The Almighty Buck

Why Bigger Planes Mean Cramped Quarters (popsci.com) 234

An anonymous reader shares a report: The ironic thing about the compressed state of air travel today is that planes are getting larger. The jet I was on, an Airbus A321, stretches nearly 23 feet longer than its predecessor, the A320. More space, more passengers, more profit. These bigger planes are increasingly the most common Âvariants -- both on American Airlines and across all carriers. The current Boeing 737s, the world's most flown craft, are all longer than the original by up to 45 feet. And yet, on the inside, we're getting squeezed.

That's because more space doesn't equal more space in Airline World. It equals more seats -- and typically less room per person. In 2017, for example, word leaked that American was planning to add six economy spots to its A320s, nine to its A321s, and 12 (that's two rows) to its Boeing 737-800s. JetBlue is reportedly ramming 12 extras into its A320s, and Delta's will gain 10. And, come 2020, you'll likely find more seats on every United plane. In Airline World, they call this densification, which is a silly word. Passengers call it arrrgh!

Consumer Reports recently polled 55,000 of its members about air travel. There were complaints about all aspects, from ticketing to agents checking carry-ons at the gate. But 30 percent of coach-class fliers rated their seats as outright uncomfortable, and every airline received extremely low scores on legroom and cushiness in economy. Clearly, things are dismal and seem to be getting even worse. They're so bad, in fact, that last year, nonprofit consumer-advocacy group FlyersRights.org filed a suit against the Federal Aviation Administration, after lobbying the agency to stop the squeeze and standardize seat sizes.

Education

Will Chromebooks Someday Threaten Windows? (itworld.com) 219

"There are signs that Chromebooks are a bigger long-term threat to Microsoft than you might imagine," reports ITWorld, arguing that "long term, they'll likely be a serious competitor." The reason? Chromebooks sell big in education. They've unseated the Mac in schools. Two years ago, for the first time, Chromebooks outsold Macs in schools. Schools are a great market for Google, but Chromebooks are also Trojan horses. Children and teens use them for schoolwork and more. And when they get Chromebooks, they also get free subscriptions to Google's G suite of apps. If kids grow up using G Suite and Chromebooks, there's a reasonable chance they'll use them when they get older.

Where I live, in Cambridge, Mass., the public Cambridge Rindge and Latin High School gives out free Chromebooks to every one of the more than 2,000 teens in the school, in a bid to close the digital divide between families who can afford to buy computers for their children and those who can't... Cambridge isn't unique. According to a 2017 article in The New York Times, "More than half the nation's primary- and secondary-school students -- more than 30 million children -- use Google education apps like Gmail and Docs... And Chromebooks, Google-powered laptops that initially struggled to find a purpose, are now a powerhouse in America's schools. Today they account for more than half the mobile devices shipped to schools...."

When students graduate, Google makes it easy for them to move all their mail and documents from their school accounts to their personal accounts. And schools sometimes even act as inadvertent salespeople for Google. The Times reports that some schools tell graduating seniors to move all their documents from their school to their personal accounts... The upshot of all this? Windows hardware continues to rule in enterprises. But Chromebooks may one day prove a serious competitor, as students make their way into the workforce.

Communications

Ask Slashdot: Should We Hang Up on Conference Calls? (ft.com) 145

Make everyone stand. Work to an agenda. Don't let people go on endlessly. There are plenty of suggestions on how to run meetings so they are not a waste of time. People pay less attention to a bigger waste of time: the multi-participant conference call, argues a story on Financial Times. The story -- shared by an anonymous reader and which may be paywalled -- makes a case against the need for conference calls: You know the drill. An invitation arrives in your inbox with a date and time, a list of participants, numbers for dialling in from different countries and a sign-in code (followed by the pound or hash sign). I have had dozens of these invitations to conference calls, particularly those to discuss forthcoming panels and events. None of the calls has contributed much to the eventual event. I know this because my role is often to chair the eventual event. This is the first difference between a conference call and a face-to-face meeting: it is clear who is chairing the meeting, whereas it is seldom clear who is chairing the call. On conference calls, there is usually someone listed as the organiser, with their own sign-in code (followed by the pound or hash sign), but they are often not the most senior person on the call. The organiser, I can say from experience, is seldom the person who is going to be chairing the planned event. Usually, they are the person who organised the call. That may be a senior person; it may be their personal assistant.

