By msmash from Slashdot's analogies department
In a wide-ranging interview, Mike McCue, CEO of news curator app Flipboard, talked about how -- and from where -- people get their news nowadays and how it shapes their worldview. From a report: McCue said getting all your news from either friends or algorithms is "challenging and semi-dangerous" because today's social platforms, like Twitter and Facebook, favor content that people engage with, driving "extremist" content to the top. Hence, he argues, the "fake news" epidemic, which McCue believes had an effect on the 2016 election. "Sometimes I think of news feeds as the 'mystery meat' of your information diet," he said. "It's not like you finish reading your Facebook feed, after half an hour, and feel like, 'That was a great use of time!' It's like if you ate potato chips all day long."Read Replies (0)
By msmash from Slashdot's how-we-live department
For a fun new entry into millennials are lazy, consider this: According to new data tracked down by Richard Fry for Pew Research, just 20 percent of 25- to 35-year-olds (Old Millennials, if you will) reported having lived at a different address the previous year. From a report on NYMag: In 2000, a full 26 percent of Gen-Xers -- then at the same age range -- had reported making a move in the previous year. In 1963, members of the Silent Generation moved at a 26 percent rate, too. The census data being used here doesn't include college-dorm moves prevalent with 18- to 24-year-olds, so those young'uns are left out of the analysis. The 20 percent rate is the lowest level of young adult mobility in half a century, Fry reports, and all this with millennials getting married, owning homes, and having kids less than previous generations. Student debt and less favorable lending rates may be driving down homeownership -- imagine that -- which further reduces movement. Psychologically, this also means that young adults are more stuck with their personalities and faded of memory compared with their more mobile peers.Read Replies (0)
By msmash from Slashdot's encrypted-emails department
Bristol-based software developer James Stanley, who used to work at Netcraft, shares how encrypted emails, something which was first introduced over 25 years ago, is still difficult to setup and use for even reasonably tech savvy people. He says he recently tried to install Enigmail, a Thunderbird add-on, but not only things like GPG, PGP, OpenPGP were -- for no reason -- confusing, Enigmail continues to suffer from a bug that takes forever in generating keys. From his blog post: Encrypted email is nothing new (PGP was initially released in 1991 -- 26 years ago!), but it still has a huge barrier to entry for anyone who isn't already familiar with how to use it. I think my experience would have been better if Enigmail had generated keys out-of-the-box, or if (a.) gpg agreed with Enigmail on nomenclature (is it a secring or a private key?) and (b.) output the paths of the files it had generated. My experience would have been a lot worse had I not been able to call on the help of somebody who already knows how to use it.Read Replies (0)
By msmash from Slashdot's shape-of-things-to-come department
Billionaire Elon Musk is known for his futuristic ideas. So it didn't come as a surprise when on Monday at the World Government Summit in Dubai, he predicted that over time we will see a "closer merger of biological intelligence and digital intelligence." He added, via a CNBC report: "It's mostly about the bandwidth, the speed of the connection between your brain and the digital version of yourself, particularly output." Musk explained what he meant by saying that computers can communicate at "a trillion bits per second", while humans, whose main communication method is typing with their fingers via a mobile device, can do about 10 bits per second. In an age when AI threatens to become widespread, humans would be useless, so there's a need to merge with machines, according to Musk. "Some high bandwidth interface to the brain will be something that helps achieve a symbiosis between human and machine intelligence and maybe solves the control problem and the usefulness problem," Musk explained.Read Replies (0)
By msmash from Slashdot's fewer-to-come-by department
An anonymous reader shares a MercuryNews report: Job growth in the tech industry used to zoom like a race car, but these days, hiring by this principal driver of the Bay Area's economy chugs along more like a family SUV. The technology industry's job growth in the nine-county region has dramatically decelerated, according to this newspaper's analysis of figures released by state labor officials and Beacon Economics. Tech's annual job growth throttled back to 3.5 percent, or 26,700 new jobs, in 2016. That's much slower than the 6 percent annual gain of 42,300 jobs in 2015, or the 6.4 percent gain in 2014. And while the industry's 3.5 percent growth last year is still a sturdy annual pace, Bay Area technology companies have already disclosed plans to slash about 2,000 jobs in the first three months of 2017.Read Replies (0)
By msmash from Slashdot's anti-productivity department
Barb Darrow, writing for Fortune: Corporate IT pros face the unenviable task of trying to protect valuable data from threats that change all the time. One vector of attack is clearly smartphones and tablets that employees use both for work and pleasure. To that end, mobile device management firm MobileIron just came out with its latest tally of the ten most blacklisted apps, based on a survey of 7,800 companies worldwide. Angry Birds tops the list of most-banned apps at companies worldwide, as well as in Australia, the U.S., and government sectors tracked by MobileIron in its twice-yearly Mobile Security and Risk Review. The survey covers the use of Android, iOS, and Windows devices from Oct. 1, 2016 and Dec. 31, 2016.Read Replies (0)
By EditorDavid from Slashdot's and-ESR-still-does department
Open source guru Eric Raymond turns 60 this year, prompting this question from an anonymous reader:
Eric Raymond's newest writing project is "Things Every Hacker Once Knew," inspired by the day he learned that not every programmer today's knows the bit structure of ASCII. "I didn't write it as a nostalgia trip -- I don't miss underpowered computers, primitive tools, and tiny low-resolution displays... In any kind of craft or profession, I think knowing the way things used to be done, and the issues those who came before you struggled with, is quite properly a source of pride and wisdom. It gives you a useful kind of perspective on today's challenges."
