posted 8 days ago on slashdot
jfruh writes While the Internet has made communications easier, that ease had made us very dependent on the Internet for communications — and, when disaster strikes, power and infrastructure outages tend to shut down those communications networks when we need them most. But now researchers are examining how the so-called "Internet of Things" — the proliferating array of Internet-communicating devices in our lives — can transmit emergency messages via ad-hoc networks even when the Internet backbone in a region is inoperable.

Read More...
posted 8 days ago on slashdot
An anonymous reader writes Phishing emails are without a doubt one of the biggest security issues consumers and businesses face today. Cybercriminals understand that we are a generation of clickers and they use this to their advantage. They will take the time to create sophisticated phishing emails because they understand that today users can tell-apart spam annoyances from useful email, however they still find it difficult identifying phishing emails, particularly when they are tailored to suit each recipient individually. Fake emails are so convincing and compelling that they fool 10% of recipients into clicking on the malicious link. To put that into context a legitimate marketing department at a FTSE 100 company typically expects less than a 2% click rate on their advertising campaigns. So, how are the cybercriminals out-marketing the marketing experts?

Read More...
posted 8 days ago on slashdot
First time accepted submitter Carly Page writes When asked for its response to Edward Snowden's claims that "Dropbox is hostile to privacy", Dropbox told The INQUIRER that users concerned about privacy should add their own encryption. The firm warned however that if users do, not all of the service's features will work. Head of Product at Dropbox for Business Ilya Fushman says: "We have data encrypted on our servers. We think of encryption beyond that as a users choice. If you look at our third-party developer ecosystem you'll find many client-side encryption apps....It's hard to do things like rich document rendering if they're client-side encrypted. Search is also difficult, we can't index the content of files. Finally, we need users to understand that if they use client-side encryption and lose the password, we can't then help them recover those files."

Read More...
posted 8 days ago on slashdot
mpicpp points out a new program from Verizon that is perfect if you don't mind being tracked. Are you comfortable having your location and Web browsing tracked for marketing purposes? If so, Verizon's got a deal for you. The wireless giant announced a new program this week called 'Smart Rewards' that offers customers credit card-style perks like discounts for shopping, travel and dining. You accrue points through the program by doing things like signing onto the Verizon website, paying your bill online and participating in the company's trade-in program. Verizon emphasizes that the data it collects is anonymized before it's shared with third parties. The program is novel in that offers Verizon users some compensation for the collection of their data, which has become big business for telecom and tech companies. Some privacy advocates have pushed data-collecting companies to reward customers for their personal information in the interest of transparency.

Read More...
posted 8 days ago on slashdot
Deathspawner writes A lot of people have never been able to understand the logic behind Microsoft's Windows RT, with many urging the company to kill it off so that it can focus on more important products, like the mainline Windows. Well, this is probably not going to come as a huge surprise, especially in light of mass layoffs announced last week, but Microsoft CEO Satya Nadella has said that his company will be working to combine all Windows versions into a unified release by next year.

Read More...
posted 8 days ago on slashdot
An anonymous reader writes: An enterprising hacker took on a project to rebuild a broken Gameboy using emulation software, a Raspberry Pi, and a few other easily-obtainable parts. The result: success! The hacker has posted a detailed walkthrough explaining all of the challenges and how they were solved. "Using a Dremel, I cut out a most of the battery compartment as well as some posts that on the case for the LCD that would no longer be needed. Doing so, the Pi sits flush with the back of the DMG case. ... The screen was the first challenge. The screen runs off 12V out of the box which wouldn't work with the USB battery pack. The USB battery pack is rated at 5V, 1000mAH so the goal was go modify the screen to allow it to run at 5V. ... I finally got it to work by removing the power converter chip as well as soldering a jumper between the + power in and the resister on the top right."

Read More...
posted 8 days ago on slashdot
Advocatus Diaboli sends this report: The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither "concrete facts" nor "irrefutable evidence" to designate an American or foreigner as a terrorist, according to a key government document obtained by The Intercept. ...The heart of the document revolves around the rules for placing individuals on a watchlist. "All executive departments and agencies," the document says, are responsible for collecting and sharing information on terrorist suspects with the National Counterterrorism Center. It sets a low standard—"reasonable suspicion"—for placing names on the watchlists, and offers a multitude of vague, confusing, or contradictory instructions for gauging it. In the chapter on "Minimum Substantive Derogatory Criteria"—even the title is hard to digest—the key sentence on reasonable suspicion offers little clarity.

