Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Google

Google Fiber Adds 14th City: Lee's Summit 81

symbolset writes "On Thursday night the Lee's Summit city council passed three resolutions to welcome Google Fiber to their community. This is the 12th community in the Kansas City Metro Area to welcome Google Fiber and the 14th city overall. The KC map now covers almost all of the KC metro area with parts in both Kansas and Missouri. 8 months into the rollout two fiberhoods have been completed, 30 more are underway and 50 more are to start by the end of summer. This covers most of the territory of both Kansas Citys ahead of schedule and completes before the end of winter so the timeline has been accelerated. As Google runs their fiber across town it appears they're putting backbones down the major thoroughfares to be trunks out to the wider communities. With Provo wired with fiber already, Austin to start next, it looks like Google Fiber's ambitions are not to deliver their symmetric gigabit uncapped, unfiltered, inexpensive fiber Internet to just a few privileged enclaves. They still have over 1,000 cities left to go who have already petitioned to be Google Fiber cities, so it's not like they're going to run out of work."
Software

Ask Slashdot: Most Secure Browser In an Age of Surveillance? 391

An anonymous reader writes "With the discovery that the NSA may be gathering extensive amounts of data, and the evidence suggesting makers of some of the most popular browsers may be in on the action, I am more than a little wary of which web browser to use. Thus, I pose a question to the community: is there a 'most secure' browser in terms of avoiding personal data collection? Assuming we all know by know how to 'safely' browse the internet (don't click on that ad offering to free your computer of infections) what can the lay person do have a modicum of protection, or at least peace of mind?"
Advertising

Data Miners Liken Obama Voters To Caesars Gamblers 166

theodp writes "As Steve Wozniak publicly laments how government used new technologies he introduced in unintended ways to monitor people, the NY Times reports how the digital masterminds behind the Obama Presidential campaign are cashing in by bringing the secret, technologically advanced formulas used for reaching voters to commercial advertisers. 'The plan is to bring the same Big Data expertise that guided the most expensive presidential campaign in history to companies and nonprofits,' explains Civis Analytics, which is backed by Google Chairman and Obama advisor Eric Schmidt. Also boasting senior members of Obama's campaign team is Analytics Media Group (A.M.G.), which pitched that 'keeping gamblers loyal to Caesars was not all that different from keeping onetime Obama voters from straying to Mitt Romney.' The extent to which the Obama campaign used the newest tech tools to look into people's lives was largely shrouded, the Times reports, but included data mining efforts that triggered Facebook's internal safeguard alarms. ... 'We asked to see [voter's Facebook] photos but really we were looking for who were tagged in photos with you, which was a really great way to dredge up old college friends — and ex-girlfriends.' The Times also explains how the Obama campaign was able to out-optimize the Romney campaign on TV buys by obtaining set-top box TV show viewing information from cable companies for voters on the Obama campaign's 'persuadable voters' list. "
Communications

Use Tor, Get Targeted By the NSA 451

An anonymous reader sends this news from Ars Technica: "Using online anonymity services such as Tor or sending encrypted e-mail and instant messages are grounds for U.S.-based communications to be retained by the National Security Agency, even when they're collected inadvertently, according to a secret government document published Thursday. ...The memos outline procedures NSA analysts must follow to ensure they stay within the mandate of minimizing data collected on U.S. citizens and residents. While the documents make clear that data collection and interception must cease immediately once it's determined a target is within the U.S., they still provide analysts with a fair amount of leeway. And that leeway seems to work to the disadvantage of people who take steps to protect their Internet communications from prying eyes. For instance, a person whose physical location is unknown—which more often than not is the case when someone uses anonymity software from the Tor Project—"will not be treated as a United States person, unless such person can be positively identified as such, or the nature or circumstances of the person's communications give rise to a reasonable belief that such person is a United States person," the secret document stated.'"
Businesses

Pro Bono Lawyer Fights C&D With Humor 144

Zordak writes "When Jake Freivald received a questionable Cease and Desist letter from a big-firm attorney, demanding that he immediately relinquish rights to his website http://westorage.info, his pro-bono lawyer decided to treat the letter like the joke that it was. In a three-page missive, the lawyer points out the legal, constitutional, and ethical problems with the letter that led him to conclude that the letter was a joke. He concludes, in a postscript, with an unsubstantiated demand for $28,000 in overpaid property taxes, and offers to lease the city the domain name 'westorange.gov' in exchange."
Handhelds

