Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

China Has Now Eclipsed The US in AI Research ( 97

Earlier this week, the Obama administration discussed a new strategic plan aimed at fostering the development of AI-centered technologies in the United States. What's striking about it is, the Washington Post notes, although the United States was an early leader in deep-learning research (a subset of the overall branch of AI known as machine learning), China has effectively eclipsed it in terms of the number of papers published annually on the subject (Editor's note: the link could be paywalled; alternate source). From the report: The rate of increase is remarkably steep, reflecting how quickly China's research priorities have shifted. The quality of China's research is also striking. The chart narrows the research to include only those papers that were cited at least once by other researchers, an indication that the papers were influential in the field.

Submission + - Samsung stops production of Galaxy Note 7 (

tripleevenfall writes: Samsung reportedly has halted production of its large screen phone following news of overheating issues in its replacement devices, according to South Korean publications such as Yonhap News Agency. An anonymous Samsung official told Yonhap that the halt was done in cooperation with safety regulators from South Korea, China and the United States.

Over the past week, there have been a handful of reports of overheating in replacement devices. One caused the evacuation of a Southwest Airlines flight; another hurt a teenage girl. What's likely up for Samsung next is a rare, second recall of the Note 7.

Submission + - Credit card changes number hourly to combat fraud ( 1

caveman writes: According to the BBC, and also promoted on the manufacturer's site a french technology company has produced a digital display integrated into a standard payment card which changes the CVV security code automatically every hour, adding an extra layer of protection similar to the RSA SecureID key fobs used by many organisations for remote access. The device is powered by a thin lithium battery slated to last up to three years. So now we have to worry about exploding credit cards as well as phones?

Submission + - Should we bring extinct species back from the dead? (

sciencehabit writes: For decades the notion of “de-extinction” hovered on the scientific fringes, but new advances in genetic engineering, especially the CRISPR-Cas9 revolution, have researchers believing that it’s time to start thinking seriously about which animals we might be able to bring back, and which ones would do the most good for the ecosystems they left behind. Science Magazine explores why and how we might do this, which animals might be first, and the big risks involved.

Submission + - SPAM: New All in One 16 Channels High Power Desktop Signal Jammer 70 meters Sheilding

sophia chen writes: High power 16 antennas all-in-one adjustable all frequencies jammer
Want to own a cell phone signal jammer that can help you to achieve the need to block all the normal wireless signals? Then just here this 42W 16 Antennas all brands cell phone jammer with jamming distance up to 50m with power adjustable you are viewing just owns the powerful function.
This 16 bands cell phone jammer block GSM, 3G, 4G, VHF, UHF, Wi-Fi, GPS, L1, L2, L5, LOJACK, 433, 325MHz all-in-one mobile phone jammer is power full design to blocks all the signals in one device, it great for school classroom avoid exam cheat and oil/gas station keep in secure.
Jamming frequencies:
1.CDMA 800: 850 to 894MHz
2.GSM 900: 925 to 960MHz
[spam URL stripped] 1805 to 1990MHz
4.3G:2110 to 2170MHz
5.GPSL1: 1570 to 1580MHz
7.Wi-Fi 2.4G: 2400 to 2500MHz
8.VHF: 135 to 174MHz
9.UHF: 400-470MHz
10.4G Wimax: 2620 to 2690MHz (European standard)
11.4G LTE: 790 to 826MHz (European standard)
12.Lojack: 167 to 175MHz
15.GPSL2-L5: 1170-1230MHz
16.GPSL3-L4: 1370-1390MHz

New All in One 16 Channels High Power Desktop Signal Jammer 70 meters Sheilding Range
You can select 16 of above frequency bands as your needed, in default we will send by country different

