Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - Should we bring extinct species back from the dead? (sciencemag.org)

sciencehabit writes: For decades the notion of “de-extinction” hovered on the scientific fringes, but new advances in genetic engineering, especially the CRISPR-Cas9 revolution, have researchers believing that it’s time to start thinking seriously about which animals we might be able to bring back, and which ones would do the most good for the ecosystems they left behind. Science Magazine explores why and how we might do this, which animals might be first, and the big risks involved.

Submission + - SPAM: New All in One 16 Channels High Power Desktop Signal Jammer 70 meters Sheilding

sophia chen writes: High power 16 antennas all-in-one adjustable all frequencies jammer
Want to own a cell phone signal jammer that can help you to achieve the need to block all the normal wireless signals? Then just here this 42W 16 Antennas all brands cell phone jammer with jamming distance up to 50m with power adjustable you are viewing just owns the powerful function.
This 16 bands cell phone jammer block GSM, 3G, 4G, VHF, UHF, Wi-Fi, GPS, L1, L2, L5, LOJACK, 433, 325MHz all-in-one mobile phone jammer is power full design to blocks all the signals in one device, it great for school classroom avoid exam cheat and oil/gas station keep in secure.
Jamming frequencies:
1.CDMA 800: 850 to 894MHz
2.GSM 900: 925 to 960MHz
[spam URL stripped] 1805 to 1990MHz
4.3G:2110 to 2170MHz
5.GPSL1: 1570 to 1580MHz
6.868MHz
7.Wi-Fi 2.4G: 2400 to 2500MHz
8.VHF: 135 to 174MHz
9.UHF: 400-470MHz
10.4G Wimax: 2620 to 2690MHz (European standard)
11.4G LTE: 790 to 826MHz (European standard)
12.Lojack: 167 to 175MHz
13.315MHz
14.433MHz
15.GPSL2-L5: 1170-1230MHz
16.GPSL3-L4: 1370-1390MHz

New All in One 16 Channels High Power Desktop Signal Jammer 70 meters Sheilding Range
You can select 16 of above frequency bands as your needed, in default we will send by country different

Advantages:
All in one with 16 bands frequency
Good cooling system with 5 cooling fans inside
Low noise
Can adjust or turn off any single band without influencing the other bands operation
Work non-stopped
Stable capability
Could be used in car directly, with car charger
Total output power: 48W
Full set weight: 7.5kg
Power supply: AC 100-240V and 12V cable to car battery (300mm Long)
Dimension: 395mm x 238mm x 60mm
Application area:
1.It can be applied at meeting rooms, conference rooms, museums, galleries, theaters, concert halls, churches, temples, restaurants, classrooms, training centers, factories, banks, trains, bus and more
2.For some locations of special purpose such as hospitals, gas stations and more, please do field test first to make sure no interference happened to the normal operation of their equipment and instrument

New All in One 16 Channels High Power Desktop Signal Jammer 70 meters Sheilding Range
Warranty: one year from delivery date
Accessories:
Multifunction jammer x 1
AC adapter x 1
Car adapter x 1
Antenna x 16

Link to Original Source

Submission + - Ask Slashtot: How to determine if your IOT device is part of a botnet? 1

galgon writes: There has been a number of stories of IoT devices becoming part of
Botnets and being used in DDOS Attacks. If these devices are seemingly working correctly to the user how would they ever know the device was compromised? Is there anything the average user can do to detect when they have a misbehaving device on their network?
User Journal

Journal Journal: Another TV season, another Transparent freak show. 11

What is portrayed on that show is not how it is for many of us in real life. Putting a man in a dress and having him portray a transsexual is not really going to capture it, except for the unpassable. But of course, that's what makes good TV. The truth is boring.

Power

Amazon Pursues More Renewable Energy, Following Google, Apple, And Facebook (fortune.com) 83

An anonymous Slashdot reader writes: Amazon will open a 100-turbine, 253-megawatt wind farm in Texas by the end of next year -- generating enough energy to power almost 90,000 U.S. homes. Amazon already has wind farms in Indiana, North Carolina, and Ohio (plus a solar farm in Virginia), and 40% of the power for AWS already comes from renewable sources, but Amazon's long-term plan is to raise that to 100%.

