Forgot your password?
typodupeerror
Social Networks

Researchers Show How Easy It Is To Manipulate Online Opinions 115

jcatcw writes "A recent study shows that a single random up-vote, randomly chosen, created a herding behavior in ratings that resulted in a 25% increase in the ratings but the negative manipulation had no effect. An intuitive explanation for this asymmetry is that we tend to go along with the positive opinions of others, but we tend to be skeptical of the negative opinions of others, and so we go in and correct what we think is an injustice. The third major result was that these effects varied by topic. So in business and society, culture, politics, we found substantial susceptibility to positive herding, whereas in general news, economics, IT, we found no such herding effects in the positive or negative direction."
Biotech

GM Rice Passes Unexpected Benefits To Weeds 208

ananyo writes "A genetic-modification technique used widely to make crops herbicide resistant has been shown to confer advantages on a weedy form of rice, even in the absence of the herbicide. Used in Monsanto's 'Roundup Ready' crops, for example, resistance to the herbicide glyphosate enables farmers to wipe out most weeds from the fields without damaging their crops. A common assumption has been that if such herbicide resistance genes manage to make it into weedy or wild relatives, they would be disadvantageous and plants containing them would die out. But the new study led by Lu Baorong, an ecologist at Fudan University in Shanghai, challenges that view: it shows that a weedy form of the common rice crop, Oryza sativa, gets a significant fitness boost from glyphosate resistance, even when glyphosate is not applied. The transgenic hybrids had higher rates of photosynthesis, grew more shoots and flowers and produced 48 — 125% more seeds per plant than non-transgenic hybrids — in the absence of glyphosate, the weedkiller they were resistant to."
Privacy

Israel Airport Security Allowed To Read Tourists' Email 438

wiredmikey writes "Israeli security officials at Ben Gurion airport are legally allowed to demand access to tourists' email accounts and deny them entry if they refuse, the country's top legal official said on Wednesday. Details of the policy were laid out by Attorney General Yehuda Weinstein in a written response to the Association for Civil Rights in Israel (ACRI), the group said in a statement. 'In a response dated April 24, 2013, the attorney general's office confirmed this practice,' ACRI said, quoting sections of the document which said it was only done in exceptional cases where 'relevant suspicious signs' were evident and only done with the tourist's 'consent'. 'Allowing security agents to take such invasive measures at their own discretion and on the basis of such flimsy "consent" is not befitting of a democracy,' commented Lila Margalit from ACRI."

Comment Re:Let's try to explain the technology (Score 1) 90

That is a good question.

My answer hovers between two choices, "not a lot" and "no idea". The reason for this is that the translation code should be generally rather straightforward. There is a bigger cost for buffer allocation and destruction, and a smaller cost with frame update.

Each time a buffer is created or destroyed, libhybris will need to do some internal bookkeeping to match the Wayland buffers with Android buffers. Some of the under-the-hood memory allocations may be more expensive than others, so I can't say where the bottlenecks will be. For frame updates, there should be little more than simply copying and re-associating geometry values and memory handles (basically integers), since the actual buffer holding the visual content is not touched.

At least that's how I understand it. I trust we'll get benchmarks eventually.

Comment Let's try to explain the technology (Score 5, Informative) 90

Phoronix article is quite low on information, and even the original post at http://mer-project.blogspot.fi/2013/04/wayland-utilizing-android-gpu-drivers.html assumes some technical knowledge of graphics stack. The basic idea is actually pretty simple. I'll try to break it down.

  1. The SoC vendors are willing to target only Android
  2. Android GPU drivers are built against Bionic libc
  3. The GPU drivers talk to hardware, and expose themselves via EGL and GLESv2
  4. EGL is basically a common API for GPU memory management, buffer (region of memory used for rendering) allocation and display updates
  5. GLESv2 stands in for the functionality we commonly associate with OpenGL
  6. GPU drivers form a combination of EGL and GLESv2 libraries, each GPU vendor providing their own

This is where libhybris comes into play. The GPU driver libraries don't work without Bionic libc - so libhybris, while running on top of regular linux (and thus [e]glibc), keeps a private Bionic libc open for the GPU drivers' use, and redirects all the EGL/GLESv2 calls to the GPU driver libraries. These libraries run in their own Bionic universe, and tell the actual display hardware what to do.

