Input Devices

Low-Cost EEG Head-Sets Promise Virtual Reality Feedback Loops (thestack.com) 35

An anonymous reader writes: Researchers from the University of Memphis have found that it's possible to use a low-cost EEG device such as the $300 Emotiv Epoc to understand how a user is feeling — opening up the path to genuine psycho-biological feedback in virtual/augmented reality scenarios. The Epoc has been used, in combination with the Razer Hydra, to give users control over VR/AR environments, but integrating emotional feedback into VR environments heralds many new possibilities in the fields of medical research, gaming — and, of course, marketing research.
Bug

FTDI Driver Breaks Hardware Again (eevblog.com) 268

janoc writes: It seems that the infamous FTDI driver that got famous by intentionally bricking counterfeit chips [NOTE: that driver was later removed] has got a new update that injects garbage data ('NON GENUINE DEVICE FOUND!') into the serial data. This was apparently going on for a while, but only now is the driver being pushed as an automatic update through Windows Update, thus many more people stand to be affected by this.

Let's hope that nobody dies in an industrial accident when a tech connects their cheap USB-to-serial cable to a piece of machinery and the controller misinterprets the garbage data.

Science

Scientists Struggle To Stay Grounded After Possible Gravitational Wave Signal (theguardian.com) 85

schwit1 writes with news that cosmologist Lawrence Krauss has set the scientific community abuzz by confirming a rumor floating around for the past several months that the LIGO experiment may have discovered gravitational waves. The excitement centers on a longstanding experiment known as the Advanced Laser Interferometer Gravitational-Wave Observatory (LIGO) which uses detectors in Hanford, Washington, and Livingston, Louisiana to look for ripples in the fabric of spacetime. According to the rumors, scientists on the team are in the process of writing up a paper that describes a gravitational wave signal. If such a signal exists and is verified, it would confirm one of the most dramatic predictions of Albert Einstein’s century-old theory of general relativity. Krauss said he was 60% confident that the rumor was true, but said he would have to see the scientists’ data before drawing any conclusions about whether the signal was genuine or not. But many scientists are trying to calm the hype. Krauss admits he hasn't spoken to anyone within the LIGO team. Further, to enhance the integrity of their work, the LIGO team will occasionally "purposefully inject false signals in to their data to test the sensitivity of their analysis techniques and to keep people honest." A LIGO spokesperson said, "We’ll certainly let you know when we have news to share."
The Military

KGB Software Almost Triggered War In 1983 (arstechnica.com) 210

An anonymous reader writes: Who here remembers WarGames? As it turns out, the film was a lot closer to reality than we knew. Newly-released documents show that the Soviet Union's KGB developed software to predict sneak attacks from the U.S. and other nations in the early 1980s. During a NATO wargame in November, 1983, that software met all conditions necessary to forecast the beginning of a nuclear war. "Many of these procedures and tactics were things the Soviets had never seen, and the whole exercise came after a series of feints by U.S. and NATO forces to size up Soviet defenses and the downing of Korean Air Lines Flight 007 on September 1, 1983. So as Soviet leaders monitored the exercise and considered the current climate, they put one and one together. Able Archer, according to Soviet leadership at least, must have been a cover for a genuine surprise attack planned by the U.S., then led by a president possibly insane enough to do it." Fortunately, when the military exercise ended, so did Soviet fears that an attack was imminent.
Businesses

Amazon Lawsuit Aims To Kill Fake Reviews (theguardian.com) 125

Mark Wilson writes with a story at Beta News (relying on this report at The Guardian) that Amazon is suing more than 1,000 fake reviewers for their misleading, paid-for reviews: The ability to read reviews of products before making a purchase is one of the great advantages of online shopping. But how do you know that what you're reading is a genuine review and not just glowing praise planted by the seller or manufacturer? Fake reviews are a serious problem, and Amazon is trying to do something about it. The retail giant has filed a lawsuit against 1,114 individuals for writing 'false, misleading, and inauthentic' reviews. Amazon says that the fakers are tarnishing its reputation, and the attempt to clean up the site is something that will be welcomed by consumers. From the Guardian's version of the story: Amazon said there had been misleading five-star reviews and comments about products, such as: “This has lit up my life” about a USB cable. A bogus comment said “definitely buying more I was impressed with how bright the lights on the cable are”, while another reviewer gave a product top marks and added the comment “cool charger”. Amazon is not suing Fiverr, a startup that raised $30m from investors last year, as the company says in its terms and conditions that advertising for services such as writing bogus reviews is banned.
Google

