Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

  • Microsoft Lobby Denies the State of Chile Access To Free Software

    walterbyrd writes: Fresh on the heels of the entire Munich and Linux debacle, another story involving Microsoft and free software has popped up across the world, in Chile. A prolific magazine from the South American country says that the powerful Microsoft lobby managed to turn around a law that would allow the authorities to use free software. "An independent member of the Chilean Parliament, Vlado Mirosevic, pushed a bill that would allow the state to consider free software when the authorities needed to purchase or renew licenses. ... A while later, the same member of the Parliament, Daniel Farcas, proposed another bill that actually nullified the effects of the previous one that had just been adopted. To make things even more interesting, some of the people who voted in favor of the first law also voted in favor of the second one. ... The new bill is even more egregious, because it aggressively pushes for the adoption of proprietary software. Companies that choose to use proprietary software will receive certain tax breaks, which makes it very hard for free software to get adopted."

    95 comments | 6 hours ago

  • Book Review: Social Engineering In IT Security Tools, Tactics, and Techniques

    benrothke writes When I got a copy of Social Engineering in IT Security Tools, Tactics, and Techniques by Sharon Conheady, my first thought was that it likely could not have much that Christopher Hadnagy didn't already detail in the definitive text on the topic: Social Engineering: The Art of Human Hacking. Obviously Hadnagy thought differently, as he wrote the forward to the book; which he found to be a valuable resource. While there is overlap between the two books; Hadnagy's book takes a somewhat more aggressive tool-based approach, while Conheady take a somewhat more passive, purely social approach to the topic. There are many more software tools in Hadnagy; while Conheady doesn't reference software tools until nearly half-way through the book. This book provides an extensive introduction to the topic and details how social engineering has evolved through the centuries. Conheady writes how the overall tactics and goals have stayed the same; while the tools and techniques have been modified to suit the times. Keep reading for the rest of Ben's review.

    33 comments | 7 hours ago

  • How Game Developers Turn Kickstarter Failure Into Success

    Nerval's Lobster writes When you ask random strangers on the Internet to give you money, there are no guarantees. That's true in almost any scenario, including when video game developers use Kickstarter to crowdfund the creation of a game. While 3,900 or so games have been funded on Kickstarter, more than 7,200 game projects failed to hit their goal. Within those two numbers are some people who fall into both categories: developers who failed to get funding on their first try, but re-launched campaigns and hit their goals. Jon Brodkin spoke with a handful of those indie game developers who succeeded on their second try; many of them used the momentum (and fans) from the first attempt to get a head start on funding the second, and one even adjusted his entire plan based on community feedback. But succeeding the second time also depended on quite a bit of luck.

    23 comments | 7 hours ago

  • Interviews: Andrew "bunnie" Huang Answers Your Questions

    A while ago you had a chance to ask Andrew "bunnie" Huang about hardware, hacking and his open source hardware laptop Novena. Below you'll find his answers to those questions.

    28 comments | 10 hours ago

  • Study: Ad-Free Internet Would Cost Everyone $230-a-Year

    Several readers sent word of research into the cost of internet content without ads. They looked at the amount of money spent on internet advertising last year in the U.K., and compared it to the number of U.K. internet users. On average, each user would have to pay about £140 ($230) to make up for the lost revenue of an ad-free internet. In a survey, 98% of consumers said they wouldn't be willing to pay that much for the ability to browse without advertisements. However, while most consumers regard ads as a necessary trade-off to keep the internet free, they will go to great lengths to avoid advertising they do not wish to see. Of those surveyed, 63 per cent said they skip online video ads 'as quickly as possible' – a figure that rises to 75 per cent for 16-24 year olds. Over a quarter of all respondents said they mute their sound and one in five scroll away from the video. 16 per cent use ad blocking software and 16 per cent open a new browser window or tab.

    453 comments | 12 hours ago

  • Calif. Court Rules Businesses Must Reimburse Cell Phone Bills

    New submitter dszd0g writes The Court of Appeal of the State of California has ruled in Cochran v. Schwan's Home Service that California businesses must reimburse employees who BYOD for work. "We hold that when employees must use their personal cell phones for work-related calls, Labor Code section 2802 requires the employer to reimburse them. Whether the employees have cell phone plans with unlimited minutes or limited minutes, the reimbursement owed is a reasonable percentage of their cell phone bills." Forbes recommends businesses that require cell phone use for employees either provide cell phones to employees or establish forms for reimbursement, and that businesses that do not require cell phones establish a formal policy.