Read More...
posted 8 days ago on slashdot
An anonymous reader writes: Andrew Binstock has an article about the ever-increasing complexity required to write code. He says, "I got into programming because I like creating stuff. Not just any stuff, but stuff other people find useful. I like the constant problem solving, the use of abstractions that exist for long periods nowhere but in my imagination, and I like seeing the transformation into a living presence. ... The simple programs of a few hundred lines of C++ long ago disappeared from my experience. What was the experience of riding a bicycle has become the equivalent of traveling by jumbo jet; replete with the delays, inspections, limitations on personal choices, and sudden, unexplained cancellations — all at a significantly higher cost. ... Project overhead, even for simple projects, is so heavy that it's a wonder anyone can find the time to code, much less derive joy from it. Software development has become a mostly operational activity, rather than a creative one. The fundamental problem here is not the complexity of apps, but the complexity of tools. Tools have gone rather haywire during the last decade chasing shibboleths of scalability, comprehensiveness, performance. Everything except simplicity."

Read More...
posted 8 days ago on slashdot
MojoKid writes: Intel just launched their new SSD 2500 Pro series solid state drive, the follow-up to last year's SSD 1500 Pro series, which targets corporate and small-business clients. The drive shares much of its DNA with some of Intel's consumer-class drives, but the Pro series cranks things up a few notches with support for advanced security and management features, low power states, and an extended management toolset. In terms of performance, the Intel SSD 2500 Pro isn't class-leading in light of many enthusiast-class drives but it's no slouch either. Intel differentiates the 2500 Pro series by adding support for vPro remote-management and hardware-based self-encryption. The 2500 Pro series supports TCG (Trusted Computing Group) Opal 2.0 features and is Microsoft eDrive capable as well. Intel also offers an administration tool for easy management of the drive. With the Intel administration tool, users can reset the PSID (physical presence security ID), though the contents of the drive will be wiped. Sequential reads are rated at up to 540MB/s, sequential writes at up to 480MB/s, with 45K – 80K random read / write IOps.

Read More...
posted 8 days ago on slashdot
Dave Knott writes: Scientists from the University of Maryland say they have turned thin air into an "optical fiber" that can transmit and amplify light signals without the need for any cables. As described in the research, this was accomplished by generating a laser with its light split into a ring of multiple beams forming a pipe. Very short and powerful pulses from the laser are used to heat the air molecules along the beam extremely quickly. Such rapid heating produces sound waves that take about a microsecond to converge to the center of the pipe, creating a high-density area surrounded by a low-density area left behind in the wake of the laser beams. The lower density region of air surrounding the center of the air waveguide has a lower refractive index, keeping the light focused, and allowing the higher-density region (with its correspondingly higher index of refraction) to act like an optical fiber. The findings, reported in the journal Optica, have applications in long range laser communications, high-resolution topographic mapping, air pollution and climate change research, and could also be used by the military to make laser weapons.

Read More...
posted 8 days ago on slashdot
jfruh (300774) writes Liquid Robotics and its Wave Glider line of autonomous seafaring robots became famous when Java inventor James Gosling left Google to join the company. Now one of its robots has passed an impressive real-world test, shrugging off a monster typhoon in the South China Sea that inflicted hundreds of millions of dollars of damage on the region.

Read More...
posted 8 days ago on slashdot
MTorrice (2611475) writes Electronics printed on paper promise to be cheap, flexible, and recyclable, and could lead to applications such as smart labels on foods and pharmaceuticals or as wearable medical sensors. Many engineers have managed to print transistors and solar cells on paper, but one key component of a smart device has been missing—memory. Now a group of researchers has developed a method that uses ink-jet technology to print resistive random access memory on an ordinary letter sized piece of paper. The memory is robust: Engineers could bend the device 1,000 times without any loss of performance. The memory is not yet very dense, but could be: "Each silver dot they printed was approximately 50 microns across and separated from its neighbor by 25 microns, so each bit of memory is 100 microns on a side. At that size, a standard 8.5- by 11-inch piece of paper can hold 1 MB of memory. Der-Hsien Lien, the paper's lead author, says existing ultrafine ink-jet technology can produce dots less than 1 micron across, which would allow the same piece of paper to hold 1 gigabyte. Reading and writing the bits takes 100 to 200 microseconds"

Read More...
posted 8 days ago on slashdot
First time accepted submitter cowdung (702933) writes In spite of Elon Musk's characterization of the landing as a KABOOM event. Judging by this video SpaceX has managed to land the first stage rocket booster nicely on the ocean after their Orbcomm launch on July 14th. It seems we're one step closer to a landing on dry land. Both this and the previous landing seem to have gone well. Hopefully the next landing test camera has something to deice the camera lens.