The call organiser may take the leading role in the call. It is hard to tell because -- unless you have met several times before -- it is difficult to know who is speaking at any time. Unlike in a face-to-face meeting, you cannot see people's faces. As participants "arrive" in the conference call, they usually say, "Hi, this is Diane", or are announced by a recorded voice like entrants to a 19th-century ball -- "Simon Oates has joined the call" -- but after that you have to listen keenly for any voice marker (an accent, a shouty tone) that will help you identify who is talking. That is if you can remember who is on the call in the first place.
What do you think?
Google

Who Has More of Your Personal Data Than Facebook? Try Google (wsj.com) 151

Facebook may be in the hot seat right now for its collection of personal data without our knowledge or explicit consent, but as The Wall Street Journal points out, "Google is a far bigger threat by many measures: the volume of information it gathers, the reach of its tracking and the time people spend on its sites and apps." From the report (alternative source): It's likely that Google has shadow profiles (data the company gathers on people without accounts) on as at least as many people as Facebook does, says Chandler Givens, CEO of TrackOff, which develops software to fight identity theft. Google allows everyone, whether they have a Google account or not, to opt out of its ad targeting, though, like Facebook, it continues to gather your data. Google Analytics is far and away the web's most dominant analytics platform. Used on the sites of about half of the biggest companies in the U.S., it has a total reach of 30 million to 50 million sites. Google Analytics tracks you whether or not you are logged in. Meanwhile, the billion-plus people who have Google accounts are tracked in even more ways. In 2016, Google changed its terms of service, allowing it to merge its massive trove of tracking and advertising data with the personally identifiable information from our Google accounts.

Google uses, among other things, our browsing and search history, apps we've installed, demographics like age and gender and, from its own analytics and other sources, where we've shopped in the real world. Google says it doesn't use information from "sensitive categories" such as race, religion, sexual orientation or health. Because it relies on cross-device tracking, it can spot logged-in users no matter which device they're on. Google fuels even more data harvesting through its dominant ad marketplaces. There are up to 4,000 data brokers in the U.S., and collectively they know everything about us we might otherwise prefer they didn't -- whether we're pregnant, divorced or trying to lose weight. Google works with some of these brokers directly but the company says it vets them to prevent targeting based on sensitive information. Google also is the biggest enabler of data harvesting, through the world's two billion active Android mobile devices.

Businesses

Demand For Batteries Is Shrinking, Yet Prices Keep On Going and Going ... Up (wsj.com) 210

schwit1 shares a report: Batteries on average cost 8.2% more than a year ago, while prices in the overall household-care segment rose only 1.8%, according to Nielsen. At a time when prices are stagnating on everything from toilet paper to diapers, such pricing power for a product that is increasingly obsolete has confounded shoppers [Editor's note: the link may be paywalled]. "As far as the prices go, you don't have a choice," said Samuel Hurly, a contractor from Mount Vernon, N.Y., as he scanned a Home Depot display of AAA batteries to power flashlights he uses on the job. Batteries ordered online take too long to arrive, Mr. Hurly said, and he finds cheaper, private-label options lose power too quickly.