    156 comments | 13 hours ago

  • National Science Foundation Awards $20 Million For Cloud Computing Experiments

    aarondubrow writes The National Science Foundation today announced two $10 million projects to create cloud computing testbeds — to be called "Chameleon" and "CloudLab" — that will enable the academic research community to experiment with novel cloud architectures and pursue new, architecturally-enabled applications of cloud computing. While most of the original concepts for cloud computing came from the academic research community, as clouds grew in popularity, industry drove much of the design of their architecture. Today's awards complement industry's efforts and enable academic researchers to advance cloud computing architectures that can support a new generation of innovative applications, including real-time and safety-critical applications like those used in medical devices, power grids, and transportation systems.

    25 comments | yesterday

  • How Patent Trolls Destroy Innovation

    walterbyrd sends this story from Vox: Everyone agrees that there's been an explosion of patent litigation in recent years, and that lawsuits from non-practicing entities (NPEs) — known to critics as patent trolls — are a major factor. But there's a big debate about whether trolls are creating a drag on innovation — and if so, how big the problem is. A new study (PDF) by researchers at Harvard and the University of Texas provides some insight on this question. Drawing from data on litigation, R&D spending, and patent citations, the researchers find that firms that are forced to pay NPEs (either because they lost a lawsuit or settled out of court) dramatically reduce R&D spending: losing firms spent $211 million less on R&D, on average, than firms that won a lawsuit against a troll. "After losing to NPEs, firms significantly reduce R&D spending — both projects inside the firm and acquiring innovative R&D outside the firm," the authors write. "Our evidence suggests that it really is the NPE litigation event that causes this decrease in innovation."

    96 comments | 2 days ago

  • Comcast Training Materials Leaked

    WheezyJoe writes: The Verge reports on leaked training manuals from Comcast, which show how selling services is a required part of the job, even for employees doing tech support. The so-called "4S training material" explicitly states that 20 percent of a call center employee's rating for a given call is dependent on effectively selling the customer new Comcast services. "There are pages of materials on 'probing' customers to ferret out upsell opportunities, as well as on batting aside customer objections to being told they need to buy something. 'We can certainly look at other options, but you would lose which you mentioned was important to you,' the guide suggests clumsily saying to an angry customer who doesn't want to buy any more Comcast services." Images of the leaked documents are available on the Verge, making for fun reading.

    242 comments | 2 days ago

  • $125,000 Settlement Given To Man Arrested for Photographing NYPD

    mpicpp sends word of a $125,000 settlement for a man who was arrested for photographing members of the New York Police Department. On June 14th, 2012, the man was sitting in his car when he saw three African-American youths being stopped and frisked by police officers. He began taking pictures of the encounter, and after the police were done, he advised the youths to get the officers' badge numbers next time. When the officers heard him, they pulled him violently from his car and arrested him under a charge of disorderly conduct. The police allegedly deleted the pictures from his phone (PDF). Rather than go to trial, the city's lawyers decided a settlement was the best course of action.

    227 comments | 2 days ago

  • Why Chinese Hackers Would Want US Hospital Patient Data

    itwbennett (1594911) writes In a follow-up to yesterday's story about the Chinese hackers who stole hospital data of 4.5 million patients, IDG News Service's Martyn Williams set out to learn why the data, which didn't include credit card information, was so valuable. The answer is depressingly simple: people without health insurance can potentially get treatment by using medical data of one of the hacking victims. John Halamka, chief information officer of the Beth Israel Deaconess Medical Center and chairman of the New England Healthcare Exchange Network, said a medical record can be worth between $50 and $250 to the right customer — many times more than the amount typically paid for a credit card number, or the cents paid for a user name and password. "If I am one of the 50 million Americans who are uninsured ... and I need a million-dollar heart transplant, for $250 I can get a complete medical record including insurance company details," he said.

