Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 1093 declined, 872 accepted (1965 total, 44.38% accepted)

United States

Submission + - DOJ Seeks Mandatory Data Retention for ISP's 3

Hugh Pickens writes: "Computerworld reports that in testimony before Congress the US Department of Justice renewed its call for legislation mandating Internet Service Providers (ISP) retain customer usage data for up to two years because law enforcement authorities are coming up empty-handed in their efforts to go after online predators and other criminals because of the unavailability of data relating to their online activities. "There is no doubt among public safety officials that the gaps between providers' retention policies and law enforcement agencies' needs, can be extremely harmful to the agencies' investigations" says Jason Weinstein, deputy assistant attorney general at the Justice Department adding that data retention is crucial to fighting Internet crimes, especially online child pornography (PDF). Weinstein admits that a data retention policy raises valid privacy concerns however, such concerns need to be addressed and balanced against the need for law enforcement to have access to the data. "Denying law enforcement that evidence prevents law enforcement from identifying those who victimize others online," concludes Weinstein."
The Military

Submission + - Chinese Stealth Fighter Jet May Use US Technology

Ponca City writes: "In 1999 a US F-117 Nighthawk was downed by a Serbian anti-aircraft missile during a bombing raid. It was the first time one of the fighters had been hit, and the Pentagon blamed clever tactics and sheer luck. The pilot ejected and was rescued. Now the Guardian reports that pieces of the wrecked US F-117 stealth fighter ended up in the hands of foreign military attaches. "At the time, our intelligence reports told of Chinese agents crisscrossing the region where the F-117 disintegrated, buying up parts of the plane from local farmers," says Admiral Davor Domazet-Loso, Croatia's military chief of staff during the Kosovo war. "We believe the Chinese used those materials to gain an insight into secret stealth technologies ... and to reverse-engineer them." Zoran Kusovac says the Serbian regime routinely shared captured western equipment with its Chinese and Russian allies. "The destroyed F-117 topped that wish-list for both the Russians and Chinese," says Kusovac."
Education

Submission + - Study Sez Txt Msgs Make Kidz Gr8 Spellrz

Picknz writes: "The Telegraph reports that researchers have found that texting can improve literacy among pupils by giving them extra exposure to word composition outside the school day. According to the report, the association between spelling and text messaging may be explained by the ''highly phonetic nature' of the abbreviations used by children and the alphabetic awareness required for successfully decoding the words. "It is also possible that textism use adds value because of the indirect way in which mobile phone use may be increasing children’s exposure to print outside of school," says the report. "We are now starting to see consistent evidence that children's use of text message abbreviations has a positive impact on their spelling skills," adds Professor Claire Wood. "There is no evidence that children's language play when using mobile phones is damaging literacy development.""
Movies

Submission + - Wikileaks Movie Coming to the Big Screen

Hugh Pickens writes: "First Facebook and now Wikileaks as the Guardian reports that studio executives have picked up the screen rights to the forthcoming Julian Assange biography "The Most Dangerous Man in the World" by award-winning Australian writer Andrew Fowler. The book details Assange's life from his childhood on Magnetic Island in Queensland, Australia, all the way through to his founding of the whistleblower website in 2006 to publish classified material. Producers Barry Josephson and Michelle Krumm, who have optioned The Most Dangerous Man in the World, say they are planning a "suspenseful drama" in the vein of All the President's Men and with the thrill of a Tom Clancy novel. "As soon as I met Andrew and read a few chapters of his profound book, I knew that – with his incredibly extensive depth of knowledge – it would enable us to bring a thought-provoking thriller to the screen," says Krumm."
Apple

Submission + - The Case of Apple's Mystery Screw 1

Pickens writes: "Network World reports that in the past if you wanted to remove the outer case on your iPhone 4 to replace the battery or a broken screen, you could use a Phillip screwdriver to remove two tiny screws at the base of the phone and then simply slide off the back cover. But now Apple is replacing the outer screw with a mysterious tamper-resistant "pentalobular" screw across its most popular product lines, making it harder for do-it-yourselfers to make repairs. What about existing products in the field? Pentalobular screws might find their way into them, too. "Apple's latest policy will make your blood boil," says Kyle Wiens, CEO of iFixit. "If you take your iPhone 4 into Apple for any kind of service, they will sabotage it by replacing your Phillips screws with the new, tamper-resistant screws. We've spoken with the Apple Store geniuses tasked with carrying out this policy, and they are ashamed of the practice." Of course only Apple authorized service technicians have Pentalobular screwdrivers and they're not allowed to resell them. "Apple sees a huge profit potential," says Wiens. "A hundred dollars per year in incremental revenue on their installed base is a tremendous opportunity.""
Graphics