The Difficulty In Getting a Machine To Forget Anything 79

An anonymous reader writes: When personal information ends up in the analytical whirlpool of big data, it almost inevitably becomes orphaned from any permissions framework that the discloser granted for its original use; machine learning systems, commercial and otherwise, end up deriving properties and models from the data until the replication, duplication and derivation of that data can never hoped to be controlled or 'called back' by the originator. But researchers now propose a revision which can be imposed upon existing machine-learning frameworks, interposing a 'summation' layer between user data and the learning system, effectively tokenising the information without anonymising it, and providing an auditable path whereby withdrawal of the user information would ripple through all iterations of systems which have utilized it — genuine 'cancellation' of data.
Windows

Microsoft Confirms It Won't Offer Free Windows 10 Upgrades To Pirates 214

An anonymous reader writes: If it sounds too good to be true, then it probably is. All that talk about pirates getting free Windows 10 upgrades? Not happening. For genuine users, the free upgrade to Windows 10 means receiving "ongoing Windows innovation and security updates for free, for the supported lifetime of that device." Terry Myerson, Microsoft's executive vice president of operating systems, has clarified the company's plans were not changing for non-genuine users: "Microsoft and our OEM partners know that many consumers are unwitting victims of piracy, and with Windows 10, we would like all of our customers to move forward with us together. While our free offer to upgrade to Windows 10 will not apply to Non-Genuine Windows devices, and as we've always done, we will continue to offer Windows 10 to customers running devices in a Non-Genuine state."
Piracy

Microsoft Says Free Windows 10 Upgrades For Pirates Will Be Unsupported 193

An anonymous reader writes with this story about some of the fine print to Microsoft's offer of Windows 10 upgrades to pirates. "When Microsoft confirmed it will offer free Windows 10 upgrades to pirates worldwide, many were shocked. VentureBeat has been trying to get more details from the company, which disclosed today that after PCs with pirated copies of Windows 7 and Windows 8.1 are upgraded to Windows 10, they will remain in a 'non-genuine' status and Microsoft will not support them. 'With Windows 10, although non-genuine PCs may be able to upgrade to Windows 10, the upgrade will not change the genuine state of the license,' a Microsoft spokesperson told VentureBeat. 'Non-genuine Windows is not published by Microsoft. It is not properly licensed or supported by Microsoft or a trusted partner. If a device was considered non-genuine or mislicensed prior to the upgrade, that device will continue to be considered non-genuine or mislicensed after the upgrade. According to industry experts, use of pirated software, including Non-genuine Windows, results in a higher risk of malware, fraud — identity theft, credit card theft, etc. — public exposure of your personal information, and a higher risk for poor performance or feature malfunctions.' Yet this doesn't provide enough answers. After a pirate upgrades to Windows 10 for free, does this 'non-genuine' version expire and become unusable after a certain period of time? Does no support mean no security updates for pirates?"
Classic Games (Games)

"Descent" Goes For a Crowdfunding Reboot (and a Linux Version) 149

New submitter boll writes A bunch of Star Citizen alumns have taken it upon themselves to resurrect the hit game franchise Descent, backed by a Kickstarter campaign. If you are a semi-oldtimer on the PC gaming scene, you may fondly remember how the original Descent was among the first to provide 6 genuine degrees of freedom during intense late night LAN gaming sessions." Reader elfindreams adds: It will be released as a PC/Mac/Linux game and will include a single player campaign and multiplayer with up to 64 combatants on a map! They are working with a number of members of the current D1/D2 community to make sure the flight/gameplay feels "old school" and they are updating the technology and game to a new generation.
AI

