year-Old Military Weather Satellite Explodes In Orbit 141

Posted by samzenpus
from the go-boom dept.
schwit1 writes A 20-year-old U.S. military weather satellite apparently exploded for no obvious reason. The incident has put several dozen pieces of space junk into orbit. From the article: "A 20-year-old military weather satellite apparently exploded in orbit Feb. 3 following what the U.S. Air Force described as a sudden temperature spike. The “catastrophic event” produced 43 pieces of space debris, according to Air Force Space Command, which disclosed the loss of the satellite Feb. 27 in response to questions from SpaceNews. The satellite, Defense Meteorological Satellite Program Flight 13, was the oldest continuously operational satellite in the DMSP weather constellation."
Technology

Physicists May Be One Step Closer To Explaining High-Temp Superconductivity 48

Posted by samzenpus
from the it's-getting-hot-in-here dept.
sciencehabit writes For years some physicists have been hoping to crack the mystery of high-temperature superconductivity—the ability of some complex materials to carry electricity without resistance at temperatures high above absolute zero—by simulating crystals with patterns of laser light and individual atoms. Now, a team has taken—almost—the next-to-last step in such 'optical lattice' simulation by reproducing the pattern of magnetism seen in high-temperature superconductors from which the resistance-free flow of electricity emerges.
Security

Pharming Attack Targets Home Router DNS Settings 30

Posted by samzenpus
from the protect-ya-neck dept.
msm1267 (2804139) writes Pharming attacks are generally network-based intrusions where the ultimate goal is to redirect a victim's web traffic to a hacker-controlled webserver, usually through a malicious modification of DNS settings. Some of these attacks, however, are starting to move to the web and have their beginnings with a spam or phishing email. Proofpoint reported on the latest iteration of this attack, based in Brazil. The campaign was carried out during a five-week period starting in December when Proofpoint spotted phishing messages, fewer than 100, sent to customers of one of the country's largest telecommunications companies.
Medicine

Research Suggests That Saunas Help You Live Longer 149

Posted by samzenpus
from the sweat-it-out dept.
jones_supa writes A study of Finnish men suggests that frequent sauna baths may help you live longer. Previous research has suggested that saunas might improve blood vessel function and exercise capacity, or even lower blood pressure in patients with hypertension. The new study links long, hot sauna baths with more benefits, including fewer deaths from heart attacks, strokes, various heart-related conditions and other causes. The study tracked 2315 Finnish men for nearly 20 years on average. Most participants used saunas at least once weekly. Those who used them four to seven times weekly received the greatest benefits. The study published in JAMA Internal Medicine wraps up by saying that further studies are warranted to establish the potential mechanism that links sauna bathing and the aforementioned cardiovascular benefits.

+ - Which classic OOP compiled language: Objective-C or C++?

Submitted by Qbertino
Qbertino (265505) writes "I've been trying to pick up a classic OOP oriented compiled language since the early 90ies and have never gotten around to it. C++ always was on my radar but I'm a little torn to-and-fro with Objective-C. Objective-C is the obvious choice if you also want to make money deving for Mac OS X, but for the stuff I want to do both languages would suffice on all platforms. I do want to start out on x86 Linux though and also use it as my main development platform. Note: The fight is only between these two. Yes, I know quite a few other PLs, but I want to get into a widespread compiled language that has good ties into FOSS and both Objective-C and C++ fit that bill.
I'm leaning towards C++ but what do you recommend? How do these two PLs compare to each other and how easy is cross-plattform development in either? (GUI free, 'headless' applications). Thanks for your opinion."
Games

42 Artificial Intelligences Are Going Head To Head In "Civilization V" 42

Posted by samzenpus
from the race-to-build-Himeji-Castle dept.
rossgneumann writes The r/Civ subreddit is currently hosting a fascinating "Battle Royale" in the strategy game Civilization V, pitting 42 of the game's built-in, computer-controlled players against each other for world domination. The match is being played on the largest Earth-shaped map the game is capable of, with both civilizations that were included in the retail version of the game and custom, player-created civilizations that were modded into it after release.
Google

Craig Brittain (Revenge Porn King) Sues For Use of Image 94

Posted by samzenpus
from the what's-good-for-the-goose-is-good-for-the-disgusting-gander dept.
retroworks writes "Washington Post reporter Caitlin Dewey leads with, "Revenge-porn impresario Craig Brittain is learning the hard way that karma is a real witch." The report states that the Federal Trade Commission has settled a complaint against Brittain, whose defunct site, "Is Anybody Down" was accused of unfair business practices. From the article: "The site paid its bills by soliciting women's nude photos on Craigslist and/or from their exes, publishing the photos without the women's permission (and often with their names and phone numbers attached), and then charging fees of $200 to $500 to take the photos down." Brittain agreed to destroy the image and never operate a revenge porn site again. However, On Feb. 9, "Brittain filed a takedown request to Google, demanding that the search engine stop linking to nearly two dozen URLs — including a number of news articles, and files on the case from the FTC — because they used photos of him and information about him without his permission." Ars Technica explains. "In this instance, fair use and general First Amendment principles are on Google's and the media's side."