Read More...
posted 8 days ago on slashdot
Microsoft has released their latest earnings report, and it's not as bleak as last week's news might have you suspect. Quoting Forbes: Microsoft reported $23.38 billion of revenue for the fourth quarter, up 17.5% from the same period last year. Net income, however, came in at $4.6 billion, down from last year and behind Wall Street analysts' consensus estimate, both about $5 billion. At 55 cents earnings per share were down 4 cents and a nickel short of the Street’s call. For the full year, revenue clocked in at $86.8 billion an 11.5% increase from a year earlier. Net income was $22.1 billion and earnings per share were $2.63. They took a hit from finalizing the acquisition of Nokia's handset division (not unexpected). The cloud services side of the business appears to be growing, while traditional software sales have stagnated. The layoffs will cost Microsoft between $1.1 and $1.6 billion over the first half of next year.

Read More...
posted 8 days ago on slashdot
chicksdaddy (814965) writes The Security Ledger reports on newly published research from the firm zScaler that reveals CNN's iPhone application transmits user login session information in clear text. The security flaw could leave users of the application vulnerable to having their login credential snooped by malicious actors on the same network or connected to the same insecure wifi hotspot. That's particularly bad news if you're one of CNN's iReporters — citizen journalists — who use the app to upload photos, video and other text as they report on breaking news events. According to a zScaler analysis, CNN's app for iPhone exposes user credentials in the clear both during initial setup of the account and in subsequent mobile sessions. The iPad version of the CNN app is not affected, nor is the CNN mobile application for Android. A spokesman for CNN said the company had a fix ready and was working with Apple to have it approved and released to the iTunes AppStore.

Read More...
posted 8 days ago on slashdot
NotInHere (3654617) writes As promised, version 33 of the Firefox browser will fetch the OpenH264 module from Cisco, which enables Firefox to decode and encode H.264 video, for both the tag and WebRTC, which has a codec war on this matter. The module won't be a traditional NPAPI plugin, but a so-called Gecko Media Plugin (GMP), Mozilla's answer to the disliked Pepper API. Firefox had no cross-platform support for H.264 before. Note that only the particular copy of the implementation built and blessed by Cisco is licensed to use the h.264 patents.

Read More...
posted 8 days ago on slashdot
An anonymous reader writes: Amazon's Fire Phone launches later this week, and the reviews have started to come in. The hardware: "There's nothing terribly special about the Fire Phone's hardware, but there's very little to turn you off either." "The nice-looking IPS display in the Fire Phone gets bright enough for outdoor viewing, and it has nice viewing angles—a necessity for a phone that's meant to be tilted around and looked at from every which way." "An indistinct slab of glass and plastic, the Fire Phone looks more like a minimalist prototype than a finished product." Software: "Firefly can recognize lots of things, but it's incredibly, hilariously inconsistent." "Firefly is the one Fire Phone feature you'll want on any phone you're currently using. Let's hope that it gets enough developer support that it isn't just a link to Amazon's storefronts." "First, and to be absolutely clear, Dynamic Perspective will impress you the first time you see it, and Amazon is pretty good at showing it off. ... But if there's some cool, useful functionality to be had from super-aggressive, super-accurate face tracking, the Fire Phone doesn't have it." Conclusion: "Smartphones are for work, for life. They're not toys, they're tools. Amazon doesn't understand that, and the Fire Phone doesn't reflect it."

Read More...
posted 9 days ago on slashdot
vinces99 writes: The disastrous March 22 landslide that killed 43 people in the rural Washington state community of Oso involved the "remobilization" of a 2006 landslide on the same hillside, a new federally sponsored geological study concludes. The research indicates the landslide, the deadliest in U.S. history, happened in two major stages. The first stage remobilized the 2006 slide, including part of an adjacent forested slope from an ancient slide, and was made up largely or entirely of deposits from previous landslides. The first stage ultimately moved more than six-tenths of a mile across the north fork of the Stillaguamish River and caused nearly all the destruction in the Steelhead Haven neighborhood. The second stage started several minutes later and consisted of ancient landslide and glacial deposits. That material moved into the space vacated by the first stage and moved rapidly until it reached the trailing edge of the first stage, the study found. "Perhaps the most striking finding is that, while the Oso landslide was a rare geologic occurrence, it was not extraordinary," said Joseph Wartman, a University of Washington associate professor of civil and environmental engineering and a team leader for the study.

Read More...
posted 9 days ago on slashdot
An anonymous reader writes: Updates to the open-source libbluray, libaacs, and libbdplus libraries have improved the open-source Blu-ray disc support to now enable the Blu-ray Java interactivity layer (BD-J). The Blu-ray Java code is in turn executed by OpenJDK or the Oracle JDK and is working well enough to play a Blu-ray disc on the Raspberry Pi when paired with the VLC media player."