Next SurfaceRT To Come With Qualcomm Snapdragon 800, LTE 157

recoiledsnake writes "Following up on our previous discussion of Microsoft selling discounted SurfaceRT tablets to schools (which fueled speculation about the future of Surface RT), Bloomberg is now reporting that Microsoft is fast at work on the next Surface RT which will replace the current Tegra 3 with a Qualcomm Snapdragon 800 chip which has stellar benchmarks against the likes of the upcoming Tegra 4, Apple A6X, and Exynos processors, especially in the GPU and graphics department. Since the SoC comes with 3g/LTE, this might be the first Surface to support integrated cellular data. There are also indications that there could be an 8" version, and that the new versions might be revealed alongside the Windows 8.1 preview bits at the upcoming BUILD conference, starting on June 26."
Crime

2 Men Accused of Trying To Make X-Ray Weapon 470

gurps_npc writes "Two radical pro-Israel terrorists were caught in upstate NY when they tried to solicit money from various honorable Jewish organizations to build a truck based x-ray weapon. They intended to drive the truck around and then turn on the x-ray machine, focusing on enemies of Israel. But the Jewish organizations they tried to solicit money from refused to participate. Instead they called the FBI, who promptly set up a sting. The men were arrested before the machine was in working order."
Biotech

Monsanto Executive Wins World Food Prize 271

sfcrazy writes "A top Monsanto executive has won the prestigious World Food Prize. Secretary of State John Kerry announced the award where Robert T. Fraley, the executive vice president and CTO of Monsanto, won the prize along with two other scientists from Belgium and the US. The award was given for devising a method to insert genes from another organism into plant cells, which could produce new genetic lines with highly favorable traits."
The Almighty Buck

Have We Hit Peak HFT? 476

CowboyRobot writes "There was a time when people wanted the fastest networks so that they could trade at lightning speeds. They deployed the smartest formulas at trading venues where no one could know who was asking for that big block of stocks on the other end of the deal. It was a wild time and people made a lot of money along with some very unwise decisions. Wall Street seems to be acting out the lyrics to a Don Henley song. The party's over, the hangover is raging and no one really knows what happened the night before. The number of shares traded via high-frequency trading are down and politicians want to roll out a tax to serve as a speed bump. Iowa Senator Tom Harkin and Oregon Representative Peter DeFazio want a .03 percent tax on nearly every trade in nearly every market in the U.S. Some are wondering if microsecond dealings are poised to fade away. As the founder of HFT firm Tower Research Capital Mark Gorton puts it, 'The easy money's gone. We're doing more things better than ever before and making less money doing it.'"
Censorship

Saudi Arabia Set To Ban WhatsApp, Skype 122

Reuters reports that Saudi Arabia's government, after banning Viber within the kingdom, is poised to prohibit at least two other such communication apps: Skype and WhatsApp. Says the article: "Conventional international calls and texts are a lucrative earner for telecom operators in Saudi Arabia, which hosts around nine million expatriates. These foreign workers are increasingly using Internet-based applications such as Viber to communicate with relatives in other countries, analysts say." With fewer legal options, a wide-scale Internet censorship regime would be easier to implement, too.
United Kingdom

ISPs To Censor Porn By Default In the UK By 2014 310

An anonymous reader writes "Parental filters for pornographic content will come as a default setting for all homes in the UK by the end of 2013, says David Cameron's special advisor on preventing the sexualization and commercialization of childhood, Claire Perry MP. Internet service providers will be expected to provide filtering technology to new and existing customers with an emphasis on opting out, rather than opting in."
The Courts

