Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Cellphones

Submission + - Fighting the iCrime Wave

theodp writes: 'What's the point of a mobile device,' asks WSJ reporter and iPad-beatdown-victim Rolfe Winkler, 'if people don't feel safe using it while they're mobile?' A lucrative secondhand market for today's electronics devices — a used iPad or iPhone can fetch $400+ — has produced an explosion in 'Apple picking' by thieves. So, how big is the iCrime wave? In New York City alone, there were more than 26,000 incidents of electronics theft in the first 10 months of 2011 — 81% involving mobile phones — according to an internal NYPD document. And plenty of the crimes are violent. The best way to deter theft is to reduce the value of stolen device — the wireless industry is moving to adopt a national registry that would deny service to such devices. A remote kill switch has been discussed as another approach. For its part, Apple says the company 'has led the industry in helping customers protect their lost or stolen devices,' although some are unimpressed. Could the estimated $575 in profit per iOS device be part of the problem?"

Submission + - 6 IT Projects are $8 Billion Over Budget at the Dept of Defense (federaltimes.com)

McGruber writes: The Federal Times has the stunning but not surprising news (http://www.federaltimes.com/article/20120723/DEPARTMENTS01/307230001/At-DoD-6-projects-8-billion-over-budget) that a new audit has found that Six Defense Department modernization projects are a combined $8 Billion — or 110 percent — over budget. The projects are also suffering from years-long schedule delays.

In 1998, work began on the Army’s Logistics Modernization Program (LMP). In April 2010, the General Accounting Office (GAO) issued their report "Actions Needed to Improve Implementation of the Army Logistics Modernization Program" (http://www.gao.gov/products/GAO-10-461) about the status of LMP. LMP is now scheduled to be fully deployed in September 2016, 12 years later than originally scheduled, and 18 years after development first began! (Development of the often-maligned Duke Nukem Forever (http://en.wikipedia.org/wiki/Duke_Nukem_Forever) only took 15 years.)

Prime contractors Computer Sciences Corp, Accenture, IBM and CACI obviously have learned the "If you're not a part of the solution, there's good money to be made in prolonging the problem" lesson! (http://www.despair.com/consulting.html)

Games

Submission + - Games could predict whether you're color blind, a gambler, or have ADD (venturebeat.com)

An anonymous reader writes: Lukasz Twardowski, a young Polish entrepreneur, recently made an unexpected discovery. By analyzing data from video games, he thinks he’ll be able to predict whether players are color blind, have Alzheimer’s disease, or suffer from various learning and development disorders. He can already use this data to tell whether players are gamblers, cheaters, or minors, so the profiling of medical conditions is not that distant, Twardowski claims.

“Games are the richest and the most meaningful form of human computer interaction,” said Twardowski in an interview with VentureBeat. “We can use [them] to build a full user behavioral profile.”

Encryption

Submission + - Sudoku Inspired Algorithm used for Encrypting Images (paritynews.com)

hypnosec writes: Sudoku puzzles, solved the world over by millions of users every day, have managed to grab attention of mathematicians allowing them to use the underlying mathematics as a means for scrambling or encrypting images. Yue Wu at Tufts University in Medford along with a couple of friends has used Sudoku’s 9x9 grid to formulate a completely new type of matrix mathematics. For readers who are not so mathematics savvy, a matrix is a rectangular array of numbers wherein each element can uniquely identified by its row and column number – in other words, its grid reference. As Sudoku is the reference for new technique, according to Wu and co it is possible to identify elements in an array such that each of the elements contains a digit from 1 to 9 and that it satisfies the rules of Sudoku. This means that each element can now be identified by a row reference, a column reference and a digit. According to the team there are a total of six different ways of representing each element according to Wu. Through the use of simple mathematical functions [PDF], the co-ordinates in one system can be converted to that of the other. When we consider encryption, these simple conversion functions are the key to scrambling images. So, how to go about it? One can start with an image made up of 9x9 pixels. Next, superimpose a Sudoku solution onto this grid such that each of the pixels can now be represented by the new coordinate systems. Now using any one of the conversion functions swap the position of pixels. This will effectively scramble the image.
Businesses