All in one with 16 bands frequency
Good cooling system with 5 cooling fans inside
Low noise
Can adjust or turn off any single band without influencing the other bands operation
Work non-stopped
Stable capability
Could be used in car directly, with car charger
Total output power: 48W
Full set weight: 7.5kg
Power supply: AC 100-240V and 12V cable to car battery (300mm Long)
Dimension: 395mm x 238mm x 60mm
Application area:
1.It can be applied at meeting rooms, conference rooms, museums, galleries, theaters, concert halls, churches, temples, restaurants, classrooms, training centers, factories, banks, trains, bus and more
2.For some locations of special purpose such as hospitals, gas stations and more, please do field test first to make sure no interference happened to the normal operation of their equipment and instrument

New All in One 16 Channels High Power Desktop Signal Jammer 70 meters Sheilding Range
Warranty: one year from delivery date
Multifunction jammer x 1
AC adapter x 1
Car adapter x 1
Antenna x 16

Link to Original Source

Submission + - Ask Slashtot: How to determine if your IOT device is part of a botnet? 1

galgon writes: There has been a number of stories of IoT devices becoming part of
Botnets and being used in DDOS Attacks. If these devices are seemingly working correctly to the user how would they ever know the device was compromised? Is there anything the average user can do to detect when they have a misbehaving device on their network?
User Journal

Journal Journal: Another TV season, another Transparent freak show. 14

What is portrayed on that show is not how it is for many of us in real life. Putting a man in a dress and having him portray a transsexual is not really going to capture it, except for the unpassable. But of course, that's what makes good TV. The truth is boring.


Amazon Pursues More Renewable Energy, Following Google, Apple, And Facebook ( 85

An anonymous Slashdot reader writes: Amazon will open a 100-turbine, 253-megawatt wind farm in Texas by the end of next year -- generating enough energy to power almost 90,000 U.S. homes. Amazon already has wind farms in Indiana, North Carolina, and Ohio (plus a solar farm in Virginia), and 40% of the power for AWS already comes from renewable sources, but Amazon's long-term plan is to raise that to 100%.

But several of the world's largest tech companies are already pursuing their own aggressive renewable energy programs, according to Fortune. Google "has said it's the largest non-utility purchaser of renewable energy in the world. Apple claims that in 2015, 93% of its energy came from renewable sources, and its data centers are already 100% run on renewables (though that claim does rely on carbon trading). Facebook, which also uses Texas wind facilities, is aiming for 50% of its data center power to come from renewables by 2018. Even slightly smaller companies like Salesforce have made big commitments to renewable energy."

Last year for the first time utilities actually bought less than half the power produced by wind farms -- because tech companies, universities, and cities had already locked it down with long-term contracts.

Submission + - RFID in Access Control (

oprfid writes: Access Control is a system which enables an authority to control access to areas in a given physical facilities. An access control point, which can be a door, turnstile, parking gate, elevator or other physical barrier where granting access can be controlled using RFID technology.

Data security is generally very high using RFID technology. It also reduces the possibility of duplicating credentials. Secure or proprietary communication protocols can also be used to further enhance security.

A RFID based Access Control reader does not usually make an access decision but send a card number to an Access Control panel that verifies the number against an access list. Generally only entry is controlled and exit is uncontrolled. In cases where exit is also controlled a second reader is used on the opposite side of the door. The typical RFID tag is a RFID based contactless smartcard, key fob, wristbands or smart phone sticker.

RFID based Access Control Systems are typically used for Enterprise Access, Car Park Access, Access to Gyms or Swimming Areas, Event Access, Library Access or Access to Hotel Rooms.

The Internet

What Vint Cerf Would Do Differently ( 125

An anonymous Slashdot reader quotes ComputerWorld: Vint Cerf is considered a father of the internet, but that doesn't mean there aren't things he would do differently if given a fresh chance to create it all over again. "If I could have justified it, putting in a 128-bit address space would have been nice so we wouldn't have to go through this painful, 20-year process of going from IPv4 to IPv6," Cerf told an audience of journalists Thursday... For security, public key cryptography is another thing Cerf would like to have added, had it been feasible.

