Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Data Storage

SSDs vs. Hard Drives In Value Comparison 263

EconolineCrush writes "SSDs hardly offer compelling value on the cost-per-gigabyte basis. But what if one considers performance per dollar? This article takes a closer look at the value proposition offered by today's most common SSDs, mixing raw performance data with each drive's cost, both per gigabyte and as a component of a complete system. A dozen SSD configurations are compared, and results from a collection of mechanical hard drives provide additional context. The data are laid out in detailed scatter plots clearly illustrating the most favorable intersections of price and performance, and you might be surprised to see just how well the SSDs fare versus traditional hard drives. A few of the SSDs offer much better value than their solid-state competitors, too."
Bug

Apple To Issue a 'Fix' For iPhone 4 Reception Perception 534

Lisandro and several other readers let us know that Apple has just released a statement addressing the signal issues a lot of users are having with their iPhone 4. They claim to have discovered the cause for the drop in bars, which is "both simple and surprising" — a wrong formula used to calculate how many bars are displayed for a given signal strength. "Upon investigation, we were stunned to find that the formula we use to calculate how many bars of signal strength to display is totally wrong. ... we sometimes display 4 bars when we should be displaying as few as 2 bars. Users observing a drop of several bars when they grip their iPhone in a certain way are most likely in an area with very weak signal strength, but they don’t know it because we are erroneously displaying 4 or 5 bars. Their big drop in bars is because their high bars were never real in the first place. ... We will issue a free software update within a few weeks that incorporates the corrected formula. Since this mistake has been present since the original iPhone, this software update will also be available for the iPhone 3GS and iPhone 3G." Wired notes that there is still a signal drop when the iPhone 4 is gripped in particular ways.
Cellphones

iOS Update May Tackle iPhone 4's Antenna Problems 282

DJRumpy was one of several readers to point out rumors that Apple will soon be deploying an update to iOS 4 to combat the iPhone 4 antenna problems we discussed last week. This could be good news for users of the 1.7 million iPhone 4s purchased during the first three days of its release. (And no, Daily Mail, Steve didn't announce a recall, though there's speculation that this problem could be a boon for Android.) An anonymous reader notes an analysis of a teardown of the phone, which found that its parts collectively cost about $188, with the most expensive part — the LCD screen — costing $28.50 by itself. In other Apple news, Germany has demanded that the company "immediately make clear" what data it collects from customers, and what use it makes of that data (perhaps spurred by Google's Wi-Fi sniffing debacle).
Google

At Google, You're Old and Gray At 40 543

theodp writes "Google faces an imminent California Supreme Court decision on whether an age discrimination suit against it can go forward. But that hasn't kept the company from patting itself on the back for how it supports 'Greyglers' — that's any Googler over 40. At a company of about 20,000 full-time employees, there were at last count fewer than 200 formally enrolled Greyglers working to 'make Google culture ... welcome to people of all ages.'"
Privacy

States Launch Joint Probe of Google Wi-Fi Snooping 134

CWmike writes "As many as 30 states could join an investigation into Google's collection of personal information from unprotected wireless networks, Connecticut attorney general Richard Blumenthal announced today. Google's response was similar to what it said earlier this month: 'It was a mistake for us to include code in our software that collected payload data, but we believe we didn't break any US laws. We're working with the relevant authorities to answer their questions and concerns.' Google already faces investigations by privacy authorities in several European countries, including the Czech Republic, France, Germany, Spain and Italy. In the US, Google faces multiple civil lawsuits, and the company has been asked for more information from several congressmen as a preliminary step to a legislative hearing. Google has asked that the lawsuits be consolidated and moved to a California federal court's jurisdiction."
Google

Why Google's Wi-Fi Payload Collection Was Inadvertent 267

Reader Lauren Weinstein found a blog post that gives a good, fairly technical explanation of why Google's collection of Wi-Fi payload data was incidental, and why it's easy to collect Wi-Fi payload data accidentally in the course of mapping Wi-Fi access points. "Although some people are suspicious of their explanation, Google is almost certainly telling the truth when it claims it was an accident. The technology for Wi-Fi scanning means it's easy to inadvertently capture too much information, and be unaware of it. ... It's really easy to protect your data: simply turn on WPA. This completely stops Google (or anybody else) from spying on your private data. ... Laws against this won't stop the bad guys (hackers). They will only unfairly punish good guys (like Google) whenever they make a mistake. ... [A]nybody who has experience in Wi-Fi mapping would believe Google. Data packets help Google find more access-points and triangulate them, yet the payload of the packets do nothing useful for Google because they are only fragments."
Government

FCC Vote Marks Effort To Take Greater Control of the Web 323

GovTechGuy writes "The FCC voted today to open an inquiry into how the broadband industry is regulated, the first step in a controversial attempt to assert greater regulatory control over Internet service providers. In a 3-2 vote the Democratic members of the Commission voted to move forward with the FCC's proposal to reclassify broadband as a telecom service, increasing the regulation it is subject to. The move also has large implications for net neutrality, which FCC Commissioner Julius Genachowski has made a focus under his watch."
Crime

