Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re:Is it leaked or is it not yet leaked? (Score 2) 165

"The real question"? Really?

You have no right at all to know what is on my "secret list". I have compiled it by digesting every news article published worldwide on the subject of underwater cribbage, and cataloging the names mentioned in any way. My reasoning is that people who have anything to do with that horrible sport are more likely to die by drowning, and I will base my Life Insurance rate quotes to them on that belief.
You want to know who is on the list and why? Tough.

You want to sue me for unfair business practices? Go ahead. But don't whinge about actuarial tables that say middle aged black men are more likely to die of heart disease than young females from the Mediterranean. While liars may figure, figures don't lie.

Any company has a fiduciary responsibility to manage risk. One way to manage risk is by getting as much information as you can and making decisions based on that information. If you have bad information, you're not doing it right. But if you have no information, or are proscribed from making decisions based on what you know, you are (rightfully) out of business.

Submission + - Attorney held liable for using "generic" E-Mail?

bbsguru writes: An attorney in New York is being sued for using an AOL email account. The plaintiffs accuse their Real Estate attorney of "negligently using a "notoriously vulnerable" AOL email account that was hacked by cybercriminals who then stole nearly $2 million".
Aside from this possible risk, what does it tell you when your [attorney | broker | accountant | financial advisor] has a generic email account?

Submission + - The Man Behind Google's Takeover Of The Map (fastcompany.com)

tedlistens writes: Google’s map isn't just a map. It's a living, complex manifestation of the data that billions of users and a team of thousands of engineers and designers feed it every day. The public face of the company's mapping effort is Ed Parsons, a gregarious Briton and geographer who as its Google's Geospatial Technologist evangelizes for its mission of organizing the world's geographic information. He also works on building the trust the company needs to make Google Maps and Google Earth more detailed, useful, and increasingly, 3-D and interactive—what he describes as “a selfie for the planet.”

The terrain isn't easy: that mission faces challenges from cartographical purists, hoping to preserve the art of cartography, and the democratic mappers of OpenStreetMap (“it’s become almost a parody," says Parsons); from governments seeking to police sensitive borders; from a host of tech companies fighting over the map business; and from privacy defenders concerned about what Google does with that data. "We’re kind of looking at what to do with it. We’ve got a very rich source of data there, but also one that we have to be very careful of," he says. "Your location on the planet is one of the most sensitive pieces of information that anyone can hold on you."

Comment ANY Single Source balanced news (Score 4, Insightful) 639

The only reason this is the least bit interesting is that there are so many people who consider Facebook a primary news source.
This Pew Research poll of last summer shows 63% of FB users get their news there (up from 47% two years ago).

ANYBODY who gets their news from only one source simply doesn't care whether it's true.

And we all know what they say about news without truth, right?

It gets repeated...

Comment For a given value of "cognitive"... (Score 1) 311

Yes, there are many physical things a machine can do as well or better than a human, though the task of building such a machine is to date not one of them.

As to the nascent "cognitive" capabilities of machines, take another look. For example, while there are some wonderful things being done with pattern recognition, that is largely a mathematical function.

Computers are great at math, hence the name. But things that can not be reduced to mathematics are still very much the domain of organic life forms.
Even at the blistering current pace of progress in the field, I am confident that we are far away from an artificial intelligence fully capable of true cognition.

Months, at least.

Submission + - This New Chip Can Trasmit and Receive Signals at Once, Doubles Data Capacity (ieee.org) 1

Wave723 writes: A new chip by Columbia University researchers uses a circulator made of silicon transistors to re-route signals and avoid interference from a transmitter and receiver that share the same antenna. This technology instantly doubles data capacity and could eventually be built into smartphones and tablets. The chip enables them to work around the principle of "reciprocity," in which electromagnetic waves are thought to always travel along the same path both forward and backward. Traditionally, electronic devices required two antennas — a transmitter and receiver — that took turns or operated on different frequencies in order to exchange signals.

