Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Submission + - OSS AI Tool for Fighting Back Against Health Insurance Denials (sfstandard.com)

mirro_dude writes: The SF standard has an article about a new AI tool for fighting back against health insurance denials.

She began helping friends file appeals, too, then asked herself a question that’s typical for engineers: Could she figure out a way to automate the process? After a year of tinkering, she just launched her answer: Fight Health Insurance, an open-source platform that takes advantage of large language models to help users generate health insurance appeals with AI.


Submission + - ARRL Pays $1 million ransom to decrypt their systems after attack (bleepingcomputer.com) 1

tlhIngan writes: The ARRL (Amateur Radio Relay League), one of the largest ham radio organizations out there, was attacked with ransomware way back in May of this year. It has been recently revealed that the ARRL has paid a $1 million ransom in order to decrypt their systems. The ARRL has not specified which ransomware gang was responsible but other sources have said it was traced to the Embargo gang.
Google

Submission + - Google's 2nd Android Developer Contest kicksoff 1

coffeeisclassy writes: Google's second Android Developer Contest (ADC2) has started, despite some confusion around how to submit applications. The prizes are different from the first ADC, with each category having prizes of 100k, 50k, and 25k and an overall best of 150k,50k and 25k, meaning the best Android application from ADC2 is eligible for ~250k. The rules seem to allow any application never published before August 1st to compete and is open through the end of August (so break out your keyboards!). The top prizes are certainly less than that of first ADC, but with the prizes broken down by category Google may be hoping to inspire some love for less popular categories. While some other developers are waiting to find out to submit, one developer has moved ahead and released one of there entires Pigs Can Fly Site Monitor (also on Google Market for those with Androids). So if you've been waiting for an excuse to start a new side-project, here you have it :)
Image

Your Browser History Is Showing 174

tiffanydanica writes "For a lot of us our browser history is something we consider private, or at least not something we want to expose to every website we visit. Web2.0collage is showing just how easy it is (with code!) for sites to determine what sites you visit. When you visit the site it sniffs your browser history, and creates a collage of the (safe for work) sites that you visit. It is an interesting application of potentially scary technology (imagine a job application site using this to screen candidates). You can jump right into having your history sniffed if you so desire. While the collages are cool on their own merit, they also serve as an illustration of the privacy implications of browser history sniffing."
Privacy

Submission + - Your browser history is showing

tiffanydanica writes: For a lot of us our browser history is something we consider private, or at least not something we want to expose to every website we visit.Web2.0collage is showing just how easy it is (with code!)for sites to determine what sites you visit. When you visit the site it sniffs your browser history, and creates a collage of the (safe for work) sites that you visit. It is an interesting application of potentially scary technology (imagine a job application site using this to screen candidates). You can jump right into having your history sniffed if you so desire. While the collages are cool on their own merit, they also serve as an illustration of the privacy implications of browser history sniffing.
Privacy

Submission + - Designing software with Privacy in mind 6

dalektcalum writes: Dr. Ann Cavoukian, Canada's Information and Privacy Commissioner, recently gave a talk entitled Privacy by Design. The talk starts of by covering the basics of privacy, and privacy law, and then moves onto the important component, how to design software that properly protects users privacy. The majourity of the time is spent on design principles, but also examines specific technologies (such as Elliptical Curve Cryptography).
Programming

Submission + - Facebook opens pages to outside developers

prostoalex writes: "A New York Times story and Fortune magazine article are both reporting on Facebook allowing third-party developers to create pages within the site. Developers can use a combination of Facebook API and subset of HTML to create interactive pages accessible from within Facebook. Users retain complete control over which applications they want to have installed, and which applications they want to see on other people's profile. Developers can build on top of Facebook's social grid, and in case of a popular application gain distribution through Facebook newsfeed."

Slashdot Top Deals

If you aren't rich you should always look useful. -- Louis-Ferdinand Celine

Working...