The South Carolina Primary and Voting Machine Fraud 467

cSeattleGameboy writes "South Carolina sure knows how to pick 'em. Alvin Greene is a broke, unemployed guy who is facing a felony obscenity charge. He made no campaign appearances and raised no money, but he is the brand new Democratic Senate nominee from South Carolina. Tom Schaller at FiveThirtyEight.com does a detailed analysis of how a guy like this wins a primary race, and many of the signs point to voting machine fraud. There seem to have been irregularities on all sides. 'Dr. Mebane performed second-digit Benford's law tests on the precinct returns from the Senate race. ... If votes are added or subtracted from a candidate's total, possibly due to error or fraud, Mebane's test will detect a deviation from this distribution. Results... showed that Rawl's Election Day vote totals depart from the expected distribution at 90% confidence. In other words, the observed vote pattern for Rawl could be expected to occur only about 10% of the time by chance. ... An unusual, non-random pattern in the precinct-level results suggests tampering, or at least machine malfunction, perhaps at the highest level. And Mebane is perhaps the leading expert on this very subject. Along with the anomalies between absentee ballot v. election day ballots..., something smells here.' Techdirt.com points out that South Carolina uses ES&S voting machines, which have had strings of problems before; and they have no audit trail."
Education

Teaching Fifth Graders Engineering 156

Jamie noticed a NYT story saying "To compete in a global economy, some school districts are offering engineering lessons to students in kindergarten. " The story is about 5th graders working on a new experimental curriculum that is well beyond the egg drop of old.
Censorship

Pentagon Seeking Out Wikileaks Founder Julian Assange 628

a user writes "The Pentagon is desperately seeking the 'cooperation' of Wikileaks founder Julian Assange, in order to stop him from releasing over 250,000 pages of confidential foreign policy documents. The documents were allegedly provided to Assange by Bradley Manning, the same solider who leaked a video showing a US Army helicopter killing unarmed civilians and international press correspondents."
Education

MA High School Forces All Students To Buy MacBooks 1217

An anonymous reader sends in this excerpt from the Salem News: "A new program at Beverly High will equip every student with a new laptop computer to prepare kids for a high-tech future. But there's a catch. The money for the $900 Apple MacBooks will come out of parents' pockets. 'You're kidding me,' parent Jenn Parisella said when she found out she'd have to buy her sophomore daughter, Sky, a new computer. 'She has a laptop. Why would I buy her another laptop?' Sky has a Dell. Come September 2011, every student will need an Apple. They'll bring it to class and use it for homework. Superintendent James Hayes sees the technology as an essential move to prepare kids for the future. The School Committee approved the move last year, and Hayes said he's getting the news out now so families can prepare. 'We have one platform,' Hayes said. 'And that's going to be the Mac.'"
Privacy

Australian Gov't Seeks To Record Citizens' Web Histories 354

An anonymous reader writes "If you thought the Australian Government's Internet filter project was bad, think again. They have a new project — they are examining a policy that would require all Internet service providers to log users' web browsing history and email data such as who all emails were sent to and from. And that's just the start. Telephone calls, mobile phone calls, even Internet telephony. It's all in there. Looks like 1984 was a pretty prophetic book." Several readers also point to ZDNet's coverage.
Government

New Declassification Process To Open 400 Million Pages of Records 135

linzeal writes "The newly minted National Declassification Center has been tasked by President Obama with eliminating the backlog of more than 400 million pages of classified records that are more than 25 years old by the end of 2013. The National Archives has prepared a draft prioritization plan to guide its declassification activities, and has invited public input on the plan. A public forum on the subject will be held on June 23. This may be a bonanza for the community of historians and intelligence buffs who have been left without significant source material to work with, in some cases since WWII, especially in terms of any information on cryptography, image analysis, and espionage."
Education

Gulf Oil Spill Disaster — Spawn of the Living Dead 228

grrlscientist writes "A recently published study, intended to provide data to commercial fisheries in the Gulf of Mexico so they maximize their catch of Yellowfin Tuna, Thunnus albacares, whilst avoiding bycatch of critically endangered Atlantic (Northern) Bluefin Tuna, Thunnus thynnus, suggests that the Deepwater Horizon oil leak may devastate the endangered Atlantic bluefin population, causing it to completely collapse or possibly go extinct."
Botnet

Botnets Using Ubiquity For Security 95

Trailrunner7 sends in this excerpt from Threatpost: "As major botnet operators have moved from top-down C&C infrastructures, like those employed throughout the 1990s and most of the last decade, to more flexible peer-to-peer designs, they also have found it much easier to keep their networks up and running once they're discovered. When an attacker at just one, or at most two, C&C servers was doling out commands to compromised machines, evading detection and keeping the command server online were vitally important. But that's all changed now. With many botnet operators maintaining dozens or sometimes hundreds of C&C servers around the world at any one time, the effect of taking a handful of them offline is negligible, experts say, making takedown operations increasingly complicated and time-consuming. It's security through ubiquity. Security researchers say this change, which has been occurring gradually in the last couple of years, has made life much more difficult for them. ... Researchers in recent months have identified and cleaned hundreds of domains being used by the Gumblar botnet, but that's had little effect on the botnet's overall operation."

Slashdot Top Deals

"The identical is equal to itself, since it is different." -- Franco Spisani

Working...