Submission + - Mark Zuckerberg's Big Facebook Mistake

Hugh Pickens writes writes: "Nathan Vardi writes in Forbes that in the last two months, Mark Zuckerberg has had a rude introduction to the capital markets and with Facebook’s stock in free-fall, down more than 40% from its IPO price, Zuckerberg has a big problem. "Zuckerberg did not want to deal with the pressures of being a public company. Like many entrepreneurs these days he viewed the capital markets with suspicion," writes Vardi. "So Zuckerberg made a fateful decision, he decided to keep Facebook a privately-held company for much longer than other success stories like Google or Amazon." But waiting eight years to conduct an IPO has turned out to be an impossible problem to manage. The bankers at Morgan Stanley applied all the lessons of the last 15 years and priced the IPO at $38, which was very aggressive, in an attempt to avoid leaving any money on the table and the embarrassment that a huge IPO pop would represent. With such a big valuation at IPO time, Facebook had to show some results but the numbers that Facebook announced in its first quarterly earnings report were underwhelming and the trading hordes drove Facebook’s stock down by 15% in Friday morning trading. Now the early institutional investors are heading for the exits and it's hard to imagine morale at Facebook won’t take a hit that correlates with the loss in value of the shares belonging to the employees. "The lesson of the Facebook fiasco for Silicon Valley is clear. Start-up entrepreneurs cannot evade the discipline of the capital markets any more than can the prime ministers of Spain and Italy.""
Google

Submission + - Google didn't delete all Street View Wi-Fi data (pcpro.co.uk)

nk497 writes: "Google is in more trouble over the Street View Wi-Fi data slurping incident. Two years ago Google admitted it had collected snippets of personal data while sniffing for Wi-Fi connections. The UK's data watchdog, the ICO, didn't fine Google, but did demand it delete the collected data. Following the FCC's investigation, the ICO double-checked with Google that the data was deleted, receiving confirmation that it had. Except... it hadn't all been deleted, Google has now admitted. That breaches the deal between the ICO and Google, and the watchdog has said it's in talks with other regulators about what to do next."
Medicine

Submission + - Two more men with HIV now virus-free (msn.com)

Diggester writes: Two men unlucky enough to get both HIV and cancer have been seemingly cleared of the virus, raising hope that science may yet find a way to cure for the infection that causes AIDS, 30 years into the epidemic.

The researchers are cautious in declaring the two men cured, but more than two years after receiving bone marrow transplants, HIV can't be detected anywhere in their bodies. These two new cases are reminiscent of the so-called "Berlin patient," the only person known to have been cured of infection from the human immunodeficiency virus.

Comment In the Archival Trenches... (Score 5, Informative) 186

As a professional historian who has worked in the National Archives in College Park, MD and at four different presidential libraries, which incidentally are also managed by NARA, I need to interject that this is an immense costly but valuable project.

Remember "the warehouse" from the Indiana Jones movies? NARA is a little like that in terms of size but are better organized. Aisle upon aisle, shelf upon shelf, row upon row, room upon room, floor upon floor, building upon building of neatly indexed banker's boxes with labelled folders of documents. The labels may have been checked by the archivists at NARA, but they may also simply be the labels affixed to the records by the source federal agency. The individual documents in folders are almost never labelled. In the course of my work, I gathered 30k digital pictures of documents over the course of two months. The acquisition process sounds deceptively easy. Look in the index, find key words and request boxes from the archivist. Then you look through folders to locate individual documents. In point of fact, I probably visually scanned 3M pages to see if they were "interesting" and photo worthy for future research, usually taking only a few seconds per page to make a snap judgement. My decisions on which boxes of documents to request were far more time consuming. What is the right keyword for talking about computers in government in 1970? If you said "information automation" then you would be right. A few presidential (Ford especially) libraries have updated electronic files for indexing which is a huge advantage.

On my trips to the archives, it was interesting to see both professionals and amateurs using a range of technologies. I saw really old school researchers using 3x5 note cards and taking notes on legal pads. They sometimes supplemented their work by photocopying really important documents at $.75/copy. Some researchers avoided this cost by using flat bed scanners which they carried in with them. Still other researchers brought in high end digital cameras and tripods. I used a digital camera freehanded. All of these people still need to find a way to actually get to physical proximity with the records. Digitalization would open up a new era in research.

On the metadata issue, most of these records already have copious amounts of metadata recorded in well-established fields that are used by NARA.

On the OCR issue, some documents have hand-written notes on them which would not be machine readable and sometimes are not human readable. It is likely that the documents will have to be digitally scanned and flagged if handwriting is detected.

Making these records available to the general public would be a huge advantage to anyone interested in government and US history. Come to think of it, in terms of size and complexity, it would be a worthy challenge for Google. U.S. government documents run back to the founding of the country and the number of documents only increases over time.

