Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×
Communications

Gemalto Launches eSIM Technology for Windows 10 Devices (business-standard.com) 47

An anonymous reader shares a report: Global digital security firm Gemalto on Tuesday announced it will make available its on-demand connectivity and eSIM technology for Microsoft's Windows 10 devices. The eSIM is designed to be remotely provisioned by mobile network operators with subscription information and is globally interoperable across all carriers, device makers and technology providers implementing the specification. Gemalto's On-Demand Connectivity solution gives service providers the capability to deliver a seamless customer experience for connecting consumer and industrial devices. "eSIM technology remains an important investment for Microsoft as we look to create even more mobile computing opportunities," said Roanne Sones, General Manager (Strategy and Ecosystem), Microsoft.

Comment Re:BBS (Score 1) 181

Most of the early boards I called were Renegade, one was WWIV, one was Telegard.

Then I discovered a board running Excelsior! and the rest quickly faded. Inherently multi-line, and supported inter-system links, so I was calling one Excelsior! BBS with 6 lines, and one of them was a dedicated linking line to another board the next city over (still a local call, but itself was local to different folks) with 12 lines, and that was linked to yet another with 8, and everyone could communicate. It was... phenomenally addictive. My grades reflected that.

Comment Re:BBS (Score 1) 181

> both sides of the disk were coated with media.

Yup. Some single-sided drives used only the top surface, and some used only the bottom, but the "single-sided" disks didn't specify which systems they were intended for, ergo both sides must've been usable!

I have a box full of those notch punches in the basement. One of these days I'm gonna go to VCFMW and hand 'em out like candy. :)

Comment Re:This explains it all (Score 1) 395

The tower doesn't need to know your location for that to happen.

Actually in CDMA, they do, to get the timing-advance that allows soft-handoff to work. It's down to tens of nanoseconds to make the chips line up when they're received at your location, and that means the trilateration accuracy is down to tens of feet.

Also, all modern standards are based on CDMA for the air-interface portion, because it's so efficient.

Look up any of the hyphenated terms if you care to learn more.

Crime

Mars Rover Code Used For Cyber-Espionage Malware 78

An anonymous reader writes: Two open-source libraries used in the Mars Rover software have been integrated in the source code of a malware family (nicknamed Rover) used as part of a cyber-espionage campaign against the Indian government (Indian Ambassador to Afghanistan). The two libraries are OpenCV and OpenAL, two libraries for processing image and audio information. As such, the Rover malware can take screenshots, record video and audio.

Comment This is called "cable mining" in the telephone biz (Score 1) 169

And Ma Bell has been doing it for a century. Cable rack in the central offices gets crowded after just a few decades, otherwise.

There's precedent, there are specialized tools and procedures for error reduction, and worldwide there are at least dozens, perhaps hundreds, of people with lots of experience in this very specific field.

Comment Blind folks still use cassette tape quite a lot. (Score 5, Interesting) 169

You can feel the weight balance to tell how much of the tape is on one reel versus the other. You can rewind and fastforward by gut-feeling, with no display. Every operation of the player is tactile, and there are no hidden options menus, touchscreens, or any of that crap.

Comment Opportunity (Score 1) 89

Police are not thinking on all cylinders. Anonymity works both ways. They need some undercover agents on Tor joining (and reporting on) plans ASAP (at least to the extent they are leaked to new recruits). I suspect, however, that ISIS recruits have to meet physically with handlers at some point - and at that point the undercover work becomes exceedingly dangerous.

Power

Company Extends Alkaline Battery Life With Voltage Booster 243

New submitter ttsai writes: Batteroo is a Silicon Valley company preparing to release its Batteriser product in September. The Batteriser is a small sleeve that fits around alkaline batteries to boost the voltage to 1.5V. This means that batteries that would otherwise be thrown into the trash when the voltage dips to 1.3V or 1.4V could be used until the unboosted voltage reaches 0.6V, extending the useful life of a battery 8x, according to the company. This product has the potential to reduce the number of batteries in landfills as well as increasing the time between replacing batteries. The expected price of the sleeve is $10 for a pack of 4 sleeves.

Comment The Face (Score 1) 290

Our small software company had a customer that would often complain, "The computer is sticking it's tongue out at me again!" For a custom module, I installed an error dialog for one particular error that displayed an animated face sticking it's tongue out. When she finally ran into this error, she was so tongue tied, she for the first time did *not* say "The computer is sticking it's tongue out at me!"

Encryption

Tor Project Aims To Eclipse US Government Funding 53

An anonymous reader writes Developed by the U.S. Navy and the recipient of millions of dollars of government grants, the Tor Project is now aiming to ween itself off dependence of U.S. government funds "including setting a goal of 50 percent non-U.S. government funding by 2016." The initiative comes after months of discussion over what some vocal critics deemed a contradiction in funding and purpose.

Submission + - A ChillingEffects.org for Domain Names (indolering.com)

fsterman writes: Domain name seizures used to be a rare occurrence, but US law enforcement has become adept at exploiting a quirk in the Internet's governance structure that allows them to seize a wide range of domains without due process. The rate has been increasing exponentially, with a total of 87 in 2010 to 1,700 in mid-2013. A month ago, nearly 5,000 domains were seized by a corporation using civil proceedings. The types of attacks targeting DNS have been increasing as well, such as when a US embassy had GoDaddy shut down a political protest site.

Slashdot Top Deals

Your code should be more efficient!

Working...