    166 comments | 2 days ago

  • Women Founders Outpace Male Counterparts In Certain Types of Kickstarter Funding

    Nerval's Lobster writes Women outpace men when it comes to raising money for technology projects through crowdfunding sites such as Kickstarter, according to a new study by researchers at New York University and the Wharton School at the University of Pennsylvania. Jason Greenberg (NYC) and Ethan Mollick (Wharton/UPenn) chose 1,250 Kickstarter projects in five categories: games and technology, where founders were predominantly male; film, with an even gender distribution; and fashion and children's books, both populated with more female founders and backers. They analyzed additional factors such as "industry typing" (a theory in which people 'often hold conscious or unconscious biases about what gender is the archetype employee in a particular occupation or industry') and restricted the data set by geography and how much money each Kickstarter project wanted (a project aiming for less than $5,000 may attract an inordinate percentage of family and friends as funders, skewing results). After crunching the data, they found that female founders of technology projects were more likely than males to achieve their Kickstarter goals, a finding that didn't extend to the other four categories. "It appears female backers are responsible for helping female founders succeed in specific industry categories that women backers generally disfavor," they theorized, adding a little later: "The value of crowdfunding is that it enables access to a pool of potential female backers particularly inclined to support women in industry categories in which they believe women to be underrepresented."

    98 comments | 3 days ago

  • Ask Slashdot: Would You Pay For Websites Without Trolls?

    First time accepted submitter carbon_tet writes I read two articles this week that made me wonder: "Would anyone actually pay for a website without trolls?" The first, was about web trolls and civility on the internet, and the second about the ad-based internet. It seems that public comments unavoidably have trolls, or they degrade very quickly until someone makes a reference to Hitler. So, is it impossible to have a substantive discussion online without trolls? Would you put your money where your mouth is to have a serious online conversation without them? Are there any topics that you would talk about (or prefer to see talked about) on a website where trolls were paywalled out?

    381 comments | 3 days ago

  • Feds: Red Light Camera Firm Paid For Chicago Official's Car, Condo

    An anonymous reader writes "The former CEO of Redflex, a major red light camera vendor, and John Bills, former Managing Deputy Commissioner at the Department of Transportation, have been indicted on federal corruption charges stemming from a contract with the City of Chicago. According to the indictment, a friend of Bills was hired as a contractor and paid $2 million. Much of that money was then kicked back to Bills, who also got a Mercedes and a condominium via Redflex employees. The defendants are facing 23 counts including: mail fraud, wire fraud, and bribery. Each fraud count carries a maximum sentence of 20 years."

    115 comments | 3 days ago

  • Are Altcoins Undermining Bitcoin's Credibility?

    An anonymous reader writes The editor of a Bitcoin advocacy site believes the proliferation of altcoins (cryptocurrencies other than Bitcoin) is harming Bitcoin's long-term potential as an alternative to traditional currencies. Posting at BadBitcoin.org, a site that seeks to expose online scams that target Bitcoin users, the pseudonymous ViK compares altcoins, including the Internet meme inspired Dogecoin, to a pump-and-dump scheme where developers create their own version of the Bitcoin wallet and blockchain and then "pre-mine" or generate a significant number of cryptocurrency units before the altcoin's official release. Later, when their value has risen, the pre-mined altcoins are exchanged for Bitcoin or in some cases converted directly to cash. While critics of cryptocurrencies in general might find ViK's comments about the altcoin "tulip" mania ironic, the self-confessed Bitcoin fan is nevertheless calling for an altcoin boycott: "The easiest way to stop them is to not participate. We all know that they only have one purpose, and that is to make Bitcoin for the so called developers."

    267 comments | 4 days ago

  • Ask Slashdot: How Dead Is Antivirus, Exactly?

    Safensoft writes: Symantec recently made a loud statement that antivirus is dead and that they don't really consider it to be a source of profit. Some companies said the same afterwards; some other suggested that Symantec just wants a bit of free media attention. The press is full of data on antivirus efficiency being quite low. A notable example would be the Zeus banking Trojan, and how only 40% of its versions can be stopped by antivirus software. The arms race between malware authors and security companies is unlikely to stop.

    On the other hand, experts' opinions of antivirus software have been low for a while, so it's hardly surprising. It's not a panacea. The only question that remains is: how exactly should antivirus operate in modern security solutions? Should it be one of the key parts of a protection solution, or it should be reduced to only stopping the easiest and most well-known threats?

