Education

How ITT Tech Screwed Students and Made Millions (gizmodo.com) 334

An anonymous Slashdot reader shares "a grim story about a company that screwed poor people, military veterans, and taxpayers to turn a profit." Gizmodo reports: By the time ITT Technical Institute closed its doors earlier this month, the for-profit college had been selling tenuous diplomas at exorbitant prices for more than 20 years...burying low-income and first-generation students in insurmountable debt, and evading regulators since the early 1990s...
ITT collected $178 million over two years just in federal education funding for veterans -- even while the company projected 33% of its students would ultimately default on their loans -- and last year 70% of the school's total revenue came directly from federal financial aid programs. Gizmodo spoke to one student who "will now spend the rest of his life paying back loans for a degree that is practically useless," after compounding interest turned his $70,000 loan into $200,000 in debt. "Like all of the former students interviewed by Gizmodo, he was placed in a job that did not require professional training" -- specifically, a game-testing position that didn't even require a high school diploma, while ITT "placed" another student in a $5.95-an-hour telemarketing job. Her assessment of ITT? "It was totally worthless."
Programming

W3C Set To Publish HTML 5.1, Work Already Started On HTML 5.2 (softpedia.com) 85

An anonymous reader quotes a report from Softpedia: Members of the World Wide Web Consortium (W3C) are getting ready to launch the HTML 5.1 specification and have already started work on the upcoming HTML 5.2 version since mid-August. The HTML 5.1 standard has been promoted from a "Release Candidate" to a "Proposed Recommendation," the last step before it becomes a "W3C Recommendation," and officially replaces HTML 5 as the current HTML standard. As a Proposed Recommendation, HTML 5.1 is practically locked against major changes, and outside small tweaks here and there, we are currently looking at a 99.99 percent version of the upcoming HTML 5.1 standard. The vote to promote HTML 5.1 from RC to PR was approved in unanimity, a clear sign that major browser makers have reached a general consensus on what the standard should look like, and what they should be implementing in their browsers in upcoming versions. You can read more on HTML 5.1 here, the changes and support table here, and the HTML 5.2 specification draft here.
Facebook

Apple Makes Slight Progress On Diversity While Its Rivals Are Making Practically None (macrumors.com) 241

The workforce at Apple is still predominately white and male, reveals the diversity report the company released Wednesday. But that doesn't mean that its efforts to improve diversity haven't yielded improvements. This is the third year that the Cupertino giant has released its diversity numbers and the balance is improving, although a bit slowly. From a MacRumors report: Its overall workforce, including tech, non-tech, and retail jobs, is 68% male and 32% female as of June 2016, a slight change from a 69%-31% split in 2015. Apple's race and ethnicity breakdown among U.S. employees is 19% Asian, 9% Black, 12% Hispanic, 2% Multiracial, 1% Other, and 56% White, representing a 2 percent increase in White employees and a 1 percent increase in both Asian and Hispanic employees compared to last year's data. Females represent 37% of Apple's global new hires, while U.S. underrepresented minorities represent 27% of global new hires. Apple defines underrepresented minorities as "groups whose representation in tech has been historically low -- Black, Hispanic, Native American, Native Hawaiian, and Other Pacific Islander."Washington Post compares Apple's progress to other Silicon Valley giants, claiming that rest of the industry is mostly sitting idle. (Alternate source: Reuters) From the report: At Facebook, black and Hispanic employees make up 2 and 4 percent of the employee base. Despite commitments to diversity, neither Google nor Facebook have made a dent in those numbers since they first announced them in 2014.
Java

Oracle Says It Is 'Committed' To Java EE 8 -- Amid Claims It Quietly Axed Future Development (theregister.co.uk) 66

