By timothy from Slashdot's obscure-but-low-hanging department
An anonymous reader writes with an intriguing story at Quanta Magazine, which begins: Two mathematicians have uncovered a simple, previously unnoticed property of prime numbers — those numbers that are divisible only by 1 and themselves. Prime numbers, it seems, have decided preferences about the final digits of the primes that immediately follow them. Among the first billion prime numbers, for instance, a prime ending in 9 is almost 65 percent more likely to be followed by a prime ending in 1 than another prime ending in 9. In a paper posted online today, Kannan Soundararajan and Robert Lemke Oliver of Stanford University present both numerical and theoretical evidence that prime numbers repel other would-be primes that end in the same digit, and have varied predilections for being followed by primes ending in the other possible final digits. "We've been studying primes for a long time, and no one spotted this before," said Andrew Granville, a number theorist at the University of Montreal and University College London. "It's crazy."Read Replies (0)
By timothy from Slashdot's confidence-levels department
mdsolar writes: Extreme weather events like floods, heat waves and droughts can devastate communities and populations worldwide. Recent scientific advances have enabled researchers to confidently say that the increased intensity and frequency of some, but not all, of these extreme weather events is influenced by human-induced climate change, according to an international National Academies of Science, Engineering, and Medicine report released March 11. "In the past, many scientists have been cautious of attributing specific extreme weather events to climate change. People frequently ask questions such as, 'Did climate change cause Hurricane Sandy?' Science can't answer that because there are so many relevant factors for hurricanes. What this report is saying is that we can attribute an increased magnitude or frequency of some extreme weather events to climate change,' said David Titley, professor of practice in Penn State's Department of Meteorology and founding director of Penn State's Center for Solutions to Weather and Climate Risk, who chaired the committee that wrote the report.Read Replies (0)
By timothy from Slashdot's why-we're-all-gathered-here-today department
prisoninmate writes: At the end of January we reported the fact that the oldest long-term supported kernel branch, Linux 2.6.32, is about to reached its end of life in February 2016, as announced by Willy Tarreau, who said that there might be another point release in a few weeks if important things need to be fixed. Well, it took a little bit longer than two weeks, and on March 12, he published details about the last maintenance release in the series, Linux kernel 188.8.131.52 LTS, along with the official end of life announcement, recommending users to move to the Linux 3.2 branch.Read Replies (0)
By timothy from Slashdot's relationship-maintenance department
MojoKid writes: Also known as "Project Sputnik," Dell came up with the idea of offering developers a variant of their XPS 13 notebook running Linux and launched its first models over three years ago. Now in its 5th generation, Project Sputnik is still going strong today with the latest models combining Ubuntu 14.04 with Intel's Skylake processors. To kick off its newest generation of Developer Edition laptops, Dell is offering three Core i7 XPS 13 configurations, including two that feature 16GB of RAM. Dell said it also plans to add a Core i5 option to the Developer Edition lineup sometime down the line. Dell is seeing increased interest from customers and in addition to the XPS Developer Edition, Dell offers Ubuntu on its Precision 5510, 3510, 7510, and 7710 mobile workstations, as well as its Precision M3800. Cost of entry into Developer Edition territory runs $1,550. What that gets you is a 13.3-inch QHD+ (3200x1800) InfinityEdge touch display powered by an Intel Core i5-6560U processor, 8GB of LPDDR3 1866 RAM, and Intel Iris Graphics 540.Read Replies (0)
By manishs from Slashdot's indie-vs-pop department
An anonymous reader points us to an opinion piece by Apple blogger Rene Ritchie on the dim prospects for indie app developers, in the face of mass-market, big-name competition. From his piece: Big apps get all the attention these days, just like big movie, music, or book releases and indies get what little is left, when there's even a little left. The App Store is big business, and that's how big business works. [...] Apple could use its considerable power and influence to help shape the App Store economy into one more hospitable to indie developers. After all, those are the apps I love and the ones that dominate my home screens. But the truth is, even if Apple gave indie developers everything they wanted, it wouldn't matter much over the long term. It may help a few for a while, and a very few for a while longer, but the app economy and apps themselves are evolving. Brent Simmons has offered his opinion on the matter. He writes, The Mac has for a long time been overlooked -- first because Windows was so huge, and then web apps, and now iOS. For my entire career people have said that the Mac is a bad bet, that it's dumb to write Mac apps. [...] There was never a golden age for indie iOS developers. It was easier earlier on, but it was never golden. (Yes, some people made money, and some are today. I don't mean that there were zero successes.) And there's a good chance that many of the people you currently think of as thriving iOS indie developers are making money in other ways: contracting, podcast ads, Mac apps, etc.Read Replies (0)
By BeauHD from Slashdot's survey-says department
An anonymous reader writes: The study, published in The Lancet, used a cross-sectional, state-level dataset relating to a host of topics associated with firearm mortality including gun ownership and even unemployment from across the U.S. to examine the relationship between recorded gun deaths and gun-control legislation. The study found that some laws, such as those that restrict gun access to children through locks and age restrictions, were simply ineffective while others, such as the stand-your-ground law that allows individuals to use deadly force in self-defense, actually increase gun-related deaths significantly. According to the study's model, a federal law expanding background checks for all gun purchases could reduce the national gun death rate by 57%, lowering it from 10.35 to 4.46 per 100,000 people while background checks for all ammunition purchases could lower the rate by 81% to 1.99 per 100,000 and firearm identification could reduce it by 83% to 1.81 per 100,000. If the federal government implemented all three laws, the scholars predict that the overall national rate of firearm deaths would drop by over 90% to 0.16 per 100,000.Read Replies (0)
By BeauHD from Slashdot's guide-to-parenting department
HughPickens.com writes: Sites like Facebook and Instagram are now baked into the world of today's families. Many, if not most, new parents post images of their newborn online within an hour of birth, and some parents create social media accounts for the children themselves -- often to share photos and news with family, although occasionally in the pursuit of "Instafame" for their fashionably clad, beautifully photographed sons and daughters. Now, KJ Dell'Antonia writes in the NYT about the growing disconnect between parents and their children and the one surprising rule children want their parents to know: Don't post anything about me on social media without asking me. "As these children come of age, they're going to be seeing the digital footprint left in their childhood's wake," says Stacey Steinberg. "While most of them will be fine, some might take issue with it." Alexis Hiniker studied 249 parent-child pairs distributed across 40 states and found about three times more children than parents thought there should be rules about what parents shared on social media. "Twice as many children as parents expressed concerns about family members oversharing personal information about them on Facebook and other social media without permission," says co-author Sarita Schoenebeck. "Many children said they found that content embarrassing and felt frustrated when their parents continued to do it."
