blogologue writes "I have a kid that's turning 4-years old soon, and I'm not able to be with him as often as I want to. To remedy this, I'm looking into whether or not getting him a phone could be a good idea to keep in touch. Being able to have a video chat is important, and as it is rare that a 4-year old has a mobile phone, and because he's got other things to do, it would be good to be able to turn off for example games and so on during time in the kindergarten. So other kids don't go around asking their parents for a smartphone. The main reason for getting the phone is keeping in touch, and as a bonus it can function as a device for games and so on during allowed times. Are there any phones that are suitable for such use? I don't mind if it's Android, iOS or something else, as long as it can be used to make video calls to other Android/iOS phones, and if it features other applications such as games, have limited, pre-defined functionality during certain periods of the day."
Sign up for the Slashdot Daily Newsletter! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Help SAVE NET NEUTRALITY! ×
mikejuk writes "We all do it — place our phones down on the desk next to the keyboard. This might not be such a good idea if you want to keep your work to yourself. A team of researchers from MIT and the Georgia Institute of Technology have provided proof of concept for logging keystrokes using nothing but the sensors inside a smartphone — an iPhone 4 to be precise, as the iPhone 3GS wasn't up to it. A pair of neural networks were trained to recognize which keys were being pressed just based on the vibration — and it was remarkably good at it for such a small device. There have been systems that read the keys by listening but this is the first system that can hide in mobile phone malware."
mdsolar writes "The No 2 officer at the military command in charge of all US nuclear war-fighting forces has been suspended and is under investigation by the naval criminal investigation command for issues related to gambling, officials said on Saturday. The highly unusual action against a high-ranking officer at US strategic command was made more than three weeks ago but not publicly announced. Air force general Robert Kehler, who heads Strategic Command, suspended the deputy commander, navy vice admiral Tim Giardina, from his duties on September 3, according to the command's top spokeswoman, navy captain Pamela Kunze. Giardina is still assigned to the command but is prohibited from performing duties related to nuclear weapons and other issues requiring a security clearance, she said."
harrymcc writes "On Saturday, I picked up a copy of a book called How To Use the Internet at a flea market. It was published in May, 1994, and is a fascinating snapshot of the state of the Net at that time — when you had to explain to people that it wasn't a good idea to say 'thank you' when issuing commands to a machine, and the World Wide Web was an alternative to Gopher that warranted only four pages of coverage towards the end of the book. I selected some choice excerpts and wrote about them over at TIME.com."
An anonymous reader writes "SpaceX's Falcon 9 rocket completed a successful first launch today, taking off from California and putting a Canadian science satellite in orbit. 'The beefed-up Falcon 9 that blasted off on its maiden flight from Southern California's Vandenberg Air Force Base, carrying a small Canadian government communication and research satellite, went through a seemingly picture-perfect countdown and performed on ascent as engineers hoped. The changes to the rocket are aimed at improving capacity and reliability, while simultaneously speeding up manufacturing. Historically, the initial launch of a new rocket has as much as a one-in-two chance of failure. Early this month, Elon Musk, the company's founder, chief executive and chief designer, seemingly tried to play down expectations by sending out a Twitter message emphasizing that the revamped rocket 'has a lot of new technology, so the probability of failure is significant.''"
kkleiner writes "The FDA has approved a device that acts as an "artificial pancreas", which both continuously monitors a patient's glucose levels and injects appropriate amounts of insulin when needed. When blood-sugar levels become low, the device from Medtronics warns the wearer and will eventually shut down. The MiniMed 530G looks to offer an on-the-go solution for the growing number of people suffering from Type 1 diabetes who have to test their blood and inject insulin throughout the day. The company plans to improve the device to make a fully automated version down the road."
An anonymous reader writes "A group of scientists have confirmed a link between the sonar used by Exxon Mobil to map the ocean floor for oil and the death of melon-headed whales. From the article: 'A spokesman for ExxonMobil said the company disagrees with the findings. "ExxonMobil believes the panel's finding about the multi-beam echo sounder is unjustified due to the lack of certainty of information and observations recorded during the response efforts in 2008," spokesman Patrick McGinn told AFP in an email. He added that observers employed by the Madagascar government and the oil giant "were on board the vessel and did not observe any whales in the area."'"
dryriver writes "We've seen real laser guns before pulling off tricks like starting small fires, or popping black balloons. That's cool, sure, but it's got nothing—on this handheld laser rifle. Developed by TWI this laser-cutter was initially designed for use by robots, but a few recent tweaks including a pistol-grip and a trigger made it into a human-sized rifle. It is designed specifically with nuclear decommission in mind, specifically chopping up huge pieces of metal infrastructure into bite-sized bits that are easily disposed of. And while it's definitely suited for that, it has some short-comings compared typical rifles. That range is pretty low, for instance, and it's not exactly mobile."