    Threats aren't the only issue — there are also performance concerns. Processors get better, and interaction with hard drives becomes faster, but at the same time antivirus solutions require more and more of that power. Real-time file scanning, constant updates and regular checks on the whole system only mean one thing – as long as antivirus is thorough, productivity while using a computer goes down severely. This situation is not going to change, ever, so we have to deal with it. But how, exactly? Is a massive migration of everything, from workstations to automatic control systems in industry, even possible? Is using whitelisting protection on Windows-based machines is the answer? Or we should all just sit and hope for Microsoft to give us a new Windows with good integrated protection? Are there any other ways to deal with it?

    323 comments | 4 days ago

  • Delays For SC Nuclear Plant Put Pressure On the Industry

    mdsolar sends this news from the Associated Press: Expensive delays are piling up for the companies building new nuclear power plants, raising fresh questions about whether they can control the construction costs that crippled the industry years ago. The latest announcement came this week from executives at SCANA Corp., which has been warned by its builders the startup of the first of two new reactors in South Carolina could be delayed two years or more. ... That announcement may well foreshadow more delays for a sister project in eastern Georgia, and they have caught the attention of regulators and Wall Street. 'Delays generally cause cost increases, and the question becomes who's going to bear the costs?' said C. Dukes Scott, executive director of the South Carolina Office of Regulatory Staff, a watchdog agency that monitors SCANA Corp.'s spending.

    None of this is helpful for the nuclear power industry, which had hoped its newest generation of plants in Georgia and South Carolina would prove it could build without the delays and cost overruns so endemic years ago. When construction slows down, it costs more money to employ the thousands of workers needed to build a nuclear plant. Meanwhile, interest charges add up on the money borrowed to finance construction. A single day of delay in Georgia could cost $2 million, according to an analysis by utility regulators.

    140 comments | 5 days ago

  • Tesla Removes Mileage Limits On Drive Unit Warranty Program

    Ars Technica reports that Elon Musk today wrote that Tesla will remove mileage limits on its warranty policy for all Tesla Model S drive units. The warranty, which will still span eight years, won't have a cap on the number of owners for each vehicle. People who purchased Teslas before today were told that the warranty period for the drive unit expired after eight years or once the car logged over 125,000 miles. The revised warranty applies to new vehicles and Model S cars that are already on the road. The article mentions that quite a few Tesla owners have had to have their drive units replaced; out of warranty, that runs about $15,000. Musk's announcement acknowledges that the change may cost the company some money, but says he's "confident it will work out well in the long run."

    174 comments | about a week ago

  • Samsung Buys Kickstarter-Funded Internet of Things Startup For $200MM

    jfruh writes: In September of 2012, SmartThings took to Kickstarter with the promise of delivering an "Internet of things" package to backers, including a hub device that would control various home gadgets via the user's smartphone. They aimed to raise $250,000. They got $1.2 million. And now they've been bought by Samsung for a reported $200 million, as the South Korean electronics market tries to get a foothold into this emerging market.

    107 comments | about a week ago

  • Apple's App Store Needs a Radical Revamp; How Would You Go About It?

    Nerval's Lobster (2598977) writes Given the hundreds of thousands of apps currently on offer, it's hard for any one app (no matter how well designed) to stand out on Apple's App Store, much less stay atop the bestseller charts for very long. In an August 10 blog posting, former Apple executive Jean-Louis Gassée offered Apple CEO Tim Cook some advice: Let humans curate the App Store. 'Instead of using algorithms to sort and promote the apps that you permit on your shelves, why not assign a small group of adepts to create and shepherd an App Store Guide,' he wrote. 'A weekly newsletter will identify notable new titles, respond to counter-opinions, perhaps present a developer profile, footnote the occasional errata and mea culpa.' Whether or not such an idea would effectively surface all the good content now buried under layers of Flappy Bird rip-offs is an open question; what's certain is that, despite Apple's rosy picture, developers around the world face a lot of uncertainty and competition when it comes to making significant money off their apps. Sure, some developers are making a ton of cash, but the rising tide doesn't necessarily float all boats. If you had the opportunity, how would you revamp/revise/upgrade/adjust/destroy the App Store to better serve the developers who put apps in it?

    249 comments | about a week ago

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>