He writes later that it's to "assist retrospective understanding by younger hackers so they can make sense of the fossils and survivals still embedded in current technology." It's focusing on ASCII and "related technologies" like hardware terminals, modems and RS-232. ("This is lore that was at one time near-universal and is no longer.") Sections include "UUCP and BBSes, the forgotten pre-Internets" and "The strange afterlife of the Hayes smartmodem" (which points out some AT commands survived to this day in smartphones). He requests any would-be contributors to remember that "I'm trying to describe common knowledge at the time." This got my thinking -- what are some that every programmer once knew that have since been forgotten by newer generations of programmers?
Eric Raymond is still hard at work today on the NTPsec project -- a secure, hardened, and improved implementation of Network Time Protocol -- and he promises donations to his Patreon page will help fund it. But what things do you remember that were commonplace knowledge "back in the day" that have now become largely forgotten? Leave your best answers in the comments. What are some things that every hacker once knew?Read Replies (0)
By EditorDavid from Slashdot's 24-years-young department
ZDNet summarizes some of the surprises in this year's poll on LinuxQuestions, "one of the largest Linux groups with 550,000 member". An anonymous reader quotes their report:
The winner for the most popular desktop distribution? Slackware...! Yes, one of the oldest of Linux distributions won with just over 16% of the vote. If that sounds a little odd, it is. On DistroWatch, a site that covers Linux distributions like paint, the top Linux desktop distros are Mint, Debian, Ubuntu, openSUSE, and Manjaro. Slackware comes in 28th place... With more than double the votes for any category, it appears there was vote-stuffing by Slackware fans... The mobile operating system race was a runaway for Android, with over 68% of the vote. Second place went to CyanogenMod, an Android clone, which recently went out of business...
Linux users love to debate about desktop environments. KDE Plasma Desktop took first by a hair's breadth over the popular lightweight Xfce desktop. Other well-regarded desktop environments, such as Cinnamon and MATE, got surprisingly few votes. The once popular GNOME still hasn't recovered from the blowback from its disliked design change from GNOME 2 to GNOME 3.
Firefox may struggle as a web browser in the larger world, but on Linux it's still popular. Firefox took first place with 51.7 percent of the vote. Chrome came in a distant second place, with the rest of the vote being divided between a multitude of obscure browsers.
LibreOffice won a whopping 89.6% of the vote for "best office suite" -- and Vim beat Emacs.Read Replies (0)
By EditorDavid from Slashdot's yearning-to-breathe-free department
Sidd Bikkannavar works at NASA's Jet Propulsion Laboratory. After racing solar-powered cars in Chile, he had trouble returning to America.
mspohr quote The Verge:
Bikkannavar says he was detained by U.S. Customs and Border Patrol and pressured to give the Customs and Border Protection agents his phone and access PIN. Since the phone was issued by NASA, it may have contained sensitive material that wasn't supposed to be shared. Bikkannavar's phone was returned to him after it was searched by CBP, but he doesn't know exactly what information officials might have taken from the device...
The officer also presented Bikkannavar with a document titled "Inspection of Electronic Devices" and explained that CBP had authority to search his phone. Bikkannavar did not want to hand over the device, because it was given to him by JPL and is technically NASA property. He even showed the officer the JPL barcode on the back of phone. Nonetheless, CBP asked for the phone and the access PIN. "I was cautiously telling him I wasn't allowed to give it out, because I didn't want to seem like I was not cooperating," says Bikkannavar. "I told him I'm not really allowed to give the passcode; I have to protect access. But he insisted they had the authority to search it."
While border agents have the right to search devices, The Verge reports that travelers aren't legally required to unlock their phones, "although agents can detain them for significant periods of time if they do not." They also report that Bikkannavar "was not allowed to leave until he gave CBP his PIN," adding that the cybersecurity team at JPL "was not happy about the breach."Read Replies (0)
By EditorDavid from Slashdot's I'll-be-seeing-you department
Facial recognition software is already in use, and it has privacy advocates worried. An anonymous reader quotes the Bay Area Newsgroup.