Lyft CEO: Self-Driving Cars Aren't the Future 451

Nerval's Lobster writes Google, Tesla, Mercedes and others are working hard to build the best self-driving car. But will anyone actually buy them? In a Q&A session at this year's South by Southwest, Lyft CEO Logan Green insisted the answer is "No." But does Green truly believe in this vision, or is he driven (so to speak) by other motivations? It's possible that Green's stance on self-driving cars has to do more with Uber's decision to aggressively fund research into that technology. Uber CEO Travis Kalanick announcing that self-driving cars were the future was something that greatly upset many Uber drivers, and Green may see that spasm of anger as an opportunity to differentiate Lyft in the hearts and minds of the drivers who work for his service. Whether or not Green's vision is genuine, we won't know the outcome for several more years, considering the probable timeframes before self-driving cars hit the road... if ever.
Piracy

Microsoft Offers Pirates Amnesty and Free Windows 10 Upgrades 322

An anonymous reader writes: Microsoft will make Windows 10 available as a free upgrade even to pirated copies of other Windows operating systems in China. Terry Myerson of Microsoft's operating systems unit made the announcement at the WinHEC technology conference in Shenzhen, China, and then told Reuters, "We are upgrading all qualified PCs, genuine and non-genuine, to Windows 10." Microsoft has a history of attempting to tackle massive and rising software piracy rates in Asia and developing countries, and periodically offers low-cost "licence amnesties" to the worst-offending countries, such as Indonesia and Kenya. Update: 03/18 14:59 GMT by S : Microsoft has clarified that the free upgrade will be offered for unlicensed copies of Windows worldwide, not just in China.
Android

Who's Afraid of Android Fragmentation? 136

Nerval's Lobster writes: The dreaded term "fragmentation" has been applied to Android more times than anyone can count over the past half-decade. That's part of the reason why game developers often build for iOS before Android, even though Android offers a bigger potential customer base worldwide, and more types of gaming experiences. Fortunately, new sets of tools allow game developers to build for one platform and port their work (fairly) easily to another. "We've done simultaneously because it is such a simple case of swapping out the textures and also hooking up different APIs for scores and achievements," London-based indie developer Tom Vian told Dice. "I've heard that iOS is a better platform to launch on first, but there's no sense for us in waiting when we can spend half a day and get it up and running." So is fragmentation an overhyped roadblock, or is it a genuine problem for developers who work in mobile?
Social Networks

An Evidence-Based Approach To Online Dating 286

HughPickens.com writes Rachel Nuwer writes in the NYT that Dr. Sameer Chaudhry's online dating persona was garnering no response from the women he reached out to so he synthesized 86 literature studies on the subject of online dating in the fields of psychology, sociology, and computer, behavioral, and neurocognitive sciences.in hopes of improving his odds. As it turns out, success begins with picking a user name. While men are drawn to names linked to physical traits (e.g., Cutie), the researchers found, women prefer ones that indicate intelligence (e.g., Cultured). Both sexes respond well to playful names (e.g. Fun2bwith) and shy away from ones with negative connotations (e.g., Bugg). User names that begin with letters from the first half of the alphabet do better than those from the latter half. "As human beings, we have a tendency to give things at the top of a pile more value," says Khan. As for your profile photo, pick a photo with a genuine smile, one that crinkles the eyes, and with a slight head tilt (it's linked to attractiveness). And if you're looking for a male partner, go for that photo of you in siren red—a color that enhances men's attraction to women. "For those attracted to browse into the profile, a description of personal traits increased likeability when it: showed who the dater was and what they were looking for in a 70:30 ratio; stayed close to reality; and employed simple language with humor added. Invitations were most successful in obtaining a response from the potential date when they: were short personalized messages addressing a trait in their profile; rhymed with their screen name or headline message; and extended genuine compliments." And finally, don't wait too long before arranging a face to face meeting.
Crime

