Robotics

In a Crash, Should Self-Driving Cars Save Passengers or Pedestrians? 2 Million People Weigh In (pbs.org) 535

In what is referred to as the "Moral Machine Experiment", a survey of more than two million people from nearly every country on the planet, people preferred to save humans over animals, young over old, and more people over fewer. From a report: Since 2016, scientists have posed this scenario to folks around the world through the "Moral Machine," an online platform hosted by the Massachusetts Institute of Technology that gauges how humans respond to ethical decisions made by artificial intelligence. On Wednesday, the team behind the Moral Machine released responses from more than two million people spanning 233 countries, dependencies and territories. They found a few universal decisions -- for instance, respondents preferred to save a person over an animal, and young people over older people -- but other responses differed by regional cultures and economic status.

The study's findings offer clues on how to ethically program driverless vehicles based on regional preferences, but the study also highlights underlying diversity issues in the tech industry -- namely that it leaves out voices in the developing world. The Moral Machine uses a quiz to give participants randomly generated sets of 13 questions. Each scenario has two choices: You save the car's passengers or you save the pedestrians. However, the characteristics of the passengers and pedestrians varied randomly -- including by gender, age, social status and physical fitness. What they found: The researchers identified three relatively universal preferences. On average, people wanted: to spare human lives over animals, save more lives over fewer, prioritize young people over old ones. When respondents' preferences did differ, they were highly correlated to cultural and economic differences between countries. For instance, people who were more tolerant of illegal jaywalking tended to be from countries with weaker governance, nations who had a large cultural distance from the U.S. and places that do not value individualism as highly. These distinct cultural preferences could dictate whether a jaywalking pedestrian deserves the same protection as pedestrians crossing the road legally in the event they're hit by a self-driving car.
Further reading: The study; and MIT Technology Review.
Space

China Produces Nano Fibre That Can Lift 160 Elephants - and a Space Elevator? (nzherald.co.nz) 240

Slashdot reader hackingbear quotes the NZ Herald: A research team from Tsinghua University in Beijing has developed a fibre they say is so strong it could even be used to build an elevator to space. They say just 1 cubic centimeter of the fibre — made from carbon nanotube — would not break under the weight of 160 elephants, or more than 800 tonnes. And that tiny piece of cable would weigh just 1.6 grams... The Chinese team has developed a new "ultralong" fibre from carbon nanotube that they say is stronger than anything seen before, patenting the technology and publishing part of their research in the journal Nature Nanotechnology earlier this year...

The space elevator idea has remained in the realm of sci-fi, physical and mathematical models because there has been no material strong enough to make the super-light, ultra-strong cables needed... Now, the Tsinghua team, led by Wei Fei, a professor with the Department of Chemical Engineering, says their latest carbon nanotube fibre has tensile strength of 80 gigapascals [over ten times more than the 7 gigapascals strenth NASA estimated to be required for a space elevator]... Chinese and Russian space scientists, for instance, are working together to find a safe, effective way to lower a fine, feather-light cable from a high-altitude orbit to the ground.

Wei also said his team was trying to get the carbon nanotube fibre into mass production for use in defense -- or to create super fast flywheels in a mechanical battery, which would have 40 times the energy density of a lithium battery.
Bitcoin

Coinbase Lets You Buy and Sell USDC Stablecoin (techcrunch.com) 53

An anonymous reader quotes a report from TechCrunch: A few weeks after Circle announced the launch of USD Coin (or USDC for short), Coinbase also announced that customers can now buy, sell, send and receive USDC on Coinbase. A USDC is a token that is worth exactly 1 USD. Its value is going to stay stable against USD -- hence the name stablecoin for this type of coins. Unlike traditional cryptocurrencies, you can be sure that the value of your USDC wallet isn't going to fluctuate like crazy. It opens up new possibilities and use cases.

