Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
Republicans

Marco Rubio: We Need To Add To US Surveillance Programs (dailydot.com) 343

Patrick O'Neill writes: The debate over surveillance hit the 2016 race for the White House again on Sunday when Republican presidential candidate Marco Rubio said he wants to add to American surveillance programs, many of which were created after 9/11. He invoked a recent shooting of a Philadelphia police officer by a man who allegedly pledged allegiance to the Islamic State. "This the kind of threat we now face in this country," Rubio said. "We need additional tools for intelligence." Rubio also addressed the NSA leaks that led to this debate: "Edward Snowden is a traitor. He took our intelligence information and gave it to the Chinese and gave it to the Russians. We cannot afford to have a commander-in-chief who thinks people like Edward Snowden are doing a good public service."
Chrome

Nvidia GPUs Can Leak Data From Google Chrome's Incognito Mode (softpedia.com) 148

An anonymous reader writes: Nvidia GPUs don't clear out memory that was previously allocated, and neither does Chrome before releasing memory back to the shared memory pool. When a user recently fired up Diablo 3 several hours after closing an Incognito Mode window that contained pornography, the game launched with snapshots of the last "private" browsing session appearing on the screen — revealing his prior activities. He says, "It's a fairly easy bug to fix. A patch to the GPU drivers could ensure that buffers are always erased before giving them to the application. It's what an operating system does with the CPU RAM, and it makes sense to use the same rules with a GPU. Additionally, Google Chrome could erase their GPU resources before quitting."
Music

David Bowie Dies At Age 69 (bbc.co.uk) 296

echo-e writes: Renowned singer David Bowie has died after an 18-month battle with cancer. His latest album, Blackstar, was only just released on Friday — his birthday. His last live show was in 2006. Bowie rose to fame in the 1970s, and he is known for hits such as Under Pressure, Let's Dance, and Space Oddity. He also appeared in handful of films, such as Labyrinth in 1986. Bowie was also notable for being one of the few musicians to immediately see the value and staying power of MP3s and the digital distribution of music. If anything, he was overly optimistic about it. In 2002, he said, "I don't even know why I would want to be on a label in a few years, because I don't think it's going to work by labels and by distribution systems in the same way. The absolute transformation of everything that we ever thought about music will take place within 10 years, and nothing is going to be able to stop it. I see absolutely no point in pretending that it's not going to happen. I'm fully confident that copyright, for instance, will no longer exist in 10 years, and authorship and intellectual property is in for such a bashing."
Space

Clouds May Hide Water On Alien Worlds (sciencemag.org) 27

sciencehabit writes: Astronomers have discovered about 2000 planets around other stars, but they have few hard facts about what they are like, such as the contents of their atmospheres. Now, a team of astronomers using the Hubble and Spitzer space telescopes have gathered enough data (abstract) to compare 10 large exoplanets, finding a range of atmosphere types, and to propose a solution to an early mystery of exoplanet atmospheres: why some don't seem to have enough water. Study lead David Sing said, "I’m really excited to finally 'see' this wide group of planets together, as this is the first time we’ve had sufficient wavelength coverage to compare multiple features from one planet to another. We found the planetary atmospheres to be much more diverse than we expected, and this significantly progresses our understanding of what makes up these planets and how they were created."
Government

FAA: Small Drones Must Be Registered By February (bloomberg.com) 533

An anonymous reader writes: The U.S. Federal Aviation Administration has finally unveiled its new drone registration rules. Starting on 21 December, all newly-purchased drones between 250 grams (.55 lbs) and 25 kg (~55 lbs) must be registered before their first flight. Owners of drones purchased before that time must register by 19 February 2016. The FAA will charge $5 to register the drones, though the first month of registrations will be free. "Make no mistake: unmanned aircraft enthusiast are aviators, and with that title comes a great deal of responsibility," said U.S. Transportation Secretary Anthony Foxx. "Registration gives us an opportunity to work with these users to operate their unmanned aircraft safely. I'm excited to welcome these new aviators into the culture of safety and responsibility that defines American innovation." There is also an age requirement: kids under the age of 13 will not be allowed to register a drone by themselves. In related news, Bard college has compiled a report on drone safety with respect to encounters with manned aircraft.
Programming