Media reports, citing anonymous Oracle engineers, noted earlier this week that development of Java EE (Enterprise Edition) projects at Oracle had been "practically ceased" since last fall. This led many to wonder about the future of Java. Well, it's all cosy, says Oracle. The software firm assures that it is "committed" to Java. The Register reports: The Redwood City titan said it will present fresh plans for the future of Java EE 8 at its JavaOne conference in San Francisco in September. Version eight is due to be released in the first half of 2017. However, over the past six months, it appeared Oracle had pretty much ceased development of the enterprise edition -- a crucial component in hundreds of thousands of business applications -- and instead quietly focused its engineers on other products and projects. Oracle spokesman Mike Moeller tonight sought to allay those fears, and said a plan for the future of Java EE is brewing. "Oracle is committed to Java and has a very well defined proposal for the next version of the Java EE specification -- Java EE 8 -- that will support developers as they seek to build new applications that are designed using micro-services on large-scale distributed computing and container-based environments on the Cloud," said Moeller.
Crime

Istanbul Attack: A Grim Reminder Of Why Airports Are Easy Targets (firstpost.com) 307

An anonymous reader shares a FirstPost article:Even as I write this the echo of gunfire continues at Ataturk International Airport. For reasons that defy logic, Istanbul's main airport has always been seen as a vulnerable target which only underscores the fact that all airports in the world are open to attack and fail-safe is not a viable option. At Ataturk, security is usually high, but the weak underbelly lies in vehicular traffic entering the airport being given cursory checks, pretty much like most airports which is why President Erdogan was able to say this sort of attack could have occurred anywhere. That is true. Airports are easy targets. That even though Turkey was aware of the chinks nothing much was done to up the security levels. If you take Delhi International as a prime example, the access to the terminal is scarcely blockaded and one can reach the entry points with ease, crossing a couple of indolent checkpoints and a roller fence. (Editor's note: the article has been written by an Indian author, and so he uses an Indian airport as an example.) Indian airports are as porous as a sponge. Most of our airports are red-starred which places them in the inadequate category. Add to that the fact that several thousand VIPs are given privileges that make a pudding out of security and it indicates how easy peasy it would be to amble up to the terminal entrance. The weakness primarily lies in the absence of X-Rays and deterrent technology on approach. You practically can check in and get to immigration before being cleared for hazardous material.
Communications

Scientists Amplify Light Using Sound On a Silicon Chip (phys.org) 21

An anonymous reader quotes a report from Phys.Org: Yale scientists have found a way to greatly boost the intensity of light waves on a silicon microchip using the power of sound. Writing in the journal Nature Photonics, a team led by Peter Rakich describes a new waveguide system that harnesses the ability to precisely control the interaction of light and sound waves. "Silicon is the basis for practically all microchip technologies," said Rakich, who is an assistant professor of applied physics and physics at Yale. "The ability to combine both light and sound in silicon permits us to control and process information in new ways that weren't otherwise possible." Rakich said combining the two capabilities "is like giving a UPS driver an amphibious vehicle -- you can find a much more efficient route for delivery when traveling by land or water." "Figuring out how to shape this interaction without losing amplification was the real challenge," said Eric Kittlaus, a graduate student in Rakich's lab and the study's first author. "With precise control over the light-sound interaction, we will be able to create devices with immediate practical uses, including new types of lasers." The researchers said there are commercial applications for the technology in a number of areas, including fiber-optic communications and signal processing. The system is part of a larger body of research the Rakich lab has conducted for the past five years, focused on designing new microchip technologies for light.
Wireless Networking

MIT Demos Wi-Fi That's So High-Tech It Doesn't Need a Password (mic.com) 92

An anonymous reader shares an article on MIC: Researchers at the Massachusetts Institute of Technology want to change how we connect to Wi-Fi. To avoid the cumbersome network login process, a team has come up with a way to grant computers access to a Wi-Fi network based on their proximity to a router. Applied practically, that means you could walk into a cafe and your device would automatically connect to a network -- no annoying password necessary. The same could be true for a home network. When your friends come over, they could immediately be granted access to your Wi-Fi. The paper (PDF), sadly, doesn't offer details on the security aspect. Security researchers advise that one should be careful when connecting to a public Wi-Fi. Say you forget to turn off Wi-Fi on your device, and you walk into a cafe. Your phone will automatically establish a connection with this supposed network. If the network is compromised, plenty of devices will be exposed to attack.
Businesses