Ortiz-Heymann: the Prior Generation 57

theodp writes "Two decades before the White House was petitioned to remove U.S. Attorney Carmen Ortiz and her Assistant U.S. Attorney Stephen Heymann from their jobs for the allegedly overzealous prosecution of Aaron Swartz, the Boston Globe reported on allegations of 'sometimes heavy-handed tactics and inaccuracies' of an NFL investigation into sexual harassment charges made by a sportswriter against the New England Patriots that was led by Watergate prosecutor Philip Heymann (Stephen's father) and included Ortiz. 'From the day Philip Heymann and his colleagues walked into Foxboro Stadium to investigate Lisa Olson's charges of sexual harassment,' the Globe reported, 'the New England Patriots were on the defensive, and apparently, they stayed there to the end. One day after conducting a preliminary six-hour interview with Olson, Heymann introduced each investigator to the Patriots and outlined their backgrounds at a meeting he later called benign. Yet he also said two weeks ago, "They were frightened from the beginning by the way I introduced people. I said that Jerry O'Sullivan had been US Attorney. I said Jim Ring had been FBI special agent in charge of organized crime."'

Regarding Ortiz, the Globe reported, 'Heymann investigator Carmen Ortiz wrote in a memo of her Oct. 18, 1990, interview with [Lisa Olson] that she took no notes and did not tape-record the conversation. Yet she used direct quotes when writing up her 15-page report on the session. When asked to explain, she referred the Globe to Heymann.' Aside from transcripts of two interviews (the tapes of which were destroyed), the Globe reported the NFL kept no notes on its interviews with 89 other people. '"It was contemplated that there would be a motion such as this [a lawsuit by Olson] and we did not want to create that type of document," an NFL attorney explained. According to the Globe, an attorney representing the Patriots said that 'one reason the tapes were destroyed may be that the NFL did not want anyone to hear raised voices or pounding of tables. He said some of those interviewed were not allowed to leave the room and had their livelihoods threatened if they did not cooperate.' Curiously, the elder Heymann featured prominently in a recently-upheld DOJ motion to keep the names of key people involved in the Aaron Swartz case secret — a postcard threat received by Philip Heymann was cited by Ortiz's office as evidence of why such secrecy was necessary."
Lord of the Rings

Dotcom Alleges Megaupload Raid Was Part of Deal To Film The Hobbit 112

c0lo writes "Kim Dotcom alleges, in an 20 min interview with the Australian public television, that Megaupload was offered up by the New Zealand's PM 'on a silver platter' as part of negotiations with Warner Brothers executives for shooting The Hobbit in New Zealand. He promises that he'll substantiate the claims in court. He also says that the extradition case the U.S. government is weak and the reason behind the latest delay in extradition hearing (postponed from August this year to March next year) is an attempt to bleed Dotcom dry of his money. Also interesting, Dotcom says that the latest debacle of the massive scale online online surveillance by U.S. spy agencies has triggered an 'explosion' of interest in mega.co.nz, the 'cloud storage' site with user generated encryption."
Privacy

Keeping Your Data Private From the NSA (And Everyone Else) 622

Nerval's Lobster writes "If those newspaper reports are accurate, the NSA's surveillance programs are enormous and sophisticated, and rely on the latest in analytics software. In the face of that, is there any way to keep your communications truly private? Or should you resign yourself to saying or typing, 'Hi, NSA!' every time you make a phone call or send an email? Fortunately there are ways to gain a measure of security: HTTPS, Tor, SCP, SFTP, and the vendors who build software on top of those protocols. But those host-proof solutions offer security in exchange for some measure of inconvenience. If you lose your access credentials, you're likely toast: few highly secure services include a 'Forgot Your Password?' link, which can be easily engineered to reset a password and username without the account owner's knowledge. And while 'big' providers like Google provide some degree of encryption, they may give up user data in response to a court order. Also, all the privacy software in the world also can't prevent the NSA (or other entities) from capturing metadata and other information. What do you think is the best way to keep your data locked down? Or do you think it's all a lost cause?"

Comment Re:No updates in 6 years? (Score 5, Informative) 197

It consists of an inherently lossy encoding in the frequency domain (like MP3) plus an encoding of the difference between the lossily encoded audio and the original.

While a few other lossless formats do this (mostly for backward-compatibility), FLAC does not convert the audio into the frequency domain. It either uses a polynomial or linear function: http://xiph.org/flac/documentation_format_overview.html

Slashdot Top Deals

What is research but a blind date with knowledge? -- Will Harvey

Working...