But several of the world's largest tech companies are already pursuing their own aggressive renewable energy programs, according to Fortune. Google "has said it's the largest non-utility purchaser of renewable energy in the world. Apple claims that in 2015, 93% of its energy came from renewable sources, and its data centers are already 100% run on renewables (though that claim does rely on carbon trading). Facebook, which also uses Texas wind facilities, is aiming for 50% of its data center power to come from renewables by 2018. Even slightly smaller companies like Salesforce have made big commitments to renewable energy."

Last year for the first time utilities actually bought less than half the power produced by wind farms -- because tech companies, universities, and cities had already locked it down with long-term contracts.

Submission + - RFID in Access Control (oprfid.com)

oprfid writes: Access Control is a system which enables an authority to control access to areas in a given physical facilities. An access control point, which can be a door, turnstile, parking gate, elevator or other physical barrier where granting access can be controlled using RFID technology.

Data security is generally very high using RFID technology. It also reduces the possibility of duplicating credentials. Secure or proprietary communication protocols can also be used to further enhance security.

A RFID based Access Control reader does not usually make an access decision but send a card number to an Access Control panel that verifies the number against an access list. Generally only entry is controlled and exit is uncontrolled. In cases where exit is also controlled a second reader is used on the opposite side of the door. The typical RFID tag is a RFID based contactless smartcard, key fob, wristbands or smart phone sticker.

RFID based Access Control Systems are typically used for Enterprise Access, Car Park Access, Access to Gyms or Swimming Areas, Event Access, Library Access or Access to Hotel Rooms.

The Internet

What Vint Cerf Would Do Differently (computerworld.com) 116

An anonymous Slashdot reader quotes ComputerWorld: Vint Cerf is considered a father of the internet, but that doesn't mean there aren't things he would do differently if given a fresh chance to create it all over again. "If I could have justified it, putting in a 128-bit address space would have been nice so we wouldn't have to go through this painful, 20-year process of going from IPv4 to IPv6," Cerf told an audience of journalists Thursday... For security, public key cryptography is another thing Cerf would like to have added, had it been feasible.

Trouble is, neither idea is likely to have made it into the final result at the time. "I doubt I could have gotten away with either one," said Cerf, who won a Turing Award in 2004 and is now vice president and chief internet evangelist at Google. "So today we have to retrofit... If I could go back and put in public key crypto, I probably would try."

Vint Cerf answered questions from Slashdot users back in 2011.

Submission + - New formula massively reduces prime number memory requirements.

grcumb writes: Peruvian mathematician Harald Helfgott made his mark on the history of mathematics by solving Goldbach's Weak Conjecture, which every odd number greater than 5 can be expressed as the sum of three prime numbers. Now, according to Scientific American, he's found a better solution to the Sieve of Erasthones:

In order to determine with this sieve all primes between 1 and 100, for example, one has to write down the list of numbers in numerical order and start crossing them out in a certain order: first, the multiples of 2 (except the 2); then, the multiples of 3, except the 3; and so on, starting by the next number that had not been crossed out. The numbers that survive this procedure will be the primes. The method can be formulated as an algorithm.

But now, Helfgott has found a method to drastically reduce the amount of RAM required to run the algorithm:

Helfgott was able to modify the sieve of Eratosthenes to work with less physical memory space. In mathematical terms: instead of needing a space N, now it is enough to have the cube root of N.

So what will be the impact of this? Will we see cheaper, lower-power encryption devices? Or maybe quicker cracking times in brute force attacks?

Sci-Fi

'Transformer' BMW Turns Into A Giant Robot (vice.com) 45

An anonymous Slashdot reader quotes Motherboard: Real-life Transformers are apparently already a thing thanks to a Turkish company called Letvision. They can't do battle with Decepticons, but they can turn their heads from side to side and move their arms and fingers and, erm, shoot smoke from between their legs. Oh, and they can do the whole changing from a 2013 BMW to an upright robot bit [video]. That's pretty cool, too.

But of course there's a catch. Each of the four available Transformers (which Letvision gave the copyright-friendly name of "Letrons") has a functional steering wheel, but you can only "drive" them remotely because Letvision stuffed the seating spaces with the hydraulics and electronics needed for the conversion.