While Coinbase lets you hold USD in your Coinbase account, this isn't safe. If somebody hacks into your account, you could end up with an empty wallet. That's why you should always try to control the keys of your wallet and transfer your coins to a safer wallet, such as a Ledger wallet or at least a software solution like MyEtherWallet. But if you want to short cryptocurrencies without sending your USD back to your bank account, you can now convert your tokens to USDC. This way, it'll be easier to buy cryptocurrencies again in the future. And maybe you can avoid paying taxes by hiding your tokens from taxation authorities
USDC is an ERC-20 token that leverages the Ethereum blockchain and ecosystem. In an effort to regulate USDC, Circle, Coinbase and others have created the CENTRE consortium to define the policies around stablecoins. "For instance, if you want to handle stablecoins on your exchange, you need to send regular audited reports that prove that you have as many USD sitting on a bank account as issued tokens," reports TechCrunch.
Programming

SQLite Adopts 'Monastic' Code of Conduct (sqlite.org) 653

An anonymous reader writes: Undoubtedly in response to this politically motivated sort of claptrap, SQLite has released their own Code of Conduct. From the preamble:

Having been encouraged by clients to adopt a written code of conduct, the SQLite developers elected to govern their interactions with each other, with their clients, and with the larger SQLite user community in accordance with the "instruments of good works" from chapter 4 of The Rule of St. Benedict. This code of conduct has proven its mettle in thousands of diverse communities for over 1,500 years, and has served as a baseline for many civil law codes since the time of Charlemagne.

Not everyone has found SQLite's attempt informative or funny (though many did). A developer wrote, for instance, "So is the SQLite CoC thing a joke or not? If it's not a joke, f*ck this. If it is a joke, that's even worse. Your CoC should be taken seriously." A security researcher, chimed in, "This sort of stunt will make actual code of conduct discussions harder. It's not funny, helpful, or wise."


Communications

How the Finnish Survive Without Small Talk (bbc.com) 283

An anonymous reader quotes a report from the BBC: Finnish people often forgo the conversational niceties that are hard-baked into other cultures, and typically don't see the need to meet foreign colleagues, tourists and friends in the middle. As Tiina Latvala, a former English instructor in Sodankyla, Lapland, explained, part of her job was to introduce her young students to the concept of small talk. "We had a practice where you had to pretend to meet someone for the first time," Latvala said. "You had to pretend you were meeting at the cafe or on a bus and [that] you didn't know each other and do a bit of chit chat. We had written on the whiteboard all the safe topics so they didn't have to struggle with coming up with something to talk about. We brainstormed. They usually found it really difficult."

"[They're] about basic conversation," she explained. "The answers are already there. We are taught to answer 'I'm great, how about you?'; 'How is your mum?'. It was very clear how to be in a conversation, as if we didn't already know. It was very weird as if there were right answers to the questions." There are more hypotheses than answers for why Finnish culture has a veil of silence permanently stitched in place. Latvala believes their trademark directness has something to do with the complexity of the Finnish language and the fairly large distance between cities (Latvala's reasoning: If you've travelled any distance to see someone, why waste time?). [...] It isn't for lack of skill, for Finland has two national languages -- Finnish and Swedish -- and Finns begin English lessons when they're six or seven. But rather it's because when faced with expressing themselves in second (or third) language, many often choose to not say anything rather than risk not being fully understood. However, when among their own, silence functions as an extension of comfortable conversation.
"'It's not about the structure or features of the language, but rather the ways in which people use the language to do things,' Dr Anna Vatanen, a researcher at the University of Oulu, explained via email. 'For instance, the 'how are you?' question that is most often placed in the very beginning of an encounter. In English-speaking countries, it is mostly used just as a greeting and no serious answer is expected to it. On the contrary, the Finnish counterpart (Mita kuuluu?) can expect a 'real' answer after it: quite often the person responding to the question starts to tell how his or her life really is at the moment, what's new, how they have been doing.'"
Open Source

Software Freedom Conservancy Shares Thoughts on Microsoft Joining Open Invention Network's Patent Non-Aggression Pact (sfconservancy.org) 66

Earlier this week, Microsoft announced that it was joining the open-source patent consortium Open Invention Network (OIN). The press release the two shared this week was short on details on how the two organizations intend to work together and what does the move mean to, for instance, the billions of dollars Microsoft earns each year from its Android patents (since Google is a member of OIN, too.) Software Freedom Conservancy (SFC), a non-profit organization that promotes open-source software, has weighed in on the subject: While [this week's] announcement is a step forward, we call on Microsoft to make this just the beginning of their efforts to stop their patent aggression efforts against the software freedom community. The OIN patent non-aggression pact is governed by something called the Linux System Definition. This is the most important component of the OIN non-aggression pact, because it's often surprising what is not included in that Definition especially when compared with Microsoft's patent aggression activities. Most importantly, the non-aggression pact only applies to the upstream versions of software, including Linux itself.