Submission + - FAA Confirms: Shooting Down a Drone is a Federal Felony 1

PvtVoid writes: [The FAA is] unequivocally confirming that it’s a federal crime to shoot down a drone, as John Goglia reports in Forbes. Goglia explains the FAA offered this ruling in response to his questions on the topic, citing 18 USC. 32, which “makes it a felony to damage or destroy an aircraft.”

Not linking to Forbes, because, well, Forbes. Here's the Slate.

Submission + - Flexible Sheet Camera Bends to Give a New Field of View (gizmag.com)

Zothecula writes: Researchers have developed a sheet camera with a flexible lens array which could be wrapped around everyday objects, turning them into cameras. The project, which uses elastic optics, could also see the development of credit card-thin cameras which a photographer simply bends to change the field of view.

Submission + - Optional Windows Update Aims To Halt Wireless Mouse Hijacking

itwbennett writes: An optional Windows patch released Tuesday protects against an attack, dubbed MouseJack, that affects wireless mice and keyboards from many manufacturers, including Microsoft and allows attackers to spoof a wireless mouse from up to 100 meters away and send rogue keystrokes instead of clicks to a computer. According to a Microsoft security advisory, the devices affected by this attack are: Sculpt Ergonomic mouse, Sculpt Mobile Mouse, Wireless Mobile Mouse 3000 v2.0, Wireless Mobile Mouse 3500, Wireless Mobile Mouse 4000, Wireless Mouse 1000, Wireless Mouse 2000, Wireless Mouse 5000 and Arc Touch Mouse. But Marc Newlin, one of the researchers who developed the attack said on Twitter that the patch doesn't go far enough and 'injection still works against MS Sculpt Ergonomic Mouse and non-MS mice.'

Submission + - iOS 1970 Bug Is Back, Can Be Exploited via Rogue WiFi Networks (softpedia.com)

An anonymous reader writes: Back in February iOS users noted that setting your phone/tablet's date to January 1, 1970 would permanently brick their devices. After Apple fixed the issue in iOS 9.3.1, two security researchers have now uploaded a video on YouTube showing how to exploit this bug from a remote location, with no access to the user's phone. The setup involves attackers putting up a WiFi network on which they're running a rogue NTP server. This server tells iOS devices syncing their time that it's December 31, 1969, 23:59:00. Twenty minutes later, if the battery didn't catch fire (which is possible with this new exploit), the iPad or iPhone device is permanently and irreversibly bricked.

Submission + - The birth of IT: The IBM System/360 turns 52 (networkworld.com)

coondoggie writes: IT can trace its roots back to arguably the most important computer introduction made 52 years ago today. April 7, 1964 was the day IBM introduced its System/360, the first true mainframe for the masses, or at least that’s what it hoped on that day.

Submission + - Encryption We Can Trust: Are We There Yet?

An anonymous reader writes: Encryption is arguably the most important single security tool that we have, but it still has some serious growing up to do. The current debate about the pros and cons of ubiquitous encryption and the FBI’s request for Apple to unlock iPhones reinforces the public notion that encryption is unbreakable, even by the nation state, unless artificially weakened by backdoors. Everyone in the industry knows this isn’t true – there is a difference between strong and weak encryption. Perhaps surprisingly those differences have almost nothing to do with encryption itself – or at least the math behind encryption. Encryption relies on secrets, digital keys to lock and unlock the data. Whether those secrets can be guessed or stolen is what makes all the difference.

Submission + - Does That App Need A Backup Generator? Rethinking Data Center Design (datacenterfrontier.com)

1sockchuck writes: A growing number of data center customers are using a hybrid power design, running mission-critical workloads in traditional data halls, while shifting others apps to space that offers high-density cooling, but with no generator or UPS support. As a result, service providers are retooling their data centers to offer both types of space under the same roof. The "low resiliency" offering is way cheaper, in some cases less than half the cost of standard Tier III data halls. This offers the ability to match costs to workload, while allowing data center operators to retain applications that otherwise might be considered for cloud.

Slashdot Top Deals

IOT trap -- core dumped

Working...