Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - KDE and Slimbook Release a Laptop for KDE Fans 1

JRiddell writes: The scope of KDE projects grows ever larger and today we are announcing the KDE Slimbook. It comes pre-installed with KDE's Plasma desktop and runs KDE neon. "The KDE Slimbook allows KDE to offer our users a laptop which has been tested directly by KDE developers, on the exact same hardware and software configuration that the users get, and where any potential hardware-related issues have already been ironed out before a new version of our software is shipped to them. This gives our users the best possible way to experience our software, as well as increasing our reach: The easier it is to get our software into users' hands, the more it will be used."

Comment the case for driverless cars everywhere? (Score 1) 97

So, if I get this right, those Google cars cause about 0.5 accidents per 1M miles? If so, that equates to about 1.5M traffic accidents per year in the US if you replaced every car with a driverless model (assuming all rates are constant, of course). If that seems like a big number, Americans currently drive about 3 trillion miles per year and get into about 5.5 million traffic accidents. If I did the math right, driverless cars will result in about 2/3 fewer accidents per year than we experience now. Should we all welcome our autonomous vehicle overlords now?

http://www.usacoverage.com/aut...

http://www.afdc.energy.gov/dat...

Submission + - As Big Data Comes to College, Officials Wrestle to Set New Ethical Norms (chronicle.com)

jyosim writes: Colleges are increasingly awash in information and so-called clickstream data about their students — much of it ripe to be mined and analyzed. Data is becoming ubiquitous thanks to advances in analytics software, a slew of new personalized-learning and student-success companies, and course-management platforms that collect and analyze students’ online interactions. The promise is that colleges can use such data to improve retention and help students graduate.
But as more colleges experiment, they're facing complex questions about what to do with the findings the data-crunching reveals.
What, if anything, should students be told about the judgments institutions are making about them from the data footprints they’re leaving behind? Should companies be able to profit from that data? And should students have the right to opt out of being monitored?
Just as a new medical finding can create standards by which doctors provide care to their patients, does having such information establish a new standard of care for colleges?

Submission + - Feds Contemplate Bounty Program for Medical Devices (securityledger.com)

chicksdaddy writes: The Security Ledger notes (https://securityledger.com/2016/06/report-feds-mull-bug-bounty-contest-for-medical-devices/) that the U.S. Department of Health and Human Services is considering a bug bounty program for medical devices and healthcare technology, modeled after the Department of Defense's recently launched Hack the Pentagon program. (https://yro.slashdot.org/story/16/03/31/2013254/hack-the-pentagon-bug-bounty-program-opens-for-registration)

The Chief Privacy Officer at the Department of Health and Human Services (HHS) has made public statements that suggest HHS is considering a similar program.

Speaking at the Collaboration of Health IT Policy and Standards Committees meeting on June 23, Lucia Savage, chief privacy officer at HHS’s Office of the National Coordinator for Health Information Technology, said that the practice could show promise at HHS if it was scaled up to meet health care needs, Federal Times reported on June 23rd. (http://www.federaltimes.com/story/government/it/health/2016/06/23/ethical-hacking-dod-draws-interest-hhs/86301606/)

"This is a struggle for devices as well,” she said. “You can’t hack something in the field, because what if the hacker disrupts the operation of the device. Similarly, health data and EHRs, we may not want to have the hacker accessing your live data because that might cause other problems relative to your obligation to keep that data confidential."

"Given that space and given the need to improve cybersecurity, is there something that ONC can do to improve that rate at which ethical hacking occurs in health care?” Savage wondered.

On June 17, U.S. Secretary of Defense Ash Carter announced preliminary results from the program, which invited some 1,400 vulnerability hunters to try their luck on DOD systems. In all, the DOD paid bounties for 138 vulnerabilities submitted by 250 researchers. In all, the DOD paid out $150,000 in bounties, with about half going to the hackers.

Slashdot Top Deals

A large number of installed systems work by fiat. That is, they work by being declared to work. -- Anatol Holt

Working...