Forgot your password?
typodupeerror
Businesses

Sprint Sues FCC For 'Capricious' Deregulation of Business Data Services (bizjournals.com) 19

An anonymous reader writes: Sprint and another wireless company have filed a lawsuit against the Federal Communications Commission for the agency's recent decision on business data services. Overland Park-based Sprint and Arkansas-based Windstream Services filed the petition for review earlier this week, seeking relief "on the grounds that the Report and Order is arbitrary, capricious, and an abuse of discretion," according to a filing in the U.S. Court of Appeals for the D.C. Circuit. The lawsuit is based on an April 20 vote by the FCC to deregulate its business data services, among them wireless backhaul services, which are crucial for transmitting large amounts of data quickly. Sprint had supported the price caps proposed under former FCC Chairman Tom Wheeler, as the carrier pays companies like AT&T, Verizon and CenturyLink to use their bandwidth to bridge gaps in the Sprint network during backhaul services. Although Sprint did not report the breakdown of these costs in its annual filing, the carrier noted that they are "a significant cost for our wireless and wireline segments."

Comment Re:nothing to see here (Score 1) 384

It is actually fairly trivial to find the identities of the people seeing as how most personal blurbs are reused from other sources.

Pg. 57 for example is most likely referring to Russell Miyaki, just do a Google search for "is involved with ensuring that the highest of standards and best practices of interactive development are applied".

Worms

Conficker Worm Asks For Instructions, Gets Update 285

KingofGnG writes "Conficker/Downup/Downadup/Kido malware, that according to Symantec 'is, to date, one of the most complex worms in the history of malicious code,' has been updated and this time for real. The new variant, dubbed W32.Downadup.C, adds new features to malware code and makes the threat even more dangerous and worrisome than before."

Feed EleeNo EG3 watch uses squares to tell the time (engadget.com)

Filed under: Household

They don't specialize in the video playing watches that all the cool kids want these days: instead Tokyoflash claims a reputation for weird watch designs, and their latest design is a refinement on one of their weirdest. The EleeNo EG3 has a face that represents the time through a series of squares: the top 3 indicate the hour, the middle three show how many minutes past the hour in tens, and the final three represent the single minutes. At ¥9,800 ($80/£41), the EG3 isn't on the high end of the watch hierarchy either. Just think of all the awkward conversations you can have with members of the public that have innocently inquired about the time!

Read | Permalink | Email this | Comments

Office Depot Featured Gadget: Xbox 360 Platinum System Packs the power to bring games to life!


The Matrix

Submission + - Controlling computers with an implant, or head ban (cnn.com)

Killam0n writes: "Surfing the Web with nothing but brainwaves

Here is the link to cnn money/business2.0, future boy, where the story is. http://money.cnn.com/2006/07/21/technology/googleb rain0721.biz2/index.htm

SAN FRANCISCO (Business 2.0 Magazine) — — Two years ago, a quadriplegic man started playing video games using his brain as a controller. That may just sound like fun and games for the unfortunate, but really, it spells the beginning of a radical change in how we interact with computers — and business will never be the same. Someday, keyboards and computer mice will be remembered only as medieval-style torture devices for the wrists. All work — emails, spreadsheets, and Google searches — will be performed by mind control."

Comment Been there, done that (Score 1) 259

New authentication scheme? This technique has been around for awhile--and not just in Morse code. I wrote working code that did this about 7 or 8 years ago. It was only 300 lines of C code. So, having first-hand experience, I am able to address some of the issues brought up here.

Typing patterns can change slightly over time or different keyboards, but some (if not most) of that variation can be accounted for statistically. Every time the user is correctly authenticated, you just add that pattern to the database. This won't handle drastic changes (like a broken hand), but it does pretty well for most cases. My system was originally trained on 10 training runs of typing the user's first name, last name, user name, and password. The login sequence required all of these, so it was a little bit longer than the standard username-password sequence.

Now, you probably can't tell your wife your password and have her log in for you, but the system could still be useful in government systems where per-user traceability is mandatory. The assumption here would be that the recognized failure modes would be acceptable, and sysadmins would be willing to handle them individually.

The system I wrote did not just measure typing speed. It actually looked at the latency patterns between each keystroke. By tweaking the similarity threshold, I could get it so that it would accept most of my attempts, but reject a lot of other people trying to log in as me. I type faster than 100 WPM, so just matching my speed was impossible for most people. I had a friend who was also a fast typist try to impersonate me. It took him a long time, but he was finally able to get in after many tries. His primary problem was typing my user name correctly and fast enough. This was difficult since it's a one-handed finger-twister. My impression after this test was that accomplished typists are consistent enough that there is minimal variation and that the recognition essentially degenerates to a speed measurement (although I don't have quantitative results to prove this). I did not do any testing on poor typists. I would have concerns about whether hunt-and-peckers would be recognized. The system did take into account the user's volatility, but it's possible that the keystroke latencies of poor typists are not normally distributed. This would pose a problem, but it might be ameliorated by using a dynamic threshold based on the users' consistency.

Comment Re:Enter Adam Smith.... (Score 0) 545

Very interesting comments. I read a book a while back on "free market economies", and I was very intrigued by the ideas. I totaly agree with you that this way of "editing" is a lot more efficient that you old find me some "qualified" editor method. The only thing I disagree with is that the transaction has to be monetary. Why? Probably mainly due to the disparity in wealth distribution in the world. Can you imagine a world where only "us" americans with money were the only ones able to "edit" the material? Seems to me that that would restrict the power of the free market you talk about. It would be very interesting to create an environment where the "market" actually set the value of things. Slasdot, Wikipedia and others have, to some extend, tried that. Has it work? Well, it is better than nothing, but it isn't perfect either. One thing that it has accomplish is keeping it $free$. I'm expecting, and hoping smart people like yourself, will help us get there.

Can you imagine a system where the free market actually decided how valuable your input is? Without charging you money (because most people don't have that), but something that is just as valuable to you (maybe time?).

Comment This is not new (Score 2, Insightful) 825

If you have filled out a FAFSA or applied for a loan the Department of Education already has all the information. Part of my job is making sure the mandatory reporting gets sent to DOE. That is on top of other federal reporting, IPEDS, FISAP, etc. Granted most of the reports are general statistics, as the article mentioned, however there is a more information that is required to be reported than most people realize.
User Journal

Journal Journal: First Time I posted anything...

This was the first day I posted anything, it was just a reply to a cloning article but hey, there's a first for everything.

Slashdot Top Deals

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...