Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Idle

The Placebo Effect Not Just On Drugs 824

dvdme writes "It seems the placebo effect isn't just valid on drugs. It's also a fact on elevators, offices and traffic lights. An article by Greg Ross says: 'In most elevators installed since the early 1990s, the 'close door' button has no effect. Otis Elevator engineers confirmed the fact to the Wall Street Journal in 2003. Similarly, many office thermostats are dummies, designed to give workers the illusion of control. "You just get tired of dealing with them and you screw in a cheap thermostat," said Illinois HVAC specialist Richard Dawson. "Guess what? They quit calling you." In 2004 the New York Times reported that more than 2,500 of the 3,250 "walk" buttons in New York intersections do nothing. "The city deactivated most of the pedestrian buttons long ago with the emergence of computer-controlled traffic signals, even as an unwitting public continued to push on."'"
Movies

Will Netflix Destroy the Internet? 577

nicholasjay writes "Netflix is swallowing America's bandwidth and it probably won't be long before it comes for the rest of the world. That's one of the headlines from Sandvine's Fall 2010 Global Internet Phenomena Report, an exhaustive look at what people around the world are doing with their Internet lines. According to Sandvine, Netflix accounts for 20 percent of downstream Internet traffic during peak home Internet usage hours in North America. That's an amazing share — it beats that of YouTube, iTunes, Hulu, and, perhaps most tellingly, the peer-to-peer file-sharing protocol BitTorrent."
Education

Hard-to-Read Fonts Improve Learning 175

arkenian writes "Difficult-to-read fonts make for better learning, according to scientists. The finding is about to be published in the international journal Cognition. Researchers at Princeton University employed volunteers to learn made-up information about different types of aliens — and found that those reading harder fonts recalled more when tested 15 minutes later. The article goes on to note a second test in a real school environment: 'Keen to see if their findings actually worked in practice, the Princeton University team then tested their results on 222 students aged between 15 and 18 at a secondary school in Chesterfield, Ohio.'... 'Students given the harder-to-read materials scored higher in their classroom assessments than those in the control group. This was the case across a range of subjects — from English, to Physics to History.'"
Facebook

Facebook Ads Could 'Out' Gay Users 196

itwbennett writes "Researchers at Microsoft Research India and the Max Planck Institute for Software Systems in Germany have written a paper showing that a users may be inadvertently revealing their sexual preference to advertisers. 'One example was an advertisement for a nursing program at a medical college in Florida, which was only shown to gay men. The researchers said that persons seeing the ad would not know that it had been exclusively aimed at them solely based on their sexuality, nor would they realize that clicking on the ad would reveal to the advertiser, by implication, their sexual preference in addition to other information they might expect to be sent, such as their IP (Internet Protocol) address.' For its part, Facebook 'downplayed the study, saying that the site does not pass any personally identifiable information back to an advertiser.'"
Businesses

Red Hat CEO Says Software Vendor Model Is Broken 223

alphadogg writes "The current model of selling commercial enterprise software is broken, charged the CEO for Red Hat. It is too expensive, doesn't address user needs and, worst of all, it leaves chief information officers holding all the risk of implementing new systems. 'The business models between customer and vendors are fundamentally broken,' said Jim Whitehurst, speaking Wednesday at the Interop conference in New York. 'Vendors have to guess at what [customers] want, and there is a mismatch of what customers want and what they get. Creating feature wars is not what the customer is looking for.' Whitehurst estimated that the total global IT market, not including telecommunications, is about $1.4 trillion a year. Factor in the rough estimates that half of all IT projects fail or are significantly downgraded, and that only half of all features in software packages are actually used, then it would follow that 'easily $500 billion of that $1.4 trillion is fundamentally wasted every year,' he said."
Businesses

Linux To Take Over Microsoft In Enterprises 237

shougyin writes "For years, Linux has enjoyed much of its success as a replacement for Unix. Companies turned to Linux to replace Unix servers, or for new deployments within a Unix-heavy environment. Linux is still king there, but it's starting to encroach on Microsoft as well. Big companies are planning overwhelmingly (76.4%) to add more Linux servers in the next year, and less than half (41.2%) of the companies are planning to add Windows servers in the next year. Even more interesting, nearly half (43.6%) are actively planning to decrease use of Windows servers in the next year."
Medicine

Meta-Research Debunks Medical Study Findings 261

jenningsthecat writes "From The Atlantic comes the story of John Ioannidis and his team of meta-researchers, who have studied the overall state of medical research and found it dangerously and widely lacking in trustworthiness. Even after filtering out the journalistic frippery and hyperbole, the story is pretty disturbing. Some points made in the article: even the most respected, widely accepted, peer-reviewed medical studies are all-too-often deeply flawed or outright wrong; when an error is brought to light and the conclusions publicly refuted, the erroneous conclusions often persist and are cited as valid for years, or even decades; scientists and researchers themselves regard peer review as providing 'only a minimal assurance of quality'; and these shortcomings apply to medical research across the board, not just to blatantly self-serving pharmaceutical industry studies. The article concludes by saying, 'Science is a noble endeavor, but it's also a low-yield endeavor ... I'm not sure that more than a very small percentage of medical research is ever likely to lead to major improvements in clinical outcomes and quality of life.' I've always been somewhat suspicious of research findings, but before this article I had no idea just how prevalent untrustworthy results were."
Biotech