Some Root For a Tech Comeuppance In San Francisco 729

HughPickens.com writes: David Streitfeld writes in the NYT that cities do not usually cheer the downfall or even the diminishment of the hometown industry, but the relationship between San Francisco and the tech community has grown increasingly tense as the consequences for people who do not make their living from technology become increasingly unpleasant. "It's practically a ubiquitous sentiment here: People would like a little of the air to come out of the tech economy," says Aaron Peskin. "They're like people in a heat wave waiting for the monsoon." Signs of distress are plentiful. The Fraternite Notre Dame's soup kitchen was facing eviction after a rent increase of nearly 60 percent. Two eviction-defense groups were evicted in favor of a start-up that intended to lease the space to other start-ups. The real estate site Redfin published a widely read blog post that said the number of teachers in San Francisco who could afford a house was exactly zero. "All the renters I know are living in fear," says Derrick Tynan-Connolly. "If your landlord dies, if your landlord sells the building, if you get evicted under the Ellis Act" — a controversial law that allows landlords to reclaim a building by taking it off the rental market — "and you have to move, you're gone. There's no way you can afford to stay in San Francisco."
Encryption

New P2P Torrent Site 'Play' Has No Single Point of Failure (thestack.com) 72

An anonymous reader writes: Play, a new peer-to-peer (P2P) site for downloading torrents, is practically impossible to shut down and promises to be the latest technology to revolutionise online downloads. The platform has appeared recently across ZeroNet, a Budapest-based open source site which is looking to offer a home to decentralised platforms which employ Bitcoin-crypto and BitTorrent technologies. As no central server exists, every additional user is a further point of connection inside the network, helping to avoid potential failures. As the first torrent site to appear on the network, Play can be accessed directly through a ZeroNet URL (only available with the tool installed). The site serves magnetic links sourced from RARBG, with which users can download films, series and other media files, in varying qualities. While ZeroNet itself is not an illegal platform, Play is identical to any other P2P download site in that it could face legal challenges over violating copyright.
Networking

Bad Karma: WISP Pares Back Its Monthly 4G Hotspot Plan, Again 59

Robotech_Master writes: The ongoing saga of the Neverstop plan shows that Karma Wireless just can't seem to catch a break as far as high-bandwidth plans are concerned. After starting out with a straight pay-per-bandwidth plan, "Refuel," for its $150 wireless hotspot, Karma thought it would innovate with a throttled-but-otherwise-unlimited 4G plan, "Neverstop." However, it soon discovered that users were taking it at its word and using up considerably more bandwidth than Karma expected or could afford. After experimenting with further throttling, Karma subsequently revamped the plan into a $50 per month, 15 GB plan that throttled to dialup speed after it ran out. However, now it turns out even that plan was too optimistic, and Karma has opted to dump the Neverstop plan altogether in favor of tiered monthly plan called Pulse —whose bandwidth costs significantly more. ($40/mo for 5 GB, $75 for 10 GB, $140 for 20 GB.) Karma's "unlimited" users weren't pleased the first time the plan changed, and now they're practically through the roof.
Advertising

Why Stack Overflow Doesn't Care About Ad Blockers 287

Press2ToContinue writes: Forging a bold step in the right direction, Stack Overflow announced today that they don't care if you use an ad blocker when you visit their site. "The truth is: we don't care if our users use ad blockers on Stack Overflow. More accurately: we hope that they won't, but we understand that some people just don't like ads. Our belief is that if someone doesn't like them, and they won't click on them, any impressions served to them will only annoy them-- plus, serving ads to people who won't click on them harms campaign performance. ... Publishers can't win by forcing ads — especially low-quality ads — in people's faces. Think scantily-clad women selling flight deals, weight-loss supplement promos or wacky waving inflatable arm-flailing tube-men promoting car dealerships." It's possible that this declaration by SO might help to clarify to advertisers that it is the overabundance of low quality ads that practically force the public to seek out ad blockers. But seriously, what is the likelihood of that?
Power

