Hardware

Oscilloscopes For Modern Engineers? 337

Every few years someone asks this community for advice on oscilloscopes. Reader dawning writes "I've just graduated with a degree in Computer Engineering (and did a Comp Sci one while I was at it) and I'm finding myself woefully under-equipped to do some great hardware projects. I'm in major need of a good oscilloscope. I'm willing to put down $2,000 for a decent one, but there are several options and they all seem so archaic and limited. I'm happy to use something that must be controlled through a PC if that gives me more measuring features. What would you, my esteemed Slashdot colleagues, get for yourself?"
Databases

Good IC / Electronic Component Inventory Software? 70

Smerky writes "As I've been getting more and more into hobby electronics I have been finding it difficult to keep track of all the different ICs and other electronics that I have (resistors, capacitors, etc.). What are Slashdotters' recommendations for some inventory software? Certain qualifications that I'd be looking for personally are that it has to run on Linux/OSX well or be web-based (to run well on an Apache2 server)."
Government

Australian Cybercrime Enquiry Report Released 81

An anonymous reader writes "The Australian Government Standing Committee on Communications has released the results of a year long enquiry into cybercrime in a report titled Hackers, Fraudsters and Botnets: Tackling the Problem of Cyber Crime. This report includes a recommendation that Internet Service Provider customers should be forced to install anti-virus and firewall software on their computers as part of their contractual obligations. The Australian Communications and Media Authority receive further powers and responsibilities under the recommendations with respect to shutting down websites hosting malicious content and ensuring that infected consumer devices are disconnected from the Internet."
Power

Bill Gates's New Version of the Einstein Letter 407

dcblogs writes "In 1939, Albert Einstein sent 'F.D. Roosevelt, President of the United States,' a letter with a warning about Germany's interest in a new type of energy with potential for use as a powerful bomb. The letter also outlined the competitive threat posed by Germany and steps for improving US research efforts. Last week, Bill Gates, along with GE's CEO and others, met with President Obama to deliver their own message: that of the top 30 companies in the world working on alternative energy, only four are in the US. Similar to Einstein's point and recommendations, Gates and his allies are asking the US to view the alternative energy push as a competitive threat posed by other nations, particularly China, which may be doing a better job in bringing its engineering talent and money to bear on this problem."
Communications

Recrafting Government As an Open Platform 233

itjoblog writes "How effective are the world's governments at using technology to become more responsive? Technology has revolutionised the way that we do business, but the public sector has traditionally moved more cautiously than the private one. Now, a report from the Centre for Technology Policy Research in the UK has made some recommendations for the use of technology as an enabling mechanism for government." I have one simple requirement: all laws must be written in a wiki with full history.
Privacy

Privacy Machiavellis 206

Chris Jay Hoofnagle has a piece up at SFGate.com on what he calls the "privacy Machiavellis," which are exemplified by Google and Facebook. (The article is adapted from a longer treatment published last year, called "Beyond Google and Evil.") Hoofnagle heads the privacy foundation set up with money collected from settlements of privacy lawsuits against Facebook. From SFGate: "... you have no way to ask Google to stop this tracking. Instead, you can merely opt out of the targeted advertising — the product recommendations. Exercising your privacy options creates a worst-case-scenario outcome: If you opt out, you are still tracked, but you do not receive the putative benefit of targeted ads. An illusory opt-out system is just one of the increasingly sophisticated sleights of hand in the privacy world. Consider Facebook's privacy options. ... Facebook can proudly proclaim that it offers ... more than 100 [choices]. Therein lies the trick; by offering too many choices, individuals are likely to choose poorly, or not at all. Facebook benefits because poor choices or paralysis leads consumers to reveal more personal information. In any case, the fault is the consumer's, because, after all, they were given a choice. Reader Kilrah_il sends word that Google has just released a tool that could alleviate some of the above worries: it stops tracking by Google Analytics for users of IE7+, Firefox 3.5+, and Chrome 4+. Perhaps Hoofnagle will comment on it here or elsewhere.
Google

Google Launches a Data Prediction API 70

databuff writes "Google has released a data prediction API. The service helps users leverage historical data to make predictions that can guide real-time decisions. According to Google, the API can be used for prediction tasks ranging from product recommendations to churn analysis (predicting which customers are likely to switch to another provider). The API involves three simple steps: upload the data, train the model, then generate predictions. The API is currently available on an invitation-only basis." Google also recently announced several other API additions, including Buzz, Fonts, and Storage.
Government