When researchers asked kids what technology rules they wished their parents would follow -- a less common line of inquiry -- the answers fell into seven general categories:
1) Be present -- Children felt there should be no technology at all in certain situations, such as when a child is trying to talk to a parent.
2) Child autonomy -- Parents should allow children to make their own decisions about technology use without interference.
3) Moderate use -- Parents should use technology in moderation and in balance with other activities.
< article continued at Slashdot's guide-to-parenting department
>Read Replies (0)
By BeauHD from Slashdot's trail-of-evidence department
An anonymous reader writes from an article published on TorrentFreak: [A] criminal complaint details the FBI's suspicions that 25-year-old Preston McWaters had conveyed "false or misleading information regarding an explosive device." The FBI started digging and in February 2016 two search warrants against Twitter and Facebook required them to turn over information on several accounts. Both did and the criminal complaint makes it clear that the FBI believes that McWaters was behind the accounts and the threats. With McWaters apparently leaving incriminating evidence all over the place (including CCTV at Walmart where he allegedly purchased a pre-paid Tracfone after arriving in his own car), the FBI turned to IP address evidence available elsewhere. "During the course of the investigation, subpoenas and search warrants have been directed to various companies in an attempt to identify the internet protocol (IP) address from where the email messages are being sent," the complaint reads. "All the responses from [email provider] 1&1, Facebook, Twitter, and Tracfone have been traced by IP address back to a company named London Trust Media [doing business as] PrivateInternetAccess.com. A subpoena was sent to London Trust Media and the only information they could provide is that the cluster of IP addresses being used was from the east coast of the United States," the FBI's complain reads. "However, London Trust did provide that they accept payment for their services through credit card with a vendor company of Stripe and/or Amazon. They also accept forms of payment online through PayPal, Bitpay, Bit Coin, Cash You, Ripple, Ok Pay, and Pay Garden." While McWaters is yet to be found guilty, it's a sad fact that some people will use anonymizing services such as VPNs, pre-paid phones and anonymous email providers to harass others. And thankfully, as this case shows, they'll need to hide a lot more than their IP address to get away with that level of crime.Read Replies (0)
By manishs from Slashdot's fixing-the-education-system department
An anonymous reader writes: E-commerce giant Amazon is planning to launch a new education platform which would enable educators to upload, manage, share, and discover open education resources. Earlier this month, the company quietly opened an Amazon Education Wait List to allow educators to be alerted about the availability of the platform. The website currently reads, "The future of education is open. Someday soon, educators everywhere will have free and unlimited access to first-class course materials from a revolutionary platform. Get on the wait list to be notified when the platform is available for all schools and classrooms!" The webpage, do note, could be related to some other project. This isn't the first time Amazon has shown interest in the education sector. In 2013, it acquired TenMarks, a company that offers mathematics learning materials. Amazon, which lets you purchase or rent books for Kindle, is also a major name in the publishing world. Over the years, Apple, Google, and Microsoft have also become increasingly interested in seeing their hardware and software in classrooms.Read Replies (0)
By BeauHD from Slashdot's insecure-home-automation-deployment department
jones_supa writes: The hotel in which Matthew Garrett was staying at, had decided that light switches are unfashionable and replaced them with a series of Android tablets. In his tour to the system, one was quickly met with a glitch message "UK_bathroom isn't responding." Anyway, two of the tablets had convenient-looking ethernet cables plugged into the wall, so MacGyver began hacking. He managed to borrow a couple of USB ethernet adapters, set up a transparent bridge and then stick his laptop between the tablet and the wall. Tcpdump showed traffic, and Wireshark revealed that it was Modbus over TCP. Modbus is a pretty trivial protocol, and does not implement authentication. The Pymodbus tool could be used to control lights, turn the TV on/off, and even close and open the curtains. Then he noticed something. His room number was 714. The IP address he was communicating with was 172.16.207.14. They wouldn't, would they? Indeed, he could access the control systems on every floor and query other rooms to figure out whether the lights were on or not, which strongly implies that he could control them as well.Read Replies (0)