Ask Slashdot: Surge Protection For International Travel? 138

New submitter gaiageek writes: As someone who has lost a laptop power supply (and thus use of the laptop) due to a late-night power surge while traveling in a developing country, I'm acutely aware of the need for surge protection when traveling abroad. While practically all laptop and phone power adapters these days are voltage auto-sensing 100V-240V compatible, most so-called "travel" surge protectors are restricted to either 110V or 220V. Given the space and weight constraints of carry-on only travel, I'd like to avoid having to carry two separate surge protectors knowing I may go from Central America (110V) to Southeast Asia (220V). Strangely, laptop specific surge protectors typically are 100V-240V compatible, but this doesn't provide protection for a phone or tablet that requires the original power supply (can't be charged from a notebook USB port).

Is there really no solution out there short using a 110V-240V notebook surge protector with an adapter to go from a "cloverleaf" notebook plug to a 5-15R (standard US) plug receptacle?
Businesses

The Box That Built the Modern World 216

HughPickens.com writes: Andrew Curry has an interesting article about how more than any other single innovation, the shipping container epitomizes the enormity, sophistication, and importance of our modern transportation system. It's invisible to most people, but fundamental to how practically everything in our consumer-driven lives works. "Think of the shipping container as the Internet of thing," says Curry. "Just as your email is disassembled into discrete bundles of data the minute you hit send, then re-assembled in your recipient's inbox later, the uniform, ubiquitous boxes are designed to be interchangeable, their contents irrelevant." Last year the world's container ports moved 560 million 20-foot containers. Even cars and trucks—known in the trade as "RoRo," or "roll-on, roll-off" cargo—are increasingly being loaded into containers rather than specialized ships. "Containers are just a lot easier," says James Rice. "A box is a box. All you need is a vessel, a berth, and a place to put the container on the ground.

Consider the economics of a T-shirt sewn at a factory near Beijing. The total time in transit for a typical box from a Chinese factory to a customer in Europe might be as little as 35 days. Cost per shirt? "Less than one U.S. cent," says Rainer Horn. "It doesn't matter anymore where you produce something now, because transport costs aren't important."
Security

Hackers Remotely Cut a Corvette's Brakes 161

An anonymous reader writes: Security researchers presented work at the USENIX conference today showing an easy way to hack into a car's electronics using a small gadget that plugs into modern dashboards. The port they're taking advantage of is commonly used to monitor the location and speeds of these vehicles. Once the researchers' dongle is attached, they can use SMS messages to transmit commands to the car's internal network. They demonstrated this by remotely cutting a Corvette's brakes. "Though the researchers say their Corvette brake tricks only worked at low speeds due to limitations in the automated computer functions of the vehicle, they say they could have easily adapted their attack for practically any other modern vehicle and hijacked other critical components like locks, steering or transmission, too."
Oracle

Oracle Bullies Enterprise Clients Into Cloud Purchases, Consultant Claims 184

An anonymous reader writes: A consultant claims that Oracle has adopted the widespread use of 'breach notices' this year to force existing enterprise customers to adopt its newly-bolstered range of cloud services, or else be told to stop using all Oracle software within thirty days. Speaking to Business Insider, the unnamed source described the tactic as a 'nuclear option' which is now practically the default when the need to add services or users to an existing contract triggers an 'audit' by Oracle. An ex-Oracle contract negotiator who now works in the ever-expanding business niche of 'Oracle contract negotiation' commented 'Internally, the water cooler gossip there is that they've never seen this kind of aggression before. Oracle has really dialed it up. Customers are buying cloud services to make the Oracle issue go away, not because they have any intention of using cloud services.'
AI

The Future of AI: a Non-Alarmist Viewpoint 367

Nerval's Lobster writes: There has been a lot of discussion recently about the dangers posed by building truly intelligent machines. A lot of well-educated and smart people, including Bill Gates and Stephen Hawking, have stated they are fearful about the dangers that sentient Artificial Intelligence (AI) poses to humanity. But maybe it makes more sense to focus on the societal challenges that advances in AI will pose in the near future (Dice link), rather than worrying about what will happen when we eventually solve the titanic problem of building an artificial general intelligence that actually works. Once the self-driving car becomes a reality, for example, thousands of taxi drivers, truck drivers and delivery people will be out of a job practically overnight, as economic competition forces companies to make the switch to self-driving fleets as quickly as possible. Don't worry about a hypothetical SkyNet, in other words; the bigger issue is what a (dumber) AI will do to your profession over the next several years.
Books