Developing In C/C++? Why You Should Consider Clang Over GCC (dice.com) 255

Nerval's Lobster writes: The idea with Clang, a compiler front-end for C, C++, Objective-C++, and Objective-C, and LLVM (a compiler infrastructure) is that you can mix the compiler front-end with a targeted back-end and end up with highly portable and efficient compiler. Clang can perform static analysis of your code, and lets you write tools that give you information about a program. Although many developers prefer developing in C/C++ using GCC, developer David Bolton (in a new Dice article) makes an argument for why you should switch to Clang. While GCC is probably still best when it comes to speed, he argues, Clang is improving release by release, and features tools that developers could find useful.
The Courts

All Malibu Media Subpoenas In Eastern District NY Put On Hold 67

NewYorkCountryLawyer sends an update on the progress of Malibu Media, the company that filed subpoenas and copyright lawsuits over alleged BitTorrent piracy of pornography films: A federal Magistrate Judge in Central Islip, New York, has just placed all Malibu Media subpoenas in Brooklyn, Queens, Long Island, and Staten Island on hold indefinitely, due to "serious questions" raised by a motion to quash (PDF) filed in one of them. Judge Steven Locke's 4-page Order and Decision (PDF) cited the defendant's arguments that "(i) the common approach for identifying allegedly infringing BitTorrent users, and thus the Doe Defendant, is inconclusive; (ii) copyright actions, especially those involving the adult film industry, are susceptible to abusive litigation practices; and (iii) Malibu Media in particular has engaged in abusive litigation practices" as being among the reasons for his issuance of the stay.
Hardware Hacking

Sensor Network Makes Life Easier For Japan's Aging Rice Farmers 91

szczys writes: The average age of Japan's rice farmers is 65-70 years old. The work is difficult and even small changes to the way things are done can have a profound impact on these lives. The flooded paddies where the rice is grown must maintain a consistent water level, which means farmers must regularly traverse the terraced fields to check many different paddies. A simple sensor board is changing this, letting farmers check their fields by phone instead of in person.

This might not sound like much, but reducing the number of times someone needs to walk the fields has a big effect on the man-hours spent on each crop. The system, called TechRice, is inexpensive and the nodes recharge batteries from a solar cell. The data is aggregated on the Internet and can be presented as a webpage, a text-message interface, or any other reporting scheme imaginable by utilizing the API of the Open Source software. This is a testament to the power we have as small groups of engineers to improve the world.
Android

Stagefright 2.0 Vulnerabilities Affect 1 Billion Android Devices 123

msm1267 writes: Security researcher Joshua Drake today disclosed two more flaws in Stagefright, one that dates back to the first version of Android, and a second dependent vulnerability that was introduced in Android 5.0. The bugs affect more than one billion Android devices, essentially all of them in circulation. One of the vulnerabilities was found in a core Android library called libutils; it has been in the Android OS since it was first released and before there were even Android mobile devices. The second vulnerability was introduced into libstagefright in Android 5.0; it calls into libutils in a vulnerable way. An attacker would use a specially crafted MP3 or MP4 file in this case to exploit the vulnerabilities. Google has released patches into the Android Open Source Project tree, but public patches are not yet available.
Stats

(Over-)Measuring the Working Man 165

HughPickens.com writes: Tyler Cowen writes in MIT Technology Review that the improved measurement of worker performance through information technology is beginning to allow employers to measure value fairly precisely and as we get better at measuring who produces what, the pay gap between those who make more and those who make less grows. Insofar as workers type at a computer, everything they do is logged, recorded, and measured. Surveillance of workers continues to increase, and statistical analysis of large data sets makes it increasingly easy to evaluate individual productivity, even if the employer has a fairly noisy data set about what is going on in the workplace. Consider journalism. In the "good old days," no one knew how many people were reading an article, or an individual columnist. Today a digital media company knows exactly how many people are reading which articles for how long, and also whether they click through to other links. The result is that many journalists turn out to be not so valuable at all. Their wages fall or they lose their jobs, while the superstar journalists attract more Web traffic and become their own global brands.