The new part about Wayland support is just a logical extension of the same behaviour. Wayland already depends on EGL for buffer management, so "all" it really needs is a native display handler. Now as it happens, the native Android display structure can be mapped to the Wayland-EGL display structure. It's not trivial, but it's certainly doable. Thanks to libhybris, the Wayland libraries see a correct native display type and operate on that, while the Android GPU libraries see their respective native display type and thus can drive the hardware as ever before. After all, it's still the SAME hardware regardless of what operating system we may be running. Registers are registers and memory is still memory. From the GPU drivers' point of view nothing has changed.

So what has happened? In addition to just redirecting graphics stack calls to Android drivers, we are now also translating the display subsystem between two somewhat different systems.

If all of the above sounds eerily familiar, you are correct. In networking this kind of design is called a proxy, or if we're talking about link layer, it would be a multi-protocol label switch. Logically there's not much difference.

Comment Re:Say what? Streisand effect on security perhaps? (Score 4, Insightful) 100

Let me get this straight, so I know we're on the same page.

There is a major vulnerability in basically ALL Postgres installations in the world. That means it has not been introduced by any recent commits. The patch(es) are not yet public, and the repositories have been made non-public while the fix is in the works.

The fix is likely delayed somewhat by the occurrence of Easter holidays. Lots of people have taken extended weekends - probably a good number of Postgres devs included. There is probably no sane way to deploy the fixed versions until after the holidays. Not everyone can afford 24/7 admins.

And you want to complain about the developers being irresponsible when dealing with this?

(For the record: I'm pretty much a full-disclosure guy, but a slightly delayed disclosure with NO IN-THE-WILD EXPLOITS for a vulnerability that is discovered just ahead of a major holiday weekend... I can live with that.)

Comment Re:Missing the point. (Score 2) 134

Social games aren't supposed to be *fun*.

There was a pretty good write-up on the topic more than a year ago: Who killed videogames?

It's a long read, but most of the important points are made in the first page. The rest (sadly) qualifies for TL;DR - it simply rehashes and expands on the same ideas from different angles and in more depth.

Comment Re:What company (Score 4, Interesting) 451

Why not offer two "phone gateways" for your support? One for customers with existing support contract, and another for those without.

For support contract line, have a robot switchboard system that requires a valid support contract code. All other callers would have to go through a premium rate number. Sure, it adds one extra step for customers who have contracts but they probably don't need to call you too often anyway.

Keep the distinctions clearly visible in your help screen. The premium rate probably discourages useless support calls, and those who perceive a need for more frequent support can easily crunch the numbers and decide which option they prefer.

Medicine

Ultrasound Waves For Transdermal Drug Delivery 32

An anonymous reader writes with news of research from MIT, where engineers have found a better way to use ultrasound waves to boost the permeability of skin for the delivery of drugs. "Ultrasound — sound waves with frequencies greater than the upper limit of human hearing — can increase skin permeability by lightly wearing away the top layer of the skin, an effect that is transient and pain-free. ... When ultrasound waves travel through a fluid, they create tiny bubbles that move chaotically. Once the bubbles reach a certain size, they become unstable and implode. Surrounding fluid rushes into the empty space, generating high-speed 'microjets' of fluid that create microscopic abrasions on the skin. In this case, the fluid could be water or a liquid containing the drug to be delivered. In recent years, researchers working to enhance transdermal drug delivery have focused on low-frequency ultrasound, because the high-frequency waves don’t have enough energy to make the bubbles pop. However, those systems usually produce abrasions in scattered, random spots across the treated area. In the new study (abstract), the MIT team found that combining high and low frequencies offers better results. The high-frequency ultrasound waves generate additional bubbles, which are popped by the low-frequency waves."
Government

