Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Bitcoin

Core Bitcoin Devs Leave Project, Create New Currency Called Decred (softpedia.com) 122

An anonymous reader writes: Core developers in the Bitcoin project have left and started a new currency called Decred. Developers are citing a lack of transparency and a conflict of interests between the group that funds the actual Bitcoin software development, and the decisions taken inside the project. Jacob Yocom-Piatt, CEO at Company 0, who has funded development of Bitcoin since early 2013: "This is in part due to a lack of mechanisms and pathways for funding development work directly from the community, and as a result Bitcoin development is funded by external entities that create conflicts of interest between the developers and the representative power of the community that uses Bitcoin."
Earth

Giant Methane Leak in California Won't Be Capped For Months 292

Motherboard takes a look at the ongoing leak from a deep well in Southern California, and the engineering challenges that mean it won't be stopped for a while. From Motherboard's report: An enormous amount of harmful methane gas is currently erupting from an energy facility in Aliso Canyon, California, at a startling rate of 110,000 pounds per hour. The gas, which carries with it the stench of rotting eggs, has led to the evacuation 1,700 homes so far. Many residents have already filed lawsuits against the company that owns the facility, the Southern California Gas Company. ... Part of the problem in stopping the leak lies in the base of the well, which sits 8,000 feet underground. Pumping fluids down into the will, usually the normal recourse, just isn't working, said [copmany spokesperson Anne] Silva. Workers have been "unable to establish a stable enough column of fluid to keep the force of gas coming up from the reservoir." The company is now constructing a relief well that will connect to the leaking well, and hopefully provide a way to reduce pressure so the leak can be plugged. As the article notes, methane is an especially noxious gas in a figurative as well as literal sense; while it spends less time in the atmosphere than does CO2, it is more effective at trapping heat.
Microsoft

Microsoft CMO Confirms Development of 'Spiritual Equivalent' of Surface Phone (hothardware.com) 165

MojoKid writes: We all know what Microsoft wants to do with Windows 10. It's supposedly the last monolithic release of Windows and the ultimate plan is to unite hardware from different device categories under a single, universal ecosystem. That includes smartphones, which is an area where Microsoft has historically struggled hard to compete. The release of a premium "Surface Phone" of some sort, however, could prove to be a game changer. Microsoft is aggressively pushing Windows 10 upgrades, and makes no bones about it, all in an effort to get developers on board to build universal Windows 10 cross-platform apps and spur mobile development. In that respect, Microsoft needs to finally make an impact in the handset space and Windows 10 Mobile is the company's one shot to do just that. And it appears that Microsoft is working on what could be essentially a true Surface Phone, or at least something very similar. In a recent interview, Mary Jo Foley pushed Microsoft's Chief Marketing Officer Chris Capossela on the prospect of a Surface Phone and he confirmed the company is working on a "breakthrough" phone that is the "spiritual equivalent" of their very successful line of Surface branded products. Capossela has been with Microsoft for over two decades. He used to write speeches for Bill Gates and is intimately familiar with Microsoft's many products and strategies.
China

China Passes Law Requiring Tech Firms To Hand Over Encryption Keys (betanews.com) 170

Mark Wilson writes: Apple may have said that it opposes the idea of weakening encryption and providing governments with backdoors into products, but things are rather different in China. The Chinese parliament has just passed a law that requires technology companies to comply with government requests for information, including handing over encryption keys.

Under the guise of counter-terrorism, the controversial law is the Chinese government's attempt to curtail the activities of militants and political activists. China already faces criticism from around the world not only for the infamous Great Firewall of China, but also the blatant online surveillance and censorship that takes place. This latest move is one that will be view very suspiciously by foreign companies operating within China, or looking to do so.

Cellphones

Switzerland Moves Toward a Universal Phone Charger Standard (vice.com) 401

Press2ToContinue writes: Apple's Lightning cable cartel be damned: Switzerland is moving forward with a plan for a single, universal phone charger across the country, standardizing phone chargers across the board. While the exact standard hasn't been mentioned yet, it wouldn't be hard to guess the standard: Micro USB, used across phone platforms, most especially Android, which has a gigantic chunk of the cell phone market worldwide.

The likely loser? Apple, which has relied on proprietary chargers since introducing the iPhone in 2007. While many companies have tried releasing generic cables, Apple often relies on DRM software to ensure that it's an Apple certified cable, charging $19 a piece for the Lightning charger used by the iPhone 5 and 6 and similar models.