The Spread of Do-It-Yourself Biotech 206

zrbyte writes "Are you an electronics hobbyist or a garden shed tinkerer? If so, then move aside, because there's a new kid on the block: the DIY biotechnologist. The decreasing price of biotech instrumentation has made it possible for everyday folks (read: biotech geeks) with a few thousand dollars to spare to equip their garages and parents' basements with the necessary 'tools of the trade.' Some, like PCR machines, are available on eBay; other utensils are hacked together from everyday appliances and some creativity. For example: microscopes out of webcams and armpit E. coli incubators. Nature News has an article on the phenomenon, describing the weird and wonderful fruits of biotech geek ingenuity, like glow-in-the-dark yogurt. One could draw parallels with the early days of computer building/programming. It may be that we're looking at a biotech revolution, not just from the likes of Craig Venter, but from Joe-next-door hacking away at his E. coli strain. What are the Steve Wozniaks of biotech working on right now?"
Security

Unspoofable Device Identity Using Flash Memory 145

wiredmikey writes with a story from Security Week that describes a security silver lining to the inevitable errors that arise in NAND flash chips. By seeking out (or intentionally causing) defects in a given part of the chip, a unique profile can be created for any device using NAND flash which the author says may be obscured, but not reproduced: "[W]e recognize devices (or rather: their flash memory) by their defects. Very much like humans recognize faces: by their defects (or deviations from the 'norm') a bigger nose, a bit too bushy eyebrows, bigger cheeks. The nice twist is that if an attacker manages to read your device identity, he cannot inscribe it into his own device. Yes, he can create errors — like we did. But he cannot control where in the block they occur as this relies solely on microscopic manufacturing defects in the silicon."
Graphics

Erasing Objects From Video In Real Time 175

Smoothly interpolating away objects in still pictures is impressive enough, but reader geoffbrecker writes with a stunning demonstration from Germany's Technical University of Ilmenau of on-the-fly erasure of selected objects in video. Quoting: "The effect is achieved by an image synthesizer that reduces the image quality, removes the object, and then increases the image quality back up. This all happens within 40 milliseconds, fast enough that the viewer doesn't notice any delay."
The Internet

Meet NELL, the Computer That Learns From the Net 272

bossanovalithium writes "Carnegie Mellon University has taught a computer how to read and learn from the internet. According to Dennis Baron at the Oxford University press blog, the computer is called NELL and it is reading the internet and learning from it in much the same way that humans learn language and acquire knowledge. Basically by soaking it all up and figuring it out. NELL is short for Never Ending Language Learner and apparently it is getting brainier every day."
Privacy

High-Tech Microphone Picks Voices From a Crowd 221

JerryQ writes with news of an impressive audio detection system from a company called Squarehead that was demonstrated during a professional basketball game. According to Wired, "325 microphones sit in a carbon-fiber disk above the stadium, and a wide-angle camera looks down on the scene from the center of this disk. All the operator has to do is pinpoint a spot on the court or field using the screen, and the Audioscope works out how far that spot is from each of the mics, corrects for delay and then synchronizes the audio from all 315 of them. The result is a microphone that can pick out the pop of a bubblegum bubble in the middle of a basketball game..."
Hardware Hacking

The Hackintosh Guide 453

An anonymous reader writes "A 'Hackintosh' is a computer that runs Apple's OS X operating system on non-Apple hardware. This has been possible since Apple's switch from IBM's PowerPC processors to Intel processors a few years ago. Until recently, building a PC-based Mac was something done only by hard-core hackers and technophiles, but in the last few months, building a Hackintosh PC has become much easier. Benchmark Reviews looks at what it's possible to do with PC hardware and the Mac Snow Leopard OS today, and the pros and cons of building a Hackintosh computer system over purchasing a supported Apple Mac Pro."
Privacy

New CCTV Site In UK Pays People To Watch 214

pyrosine writes "Have you ever felt like being paid for watching live CCTV footage? The BBC are reporting CCTV site, 'Internet Eyes' is doing exactly that. Offering up to £1000 to people who report suspicious activity, the scheme seems an easy way to make money. Not everyone is pleased with the scheme though; the Information Commissioner's Office is worried it will lead to voyeurism or misuse, but what difference does it make when you can find said webcams with a simple Google search?"
Wikipedia

Competition Produces Vandalism Detection For Wikis 62

marpot writes "Recently, the 1st International Competition on Wikipedia Vandalism Detection (PDF) finished: 9 groups (5 from the USA, 1 affiliated with Google) tried their best in detecting all vandalism cases from a large-scale evaluation corpus. The winning approach (PDF) detects 20% of all vandalism cases without misclassifying regular edits; moreover, it can be adjusted to detect 95% of the vandalism edits while misclassifying only 30% of all regular edits. Thus, by applying both settings, manual double-checking would only be required on 34% of all edits. Nothing is known, yet, whether the rule-based bots on Wikipedia can compete with this machine learning-based strategy. Anyway, there is still a lot potential for improvements since the top 2 detectors use entirely different detection paradigms: the first analyzes an edit's content, whereas the second (PDF) analyzes an edit's context using WikiTrust."

Slashdot Top Deals

We gave you an atomic bomb, what do you want, mermaids? -- I. I. Rabi to the Atomic Energy Commission

Working...