Copyright Industry Calls For Broad Search Engine Controls 421

The copyright battles going on right now are not all about SOPA, PIPA, or even the wider-reaching ACTA: suraj.sun snips thus from TorrentFreak: "At a behind-closed-doors meeting facilitated by the UK Department for Culture, Media and Sport, copyright holders have handed out a list of demands to Google, Bing and Yahoo. To curb the growing piracy problem, Hollywood and the major music labels want the search engines to de-list popular filesharing sites such as The Pirate Bay, and give higher ranking to authorized sites. ... If the copyright industry had their way, Google and other search engines would no longer link to sites such as The Pirate Bay and isoHunt. In a detailed proposal handed out during a meeting with Google, Yahoo and Bing, various copyright holders made their demands clear. The document, which describes a government-overlooked 'Voluntary Code of Practice' for search engines, was not intended for public consumption but the Open Rights Group obtained it through a Freedom of Information (FOI) request."
Censorship

Dutch Court Forces ISPs To Block the Pirate Bay 304

New submitter swinferno writes "After recent successes in Finland, Italy and Belgium, the Dutch Copyright protection organization BREIN has obtained a verdict that forces two major ISPs to block access to The Pirate Bay domains and gives them the right to submit future domains/IP addresses to be blocked in the future without court order."
The Internet

Average Web Page Approaches 1MB 319

MrSeb writes "According to new research from HTTP Archive, which regularly scans the internet's most popular destinations, the average size of a single web page is now 965 kilobytes, up more than 30% from last year's average of 702KB. This rapid growth is fairly normal for the internet — the average web page was 14KB in 1995, 93KB by 2003, and 300KB in 2008 — but by burrowing a little deeper into HTTP Archive's recent data, we can discern some interesting trends. Between 2010 and 2011, the average amount of Flash content downloaded stayed exactly the same — 90KB — but JavaScript experienced massive growth from 113KB to 172KB. The amount of HTML, CSS, and images on websites also showed a significant increase year over year. There is absolutely no doubt that these trends are attributable to the death throes of Flash and emergence of HTML5 and its open web cohorts." If you have a personal home page, how big is it?

Comment Leak, not a hack (Score 4, Interesting) 129

Bit of background: Finland has pretty strict privacy laws, and compiling personal detail lists, such as this, is subject to regulation. Very few care about that. What really matters is that storing such lists has certain requirements - and disseminating them is explicitly unlawful.

The leaked list is apparently a compilation of 10 (or more) smaller lists. Criminal Bureau are going after the person who compiled and published the list, and the morons who compiled the original lists will probably get off with less than a slap on their wrists.

The original compilations have been passed around via mailing lists. I'll let that sink in.

[Puts on the cynic hat]
What should be a wake-up call to enforce the collection and dissemination rules will be used to drum up the threat of Anonymous and increased possibility to get spammed. The real problem, namely the near-criminal negligence with which this type of data is handled, will be ignored.

In a nutshell: someone who had access to multiple lists exposed a systematic indifference to privacy laws and the utter ignorance of decent practices. The leak itself will be vilified, while the practices which allowed this to happen with such trivial effort are unlikely to be addressed.

Facebook

Facebook Punishes Devs Who Shared User IDs 71

A couple weeks ago, we discussed news that some Facebook application developers were selling or accidentally sharing user IDs to advertisers and data brokers in violation of Facebook's privacy terms. Now, the company writes that they've updated the policy to dictate how UIDs can be handled within applications, and also punished the offending developers by blocking access to the site's communication channels for a period of six months. Quoting: "While we determined that no private user data was sold and confirmed that transfer of these UIDs did not give access to any private data, this violation of our policy is something we take seriously. As such, we are taking action against these developers by instituting a 6-month full moratorium on their access to Facebook communication channels, and we will require these developers to submit their data practices to an audit in the future to confirm that they are in compliance with our policies. This impacts fewer than a dozen, mostly small developers, none of which are in the top 10 applications on Facebook Platform. We have also reached an agreement with Rapleaf, the data broker who came forward to work with us on this situation. Rapleaf has agreed to delete all UIDs in its possession, and they have agreed not to conduct any activities on the Facebook Platform (either directly or indirectly) going forward."

Slashdot Top Deals

My idea of roughing it turning the air conditioner too low.

Working...