We know that Microsoft has done patent troll shakedowns in the past on Linux products related to the exfat filesystem. While we at Conservancy were successful in getting the code that implements exfat for Linux released under GPL (by Samsung), that code has not been upstreamed into Linux. So, Microsoft has not included any patents they might hold on exfat into the patent non-aggression pact.

We now ask Microsoft, as a sign of good faith and to confirm its intention to end all patent aggression against Linux and its users, to now submit to upstream the exfat code themselves under GPLv2-or-later. This would provide two important protections to Linux users regarding exfat: (a) it would include any patents that read on exfat as part of OIN's non-aggression pact while Microsoft participates in OIN, and (b) it would provide the various benefits that GPLv2-or-later provides regarding patents, including an implied patent license and those protections provided by GPLv2 (and possibly other GPL protections and assurances as well).

Medicine

Scientists Are Getting Seriously Worried About Synthetic Smallpox (sciencealert.com) 93

An anonymous reader quotes ScienceAlert: Earlier this year, scientists published a paper describing how they pieced together segments of DNA in order to bring back a previously eradicated virus called horsepox. The paper, written by two University of Alberta researchers and the co-founder of a New York pharmaceutical company, was controversial because, as various experts told the magazine Science, someone could use a very similar process to bring back a related virus: smallpox. Smallpox, you'll recall, killed hundreds of millions of people before the World Health Organization declared it eradicated in 1980. That was the result of a long vaccination campaign — so the idea of piecing the virus back together from bits of DNA raises the specter of a horrifying pandemic.

Two journals rejected the paper before PLOS One, an open access peer-reviewed journal, published it. Critics argue that the paper not only demonstrates that you can synthesize a deadly pathogen for what Science reported was about US$100,000 in lab expenses, but even provides a slightly-too-detailed-for-comfort overview of how to do it. Some of the horsepox scientists' coworkers are still pretty upset about this. PLOS One's sister Journal, PLOS Pathogens, just published three opinion pieces about the whole flap, as well as a rebuttal by the Canadian professors. Overall, everyone's pretty polite. But you get the sense that microbiologists are really, really worried about someone reviving smallpox. MIT biochemist Kevin Esvelt, for instance, wrote on Thursday that the threat is so grim that we shouldn't even talk about it.

Iphone

Cops Told 'Don't Look' at New iPhones To Avoid Face ID Lock-Out (vice.com) 84

As Apple continues to update its iPhones with new security features, law enforcement and other investigators are constantly playing catch-up, trying to find the best way to circumvent the protections or to grab evidence. From a report: Last month, Forbes reported the first known instance of a search warrant being used to unlock a suspect's iPhone X with their own face, leveraging the iPhone X's Face ID feature. But Face ID can of course also work against law enforcement -- too many failed attempts with the 'wrong' face can force the iPhone to request a potentially harder to obtain passcode instead. Taking advantage of legal differences in how passcodes are protected, US law enforcement have forced people to unlock their devices with not just their face but their fingerprints too. But still, in a set of presentation slides obtained by Motherboard this week, one company specialising in mobile forensics is telling investigators not to even look at phones with Face ID, because they might accidentally trigger this mechanism.

"iPhone X: don't look at the screen, or else... The same thing will occur as happened on Apple's event," the slide, from forensics company Elcomsoft, reads. Motherboard obtained the presentation from a non-Elcomsoft source, and the company subsequently confirmed its veracity. The slide is referring to Apple's 2017 presentation of Face ID, in which Craig Federighi, Apple's senior vice president of software engineering, tried, and failed, to unlock an iPhone X with his own face. The phone then asked for a passcode instead. "This is quite simple. Passcode is required after five unsuccessful attempts to match a face," Vladimir Katalov, CEO of Elcomsoft, told Motherboard in an online chat, pointing to Apple's own documentation on Face ID. "So by looking into suspect's phone, [the] investigator immediately lose one of [the] attempts."

Medicine

Humans Having Sex With Neanderthals Gave Us Protection Against Ancient Epidemics (sciencealert.com) 202

An anonymous reader quotes a report from ScienceAlert: A new study argues that we have Neanderthals to thank for helping us cope with the viral tides we encountered as we marched around the globe. Stanford University researchers have identified DNA sequences that evolved in our ancient cousins can produce antivirus proteins, which more than likely gave some human populations the edge they needed to survive. Roughly 1 percent of our genome's coding was written in Neanderthal populations. But this is a broad average -- many families with African ancestry have zero, for instance, while other populations boast as much as 2 percent or more. So the question is how much of this difference comes down to the random drift of DNA being passed on around the globe, and how much is due to natural selection giving those with Neanderthal genes an advantage?