Silk Road Case: Prosecution Reads Alleged Transcript of DPR Arranging 5 Murders 73

New submitter BenBoy points out an article at Wired about the most recent developments in the trial of Ross Ulbricht, alleged to be the man behind the Silk Road digital black market, going by the alias Dread Pirate Roberts. The prosecution has now rested its case, but one of their last presentations was a series of communications between DPR and a supposed member of the Hell's Angels motorcycle club in which he arranged for hitmen to kill five different people. Wired notes, Ulbricht, who the prosecutors have sought to prove is that Dread Pirate Roberts, hasn't been charged with murder-for-hire in his Southern District of New York case, though he faces charges that include conspiracies to sell narcotics, launder money and more. (He does, however, face murder-for-hire charges in a separate case in Baltimore.) In fact, the prosecution admitted in court that the purported victims of the Silk Road killings were never found, and that Canadian police couldn't even locate records for anyone with their names. ... Even so, the prosecution took pains to read the entire conversation to the jury because it’s intended to show them the darkest side of the Silk Road’s short history. If genuine, the transcript shows that members of the Hell's Angels organization are familiar with using encryption to shield their communications from law enforcement. Forbes has a detailed update on how the rest of the case has progressed, and Ars has a brief article on today's closing arguments.
Input Devices

Ask Slashdot: Where Can You Get a Good 3-Button Mouse Today? 431

guises writes Ever since mouse wheels were introduced the middle mouse button has been sidelined to an inadequate click-wheel function, or in some cases ditched altogether. This has never sat well with me, a proper middle button is invaluable for pasting, games, and navigation. More than that, my hand categorically rejects two button mice — the dangling ring finger causes me genuine physical discomfort. I have begged Logitech on multiple occasions to make just one, among their many screwy specialty mice, to replace the Mouseman which I loved so dearly. I thought for a moment that I had been answered with the g600, only to find that they had put the right mouse button in the middle.

So my question to Slashdot is: where does a person turn for a three button mouse these days? I've only found two, both ergonomic and priced accordingly. I use the Contour and like the shape and wheel position, but would love to find something wireless and with a higher DPI sensor.
Communications

Your High School Wants You To Install Snapchat 157

Bennett Haselton writes: They would never admit it, but your high school admins would probably breathe a sigh of relief if all of their sexting-mad students would go ahead and install Snapchat so that evidence of (sometimes) illegal sexting would disappear into the ether. They can't recommend that you do this, because it would sound like an implicit endorsement, just like they can't recommend designated drivers for teen drinking parties -- but it's a good bet they would be grateful. Read on for the rest.
The Internet

TripAdvisor Fined In Italy For Fake Reviews 88

mpicpp writes with news that TripAdvisor, a travel website filled with user-generated reviews, has been hit with a €500,000 ($611,000) fine for "misleading customers" by failing to cull fake reviews from their list. "The regulator complained that people reading TripAdvisor Italy were unable to distinguish between genuine and fake reviews posted on the site. It said both were presented by TripAdvisor as 'authentic and genuine in nature.' Demanding payment of the fine within 30 days, the ICA also accused the travel company of failing to provide proper checks to weed out bogus postings."
DRM

Keurig 2.0 Genuine K-Cup Spoofing Vulnerability 270

An anonymous reader writes A security researcher has released a humorous vulnerability description for the Keurig 2.0 coffee maker, which includes DRM designed to only brew Keurig brand coffe pods (K-Cups): "Keurig 2.0 Coffee Maker contains a vulnerability in which the authenticity of coffee pods, known as K-Cups, uses weak verification methods, which are subject to a spoofing attack through re-use of a previously verified K-Cup." The vulnerability description even includes mitigating controls, such as keeping the Keurig in a locked cabinet when not in use. Also at Hackaday.

Slashdot Top Deals