Forgot your password?
typodupeerror

Comment Xiaomi MIUI 10 Gestures (Score 1) 130

I have got addicted to Xiaomi MIUI 10 gestures. I think they really got something right in their implementation. Drawn in the lower half of screen: full swipe left/right equals back button press, swipe up equals home, swipe up and stay in the middle brings up the recents menu, drawn in upper half of screen swipe left/right triggers app action. I hope these gestures become a standard so there are available on all handsets.

Medicine

The Decline of American Peyote (vice.com) 81

dmoberhaus writes: An investigation into the decline of America's peyote, a hallucinogenic cactus that is critically important to the rituals of the Native American Church, the largest pan-tribal religious organization in the U.S. Motherboard spoke with Dawn Davis, a researcher using satellite data to track the destruction of peyote's habitat, as well as Salvador Johnson, one of only four people who is licensed to harvest and sell peyote in the U.S. by the DEA. "In 2011, Davis traveled to the peyote gardens for the first time and met with Johnson," reports Motherboard. "Davis said that Johnson was following many conservation best practices, such as cycling through the areas where peyote is harvested, but this hadn't slowed the steady decrease in the size and quantity of peyote buttons in his harvests. Today, the biggest threats to peyote continue to be rapid land development, poaching, and rooting by feral pigs -- problems that responsible harvesting by peyoteros can't solve."

While there has been an increase in the number of indigenous people growing peyote in greenhouses, this is only a temporary solution to the conservation crisis. Davis is advocating for conservation easements or tax breaks for landowners to encourage the protection of peyote. She also said it will be necessary to push for the DEA to reschedule peyote, which is still considered a Schedule I substance that has "no currently accepted medical use." This makes it exceedingly hard for individuals to become licensed peyoteros.
Government

New Bill Would Allow Employers To Demand Genetic Testing From Workers (businessinsider.com) 397

capedgirardeau quotes a report from Business Insider: A little-noticed bill moving through the U.S. Congress would allow companies to require employees to undergo genetic testing or risk paying a penalty of thousands of dollars, and would let employers see that genetic and other health information. Giving employers such power is now prohibited by U.S. law, including the 2008 genetic privacy and nondiscrimination law known as GINA. The new bill gets around that landmark law by stating explicitly that GINA and other protections do not apply when genetic tests are part of a "workplace wellness" program. The bill, HR 1313, was approved by a House committee on Wednesday, with all 22 Republicans supporting it and all 17 Democrats opposed. The 2008 genetic law prohibits a group health plan -- the kind employers have -- from asking, let alone requiring, someone to undergo a genetic test. It also prohibits that specifically for "underwriting purposes," which is where wellness programs come in. "Underwriting purposes" includes basing insurance deductibles, rebates, rewards, or other financial incentives on completing a health risk assessment or health screenings. In addition, any genetic information can be provided to the employer only in a de-identified, aggregated form, rather than in a way that reveals which individual has which genetic profile. There is a big exception, however: As long as employers make providing genetic information "voluntary," they can ask employees for it. Under the House bill, none of the protections for health and genetic information provided by GINA or the disabilities law would apply to workplace wellness programs as long as they complied with the ACA's very limited requirements for the programs. As a result, employers could demand that employees undergo genetic testing and health screenings.
Security

Hackers Break Into Telegram, Revealing 15 Million Users' Phone Numbers (venturebeat.com) 47

A vulnerability in Telegram has exposed the data of millions of people in Iran. Hackers in the country have compromised dozens of accounts by an SMS redirection hack, and also identified phone numbers of 15 million users, according to a report on Reuters. From the report: The attacks, which took place this year and have not been previously reported, jeopardized the communications of activists, journalists and other people in sensitive positions in Iran, where Telegram is used by some 20 million people, said independent cyber researcher Collin Anderson and Amnesty International technologist Claudio Guarnieri, who have been studying Iranian hacking groups for three years.As for the attack, hackers aren't targeting the encryption that protects messages between accounts, but how a phone number is tied to an account. When a user adds a new device to their Telegram account, the new device is confirmed through a one-time SMS message. Hackers are intercepting that SMS and cloning the data to a compromised device.

Update: Telegram reached out to Slashdot on Twitter with a link to a blog post that included:
Certain people checked whether some Iranian numbers were registered on Telegram and were able to confirm this for 15 million accounts. As a result, only publicly available data was collected and the accounts themselves were not accessed. Such mass checks are no longer possible since we introduced some limitations into our API this year. However, since Telegram is based on phone contacts, any party can potentially check whether a phone number is registered in the system. This is also true for any other contact-based messaging app (WhatsApp, Messenger, etc.). Read the rest of Telegram's official statement, including SMS codes allegedly being intercepted, here.