To build a case one way or another, the Stanford researchers put together a list of just over 4,500 virus-interacting proteins (VIP) made by our genome. These were all matched against a database of Neanderthal DNA that could be found in modern East Asian and European human populations, providing 152 VIP genes shared by both groups of human. Interestingly, all of these VIP genes were of a variety that interacted with RNA viruses -- pathogens that include influenza A, hepatitis C, and HIV. This isn't to say these viruses were problems for ancient humans, but rather that similar RNA viruses were more than likely prevalent enough to shape our evolution. The discovery supports a view of genetic exchange described as the 'poison-antidote' model.

Iphone

iPhone XS Passcode Bypass Hack Exposes Contacts, Photos (threatpost.com) 23

secwatcher shares a report from Threatpost: A passcode bypass vulnerability in Apple's new iOS version 12 could allow an attacker to access photos and contacts (including phone numbers and emails) on a locked iPhone. The hack allows someone with physical access to a vulnerable iPhone to sidestep the passcode authorization screen on iPhones running Apple's latest iOS 12 beta and iOS 12 operating systems. Threatpost was tipped off to the bypass by Jose Rodriguez, who describes himself as an Apple enthusiast and "office clerk" based in Spain who has also found previous iPhone hacks.

Rodriguez posted a video of the bypass on his YouTube channel under the YouTube account Videosdebarraquito, where he walks viewers through a complicated 37-step bypass process in Spanish. Threatpost has independently confirmed that the bypass works on a number of different iPhone models including Apple's newest model iPhone XS. The process involves tricking Siri and Apple's accessibility feature in iOS called VoiceOver to sidestep the device's passcode. The attack works provided the attacker has physical access to a device that has Siri enabled and Face ID either turned off or physically covered (by tape, for instance).

Google

Google Defends Gmail Data Sharing, Gives Few Details on Violations (reuters.com) 26

Google defended how it polices third-party add-ons for Gmail in a letter to U.S. senators made public on Thursday, saying that upfront review catches the "majority" of bad actors. A report adds: Google said it uses automated scans and reports from security researchers to monitor third parties with access to Gmail data, but gave no details on how many add-ons have been caught violating its policies. Google's privacy practices have been under growing scrutiny. The Senate Commerce Committee has a hearing scheduled for Sept. 26 to question Google, Apple, AT&T, Twitter about their consumer data privacy practices. Gmail, the Google email service used by 1.4 billion people, enables add-on developers access to users' emails and the ability to share that data with other parties as "long as they are transparent" with users about how they are using data and get consent, Google said in the letter. For instance, a program that logs receipts could be allowed to scan Gmail as it searches for receipts.
Crime

Man Jailed For Hundreds of Fake TripAdvisor Reviews (tripadvisor.com) 59

An Italian man was sentenced to nine months in jail for selling fake reviews on TripAdvisor to several hundred businesses. He'll also be fined 8,000 euros (about $9,300).

TripAdvisor had threatened businesses with a red badge icon warning travelers thatreviews had been manipulated, after which "several businesses were willing to share information to support TripAdvisor's investigations." From TripAdvisor's Insights blog:
Back in 2015, our dedicated team of fraud investigators identified a new illegal business in Italy called PromoSalento that was offering to write fake reviews for hospitality businesses... PromoSalento attempted to avoid our scrutiny by regularly changing their usernames and email addresses, but our fraud detection processes use a suite of advanced technologies to evaluate hundreds of review attributes such as IP addresses, browser types and even the screen resolution of a reviewer's device. Based on that analysis, we were able to see a trail of digital and behavioral 'breadcrumbs' that led our team straight back to PromoSalento....

Writing fake reviews on TripAdvisor has always been a violation of the law in many jurisdictions, for instance falling under the EU Unfair Commercial Practices Directive, as well as national laws relating to consumer protection, fraud and false advertising. However, this is the first time we have seen the laws being enforced to the point of securing a criminal conviction.

