Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:No. (Score 5, Informative) 198

A whole interview rarely carries over. I was asked if I thought Apple would be around in 100 years. My reply even referred to IBM, along the lines of what you can do and how many restarts you can get when you are that big. I facetiously jabbed at the idea of Trump seeking advice from today's huge internet companies by telling the reporter that they would all ask for lower taxes and become larger yet.

Submission + - Investigation Finds Inmates Built Computers, Hid Them In Prison Ceiling (cbs6albany.com)

An anonymous reader writes: The discovery of two working computers hidden in a ceiling at the Marion Correctional Institution prompted an investigation by the state into how inmates got access. In late July, 2015 staff at the prison discovered the computers hidden on a plywood board in the ceiling above a training room closet. The computers were also connected to the Ohio Department of Rehabilitation and Correction's network. Authorities say they were first tipped off to a possible problem in July, when their computer network support team got an alert that a computer "exceeded a daily internet usage threshold." When they checked the login being used, they discovered an employee's credentials were being used on days he wasn't scheduled to work. That's when they tracked down where the connection was coming from and alerted Marion Correctional Institution of a possible problem. Investigators say there was lax supervision at the prison, which gave inmates the ability to build computers from parts, get them through security checks, and hide them in the ceiling. The inmates were also able to run cabling, connecting the computers to the prison's network.

Submission + - Google Ruins the Assistant's Shopping List, Turns It Into a Google Express Ad (arstechnica.com)

An anonymous reader writes: The Google Assistant, Google's voice assistant that powers the Google app on Android phones, tablets, and Google Home, has just gotten a major downgrade. In a move reminiscent of all the forced and user-hostile Google+ integrations, Google has gutted the Google Assistant's shopping list functionality in order to turn it into a big advertisement for Google's shopping site, Google Express. The shopping list has been a major feature of the Google Assistant. You can say "Add milk to my shopping list," and the Google Assistant would dutifully store this information somewhere. The shopping list used to live in Google Keep. Keep is Google's primary note-taking app, making it a natural home for the shopping list with lots of useful tools and management options. Now the shopping list lives in Google Express. Express is an online shopping site, and it has no business becoming a dedicated place to store a shopping list that probably has nothing to do with Google's online marketplace. Since Google Express is an online shopping site (and, again, has no business having a note-taking app grafted onto it), the move from Keep to Google Express means the Assistant's shopping list functionality loses the following features: Being able to reorder items with drag and drop.
Reminders; Adding images to the shopping list; Adding voice recordings to the shopping list; Real time collaboration with other users (Express has sharing, but you can't see other people as they type—you have to refresh.); Android Wear integration; Desktop keyboard shortcuts; Checkbox management: deleting all checked items, unchecking all items, hiding checkboxes. Alternatively, the move from Keep to Google Express means the Assistant shopping list gains the following features: Google Express advertising next to every list item; Google Express advertising at the bottom of the page.

Submission + - The Kodi development team wants to be legitimate and bring DRM to the platform. (torrentfreak.com)

pecosdave writes: The XBMC/ Kodi development team has taken a lot of heat over the years, mostly due to third party developers introducing piracy plugins to the platform, then in many cases cheap Android computers are often sold with these plugins pre-installed with the Kodi or XBMC name attached to them. The Kodi team is not happy about this, and has taken the fight to the sellers. The Kodi team is now trying to work with rights holders to introduce DRM and legitimate plugins to the platform. Is this the first step towards creating a true one-stop do it yourself Linux entertainment system?

Submission + - How Google Book Search Got Lost (backchannel.com)

mirandakatz writes: When Google started its Book Search project nearly 15 years ago, it seemed impossibly ambitious: An upstart tech company that had just tamed and organized the vast informational jungle of the web would now extend the reach of its search box into the offline world. It was the company's first real moonshot, aspiring to make all the world's books digitally accessible—and in doing so, somehow produce a phase-shift in human awareness. But between legal battles and a slowly dwindling sense of ambition, Google Books never achieved those great heights, and today, it's settled into a quiet middle age of sourcing quotes and serving up snippets of text from the 25 million-plus tomes in its database. At Backchannel, Scott Rosenberg chronicles the project's rise and fall, writing that "Google employees maintain this is all they ever intended to achieve. Maybe so. But they sure got everyone else’s hopes up."

Submission + - SPAM: Exploit Revealed For Remote Root Access Vulnerability Affecting Many Routers

Orome1 writes: Back in January 2013, researchers from application security services firm DefenseCode unearthed a remote root access vulnerability in the default installation of some Cisco Linksys (now Belkin) routers. The flaw was actually found in Broadcom’s UPnP implementation used in popular routers, and ultimately the researchers extended the list of vulnerable routers to encompass devices manufactured by the likes of ASUS, D-Link, Zyxel, US Robotics, TP-Link, Netgear, and others. Since there were millions of vulnerable devices out there, the researchers refrained from publishing the exploit they created for the flaw, but now, four years later, they’ve released their full research again, and this time they’ve also revealed the exploit.
Link to Original Source

Submission + - Symantec says CIA hacking tools were used in 40 'Longhorn' cyberattacks (betanews.com)

Mark Wilson writes: The CIA's range of hacking tools revealed as part of WikiLeaks' Vault 7 series of leaks have been used to conduct 40 cyberattacks in 16 countries, says Symantec. The security firm alleges that a group known as Longhorn has been using tools that appear to be the very same ones used by the CIA.