Battery prices were more likely to fluctuate a few years ago, when Duracell was owned by consumer-products giant Procter & Gamble Co. and Energizer was part of Edgewell Personal Care Co. Those companies were more focused on their bigger, more profitable razor businesses -- Edgewell with Schick and P&G with Gillette. They would invest less in batteries, or slash prices to drive up volume, to compensate for weak sales in other units, said SunTrust analyst Bill Chappell. Energizer Holdings Inc. spun off from Edgewell in 2015, and Duracell broke apart from P&G a year later when it was acquired by Warren Buffett's Berkshire Hathaway Inc.
schwit1 asks, "Both businesses have become more profit-focused since separating from their previous owners. Is the Energizer/Duracell duopoly ripe for disruption?"
The Almighty Buck

LinuxJournal, Which Ceased Publication Last Month Citing Poor Financial Condition, Secures Fresh Fund From Readers To Resume Operation (linuxjournal.com) 50

New submitter dataknife2 writes: LinuxJournal announced in Nov 2017 that they were going to cease publication; With some timely intervention by Private Internet Access they are going to be able to continue operation and are currently soliciting feedback for improving the magazine in the future. In a blog post, team at LinuxJournal wrote: Talk about a Happy New Year. The reason: it turns out we're not dead. In fact, we're more alive than ever, thanks to a rescue by readers -- specifically, by the hackers who run Private Internet Access (PIA) VPN, a London Trust Media company. PIA are avid supporters of freenode and the larger FOSS community. They're also all about Linux and the rest of the modern portfolio of allied concerns: privacy, crypto, freedom, personal agency, rewriting the rules of business and government around all of those, and having fun with constructive hacking of all kinds. We couldn't have asked for a better rescue ship to come along for us. In addition, they aren't merely rescuing this ship we were ready to scuttle; they're making it seaworthy again and are committed to making it bigger and better than we were ever in a position to think about during our entirely self-funded past.
Businesses

The Brutal Fight To Mine Your Data and Sell It To Your Boss (bloomberg.com) 75

An anonymous reader shares a report from Bloomberg, explaining how Silicon Valley makes billions of dollars peddling personal information, supported by an ecosystem of bit players. Editor Drake Bennett highlights the battle between an upstart called HiQ and LinkedIn, who are fighting for your lucrative professional identity. Here's an excerpt from the report: A small number of the world's most valuable companies collect, control, parse, and sell billions of dollars' worth of personal information voluntarily surrendered by their users. Google, Facebook, Amazon, and Microsoft -- which bought LinkedIn for $26.2 billion in 2016 -- have in turn spawned dependent economies consisting of advertising and marketing companies, designers, consultants, and app developers. Some operate on the tech giants' platforms; some customize special digital tools; some help people attract more friends and likes and followers. Some, including HiQ, feed off the torrents of information that social networks produce, using software bots to scrape data from profiles. The services of the smaller companies can augment the offerings of the bigger ones, but the power dynamic is deeply asymmetrical, reminiscent of pilot fish picking food from between the teeth of sharks. The terms of that relationship are set by technology, economics, and the vagaries of consumer choice, but also by the law. LinkedIn's May 23 letter to HiQ wasn't the first time the company had taken legal action to prevent the perceived hijacking of its data, and Facebook and Craigslist, among others, have brought similar actions. But even more than its predecessors, this case, because of who's involved and how it's unfolded, has spoken to the thorniest issues surrounding speech and competition on the internet.
Privacy

Equifax Breach is Very Possibly the Worst Leak of Personal Info Ever (arstechnica.com) 401

The breach Equifax reported Thursday is very possibly is the most severe of all for a simple reason: the breath-taking amount of highly sensitive data it handed over to criminals. Dan Goodin of ArsTechnica writes: By providing full names, Social Security numbers, birth dates, addresses, and, in some cases, driver license numbers, it provided most of the information banks, insurance companies, and other businesses use to confirm consumers are who they claim to be. The theft, by criminals who exploited a security flaw on the Equifax website, opens the troubling prospect the data is now in the hands of hostile governments, criminal gangs, or both and will remain so indefinitely. Hacks hitting Yahoo and other sites, by contrast, may have breached more accounts, but the severity of the personal data was generally more limited. And in most cases the damage could be contained by changing a password or getting a new credit card number. What's more, the 143 million US people Equifax said were potentially affected accounts for roughly 44 percent of the population. When children and people without credit histories are removed, the proportion becomes even bigger. That means well more than half of all US residents who rely the most on bank loans and credit cards are now at a significantly higher risk of fraud and will remain so for years to come. Besides being used to take out loans in other people's names, the data could be abused by hostile governments to, say, tease out new information about people with security clearances, especially in light of the 2015 hack on the US Office of Personnel Management, which exposed highly sensitive data on 3.2 million federal employees, both current and retired. Meanwhile, if you accept Equifax's paltry "help" you forfeit the right to sue the company, it has said. In its policy, Equifax also states that it won't be helping its customers fix hack-related problems.