"As many as 16 percent of online reviews are fake, according to research by the European Parliament," reports CBS News. Yet they add that when it comes to accountability and consumer safety, many Americans believe online reviews are more effective than government oversight.
Iphone

Is Apple's 3D Touch a 'Huge Waste' of Engineering Talent? 99

Three years ago, Apple introduced 3D Touch for the iPhone 6s and 6s Plus, a pressure-sensitive feature that uses capacitive sensors integrated into the smartphone's display to sense three degrees of pressure in a user's touch and respond differently based on the amount of pressure exerted. It's a neat idea as it has allowed users to interact with the user interface in a completely new way. Now, with the release of the new iPhone XR, Apple seems to be on the way to phasing it out. The Verge reports: While both the new iPhone XS and XS Max include 3D Touch, Apple has chosen not to include the feature on the iPhone XR. Yes, that phone is cheaper, and Apple had to strip out some features, but 3D Touch has been included on iPhones in that price range since it was introduced not too long ago, so this feels less like necessary cost savings and more like planned omission. There have always been a few core problems with 3D Touch. For one, its use often amounted to the right click of a mouse, which is funny coming from the company that famously refused to put a dedicated right button on its mice or trackpads. And selecting from those right click options was rarely faster or a substantially more useful way of getting something done than just tapping the button and manually navigating to where you needed to go. People also didn't know the feature was there. The iPhone did little to train users on 3D Touch. And even the people who knew it was there had no way to tell which icons supported it without just 3D pressing everything to see what happened.

Apple isn't entirely removing the concept of 3D Touch from the iPhone XR. Instead, the phone will include something Apple is calling Haptic Touch, which will make a click when you activate a button's secondary feature by pressing and holding it. But that replacement underscores just how useless 3D Touch has really become: it's not more than a very, very fancy long press. That's something phones have always been capable of. And despite the name, I've found long press features to be faster and easier to use than their 3D Touch equivalent. Instagram, for instance, lets you preview photos with a 3D Touch on the iPhone or a long press on Android. I find the Android version to be simpler and quicker.
Here's what Apple's marketing leader, Phil Schiller, had to say about the feature back in 2015 when it was first introduced: "'Engineering-wise, the hardware to build a display that does what [3D Touch] does is unbelievably hard,' says Schiller. 'And we're going to waste a whole year of engineering -- really, two -- at a tremendous amount of cost and investment in manufacturing if it doesn't do something that [people] are going to use. If it's just a demo feature and a month later nobody is really using it, this is a huge waste of engineering talent.'"
Apple

Apple Watch Series 4 Includes a Bigger Display, ECG Support, and 64-Bit S4 Chip (9to5mac.com) 172

Apple has unveiled its next-generation Apple Watch Series 4 smartwatch, featuring a larger display with smaller bezels, a 64-bit processor that's twice as fast as the previous generation, and electrocardiography (ECG) support. 9to5Mac reports: In terms of hardware, the Digital Crown has been completely reengineered with haptic feedback. For instance, as you flip through content in the Podcast application. The speaker is also over 50 percent louder, according to [Apple COO Jeff Williams]. As we reported earlier this week, the Apple Watch Series 4 uses a new 64-bit processor that offers performance up to two times faster performance. There's also a next-generation accelerometer gyroscope, which Williams says allows Apple Watch to detect a fall. When a fall is detected, Apple Watch will send an alert prompting you to call emergency services. If it senses you are immobile for more than 1 minute, the call will be started automatically.

As for heart features, Apple Watch is now capable of detecting a low rate. The device will also now screen your heart rhythm, allowing it to detect atrial fibrillation. As expected, Apple Watch Series 4 also now supports ECG -- which measures the electrical activity of the heart. With Apple Watch, you can take an ECG directly on the Apple Watch by putting your finger directly on the digital crown. The feature -- as well as irregular heart rate detection -- has received FDA clearance. Williams says that all health and fitness is encrypted on-device and in the cloud. Battery life on Apple Watch Series 4 is the same, 18-hours as before. Outdoor workout time is now 6 hours.
In terms of pricing and colors, the Apple Watch Series 4 will start at $399 for the GPS model and $499 for the cellular model, with preorders starting September 14th. The aluminum model will feature space gray, silver, and black color configurations, while the stainless steel model will feature gold, polished black, and space black color configurations.
AI

Researchers Come Out With Yet Another Unnerving, New Deepfake Method (gizmodo.com) 54