Read More...
posted 9 days ago on slashdot
klapaucjusz writes: The EFF has released an experimental router firmware designed make it easy to deploy open (password-less) access points in a secure manner. The EFF's firmware is based on the CeroWRT fork of OpenWRT, but appears to remove some of its more advanced routing features. The EFF is asking for help to further develop the firmware. They want the open access point to co-exist on the same router as your typical private and secured access point. They want the owner to be able to share bandwidth, but with a cap, so guests don't degrade service for the owner. They're also looking to develop a network queueing, a minimalist web UI, and an auto-update mechanism. The EFF has also released the beta version of a plug-in called Privacy Badger for Firefox and Chrome that will prevent online advertisers from tracking you.

Read More...
posted 9 days ago on slashdot
An anonymous reader writes: Brianna Wu, leader of a game development studio, has an article exposing the constant harassment of women in the games industry. She says, "I'm not writing this piece to evoke your sympathy. I'm writing to share with you what prominent, successful women in the industry experience, in their own words." She goes through the individual stories of several women targeted by this vitriol, and tries to figure out why it happens. Quoting: "We live in a society that's sexist in ways it doesn't understand. One of the consequences is that men are extremely sensitive to being criticized by women. ... This is why women are socialized to carefully dance around these issues, disagreeing with men in an extremely gentle manner. Not because women are nicer creatures than men. But because our very survival can depend on it. ... Growing a thicker skin isn't the answer, nor is it a proper response. Listening, and making the industry safer for the existence of visible women is the best, and only, way forward."

Read More...
posted 9 days ago on slashdot
mrspoonsi sends word that researchers from Temple University have managed to eliminate the HIV-1 virus from human cells for the first time. "When deployed, a combination of a DNA-snipping enzyme called a nuclease and a targeting strand of RNA called a guide RNA (gRNA) hunt down the viral genome and excise the HIV-1 DNA (abstract). From there, the cell's gene repair machinery takes over, soldering the loose ends of the genome back together – resulting in virus-free cells." While antiretroviral therapy can treat people who are infected with HIV, the immune system is incapable of actually removing the virus, so this is an important step in fighting it. The researchers still have to overcome the problem of delivering the the genetic "toolkit" to each affected cell in a patient's body, and also HIV's high mutation rate.

Read More...
posted 9 days ago on slashdot
An anonymous reader writes: With the Little Box Challenge, Google (and IEEE, and a few other sponsors like Cree and Rohm) is offering a $1 million prize to the team which can "design and build a kW-scale power inverter with the highest power density (at least 50 Watts per cubic inch)." Going from cooler-sized to tablet sized, they say, would make whole lot of things better, and the prize is reserved for the best performing entrant. "Our testing philosophy is to not look inside the box. You provide us with a box that has 5 wires coming out of it: two DC inputs, two AC outputs and grounding connection and we only monitor what goes into and comes out of those wires, along with the temperature of the outside of your box, over the course of 100 hours of testing. The inverter will be operating in an islanded more—that is, not tied or synced to an external grid. The loads will be dynamically changing throughout the course of the testing, similar to what you may expect to see in a residential setting." The application must be filled out in English, but any serious applicants can sign up "regardless of approach suggested or team background." Registration runs through September.

Read More...
posted 9 days ago on slashdot
An anonymous reader writes Mozilla has released version 31 of its Firefox web browser for desktops and Android devices. According to the release notes, major new features include malware blocking for file downloads, automatic handling of PDF and OGG files if no other software is available to do so, and a new certificate verification library. Smaller features include a search field on the new tab page, better support for parental controls, and partial implementation of the OpenType MATH table. Firefox 31 is also loaded with new features for developers. Mozilla also took the opportunity to note the launch of a new game, Dungeon Defenders Eternity, which will run at near-native speeds on the web using asm.js, WebGL, and Web Audio. "We're pleased to see more developers using asm.js to distribute and now monetize their plug-in free games on the Web as it strengthens support for Mozilla's vision of a high performance, plugin-free Web."

Read More...
posted 9 days ago on slashdot
Ben Blair is CTO of MarkITx, a company that brokers used commercial IT gear. This gives him an excellent overview of the marketplace -- not just what companies are willing to buy used, but also what they want to sell as they buy new (or newer) equipment. Ben's main talking point in this interview is that hardware has become so commoditized that in a world where most enterprise software can be virtualized to run across multiple servers, it no longer matters if you have the latest hardware technology; that two older servers can often do the job of one new one -- and for less money, too. So, he says, you should make sure you buy new hardware only when necessary, not just because of the "Ooh... shiny!" factor" (Alternate Video Link)

Read More...