UPDATE (9/9/17): Equifax has now announced that "the arbitration clause and class action waiver included in the Equifax and TrustedID Premier terms of use does not apply to this cybersecurity incident."

Bloomberg reported on Friday that a class action seeking to represent 143 million consumers has been filed, and it alleges the company didn't spend enough on protecting data. The class-action -- filed by the firm Olsen Daines PC along with Geragos & Geragos, a celebrity law firm known for blockbuster class actions -- will seek as much as $70 billion in damages nationally.
Patents

Apple Patents a Vaporizer (cnn.com) 101

Apple's product lineup may extend beyond cars and the connected home. A patent filed last year and published January 26 reveals a concept for a vaporizer. From a report on CNN Money, shared by reader JoshTops: The details are a bit hazy -- that is, Apple's patent only describes "a substance that is to be vaporized or sublimated into a vapor," not what the substance might be. The patent, filed by Apple employee Tetsuya Ishikawa, outlines plans for a temperature-regulated plate inside a chamber that heats up a substance to form a vapor. Many people use vapes to inhale nicotine or marijuana, and they are sometimes used as a replacement for cigarettes. The FDA began regulating vaping last year, and set rules for the manufacturing and distribution of vapes and their components. Vaporizers are also used in industries like healthcare and agriculture, so it's possible Apple is thinking bigger than personal use.
Piracy

Major Cyberlocker EX.UA To Shut Down Amid Police Crackdown (torrentfreak.com) 12

An anonymous reader quotes a report from TorrentFreak: Earlier this week, news broke that following a complaint from the MPAA, local piracy giant FS.to was raided by police, with more than 60 servers seized and 19 people arrested. That investigation is still ongoing but now an even bigger target has folded in its wake. Founded in 2009, EX.UA is Ukraine's largest cyberlocker and one of the largest sites in the country, period. With millions of visitors each day the site is a much-loved resource but very shortly the platform will close its doors for good. In an announcement to users, EX.UA's owners said that it was time to throw in the towel after 12 months of trouble for the site and potential legal trouble ahead. "Over the past year EX.UA has had a chance to feel the direct threats, blackmail (including at the international level), and DDOS attacks. These actions jeopardize the personal information and personal files stored by users on the service," the site announced. EX.UA's operators say they have always tried to operate with respect for the laws of Ukraine, including dealing with takedowns quickly. However, the site does not approve of the system of distribution and rights management in place in the country and says it was one of the site's goals to raise this issue in Ukrainian society. Just recently, Ukraine passed a law which will allow copyright holders to block allegedly infringing sites without obtaining a court order. This, EX.UA says, is a sign of "uncivilized lobbying" and will only result in less respect for copyright. Faced with a change in the law and a desire to respect it, EX.UA's operators say that they will shut down the site. Users have just under two weeks to save their files.
Security

Hack of Democrats' Accounts Was Wider Than Believed, Officials Say (nymag.com) 285

A Russian cyberattack that targeted Democratic politicians was bigger than it first appeared and breached private email accounts of more than 100 party officials and groups (could be paywalled; alternate source), reports The New York Times, citing officials with knowledge of the case. From the report: The widening scope of the attack has prompted the F.B.I. to broaden its investigation, and agents have begun notifying a long list of Democratic officials that the Russians may have breached their personal accounts. The main targets appear to have been the personal email accounts of Hillary Clinton's campaign officials and party operatives, along with a number of party organizations. Officials have acknowledged that the Russian hackers gained access to the Democratic Congressional Campaign Committee, which is the fund-raising arm for House Democrats, and to the Democratic National Committee, including a D.N.C. voter analytics program used by Mrs. Clinton's presidential campaign.
HP