According to Cowen, the upside is that measuring value tends to boost productivity, as has been the case since the very beginning of management science. We're simply able to do it much better now, and so employers can assign the most productive workers to the most suitable tasks. The downsides are several. Individuals don't in fact enjoy being evaluated all the time, especially when the results are not always stellar: for most people, one piece of negative feedback outweighs five pieces of positive feedback.
Communications

What Congress' New Email-privacy Bill Means For Your Inbox 90

erier2003 writes: The Electronic Communications Privacy Act Amendments Act has a simple and vital purpose: making it harder for the government to get your email, instant messages, and Facebook chats. It amends a decades-old law to require government agencies to get a warrant to access the contents of any email or other electronic record—no matter how old those communications are. Sen. Mike Lee, one of the bill's cosponsors, told the Daily Dot why it matters. "The bill adds a warrant requirement for communications that were previously considered so old as to be irrelevant to their participants and unworthy of privacy protections. Right now, emails and other electronic messages older than 180 days are considered to have been “abandoned” by the people who sent and received them. Law-enforcement agencies don't need to get a warrant to force a company like Google or Facebook to turn over those communications." The act also requires the government to notify people whose records it has acquired, though they can delay that notice for 90 or 180 days if they feel sending it will put somebody at risk.
Education

Ask Slashdot: How Would You Introduce Kids In Rural India To Computers? 218

asto21 writes: A friend of mine wants to introduce school kids in rural India to computers and could use some advice. Key questions: What learning material to use and how to source? What programming language to start with? What software to introduce them to? What games to introduce them to? Key constraints: The kids don't know much English and speak a local language called Odiya. There aren't any technical publications/resources in Odiya. Poor internet connectivity. No computer experts on the school staff. Any other advice/help would also be appreciated.
Security

Most Healthcare Managers Admit Their IT Systems Have Been Compromised 122

Lucas123 writes: Eighty-one percent of healthcare IT managers say their organizations have been compromised by at least one malware, botnet or other kind of cyber attack during the past two years, and only half of those managers feel that they are adequately prepared to prevent future attacks, according to a new survey by KPMG. The KPMG survey polled 223 CIOs, CTOs, chief security officers and chief compliance officers at healthcare providers and health plans, and found 65% indicated malware was most frequently reported line of attack during the past 12 to 24 months. Additionally, those surveyed indicated the areas with the greatest vulnerabilities within their organization include external attackers (65%), sharing data with third parties (48%), employee breaches (35%), wireless computing (35%) and inadequate firewalls (27%). Top among reasons healthcare facilities are facing increased risk, was the adoption of digital patient records and the automation of clinical systems.
Crime

At Black Hat: Square Reader To Credit Card Skimmer In 10 Minutes 62

New submitter arit writes with word that three recent Boston University grads have demonstrated at Black Hat software and hardware attacks on the Square Reader used by many mobile vendors to process credit card transactions. One of the attacks converts a standard reader into an efficient credit card skimmer (conference slides) with very little effort. Always keep Scott Adams' object lesson in mind.

Submission + - At Wired, Making an AR-15 In a San Francisco Office

An anonymous reader writes: Wired's writer Andy Greenberg writes about his experience fabricating an AR-15 lower receiver with the Ghost Gunner CNC mill. (That's the same device that was demoed in a Slashdot video earlier this year.) Greenberg points out that CNC millng isn't new, but nonetheless "Aside from a single brief hardware hiccup, it worked remarkably well. In fact, the Ghost Gunner worked so well that it may signal a new era in the gun control debate, one where the barrier to legally building an untraceable, durable, and deadly semiautomatic rifle has reached an unprecedented low point in cost and skill."

Slashdot Top Deals

Where there's a will, there's a relative.

Working...