Researchers at Carnegie Mellon University have figured out a new method to create deepfakes -- videos that make it look like someone said or did something they didn't say or do. They're usually manipulated using machine learning and have been a big problem for porn sites, as they can be used to create fake celebrity pornographic videos or revenge porn. According to Gizmodo, the researchers "have figured out a way to automatically transfer the 'style' of one person to another." From the report: "For instance, Barack Obama's style can be transformed into Donald Trump," the researchers wrote in the description of a YouTube video highlighting the outcome of this method. The video shows the facial expressions of John Oliver transferred to both Stephen Colbert and an animated frog, from Martin Luther King, Jr. to Obama, and from Obama to Trump. The researchers describe the process in a paper as an "unsupervised data-driven approach." Like other methods of developing deepfakes, this one uses artificial intelligence. The paper doesn't exclusively deal in translating talking style and facial movements from one human to another -- it also includes examples with blooming flowers, sunrises and sunsets, and clouds and wind.

For the person-to-person deepfakes, the researchers cite examples of how certain mannerisms can be transferred, including "John Oliver's dimple while smiling, the shape of mouth characteristic of Donald Trump, and the facial mouth lines and smile of Stephen Colbert." The team used videos available to the public to develop these deepfakes. It's easy to see how these techniques might be applied in a more innocuous way...

Privacy

Free Municipal Wi-Fi May Be the Next Front In the War Against Privacy (theintercept.com) 76

TuballoyThunder writes: According to The Intercept, it appears that the LinkNYC free Wi-Fi might be designed to track users. This and other concerns were raised during a 2015 discussion on Slashdot. While many people are comfortable in trading their privacy for ostensibly free services, it is disheartening when municipalities collaborate with business to make it happen. "In May of this year, Charles Meyers, an undergraduate at New York City College of Technology, came across folders in LinkNYC's public library on GitHub, a platform for managing files and software, that appear to raise further questions about location tracking and the platform's protection of its users' data," reports The Intercept. "Meyers made copies of the codebases in question -- 'LinkNYC Mobile Observation' and 'RxLocation' -- and shared both folders with The Intercept."

Meyers says the "LinkNYC Mobile Observation" code collects the user's longitude and latitude, browser type, OS, device type, device identifiers, and full URL clickstreams (including data and time) and "aggregates this information into a database," the report says. Meyer's believes the company is interested in tracking the location of Wi-Fi users in real time. "If such code were run on a mobile app or kiosk, he said, the company would be able to make advertisements available in real time based on where and who someone was, and that this would constitute a potential violation of the company's privacy policy," reports The Intercept.

Following the revelations, LinkNYC said the code was never intended to be released and was part of a longer-term R&D process. "In this instance, David Mitchell, Intersection's CTO, told the Intercept in an email. "Intersection was prototyping and testing some ideas internally, using employee data only, and mistakenly made source code public on Github. This code is not in use on the LinkNYC network." [Intersection is the "key player" in CityBridge, "a chameleon-like consortium of private companies" that New York City contracted to turn the city's payphone booth network into Wi-Fi-enabled kiosks.]
Verizon

FCC Criticized For Surrendering Power To Punish Verizon After Firefighters Got Throttled During Wildfire (gizmodo.com) 161

Democratic lawmakers on Wednesday criticized the FCC on its response to Verizon's throttling of firefighters' data speeds as they battled a major wildfire in Northern California. "In a letter Friday, Senator Edward Markey and Congresswoman Anna Eshoo demanded answers from the FCC over what steps it is currently taking to address 'critical threats to public safety,' citing its decision to repeal Obama-era net neutrality protections," reports Gizmodo. From the report: The 2015 Open Internet Order -- overturned by the FCC's Republican majority last winter -- reclassified internet providers like Verizon as common carriers under Title II of the Federal Communications Act, granting the FCC regulatory authority that, in this instance, would have allowed the commission to investigate and potential penalize Verizon for its decision. At Chairman Ajit Pai's direction, the commission abdicated that authority this year. It no longer has the power to establish rules prohibiting Verizon from throttling emergency services, or charging police and fire departments additional fees to maintain their communications at optimal speeds when usage peaks -- say, during a wildfire, or an earthquake, or a mass shooting.

"The FCC has incorrectly suggested that the Federal Trade Commission (FTC) could sufficiently fill this void," wrote Markey and Eschoo, whose congressional districting includes portions of Santa Clara. "We strongly disagree with that assertion." In their letter, the Democratic lawmakers urged the FCC to make use of its Public Safety and Homeland Security Bureau and investigate the matter, saying that while the FTC may find Verizon's actions exemplify an "unfair and deceptive practice," both agencies should use "all of the tools available" to resolve this public safety matter. "To do nothing is unacceptable," they said.