While it would be obvious to jump to the conclusion that the CIA was itself responsible for the attacks — and that Longhorn is just a branch of the CIA — Symantec opts for a rather more conservative evaluation of things: "there can be little doubt that Longhorn's activities and the Vault 7 documents are the work of the same group."

In a post on the Symantec Security Response blog, the company provides what it says is the first evidence that the Vault 7 tools have actually been used in cyberattacks or cyberespionage.

Comment Re:A better question to ask (Score 1) 75

"Chad Rigetti, the startup's founder and CEO -- who declined to say whether the company is actually earning any revenue yet." who would also decline to say whether the company is doing proper quantum computing yet.

If he knew how much revenue he was getting, he wouldn't know whether the revenue growth rate was growing or shrinking. How the fark is he supposed to get Series A funding at a good valuation like that? Naw, man, he did it right - assume a given momentum sufficient to get the next round of funding, and who cares about the company's actual market position?

Comment Late-Breaking News from the Council: WTF G'RANEE? (Score 2) 244

>K'Breel was deposed and executed after his repeated failures in repelling the Terran aggressor. We don't speak of him. All hail mighty G'Ranee, Supreme Leader for Life!

LATE-BREAKING NEWS FROM THE COUNCIL: VICTORY! The Council of Elders has confirmed the blueworlders' resumption of aggression upon our noble red sands. K'Breel, Speaker for the Council of Elders, addressed the planet thusly: OKAY. Okay, so I'm K'Breel (even though anyone on Slashdot can assume the mantle merely by declaring themselves Speaker for the Council), and I'm late, but I'm merely chronologically late, not as in the Late Second Adjunctant to the Council Formerly Known As G'Ranee.

But domestic politics is beneath us tonight -- just take a glance at the blue world beneath us for a look at how bad that can get -- and let us focus on what's important: over the past sol or so, our Planetary Defense Force has been so good at pre-emptively distracting the blueworlders with tasks like landing comets, grabbing their prospective mates by their genitals, low-planetary orbit missions, and just general tribal infighting that we haven't had to shoot down any robotic invaders in quite some time. But when the opportunity presents itself, we take advantage of it, and so, we did. Hence the trivial elimination of yet another putative invader from elsewhere. We'd do it every day, except that the blueworlders lack the gelsacular fortitude to send us more targets. Now as to gelsacular fortitude, on to Second Adjunctant G'Ranee...

When a junior reporter pointed out that the destroyed invader was merely a technology demonstrator built on the cheap to see if a landing was possible, and that the blueworlders' actual payload was safely in orbit, K'Breel had the reporter's gelsacs launched into orbit alongside those of G'Ranee for a closer look.

Comment Re:Nomorobo? (Score 1) 113

It does seem to significantly help, but the catch is that not only does it still let one ring go through, but perhaps people aren't super comfortable with having all their incoming calls hit a 3rd party as well.

For those who don't know how the service works, it relies on your phone provider supporting "simultaneous ring" which is having your incoming calls ring not only your phone but also another phone that you specify. The service detects where the call is coming from and if it believes it is spam, it will "pick up the phone" and ringing stops on your side. Great in theory, works well in practice, but they now know who calls your phone number.

I don't know much more about it or if they are doing this to build any data on people, but the potential is there I suppose. Probably nothing to worry about. Then again, Verizon/ATT/Comcast/etc. already have this information and probably are using it :-)

Comment Re:Wait What? (Score 1) 160

We would have been sittin' pretty with broadband wiring back when there was a government-regulated Telco, the old AT&T, had they gone ahead with the PicturePhone in the 1960s. But these days, there's no main telco, they're all private companies with only the minimal of must-wire controls. And they wouldn't necessarily solve the last mile problem in a way acceptable to any other wired carrier.

Wireless is a better possibility, but the big wireless companies, the ones with the existing infrastructure here, are used to absolutely raping their customers over data use. They apparently make far too much money there to consider at proper home broadband open a worthy goal. For one, they'd have to offer you 10-50x the monthly data cap at higher speeds for less money, or they'd be clobbered anytime a wired carrier entered the area. Concentrating on the advantage of mobile on less consumptive devices, they're maintaining those 40-50% profit margins.

Comment Re:Wait What? (Score 1) 160

Many/most of us would probably be willing to pay for the last mile infrastructure, we just do not want AT&T/Google/Comcrap/TWC/Charter to own it. The natural monopoly is primarily because of a bad funding model. These guys will all race to your house if they can be sure of perpetual domination, but are slow if there's competition.

Not so much. They'll race to your crowded neighborhood if they can have the monopoly. Maybe. Verizon froze their FiOS build-out years ago, and may be thawing that a little today, but they didn't want your business much if you weren't already covered. And if you're rural, just fuggedaboudit... they'll leave you to the savagery of the satellite carriers.

Comment Re:The last mile... (Score 1) 160

Some of it's just company policy... at my old place, I was across the street from a DSL-compatible local node... I could see it from my driveway. But while Verizon had a pretty big DSL customer base in the area (South Jersey), they were no longer supporting new customers. So I had 16 years of satellite Internet as a result. Just one more reason for leaving Jersey, I guess.

Cable was also in the vicinity, but not close enough. They offered to wire me up for about $60,000...

Slashdot Top Deals

The bogosity meter just pegged.

Working...