Government

Iran Launches Cyber-Police Units 45

Khopesh writes "Iran is implementing a cyber police force to combat social networks and similar sources of 'espionage and riots.' This will likely result in more control over internet access than efforts that might hinder attacks like Stuxnet. 'Ahmadi Moghaddam said that Iran's cyber police will take on the "anti-revolutionary" dissident groups that used online social networks to organize protests against President Mahmoud Ahmadinejad following disputed elections held in 2009. "Through these very social networks in our country, anti-revolutionary groups and dissidents found each other and contacted foreign countries and triggered riots," said Ahmadi Moghaddam, referring to the protests that took place at the time.'"
Security

Ex-NSA Analyst To Be Global Security Head At Apple 145

AHuxley writes "Cnet.com reports that Apple has tapped security expert and author David Rice to be its director of global security. Rice is a 1994 graduate of the US Naval Academy and has a master's degree in Information Warfare and Systems Engineering from the Naval Postgraduate School. He served as a Global Network Vulnerability analyst (Forbes used cryptographer) for the National Security Agency and as a Special Duty Cryptologic officer for the Navy. He is executive director of the Monterey Group, a cybersecurity consulting firm. He's also on the faculty of IANS, an information security research company and works with the US Cyber Consequences Unit. In a 2008 interview with Forbes, 'A Tax On Buggy Software,' Rice talks of a 'tax on software based on the number and severity of its security bugs. Even if that means passing those costs to consumers. ... Back in the '70s, the US had a huge problem with sulfur dioxide emissions. Now we tax those emissions, and coal power plants have responded by using better filters. Software vulnerabilities, like pollution, are inevitable — producing perfect software is impossible. So instead of saying all software must be secure, we tax insecurity and allow the market to determine the price it's willing to pay for vulnerability in software. Those who are the worst "emitters" of vulnerabilities end up paying the most, and it creates an economic incentive to manufacture more secure software.'"
Facebook

How Facebook Responded To Tunisian Hacks 227

jamie writes "Facebook's security team opens up, shedding light on a revolution that could become a parable for Internet activism. Quoting: 'After more than ten days of intensive investigation and study, Facebook's security team realized something very, very bad was going on. The country's Internet service providers were running a malicious piece of code that was recording users' login information when they went to sites like Facebook. By January 5, it was clear that an entire country's worth of passwords were in the process of being stolen right in the midst of the greatest political upheaval in two decades. Sullivan and his team decided they needed a country-level solution — and fast. Though Sullivan said Facebook has encountered a wide variety of security problems and been involved in various political situations, they'd never seen anything like what was happening in Tunisia.'"
Image

Genghis Khan, History's Greenest Conqueror 279

New research suggests that in addition to being one of history's cruelest conquerors, Genghis Khan may have been the greenest. It is estimated that the Mongol leader's invasions unintentionally scrubbed almost 700 million tons of carbon from the atmosphere. From the article: "Over the course of the century and a half run of the Mongol Empire, about 22 percent of the world's total land area had been conquered and an estimated 40 million people were slaughtered by the horse-driven, bow-wielding hordes. Depopulation over such a large swathe of land meant that countless numbers of cultivated fields eventually returned to forests. In other words, one effect of Genghis Khan's unrelenting invasion was widespread reforestation, and the re-growth of those forests meant that more carbon could be absorbed from the atmosphere." I guess everyone has their good points.
The Internet

British ISPs Embracing Two-Tier Internet 305

Barence writes "Britain's leading ISPs are attempting to construct a two-tier internet, where websites and services that are willing to pay are thrust into the 'fast lane,' while those that don't are left fighting for scraps of bandwidth or even blocked outright. Asked directly whether ISP TalkTalk would be willing to cut off access completely to BBC iPlayer in favor of YouTube if the latter was prepared to sign a big enough cheque, TalkTalk's Andrew Heaney replied: 'We'd do a deal, and we'd look at YouTube and we'd look at BBC and we should have freedom to sign whatever deal works.' Britain's biggest ISP, BT, meanwhile says it 'absolutely could see situations in which some content or application providers might want to pay BT for a quality of service above best efforts.' PC Pro asks if it's the end of the net as we know it."
Biotech

Biotech Company Making Fossil Fuels With a 'Library' of Bacteria 386

Saysys sends an excerpt from a story at the Globe and Mail: "In September, a privately held and highly secretive US biotech company named Joule Unlimited received a patent for 'a proprietary organism' – a genetically engineered cyanobacterium that produces liquid hydrocarbons: diesel fuel, jet fuel and gasoline. This breakthrough technology, the company says, will deliver renewable supplies of liquid fossil fuel almost anywhere on Earth, in essentially unlimited quantity and at an energy-cost equivalent of $30 (US) a barrel of crude oil. It will deliver, the company says, 'fossil fuels on demand.' ... Joule says it now has 'a library' of fossil-fuel organisms at work in its Massachusetts labs, each engineered to produce a different fuel. It has 'proven the process,' has produced ethanol (for example) at a rate equivalent to 10,000 US gallons an acre a year. It anticipates that this yield could hit 25,000 gallons an acre a year when scaled for commercial production, equivalent to roughly 800 barrels of crude an acre a year."

Slashdot Top Deals

This file will self-destruct in five minutes.

Working...