Trouble is, neither idea is likely to have made it into the final result at the time. "I doubt I could have gotten away with either one," said Cerf, who won a Turing Award in 2004 and is now vice president and chief internet evangelist at Google. "So today we have to retrofit... If I could go back and put in public key crypto, I probably would try."

Vint Cerf answered questions from Slashdot users back in 2011.

Submission + - New formula massively reduces prime number memory requirements.

grcumb writes: Peruvian mathematician Harald Helfgott made his mark on the history of mathematics by solving Goldbach's Weak Conjecture, which every odd number greater than 5 can be expressed as the sum of three prime numbers. Now, according to Scientific American, he's found a better solution to the Sieve of Erasthones:

In order to determine with this sieve all primes between 1 and 100, for example, one has to write down the list of numbers in numerical order and start crossing them out in a certain order: first, the multiples of 2 (except the 2); then, the multiples of 3, except the 3; and so on, starting by the next number that had not been crossed out. The numbers that survive this procedure will be the primes. The method can be formulated as an algorithm.

But now, Helfgott has found a method to drastically reduce the amount of RAM required to run the algorithm:

Helfgott was able to modify the sieve of Eratosthenes to work with less physical memory space. In mathematical terms: instead of needing a space N, now it is enough to have the cube root of N.

So what will be the impact of this? Will we see cheaper, lower-power encryption devices? Or maybe quicker cracking times in brute force attacks?


'Transformer' BMW Turns Into A Giant Robot ( 45

An anonymous Slashdot reader quotes Motherboard: Real-life Transformers are apparently already a thing thanks to a Turkish company called Letvision. They can't do battle with Decepticons, but they can turn their heads from side to side and move their arms and fingers and, erm, shoot smoke from between their legs. Oh, and they can do the whole changing from a 2013 BMW to an upright robot bit [video]. That's pretty cool, too.

But of course there's a catch. Each of the four available Transformers (which Letvision gave the copyright-friendly name of "Letrons") has a functional steering wheel, but you can only "drive" them remotely because Letvision stuffed the seating spaces with the hydraulics and electronics needed for the conversion.

Letvision's demo video has the clever title "Rise of LETRONS", and shows the vehicle spontaneously beginning its transformation after a newscaster announces, "Our country is under invasion by extraterrestrials."

Moving Beyond Flash: the Yahoo HTML5 Video Player ( 96

Slashdot reader theweatherelectric writes: Over on Streaming Media, Amit Jain from Yahoo has written a behind-the-scenes look at the development of Yahoo's HTML5 video player. He writes, "Adobe Flash, once the de-facto standard for media playback on the web, has lost favor in the industry due to increasing concerns over security and performance. At the same time, requiring a plugin for video playback in browsers is losing favor among users as well. As a result, the industry is moving toward HTML5 for video playback...

At Yahoo, our video player uses HTML5 across all modern browsers for video playback. In this post we will describe our journey to providing an industry-leading playback experience using HTML5, lay out some of the challenges we faced, and discuss opportunities we see going forward."

Yet another brick in the wall? YouTube and Twitch have already switched to HTML5, and last year Google started automatically converting Flash ads to HTML5.

Google Open Sources Its Image-Captioning AI ( 40

An anonymous Slashdot reader quotes ZDNet: Google has open-sourced a model for its machine-learning system, called Show and Tell, which can view an image and generate accurate and original captions... The image-captioning system is available for use with TensorFlow, Google's open machine-learning framework, and boasts a 93.9 percent accuracy rate on the ImageNet classification task, inching up from previous iterations.

The code includes an improved vision model, allowing the image-captioning system to recognize different objects in images and hence generate better descriptions. An improved image model meanwhile aids the captioning system's powers of description, so that it not only identifies a dog, grass and frisbee in an image, but describes the color of grass and more contextual detail.

Slashdot Top Deals

8 Catfish = 1 Octo-puss