HP Rolls Out Device-as-a-Service for PCs, Printers (eweek.com) 75

HP says it plans to provide companies with personal computers and other devices as part of a service. Corporate customers of HP's new initiative dubbed "device-as-a-service" will be able to pay a fixed monthly fee per employee for devices, eliminating the need to pay the retail cost upfront for hardware. From a report on eWeek:The Palo Alto, Calif.-based company unveiled a DaaS (device-as-a-service) initiative, one that has already been up and running with several of its clients for the last few months. As more and more millennials come into the work force, they expect to see light, fast, small, and up-to-date tools to use, because that's what they're used to, and their tools are like a badge of honor, HPI's Vice-President and General Manager of Support Services Bill Avey said. "Older employees might want bigger screen and keyboards. The point is, work tools need to fit the work force, and as workforces become more diverse, the tools must adjust fit the needs," Avey said. Otherwise, Avey said, employees will find workarounds in so-called shadow IT (using their own laptops, smartphones, tablets and applications) to get the job done -- which is always a nightmare for enterprise security professionals.
Advertising

Viewing Data Harvested From Smart TVs Used To Push Ads To Other Screens? (securityledger.com) 148

chicksdaddy writes: In the latest episode of EULA overreach, electronics maker Vizio Holdings has been called out by the non profit investigative reporting outfit ProPublica for an on-by-default feature on its smart TVs called "Smart Interactivity" that analyzes both broadcast and streamed content viewed using the device. ProPublica noted that the company's privacy policy failed to clearly describe the tracking behavior, which included the collection of information such as the date, time, channel and whether the program was viewed live or recorded.

According to ProPublica, the monitoring of viewing information through IP addresses, while it does not identify individuals, can be combined with other data available in commercial databases from brokers such as Experian, creating a detailed picture of an individual or household. Vizio has since updated its privacy policy with a supplement that explains how "Smart Interactivity" works.

The bigger issue may be what that updated privacy policy reveals. As The Security Ledger notes, the updated Vizio privacy policy makes clear that the company will combine "your IP address and other Non-Personal Information in order to inform third party selection and delivery of targeted and re-targeted advertisements." Those advertisements "may be delivered to smartphones, tablets, PCs or other internet-connected devices that share an IP address or other identifier with your Smart TV."

In other words, TV viewing patterns will be used to serve ads to any device user who happens to be connected to the same network as the Vizio Smart TV — an obvious problem for households with a mix of say... adults and children?! Vizio does provide instructions for disabling the Smart Interactivity features and says that "connected" features of the device aren't contingent on monitoring. That's better than some other vendors. In 2014, for example, LG used a firmware update for its smart televisions to link the "smart" features of the device to viewer tracking and monitoring. Viewers who applied the update, but refused to consent to monitoring were not able to use services like Netflix and YouTube.

Microsoft

Microsoft's Mission To Reignite the PC Sector (nytimes.com) 267

HughPickens.com writes: Sales of personal computers have been declining for so long — 14 consecutive quarters — that it's hard remember a time when PCs ruled the tech world. Now Nick Wingfield writes in the NY Times that Microsoft is leading the way on a mission to re-ignite the PC market by taking the once-unthinkable step of competing with its hardware partners. This week, Microsoft dived even further into the business with a laptop device, the Surface Book. The stated reason that Microsoft got into the PC hardware business three years ago, with the original Surface, was not to put PC companies out of business — but to better illustrate the capabilities of its software, providing devices that would inspire PC makers to be more innovative.