Submission + - DARPA's Latest Chip Is Designed to Be Bad at Arithmetic (technologyreview.com)

holy_calamity writes: Pentagon research agency DARPA has funded the creation of a chip incapable of correct arithmetic, in the hope of making computers better at understanding the real world. The S1 chip can process noisy data like video very efficiently because it doesn't need the extra circuits or operations needed to ensure every mathematical operation is performed perfectly. This summer DARPA will put five prototype computers, each equipped with 16 of the inexact S1 chips, online for researchers to experiment with.
Robotics

Untethered Miniature Origami Robot That Self-Folds, Walks, Swims, and Degrades 27

jan_jes writes: MIT researchers demonstrated an untethered miniature origami robot that self-folds, walks, swims, and degrades at ICRA 2015 in Seattle. A miniature robotic device that can fold-up on the spot, accomplish tasks, and disappear by degradation into the environment promises a range of medical applications but has so far been a challenge in engineering. This work presents a sheet that can self-fold into a functional 3D robot,actuate immediately for untethered walking and swimming, and subsequently dissolve in liquid. Further, the robot is capable of conducting basic tasks and behaviors, including swimming, delivering/carrying blocks, climbing a slope, and digging. The developed models include an acetone-degradable version, which allows the entire robot's body to vanish in a liquid. Thus this experimentally demonstrate the complete life cycle of this robot: self-folding,actuation, and degrading.
Power

Rooftop Solar Could Reach Price Parity In the US By 2016 516

Lucas123 writes: The cost of rooftop solar-powered electricity will be on par with prices of coal-powered energy and other conventional sources in all 50 U.S. states in just two years, a leap from today where PV energy has price parity in only 10 states, according to Deutsche Bank's leading solar industry analyst. The sharp decline in solar energy costs is the result of increased economies of scale leading to cheaper photovoltaic panels, new leasing models and declining installation costs, Deutsche Bank's Vishal Shah stated in a recent report. The cost of solar-generated electricity in the top 10 states for capacity ranges from 11-15 cents per kilowatt hour (c/kWh), compared to the retail electricity price of 11-37 c/kWh. Amit Ronen, a former Congressional staffer behind legislation that created an investment tax credit for solar installations, said one of the only impediments to decreasing solar electricity prices are fees proposed by utilities on customers who install solar and take advantage of net metering, or the ability to sell excess power back to utilities.
Crime

Judge Frees "Cannibal Cop" Who Shared His Fantasies Online 185

AthanasiusKircher (1333179) writes The story is classic: Boy meets Girl. Boy likes Girl. Boy goes on the internet and writes about his fantasies that involve killing and eating Girl. Boy goes to jail. In this case, the man in question, NYC police officer Gilberto Valle, didn't act on his fantasies — he just shared them in a like-minded internet forum. Yesterday, Valle was released from jail after a judge overturned his conviction on appeal. U.S. District Judge Paul Gardephe wrote that Valle was "guilty of nothing more than very unconventional thoughts... We don't put people in jail for their thoughts. We are not the thought police and the court system is not the deputy of the thought police." The judge concluded that there was insufficient evidence, since "this is a conspiracy that existed solely in cyberspace" and "no reasonable juror could have found that Valle actually intended to kidnap a woman... the point of the chats was mutual fantasizing about committing acts of sexual violence on certain women." (A New York magazine article covered the details of the case and the implications of the original conviction earlier this year.)

Submission + - Snowden Used Social Engineering To Get Classified Documents (reuters.com) 1

cold fjord writes: Reuters reports, "Edward Snowden used login credentials and passwords provided unwittingly by colleagues ... to access some of the classified material he leaked ... A handful of agency employees who gave their login details to Snowden were identified, questioned and removed from their assignments ... Snowden may have persuaded between 20 and 25 fellow workers at the NSA regional operations center in Hawaii to give him their logins and passwords by telling them they were needed for him to do his job as a computer systems administrator ... People familiar with efforts to assess the damage to U.S. intelligence caused by Snowden's leaks have said assessments are proceeding slowly because Snowden succeeded in obscuring some electronic traces of how he accessed NSA records. ... The revelation that Snowden got access to some of the material he leaked by using colleagues' passwords surfaced as the U.S. Senate Intelligence Committee approved a bill intended in part to tighten security over U.S. intelligence data. One provision of the bill would earmark a classified sum of money ... to help fund efforts by intelligence agencies to install new software designed to spot and track attempts to access or download secret materials without proper authorization."

Slashdot Top Deals

Dead? No excuse for laying off work.

Working...