What do you think -- are government-mandated standards for chargers a good idea? Despite the success of the standard household 3-prong electrical plug, doesn't this hamper progress?
China seems to have done most of the work on the wall-circuit side of the equation,several years ago. But as to the "standard" 3-prong plug, any particular plug type is only as universal as the sockets and voltages they supply.
Bitcoin

Sweden's Cash-Free Future Looms -- and Not Everyone Is Happy About It 440

HughPickens.com writes: Liz Alderman writes in the NYT that bills and coins now represent just 2 percent of Sweden's economy, compared with 7.7 percent in the United States and 10 percent in the euro area and this year only about 20 percent of all consumer payments in Sweden have been made in cash, compared with an average of 75 percent in the rest of the world. "Sweden has always been at the forefront of technology, so it's easy to embrace this," said Jacob de Geer, a founder of iZettle, which makes a mobile-powered card reader. In Sweden parishioners text tithes to their churches, homeless street vendors carry mobile credit-card readers, and even the Abba Museum, despite being a shrine to the 1970s pop group that wrote "Money, Money, Money," considers cash so last-century that it does not accept bills and coins. "We don't want to be behind the times by taking cash while cash is dying out," says Bjorn Ulvaeus, a former Abba member who has leveraged the band's legacy into a sprawling business empire, including the museum.

But not everyone is pleased with the process. Remember, Sweden is the place where, if you use too much cash, banks call the police because they think you might be a terrorist or a criminal. Swedish banks have started removing cash ATMs from rural areas, annoying old people and farmers. Credit Suisse says the rule of thumb in Scandinavia is: "If you have to pay in cash, something is wrong." Sweden's embrace of electronic payments has alarmed consumer organizations and critics who warn of a rising threat to privacy and increased vulnerability to sophisticated Internet crimes. Last year, the number of electronic fraud cases surged to 140,000, more than double the amount a decade ago, according to Sweden's Ministry of Justice. Older adults and refugees in Sweden who use cash may be marginalized, critics say, and young people who use apps to pay for everything or take out loans via their mobile phones risk falling into debt. "It might be trendy," says Bjorn Eriksson, a former director of the Swedish police force and former president of Interpol. "But there are all sorts of risks when a society starts to go cashless."
Books

Ask Slashdot: State-of-the-Art In Amateur Book Scanning? 122

An anonymous reader writes: I have a shelf full of books and other book-like things ranging from old to very old that I would like to turn into PDFs (or other similarly portable format), and have been on a slow-burn quest for the right hardware and method to do so on a budget. These are mostly sentimental — things handed down over generations, and they include family bibles, notebooks, and photo albums, as well as some conventional — published, bound — books from the late 19th and early 20th Century. None of them are especially valuable as antiques, as far as I know; my goals in preserving them are a) to make them available to other people in my family who are into genealogy or just nostalgia, and b) so I can read some of those old, interesting books (et cetera) without endangering them any more than it takes to scan them once. I was intrigued by the (funded, but not yet available) scanner mentioned earlier this year on Slashdot; it seems to do a lot of things right, but like any crowdfunded project, the proof is in the pudding, and the pudding hasn't yet arrived. It's also cheap, and that fits my household budget. What methods and hardware are you using to scan old documents? Any tips you have from a similar project, with regard to hardware, treatment of the materials being scanned, light sources, file formats, clean-up and editing tools, file-size-vs-resolution tradeoffs? In the end, I'm likely to err toward high-resolution scans, since they can be knocked down to size later if need be, but I'd be interested in hearing about what tradeoffs you've found to work for you.

One big question that I'd like to have answered: Is there stand-alone Free / Open Source software, or even just cheap software (I am mostly on Linux, by choice, but won't leap onto a sword to keep my Free Software purity) that makes for easy correction of the distortion introduced by camera-based imaging? If I could easily uncurl and keystone-correct pages, then a lot of input methods (even my phone) are suddenly much more attractive. My old Casio camera could do this 10 years ago, but I haven't found a free software desktop utility that lets me turn photos into nicely squared-up pages.

Submission + - Book torrent released before its release date: Linux C Programming 1

internet-redstar writes: Before its release date, the book "Linux C Programming" is available for download in its DRM-free format through bittorrent.
Author, Jasper Nuyens, a Linux veteran was asked about his feelings. "Well, this is a strange situation", he replied, "like the movie from Quentin Tarantino, it is occurring more and more that works are distributed online even before they are available for purchase through the normal sales channels".

The author, however indicated that he isn't that sad with this event. "I don't make my living from selling books. If more people attend our courses based upon the books, than that's great, if more learn to program in C on Linux, that's great too." Mr. Tarantino might not share his feelings, but in the music industry too, some artists shift away their focus from selling CDs to selling tickets for their performances.

"Maybe a similar model is possible for book distribution", Mr Nuyens continued. He added that he will not be taking steps against further distribution of his book. "The sharing through BitTorrent of the book actually helps its distribution, so I don't see it as a bad thing at all."