FCC May Tweak Broadband Plan 52

adeelarshad82 writes "Despite a recent ruling that said the FCC did not have the right to interfere in Comcast's network management issues, the agency is pushing ahead with its national broadband plan, though there might be some tweaks. Since the case was won on the fact that the FCC based its decision on its Internet Policy Principles, a set of guidelines the agency developed internally several years ago regarding broadband Internet service and not actual rules that went through a formal, open rulemaking process, they are invalid, as is the enforcement action. FCC general counsel Austin Schlick acknowledged that the court's decision may affect a significant number of important plan recommendations. The commission is assessing the implications of the decision for each recommendation to ensure that it has adequate authority to execute the mission laid out in the plan."
Education

Recommendations For C++/OpenGL Linux Tutorials? 117

QuaveringGrape writes "After a few years of Python I've recently been trying to expand my programming knowledge into the realm of compiled languages. I started with C, then switched over to C++. A friend and longtime OpenGL programmer told me about NeHe's tutorials as a good step after the command-line programs started to get old, but there's a problem: all the tutorials are very Windows-based, and I've been using Linux as my single platform for a while now. I'm looking for suggestions for tutorials that are easy to learn, without being dumbed down or geared towards non-programmers."
Medicine

Medical Professionals Aren't Leaping For E-Medicine 98

theodp writes "Despite all the stimulus money being directed toward developing electronic medical records, surprisingly few doctors, hospitals and insurers are using Google Health and other sites like it. One reason, Newsweek suggests, may be that Web-based personal-health records like the ones being compiled on Google Health don't appear to be covered under HIPAA, which requires that health care providers and health plans protect patient confidentiality. 'We don't connect that information to other aspects of Google,' explains Dr. Roni Zeiger, product manager for Google Health. Still, the federal government is in the process of drafting privacy recommendations that would apply to Google Health, as well as the makers of consumer apps that perform tasks like monitoring blood pressure."
Security

Aurora Attack — Resistance Is Futile, Pretty Much 268

eldavojohn writes "Do you have branch offices in China? iSec has published a new report (PDF) outlining the severity of the attacks on Google.cn, allegedly by the Chinese government, dubbed 'Aurora' attacks. Up to 100 companies were victims, and some are speculating that resistance to such attacks is futile. The report lays out the shape of the attacks — which were customized per-company based on installed vulnerable software and antivirus protection: '1. The attacker socially engineers a victim, often in an overseas office, to visit a malicious website. 2. This website uses a browser vulnerability to load custom malware on the initial victim's machine. 3. The malware calls out to a control server, likely identified by a dynamic DNS address. 4. The attacker escalates his privilege on the corporate Windows network, using cached or local administrator credentials. 5. The attacker attempts to access an Active Directory server to obtain the password database, which can be cracked onsite or offsite. 6. The attacker uses cracked credentials to obtain VPN access, or creates a fake user in the VPN access server. 7. At this point, the attack varies based upon the victim. The attacker may steal administrator credentials to access production systems, obtain source code from a source repository, access data hosted at the victim, or explore Intranet sites for valuable intellectual property.' The report also has pages of recommendations as well as lessons learned, which any systems administrator — even those inside the US — should read and take note of."
Programming

Recommendation Algorithm Wants To Show You Something New 90

Several sources are reporting on a new metric that computer scientists are going after with respect to recommender systems — recommendation diversity. "In a paper that will be released by PNAS, a group of scientists are pushing the limits of recommendation systems, creating new algorithms that will make more tangential recommendations to users, which can help expand their interests, which will increase the longevity and utility of the recommendation system itself. Accuracy has long been the most prized measurement in recommending content, like movies, links, or music. However, computer scientists note that this type of system can narrow the field of interest for each user the more it is used. Improved accuracy can result in a strong filtering based on a user's interests, until the system can only recommend a small subset of all the content it has to offer."
Biotech

$350 Test Screens For 100 Single-Gene Disorders 4

TechRev_AL writes "Prospective parents could soon be screened for around 100 genetic diseases that they might pass on to their children. Counsyl, a Stanford University startup based in Redwood City, CA, has developed the necessary genetic test — it costs $349 and is already covered by some major insurers. For most people, screening recommendations are currently limited to the chronic lung disease cystic fibrosis, with broader testing offered to some ethnic groups. The new technology could make this kind of screening far more common."
Image