One of the most remarkable things about Microsoft's growing presence in the hardware business is that it has not led to open revolt among its partners. Initially, many of them were not happy about Microsoft's moves, complaining in private. "It's positioned as a laptop, very squarely against the MacBook Pro as an example. But that could also be extended to a Dell XPS 13, or an HP x360," says Patrick Moorhead. One reason there hasn't been more pushback from OEMs is that Microsoft's Surface business is still relatively small. Another is that the money Microsoft has poured into marketing Surface has raised the broader profile of Windows PCs. While Microsoft obviously risks alienating its partners, it's doing so with a much bigger fight in mind. "Right now Microsoft really believes that it has to have a combined hardware, software, and services play to go up against the likes of Apple," says Moorhead. "That's why it's doing this. That's why it's taking such an aggressive stance now, moving to laptops."

The Internet

Kim Dotcom Calls Hillary Clinton an "Adversary" of Internet Freedom 276

An anonymous reader writes: CNET reports that Kim Dotcom views Hillary Clinton as "an enemy of online freedom." Hilary's candidacy came up when Kim was asked about a tweet he made in which he called himself "Hillary's worse nightmare in 2016." He says now that Wikileaks founder Julian Assange would probably be a bigger headache for Clinton. "I'm aware of some of the things that are going to be roadblocks for her," he added. Dotcom said he hoped to expand the influence of the Internet Party and provide some transparency. Brietbart adds that a conflict between Assange and Clinton may have personal motivations, but it also seems inevitable. Hillary is obsessive about maintaining control of information. She created a personal server in her home to handle her emails as Secretary of State and then deleted all the contents after self-selecting the emails she believed were work-related. Assange is famous for parceling out secret information."
Businesses

Reactions to the New MacBook and Apple Watch 450

As the dust settles from Apple's press conference yesterday, there have been a broad variety of reactions around the web. Robinson Meyer at The Atlantic says Apple's $10,000 watch demonstrates the company has lost its soul. "The prices grate. And they grate not because they’re so expensive, but because they’re gratuitously expensive. ... To many commentators, this is unsurprising. It’s good business sense, really. Apple has made its world-devouring profits by ratcheting up profit margins on iPhones. There is no better target for these massive margins than the super-rich. But high margins do not a luxury brand make." Others suspect the high-end watches are targeted more at rich people in China.

As for the less expensive watches, perhaps they're around not so much to become a new major sales category for Apple, but rather to drive more iPhone sales. Meanwhile, the redesigned MacBook may signify a bigger change for the laptop industry than people realize: "We don’t need all those other ports, Apple says. We are living in a wireless world now, where we can connect most of our peripherals without cords." The new MacBook has also fueled speculation that Apple could be working on a more powerful tablet, something that could compete with Microsoft's Surface Pro line.
IBM

Not Just For ThinkPads Anymore: Lenovo Gets OK To Buy IBM Server Line 93

IBM sold its personal computer line (including the iconic ThinkPad line) to Lenovo back in 2005. Now, Lenovo is poised to acquire IBM's line of X86-based servers, and has garnered the approval of a regulatory body which could have scotched the deal. (The article describes the server line at issue as "low end," but that's in the eye of the beholder.) From the article: The conclusion of the review by the Committee on Foreign Investment in the U.S., or Cfius, is “good news for both IBM and Lenovo, and for our customers and employees,” Armonk, New York-based IBM said yesterday in a statement. While Cfius placed some conditions on the deal, they don’t significantly affect the business, and terms of the transaction didn’t change as result, a person with knowledge of the matter said, without specifying the conditions. The sale drew scrutiny because of disputes between China and the U.S., the world’s two largest economies, over cyberintrusions. By completing the deal, IBM can jettison a less profitable business to focus on growing areas, such as cloud computing and data analytics, while giving Lenovo a bigger piece of the global computing-hardware market. ... Spokesmen for IBM and Lenovo declined to comment on whether the Cfius clearance included any requirements or concessions. Holly Shulman, a spokeswoman for the Treasury Department, which leads Cfius, declined to comment.
Music

Interviews: Jonathan Coulton Answers Your Questions 36

We recently had the chance to talk with internet rock star and former code monkey Jonathan Coulton. We asked him a number of your questions and a few of our own about music, technology, and copyright issues. Read below to see what he had to say.

Slashdot Top Deals