cartechboy writes "Whether its the Mayan calendar, a rough economy, or a fear of zombies, there are people who are currently preparing for the end of the world, coming, like, soon. And they can attract some fringe elements. So maybe those elements are worth a little truck marketing. Yesterday at the Texas State Fair, Chevrolet unveiled a "Black Ops" concept truck that it says will "explore the extremes of preparedness." The truck comes with a vault storage unit, solar power pack, gas masks, gloves, a military first aid kit, a folding shovel, a generator and some rope. Twinkies apparently not included."
wiredmikey writes "Vulnerability management software company Rapid7 has launched an ambitious community project to scan the public Internet, organize the results and share the data with the IT security industry. The brainchild of Metasploit creator HD Moore, the overall goal of Project Sonar is to crowdsource the discovery and reporting of security vulnerabilities of affected software and hardware vendors. 'If we try to parse the data sets ourselves, even with a team of 30 people, it would take multiple years just to figure out the vulnerabilities in the data set. It's ridiculous, really,' Moore said in an interview with SecurityWeek. To start, Rapid7 has released about 3 terabytes of raw data generated from scans across public Internet-facing systems. The data sets relate to IPv4 TCP banners & UDP probe replies, IPv4 Reverse DNS PTR records and IPv4 SSL Certificates. Moore's team also listed a set of tools used to generate the data sets. They include ZMap, an Internet-scale scanner developed at he University of Michigan; UDPBlast, a stand-alone UDP scanning utility; and MASSCAN, an Errata Security tool that claims to scan the entire IPv4 internet in three seconds."
An anonymous reader writes "Orbital Sciences Corp's robotic Cygnus spacecraft made history by docking with the International Space Station early Sunday. From the article: 'The robotic Cygnus spacecraft was captured by space station astronauts using the outpost's robotic arm at 7 a.m. EDT (1100 GMT) as the two spacecraft sailed over the Indian Ocean. The orbital arrival, which occurred one week later than planned due to a software data glitch, appeared to go flawlessly.'"
McGruber writes "The New York Times is reporting on yet another NSA revelation: for the last three years, the National Security Agency has been exploiting its huge collections of data to create sophisticated graphs of some Americans' social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information. 'The agency can augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data, according to the documents. They do not indicate any restrictions on the use of such "enrichment" data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners.' In a memorandum, NSA analysts were 'told that they could trace the contacts of Americans as long as they cited a foreign intelligence justification.' 'That could include anything from ties to terrorism, weapons proliferation or international drug smuggling to spying on conversations of foreign politicians, business figures or activists. Analysts were warned to follow existing "minimization rules," which prohibit the NSA from sharing with other agencies names and other details of Americans whose communications are collected, unless they are necessary to understand foreign intelligence reports or there is evidence of a crime. The agency is required to obtain a warrant from the intelligence court to target a "U.S. person" — a citizen or legal resident — for actual eavesdropping.'"
jrepin points out an article by Richard Stallman following up on the 30th anniversary of the start of his efforts on the GNU Project. RMS explains why he thinks we should continue to push for broader adoption of free software principles. He writes, "Much has changed since the beginning of the free software movement: Most people in advanced countries now own computers — sometimes called “phones” — and use the internet with them. Non-free software still makes the users surrender control over their computing to someone else, but now there is another way to lose it: Service as a Software Substitute, or SaaSS, which means letting someone else’s server do your own computing activities. Both non-free software and SaaSS can spy on the user, shackle the user, and even attack the user. Malware is common in services and proprietary software products because the users don’t have control over them. That’s the fundamental issue: while non-free software and SaaSS are controlled by some other entity (typically a corporation or a state), free software is controlled by its users. Why does this control matter? Because freedom means having control over your own life. ... Schools — and all educational activities — influence the future of society through what they teach. So schools should teach exclusively free software, to transmit democratic values and the habit of helping other people. (Not to mention it helps a future generation of programmers master the craft.) To teach use of a non-free program is to implant dependence on its owner, which contradicts the social mission of the school. Proprietary developers would have us punish students who are good enough at heart to share software or curious enough to want to change it."
dmfinn writes "It was back in 2011 when Stefano Ampollini and two accomplices cheated a French casino out of over €90,000 thanks to the help of Chinese-made infrared contact lenses. According to French authorities, Ampollini and two casino workers marked cards using an invisible liquid that would be picked up by the infrared lenses, which Ampollini then used to read his competitors' cards. Though the contacts themselves cost over €2,000, the crew managed to take €71,000 in their first night. However, the trio was finally caught when a lawyer working for the casino became suspicious after Ampollini folded with an unbelievably good hand, which suggested he knew the croupier's cards. This week, a French court sentenced Ampollini to two years in prison and a €100,000 fine. His main accomplice was handed an even harsher sentence; he was forced to pay the same fine and given a 36-month sentence. It appears, despite their best efforts and advanced tactics, that the men were still unable to beat the house without raising significant alarms. So, at least for now, it seems modern technology still can't simulate good old 'luck.'"