Cloud

Is Amazon Rigging the Bidding For Massive Government Contracts? (vanityfair.com) 128

SpzToid quotes Vanity Fair: The controversy involves a plan to move all of the Defense Department's data -- classified and unclassified -- on to the cloud. The information is currently strewn across some 400 centers, and the Pentagon's top brass believes that consolidating it into one cloud-based system, the way the CIA did in 2013, will make it more secure and accessible. That's why, on July 26, the Defense Department issued a request for proposals called JEDI, short for Joint Enterprise Defense Infrastructure. Whoever winds up landing the winner-take-all contract will be awarded $10 billion -- instantly becoming one of America's biggest federal contractors.

But when JEDI was issued, on the day Congress recessed for the summer, the deal appeared to be rigged in favor of a single provider: Amazon. According to insiders familiar with the 1,375-page request for proposal, the language contains a host of technical stipulations that only Amazon can meet, making it hard for other leading cloud-services providers to win -- or even apply for -- the contract. One provision, for instance, stipulates that bidders must already generate more than $2 billion a year in commercial cloud revenues -- a "bigger is better" requirement that rules out all but a few of Amazon's rivals... Much of the language of JEDI, in fact, seems specifically tailored for Jeff Bezos. "Everybody immediately knew that it was for Amazon," says a rival bidder who asked not to be named. To even make a bid, a provider must maintain a distance of at least 150 miles between its data centers and provide "32 GB of RAM" -- specifications that few providers other than Amazon can meet.

The article also cites last year's "so-called Amazon amendment, a provision buried in a defense authorization bill that will establish Amazon as the go-to portal for every online purchase the government makes -- some $53 billion every year." And it also notes that Amazon employs more than 100 lobbyists in Washington, and "has spent $67 million on lobbying since 2000 -- including more this year than Citigroup, JP Morgan Chase, and Wells Fargo combined."

The article says this controversy may be "a sign of how tech giants and Silicon Valley tycoons will dominate Washington for generations to come."
Operating Systems

Windows 95 Is Now An App You Can Download and Install On macOS, Windows, and Linux (theverge.com) 183

Slack developer Felix Rieseberg has made Windows 95 into an electron app that you can run on macOS, Windows, and Linux. The source code and app installers are available on GitHub. According to The Verge, "apps like Wordpad, phone dialer, MS Paint, and Minesweeper all run like you'd expect," but "Internet Explorer isn't fully functional as it simply refused to load pages." From the report: The app is only 129MB in size and you can download it over at Github for both macOS and Windows. Once it's running it surprisingly only takes up around 200MB of RAM, even when running all of the old Windows 95 system utilities, apps, and games. If you run into any issues with the app you can always reset the Windows 95 instance inside the app and start over again. Enjoy this quirky trip down memory lane.
United States

'Americans Own Less Stuff, and That's Reason To Be Nervous' (bloomberg.com) 554

Bloomberg's Tyler Cowen writes about "the erosion of personal ownership and what that will mean for our loyalties to traditional American concepts of capitalism and private property." An anonymous Slashdot reader shares the report: The main culprits for the change are software and the internet. For instance, Amazon's Kindle and other methods of online reading have revolutionized how Americans consume text. Fifteen years ago, people typically owned the books and magazines they were reading. Much less so now. If you look at the fine print, it turns out that you do not own the books on your Kindle. Amazon.com Inc. does. I do not consider this much of a practical problem. Although Amazon could obliterate the books on my Kindle, this has happened only in a very small number of cases, typically involving account abuse. Still, this licensing of e-books, instead of stacking books on a shelf, has altered our psychological sense of how we connect to what we read -- it is no longer truly "ours."

The change in our relationship with physical objects does not stop there. We used to buy DVDs or video cassettes; now viewers stream movies or TV shows with Netflix. Even the company's disc-mailing service is falling out of favor. Music lovers used to buy compact discs; now Spotify and YouTube are more commonly used to hear our favorite tunes. Each of these changes is beneficial, yet I worry that Americans are, slowly but surely, losing their connection to the idea of private ownership. The nation was based on the notion that property ownership gives individuals a stake in the system. It set Americans apart from feudal peasants, taught us how property rights and incentives operate, and was a kind of training for future entrepreneurship. We're hardly at a point where American property has been abolished, but I am still nervous that we are finding ownership to be so inconvenient.

Slashdot Top Deals