Submission + - Facebook Images to Get Expiration Date

Pickens writes: "BBC reports that researchers have created software that gives images an expiration date by tagging them with an encrypted key so that once this date has passed the key stops the images being viewed and copied. Professor Michael Backes, who led development of the X-Pire system, says development work began about 18 months ago as potentially risky patterns of activity on social networks, such as Facebook, showed a pressing need for such a system. "More and more people are publishing private data to the internet and it's clear that some things can go wrong if it stays there too long," says Backes. The X-Pire software creates encrypted copies of images and asks those uploading them to give each one an expiration date. Viewing these images requires the free X-Pire browser add-on. When the viewer encounters an encrypted image it sends off a request for a key to unlock it. This key will only be sent, and the image become viewable, if the expiration date has not been passed."
Transportation

Submission + - Road Train Completes First Trials in Sweden

Hugh Pickens writes: "BBC reports that technology that links vehicles into "road trains" that can travel as a semi-autonomous convoy has undergone its first real world tests with trials held on Volvo's test track in Sweden slaving a single car to a truck to test the platooning system and researchers believe platoons of cars could be traveling on Europe's roads within a decade cutting fuel use, boosting safety and may even reducing congestion. SARTRE researchers say that around 80% of accidents on the road are due to human error so using professional lead drivers to take the strain on long journeys could, they say, see road accidents fall. They also predict fuel efficiency could improve by as much as 20% if "vehicle platooning" takes off, with obvious benefits for the environment. A video of the trial shows the test car traveling behind a truck and then handing over control to that leading vehicle with commands to steer, speed up and slow down all coming from the driver of the lead vehicle while the driver of the test car is seen taking his hands off the wheel, reading a newspaper and sipping coffee as the journey proceeds. "An automated system is likely to make it safer as it takes away driver error but it would have to be 100% reliable," says John Franklin "This kind of system would also require a complete change in motoring culture for drivers to hand over control,.""
Music

Submission + - Sony, Universal to Beat Piracy with 'Instant Pop' 1

Hugh Pickens writes: "The Guardian reports that Britain's two biggest record labels, Sony and Universal, plan to beat music piracy by making new singles available for sale on the day they first hit the airwaves hoping the effort will encourage young people to buy songs they can listen to immediately rather than copying from radio broadcasts online. Songs used to receive up to six weeks radio airplay before they were released for sale, a practice known as "setting up" a record. "What we were finding under the old system was the searches for songs on Google or iTunes were peaking two weeks before they actually became available to buy, meaning that the public was bored of — or had already pirated — new singles," says David Joseph. Sony, which will start the "on air, on sale" policy simultaneously with Universal next month, agreed that the old approach was no longer relevant in an age where, according to a spokesman for the music major, "people want instant gratification"."
Programming

Submission + - How Facebook Ships Code

Hugh Pickens writes: "yeegay has a very interesting article about how Facebook develops and releases software that he has gathered from talking with friends at the company. The two largest teams at Facebook are Engineering and Ops, with roughly 400-500 team members each, together making up about 50% of the company. All engineers go through 4 to 6 week “Boot Camp” training where they learn the Facebook system by fixing bugs. After boot camp, all engineers get access to live DB and any engineer can modify any part of Facebook's code base and check-in at-will so that engineers can modify specs mid-process, re-order work projects, and inject new feature ideas anytime. Then arguments about whether or not a feature idea is worth doing or not generally get resolved by spending a week implementing it and then testing it on a sample of users, e.g., 1% of Nevada users. "All changes are reviewed by at least one person, and the system is easy for anyone else to look at and review your code even if you don’t invite them to," writes yeegay. "It would take intentionally malicious behavior to get un-reviewed code in.” What is interesting for a compnay this size is that there is no official QA group at Facebook but almost every employee is dogfooding the product every day: many times a day and every employee is using a version of the site that includes all the changes that are next in line to go out. All employees are strongly encouraged to report any bugs they see and these are very quickly actioned upon. Facebook has about 60,000 servers with the smallest level comprising only 6 servers and there are nine levels for pushing out new code. For new code the ops team observes those 6 servers at level 1 to make sure that they are behaving correctly before rolling forward to the next level. If a release is causing any issues (e.g., throwing errors, etc.) then the push is halted, the engineer who committed the offending changeset is paged to fix the problem, and then the release starts over again at level 1."
United States

Submission + - US Scraps Virtual Fence along Mexican Border

Pickens writes: "The Arizona Republic reports that the federal government has officially cancelled its multibillion-dollar plan to build a virtual fence along the border with Mexico as Homeland Security Secretary Janet Napolitano disclosed in a congressional briefing that the program known as SBInet was costing too much and achieving too little. "SBInet cannot meet its original objective of providing a single, integrated border-security technology solution," says Napolitano. Boeing was hired in 2006 to develop the system under a three-year federal contract with cost projections for full build-out as high as $8 billion but efforts were plagued by delays, glitches, budget increases and congressional criticism. Napolitano has ordered Customs and Border Protection to launch a more modest and geographically tailored effort using SBInet funds and existing technology such as mobile-surveillance systems, unmanned aircraft, thermal-imaging devices and remote-video surveillance with proven elements of SBInet including stationary radar and infrared-sensor towers. SBInet cost nearly $1 billion for development along 53 miles of Arizona border. Homeland Security says its new plan can enhance security along the remaining 323 miles of Arizona border at a total cost of less than $750 million."
Crime