Letvision's demo video has the clever title "Rise of LETRONS", and shows the vehicle spontaneously beginning its transformation after a newscaster announces, "Our country is under invasion by extraterrestrials."
Yahoo!

Moving Beyond Flash: the Yahoo HTML5 Video Player (streamingmedia.com) 92

Slashdot reader theweatherelectric writes: Over on Streaming Media, Amit Jain from Yahoo has written a behind-the-scenes look at the development of Yahoo's HTML5 video player. He writes, "Adobe Flash, once the de-facto standard for media playback on the web, has lost favor in the industry due to increasing concerns over security and performance. At the same time, requiring a plugin for video playback in browsers is losing favor among users as well. As a result, the industry is moving toward HTML5 for video playback...

At Yahoo, our video player uses HTML5 across all modern browsers for video playback. In this post we will describe our journey to providing an industry-leading playback experience using HTML5, lay out some of the challenges we faced, and discuss opportunities we see going forward."

Yet another brick in the wall? YouTube and Twitch have already switched to HTML5, and last year Google started automatically converting Flash ads to HTML5.
Google

Google Open Sources Its Image-Captioning AI (zdnet.com) 36

An anonymous Slashdot reader quotes ZDNet: Google has open-sourced a model for its machine-learning system, called Show and Tell, which can view an image and generate accurate and original captions... The image-captioning system is available for use with TensorFlow, Google's open machine-learning framework, and boasts a 93.9 percent accuracy rate on the ImageNet classification task, inching up from previous iterations.

The code includes an improved vision model, allowing the image-captioning system to recognize different objects in images and hence generate better descriptions. An improved image model meanwhile aids the captioning system's powers of description, so that it not only identifies a dog, grass and frisbee in an image, but describes the color of grass and more contextual detail.

Submission + - TypeScript 2.0 Released (arstechnica.com)

An anonymous reader writes: Since its introduction, TypeScript has included new features to improve performance, enhance JavaScript compatibility, and extend the range of error checking that the TypeScript compiler performs. TypeScript 2.0 introduces a big step forward here by giving developers greater control over null values. null, used to denote (in some broad, hand-waving sense) that a variable holds no value at all, has been called the billion dollar mistake. Time and time again, programs trip up by not properly checking to see if a variable is null, and for good or ill, every mainstream programming language continues to support the null concept. TypeScript 2.0 brings a range of new features, but the biggest is control over these null values. With TypeScript 2.0, programmers can opt into a new behavior that by default prevents values from being null. With this option enabled, variables by default will be required to have a value and can't be set to null accidentally. This in turn allows the compiler to find other errors such as variables that are never initialized.

Submission + - How ITT Tech Screwed Students and Made Millions (gizmodo.com)

An anonymous reader writes: This is a grim story about a company that screwed poor people, military veterans, and taxpayers to turn a profit. It includes shocking details about the inner-working of the for-profit college including stuff like this:

"ITT recruiters even manipulated prospective students using pain-based sales techniques. Recruiters used a sales strategy called the “Pain Funnel” that encouraged them to ask progressively more hurtful questions to get prospective students to enroll in the school."

Government

Hacker Leaks Michelle Obama's Passport (nypost.com) 122

The hacker who leaked Colin Powell's private email account last week has struck again. This time they have hacked a low-level White House staffer and released a picture of Michelle Obama's passport, along with detailed schedules for top U.S. officials and private email messages. New York Post reports: The information has been posted online by the group DC Leaks. The White House staffer -- who also apparently does advance work for Hillary Clinton's presidential campaign -- is named Ian Mellul. The released documents include a PowerPoint outline of Vice President Joe Biden's recent Cleveland trip, showing his planned route, where he'll meet with individuals and other sensitive information, according to the Daily Mail. In an email to The Post, the hacker writes, "The leaked files show the security level of our government. If terrorists hack emails of White House Office staff and get such sensitive information we will see the fall of our country." The hacker adds, "We hope you will tell the people about this criminal negligence of White House Office staffers."

Slashdot Top Deals

"Irrigation of the land with sewater desalinated by fusion power is ancient. It's called 'rain'." -- Michael McClary, in alt.fusion

Working...