Here is the magnet link:
magnet:?xt=urn:btih:5F77AF83F92ADB7E7A96C753A260531FC9B1ED9B&dn=Linux_C_Programming_version_12-2015.pdf&tr=udp%3a%2f%2ftracker.openbittorrent.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.publicbt.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.istole.it%3a80%2fannounce
Censorship

North Korea's Operating System Analyzed (theguardian.com) 98

Bruce66423 points out an analysis at The Guardian of North Korea's Red Star Linux-based OS, based on a presentation Sunday to the Chaos Communication Congress in Berlin : The features of their Fedora based OS include a watermarking system to enable tracking of files — even if unopened. The operating system is not just the pale copy of western ones that many have assumed, said Florian Grunow and Niklaus Schiess of the German IT security company ERNW, who downloaded the software from a website outside North Korea and explored the code in detail. ... This latest version, written around 2013, is based on a version of Linux called Fedora and has eschewed the previous version’s Windows XP feel for Apple’s OS X – perhaps a nod to the country’s leader Kim Jong-un who, like his father, has been photographed near Macs. The OS, unsurprisingly, allowed only tightly fettered access to web sites, using a whitelist approach that gives access to government-controlled or approved sites.

Submission + - APT Speed for Incremental Updates Got Massive Performance Boost

jones_supa writes: Developer Julian Andres Klode has this week made some improvements to significantly increase the speed of incremental updates with Debian GNU/Linux's APT update system. His optimizations have yielded the apt-get program to suddenly yield 10x performance when compared to the old code. These improvements also make APT with PDiff now faster than the default, non-incremental behavior. Beyond the improvements that landed this week, Julian is still exploring other areas for improving APT update performance. More details via his blog post.
Build

Netflix Creates DIY Smart Socks That Pause Your Show When You Fall Asleep (netflix.com) 76

HughPickens.com writes: We've all said "just one more episode before bed" to ourselves only to fall asleep halfway through while Netflix kept playing. It's frustrating to try to put the pieces back together the next day as you attempt to determine what you last saw before you dozed off — and Netflix feels your pain. Now Nathan McAlone writes at Business Insider that Netflix has built socks that read your body to understand when you fall asleep, and then automatically pause your Netflix show. The sleep detection socks use an accelerometer to tell when you've stopped moving for a while (presumably when you've fallen asleep). In the socks prototype, an LED light in the cuff of the sock begins to flash red when you've been immobile, letting you know it is about to pause your show. If you move at all, it cancels the countdown. Netflix released a detailed parts list (PDF), including where you can purchase each item needed, as well as schematics you can follow as you build out the electronics. The company even put together the basic code you'll need to use to program the electronics, though you'll need to find your TV's IR signals to make it work. The knitting process for the socks doesn't seem too difficult (if you already know how to knit, of course), and Netflix offers a handful of patterns based on the company's popular shows — including "BoJack Horseman," "Unbreakable Kimmy Schmidt," "Bloodline," "Master of None" and "House of Cards."
Security

Ransomware Found Targeting Linux Servers, MySQL, Git, Other Development Files (drweb.com) 93

An anonymous reader writes: A new piece of ransomware has been discovered that targets Linux servers, looking to encrypt only files that are related to Web hosting, Web servers, MySQL, Subversion, Git, and other technologies used in Web development and HTTP servers. Weirdly, despite targeting business environments, the ransomware only asks for 1 Bitcoin, a fairly low amount compared to other ransomware.
Government

The European Commission Is Preparing a Frontal Attack On the Hyperlink (juliareda.eu) 220

An anonymous reader writes: Julia Reda, a member of the European parliament, is sounding the alarm on new copyright legislation under development. She says the European Commission is considering copyright protection for hyperlinking. Reda says, "This idea flies in the face of both existing interpretation and spirit of the law as well as common sense. Each weblink would become a legal landmine and would allow press publishers to hold every single actor on the Internet liable." Under this scheme, simply linking to copyrighted material would be legally considered "providing access," and thus require explicit permission of the rightsholder. Reda warns that it could lead to legal expenses for anyone who shares links (read: everybody), and ultimately the fragmentation of the internet.

Scan a Book In Five Minutes With a $199 Scanner? (teleread.com) 221

New submitter David Rothman writes: Scan a 300-page book in just five minutes or so? For a mere $199 and shipping — the current price on Indiegogo — a Chinese company says you can buy a device to do just that. And a related video is most convincing. The Czur scanner from CzurTek uses a speedy 32-bit MIPS CPU and fast software for scanning and correction. It comes with a foot pedal and even offers WiFi support. Create a book cloud for your DIY digital library? Imagine the possibilities for Project Gutenberg-style efforts, schools, libraries and the print-challenged as well as for booklovers eager to digitize their paper libraries for convenient reading on cellphones, e-readers and tablets. Even at the $400 expected retail price, this could be quite a bargain if the claims are true. I myself have ordered one at the $199 price.

Slashdot Top Deals

1 + 1 = 3, for large values of 1.

Working...