Lauren Ipsum: A Story About Computer Science and Other Improbable Things 44

MassDosage writes As the full title to Lauren Ipsum: A story about Computer Science and Other Improbable Things indicates, this is a book about Computer Science but what's surprising about it is that it manages to be about Computer Science without actually ever directly referring to the subject or even to computers at all. It is in fact a fictional story about a young girl called Lauren who gets lost after wandering into a forest near her house after an argument with her mother. She stumbles into a world populated with all kinds of strange creatures and colorful characters some of whom she befriends in order to figure out how to get back to her home. The "figuring out" part of the plot is where things get interesting as she has many attempts at solving this problem with different characters giving her often contradictory advice and Lauren then has to decide what exactly she's trying to do and which of the various possible solutions is the best. This involves a fair amount of trial and error, learning from certain mistakes and trying different approaches. If this is starting to sound familiar to those who have written software then that's the whole point. Lauren Ipsum is cunningly littered with references to Computer Science and in particular to things like algorithms, logic puzzles and many other of the theoretical underpinnings of the subject. Read below to see what MassDosage has to say about the book.
The Internet

HTTP/2 - the IETF Is Phoning It In 161

An anonymous reader writes HTTP/2 is back in the spotlight again. After drawing significant ire over a proposal for officially sanctioned snooping, the IETF is drawing criticism for plowing ahead with its plans for HTTP/2 on an unrealistically short schedule and with an insufficiently clear charter. A few days ago the IETF announced Last Call for comments on the HTTP/2 protocol.

Poul-Henning Kamp writes, "Some will expect a major update to the world's most popular protocol to be a technical masterpiece and textbook example for future students of protocol design. Some will expect that a protocol designed during the Snowden revelations will improve their privacy. Others will more cynically suspect the opposite. There may be a general assumption of 'faster.' Many will probably also assume it is 'greener.' And some of us are jaded enough to see the "2.0" and mutter 'Uh-oh, Second Systems Syndrome.' The cheat sheet answers are: no, no, probably not, maybe, no and yes."

"Given this rather mediocre grade-sheet, you may be wondering why HTTP/2.0 is even being considered as a standard in the first place. The Answer is Politics. Google came up with the SPDY protocol, and since they have their own browser, they could play around as they choose to, optimizing the protocol for their particular needs. SPDY was a very good prototype which showed clearly that there was potential for improvement in a new version of the HTTP protocol. Kudos to Google for that. But SPDY also started to smell a lot like a 'walled garden'."

"The IETF, obviously fearing irrelevance, hastily 'discovered' that the HTTP/1.1 protocol needed an update, and tasked a working group with preparing it on an unrealistically short schedule. This ruled out any basis for the new HTTP/2.0 other than the SPDY protocol. With only the most hideous of SPDY's warts removed, and all other attempts at improvement rejected as 'not in scope,' 'too late,' or 'no consensus,' the IETF can now claim relevance and victory by conceding practically every principle ever held dear in return for the privilege of rubber-stamping Google's initiative."
Movies

Netflix Begins Blocking Users Who Bypass Region Locks 121

An anonymous reader writes with reports that Netflix may be shutting out international VPN users. "Netflix can only stream the videos that studios make available in a given country, which has led to a booming business in workarounds (such as proxies and virtual private networks) that let you see the company's catalogs in other nations. Heck, one New Zealand internet provider practically built a service around it. However, you might not get to count on that unofficial solution for much longer. VPN operators claim to TorrentFreak that Netflix recently started blocking some users who use these technological loopholes to watch videos that would normally be verboten. The effort isn't widespread and mostly appears to focus on connections with many simultaneous Netflix sign-ins (that is, they're obviously being used for circumvention), but it's a surprise to viewers who were used to having unfettered access."

Slashdot Top Deals