Submission + - Your Most Dangerous Possession? Your Smartphone 1

Hugh Pickens writes: "CNN reports that now that smartphones double as wallets and bank accounts — allowing users to manage their finances, transfer money, make payments, deposit checks and swipe their phones as credit cards — smartphones have become very lucrative scores for thieves and with 30% of phone subscribers owning iPhones, BlackBerrys and Droids, there are a lot of people at risk. "It's crazy the amount of information on that phone — it's like carrying a mini-computer around with you, except that more people know the settings on their computer than they do on their phones at this point," says Nikki Junker, a victim advisor at the Identity Theft Resource Center. "People are incredibly at risk as technology improves." Storing a password and keeping your phone locked is a good start, but it's not going to protect you from professional fraudsters. "Don't think that having an initial password set on your phone can stop people from getting in there," says Junker. "It's a very low level of protection — you can even find 30-second videos on how to crack smartphone passwords on YouTube.""
United States

Submission + - Patriot Act Up For Renewal, Nobody Notices

Ponca City, We Love You writes: "When the Patriot Act was first signed in 2001, it was billed as a temporary measure required because of the extreme circumstances created by the terrorist threat. The fear from its opponents was that executive power, once given, is seldom relinquished. Now the Examiner reports that on January 5th, Rep. Mike Rogers (R-MI) introduced a bill to add yet another year to the soon to be expiring Patriot Act extending it until February, 2012 with passage likely to happen with little debate or contention. If passed, this would be the second time the Obama administration has punted on campaign promises to roll back excessive surveillance measures allowed under the act passed in the wake of 9/11. Last years extension passed under the heading of the Medicare Physician Payment Reform Act. "Given the very limited number of days Congress has in session before the current deadline, and the fact that the bill’s Republican sponsor is only seeking another year, I think it's safe to read this as signaling an agreement across the aisle to put the issue off yet again," writes Julian Sanchez."

Submission + - RapidShare Threatens Suit Over Piracy Allegations

Hugh Pickens writes: "PC Magazine reports that RapidShare, named as a contributor to digital piracy by a MarkMonitor report, has threatened to sue for defamation. "This defamation of RapidShare as a digital piracy site is absurd and we reserve the right to take legal action against MarkMonitor," says RapidShare in a statement. "RapidShare is a legitimate company that offers its customers fast, simple and secure storage and management of large amounts of data via our servers." MarkMonitor, a Web site that specializes in "enterprise brand protection," says in their study that the most-trafficked domains engaged in digital piracy included three sites — rapidshare.com, megavideo.com, and megaupload.com — that combined yielded 21 billion pageviews per year. RapidShare acknowledged that copyrighted files do get uploaded to its site, however "these users are in the absolute minority compared with those who use our services to pursue perfectly legitimate interests." RapidShare says that it does not open and view the files of its users, and contains no search function so that other users may look for content."
Government

Submission + - Jerry Brown Confiscates 48,000 Cell Phones

Hugh Pickens writes: "The Sacramento Bee reports that California Governor Jerry Brown, in his first executive order since taking office, has ordered the collection and return of 48,000 state government-paid cell phones — half of those now in use - by June 1. "It is difficult for me to believe that 40 percent of all state employees must be equipped with taxpayer-funded cell phones," says Brown in a written statement. "Some state employees, including department and agency executives who are required to be in touch 24 hours a day and seven days a week, may need cell phones, but the current number of phones out there is astounding." Brown's cell phone order directs state agency and department heads to retrieve the cell phones and the governor says he plans to continue reducing cell phone usage in months ahead. "In the face of a multi-billion dollar budget deficit, a cell phone may not seem like a big expense," adds Brown. "But spending $20 million, and perhaps far more than that, on cell phones can't be justified.""
Iphone

Submission + - Verizon to Offer iPhone Users Unlimited Data

Hugh Pickens writes: "The WSJ reports that Verizon Wireless, the country's largest wireless carrier, is confident enough in its network that it will offer unlimited data-use plans when it starts selling the iPhone around the end of this month, a person familiar with the matter says. Such plans would provide a key means of distinguishing its service from rival AT&T Inc., which limits how much Internet data its customers may use each month. Verizon has a lot at stake as it starts to carry the iPhone, which it will announce Tuesday at an event in New York City, people familiar with the matter say. Verizon more than any other U.S. carrier has built its reputation on its network quality, and any stumble in handling iPhone traffic will call into question Verizon's major selling point. On the other hand, if it does handle the iPhone well, then AT&T will have a harder time arguing it didn't mismanage its own network. Anthony J. Melone, Verizon's chief technology officer, says the company has invested heavily in its 3G network to handle surging smartphone traffic including nine million Android subscribers, up from none a year earlier. "We added enormous capacity to the network in one fell swoop," says Melone. "It is there waiting for us to grow into it. That will help me tremendously with my 3G network.""

Slashdot Top Deals

"The voters have spoken, the bastards..." -- unknown

Working...