The Trousers of Reality Screenshot-sm 63

gregrolan writes "The Trousers of Reality — Volume 1, Working Life is indeed a book about finding balance and satisfaction in life work and play. The author's thesis can be applied to almost any discipline, but it is from his background as an IT consultant that most of his professional examples are drawn. He considers success in this field pretty broadly and addresses the technical, management, political, personal, and social aspects of the IT profession." Read on for the rest of Greg's review.
Windows

Microsoft Policies Help Virus Writers, Says Security Firm 166

Barence writes "Security firm Trend Micro has accused Microsoft of giving malware writers a helping hand by advising users not to scan certain files on their PC because 'they are not at risk of infection.' Trend Micro warns that by making such information available, Microsoft is effectively creating a hit list for malware writers. 'Following the recommendations does not pose a significant threat as of now, but it has a very big potential of being one,' the company's researcher, David Sancho, writes on theTrend Micro blog."
Image

Website Owner's Manual Screenshot-sm 40

Michael J. Ross writes"Experienced Web designers and developers will readily admit that the most challenging aspect of their professions is not the technical work itself, nor learning the tools of the trade, but rather dealing with clients. Within that area, the most frustrating type of work — aside from the ever-joyless chore of collecting on invoices — is getting (non-technical) clients to understand the possibilities and limitations of Web technologies, design decisions, and all the other factors that can make or break a website project, as well as the site itself. Yet this process can be just as unhappy, and far more confusing, to prospective site owners, who typically are quite knowledgeable of their own fields, but have little to no understanding of how best to ensure the success of any website project they sponsor. Aiming to bridge this gap, is the appropriately-titled Website Owner's Manual." Read on for the rest of Michael's review.
Programming

The Book of Xen 88

swsuehr writes "The Book of Xen: A Practical Guide for the System Administrator provides an excellent resource for learning about Xen virtualization. I frequently need to create test environments for examples that appear in various books and magazine articles (in the interest of full disclosure, I've never written for the publisher of this book). In the days before virtualization that meant finding and piecing together hardware. Like many readers, I've been using virtualization in one form or another for several years, including Xen. This book would've saved hours searching around the web looking for tidbits of information and sifting through what works and doesn't work in setting up Xen environments. The authors have done the sifting for me within the ~250 pages of the book. But far beyond, the authors also convey their experience with Xen using walkthroughs, tips, and recommendations for Xen in the real world." Read on for the rest of Steve's review.
Censorship

FTC Says Virtual Worlds Bad For Minors 355

eldavojohn writes "A new report from the FTC is claiming minors have access to explicit content via online virtual worlds such as those found in online games. The report makes five recommendations to keep little Johnny away from the harms of Barrens chat: Use more effective age-screening mechanisms to prevent children from registering in adult virtual worlds; Use or enhance age-segregation techniques to make sure that people interact only with others in their age group; Re-examine language filters to ensure that they detect and eliminate messages that violate rules of behavior in virtual worlds; Provide more guidance to community enforcers in virtual worlds so they are better able to review and rate virtual world content, report potential underage users, and report any users who appear to be violating rules of behavior; and Employ a staff of specially trained moderators who are equipped to take swift action against rule violations."
Security

Malware Could Grab Data From Stock iPhones 127

Ardisson writes "Swiss iPhone developer Nicolas Seriot presented last night a talk on iPhone Privacy in Geneva. He showed how a malicious application could harvest personal data on a non-jailbroken iPhone (PDF) and without using private APIs. It turns out that the email accounts, the keyboard cache content and the WiFi connection logs are fully accessible. The talk puts up several recommendations. There is also a demo project on github."
NASA

NASA Willing To Team With China; Rumors of a Budget Cut 200

eldavojohn writes "2009 has been an interesting year for NASA — from a new strategy to even closer ties with an old enemy. So it's perhaps no surprise that NASA has publicly stated that they are ready to team up with China. NASA Chief Charles Bolden said, 'I am perfectly willing, if that's the direction that comes to me, to engage the Chinese in trying to make them a partner in any space endeavor. I think they're a very capable nation. They have demonstrated their capability to do something that only two other nations that have done — that is, to put humans in space. And I think that is an achievement you cannot ignore. They are a nation that is trying to really lead. If we could cooperate we would probably be better off than if we would not.' While the budget of the China National Space Administration is a fraction of NASA's, partnering with them has been considered since 2008. In possibly related news, rumors are circulating of the Obama administration cutting NASA's budget by ten percent for fiscal year 2011 despite the success of Monday's Atlantis launch. Considering the Augustine panel's recommendations, such a cut could halt US human space flight for a decade."

Slashdot Top Deals