Comment: Re:Foxconn Factories' Future: Fewer Humans, More R (Score 1, Informative) 164

by khallow (#49157501) Attached to: Foxconn Factories' Future: Fewer Humans, More Robots

Right, but the conversation that's being had around this is what are we going to do with all these people that we don't need anymore.

Employ them. That's what China will do. The two or three "lost generations" is a developed world problem coming from an uncompetitive labor force.

+ - How Does One Verify Hard Drive Firmware? 1

Submitted by Anonymous Coward
An anonymous reader writes "In light of recent revelations from Kaspersky Labs about the Equation Group and persistent hard drive malware, I was curious about how easy it might be to verify my own system's drives to see if they were infected. I have no real reason to think they would be, but I was dismayed by the total lack of tools to independently verify such a thing. For instance, Seagate's firmware download pages provide files with no external hash, something Linux distributions do for all of their packages. Neither do they seem to provide a utility to read off the current firmware from a drive and verify its integrity.

Are there any utilities to do such a thing? Why don't these companies provide such a thing to users? Has anyone compiled and posted a public list of known-good firmware hashes for the major hard drive vendors and models? This seems to be a critical hole in PC security.

I did contact Seagate support asking for hashes of their latest firmware; I got a response stating that '...If you download the firmware directly from our website there is no risk on the file be tampered with." [their phrasing, not mine]. Methinks somebody hasn't been keeping up with world events lately."
Security

Blu-Ray Players Hackable Via Malicious Discs 93

Posted by Soulskill
from the physical-media-increasingly-sketchy dept.
An anonymous reader writes: Some Blu-Ray disc interactive features use a Java variant for UIs and applications. Stephen Tomkinson just posted a blog discussing how specially created Blu-Ray discs can be used to hack various players using exploits related to their Java usage. He hacked one Linux-based, network-connected player to get root access through vulnerabilities introduced by the vendor. He did the same thing against Windows Blu-Ray player software. Tomkinson was then able to combine both, along with detection techniques, into a single disc.

+ - Google Taking Over New TLDs->

Submitted by bobo the hobo
bobo the hobo (302407) writes "In the corner of the internet where people care about DNS, there is a bit of an uproar at Google's application for over a hundred new top-level domains, including .dev, .lol, .app, .blog, .cloud and .search. Their application includes statements such as:
By contrast, our application for the .blog TLD describes a new way of automatically linking new second level domains to blogs on our Blogger platform – this approach eliminates the need for any technical configuration on the part of the user and thus makes the domain name more user friendly.

And also limiting usage of .dev to Google only:
Second-level domain names within the proposed gTLD are intended for registration and use by Google only, and domain names under the new gTLD will not be available to the general public for purchase, sale, or registration. As such, Charleston Road Registry intends to apply for an exemption to the ICANN Registry Operator Code of Conduct as Google is intended to be the sole registrar and registrant."

Link to Original Source
Privacy

NSA Spying Wins Another Rubber Stamp 85

Posted by Soulskill
from the once-more-unto-the-privacy-breach dept.
schwit1 sends this report from the National Journal: A federal court has again renewed an order allowing the National Security Agency to continue its bulk collection of Americans' phone records, a decision that comes more than a year after President Obama pledged to end the controversial program. The Foreign Intelligence Surveillance Court approved this week a government request to keep the NSA's mass surveillance of U.S. phone metadata operating until June 1, coinciding with when the legal authority for the program is set to expire in Congress. The extension is the fifth of its kind since Obama said he would effectively end the Snowden-exposed program as it currently exists during a major policy speech in January 2014. Obama and senior administration officials have repeatedly insisted that they will not act alone to end the program without Congress.

+ - A step closer to explaining high-temperature superconductivity?->

Submitted by sciencehabit
sciencehabit (1205606) writes "For years some physicists have been hoping to crack the mystery of high-temperature superconductivity—the ability of some complex materials to carry electricity without resistance at temperatures high above absolute zero—by simulating crystals with patterns of laser light and individual atoms. Now, a team has taken—almost—the next-to-last step in such "optical lattice" simulation by reproducing the pattern of magnetism seen in high-temperature superconductors from which the resistance-free flow of electricity emerges."
Link to Original Source

Using TSO is like kicking a dead whale down the beach. -- S.C. Johnson

Working...