Southern California-based FaceFirst sells its facial recognition technology to retail stores, which use it to identify shoplifters who have been banned from the store, and alert management if they return. Corporate offices and banks also use the software to recognize people who are wanted by police... Several local law enforcement agencies have expressed interest in the technology, but so far none have had the budget for it. FaceFirst sells software police officers can install on their smartphones and use to identify people in the field from up to 12 feet away.
Some privacy experts worry facial recognition technology will show up next in police body cameras, with potentially dangerous consequences... The problem, say privacy advocates, is that all kinds of people come into contact with police, including many who are never suspected of any crimes. So lots of innocent people could be caught up in a police database fed by face-recognizing body cameras. The body cameras could turn into a "massive mobile surveillance network," said Jeramie Scott, national security counsel for the Electronic Privacy Information Center.
One-third of America's police departments use body cameras. (And just in San Jose, there's already 450 neighborhood cameras that have also agreed to share their footage for police investigations.) The new technologies concern the ACLU's policy director for technology and civil liberties. "You have very powerful systems being purchased, most often in secret, with little-to-no public debate and no process in place to make sure that there are policies in place to safeguard community members."Read Replies (0)
By EditorDavid from Slashdot's bills-being-belittled department
A surprise announcement Sunday revealed that tomorrow Verizon will begin offering introductory plans with unlimited data.*
* Customers "will get full LTE speeds until they reach 22GB of usage," reports The Verge, "after which they'll be subject to reduced data speeds and de-prioritization."
An anonymous reader writes:
Other carriers have similar limits. "For Sprint it's 23GB. T-Mobile has a slightly higher threshold of 26GB... AT&T matches Verizon at 22GB," reports The Verge. Verizon says their cap is "to ensure a quality experience for all customers... While we don't expect to do that very often, network management is a crucial tool that benefits all Verizon customers."
The $80-a-month plan also includes hotspot tethering -- up to 10 gigabytes -- and "includes 'HD' video as opposed to the 480p/DVD-quality video that T-Mobile One customers get by default." In a Sunday YouTube video, the head of Verizon's wireless effort says customer interviews found "Some of the heavier users of data -- the power users -- had data anxiety." But it's still a surprising move. Engadget reports that in the past Verizon "frequently tried its hardest to discourage unlimited data users," but today is "facing stiff competition from T-Mobile, which engineered a dramatic comeback in recent years and upped the ante by making unlimited data standard through the One plan."
Verizon's pricing was also targeted heavily last week in a barrage of Super Bowl ads by both Sprint and T-Mobile just last Sunday. T-Mobile showed a masochistic woman calling Verizon just to enjoying hearing about the overages, taxes and fees she incurred by exceeding her data limit, while Sprint showed a man who was trying to escape his Verizon contract by faking his own death.Read Replies (0)
By EditorDavid from Slashdot's popular-quantum-mechanics department
LIGO is a large-scale physics experiment to detect "ripples in spacetime," as well as gravity waves from outer space. But it turns out that it's also creating gravity waves, according to a team of physicists led by Belinda Pang, a physicist at the California Institute of Technology. sciencehabit quotes Science magazine:
Although these waves are far too feeble to detect directly, the researchers say, the radiation in principle could be used to try to detect weird quantum mechanical effects among large objects... Of course, LIGO doesn't generate large gravitational waves -- you could probably make bigger ones yourself by whirling bowling balls around -- but it does so with optimal efficiency [and] the waves could still be used to probe quantum effects among macroscopic objects, Pang says.
Quantum mechanics says that a vanishingly small object such as an electron can literally be in two places in once. Many physicists suspect that it might just be possible to coax a macroscopic object, such as one of LIGO's mirrors, into a similar state of quantum motion. That delicate state wouldn't last long, as interactions with the outside world would make it "decohere" and put it in one place or another. However, one could imagine measuring the rate at which such a state decoheres to see whether it matches the rate expected from the radiation of gravitational waves, Pang says.
"It's unbelievably difficult," Pang says. "But if you want to do it, what we're saying is that LIGO is the best place to do it."Read Replies (0)
By EditorDavid from Slashdot's retro-recipes department
schwit1 quotes The South China Morning Post: Stanford University students have recreated a Chinese beer using a recipe that dates back 5,000 years. The beer "looked like porridge and tasted sweeter and fruitier than the clear, bitter beers of today," said Li Liu, a professor in Chinese archaeology, was quoted by the university as saying. Last spring, Liu and her team of researchers were carrying out excavation work at the Mijiaya site in Shaanxi province and found two pits containing remnants of pottery used to make beer, including funnels, pots and amphorae. The pits dated to between 3400BC and 2900BC, in the late Yangshao era. They found a yellowish residue on the remains of the items, including traces of yam, lily root and barley...Liu taught her students to recreate the recipe as part of her archaeology course.
One student following a second ancient beer recipe created a beverage that "smelled like funky cheese."Read Replies (0)
By EditorDavid from Slashdot's telling-it-to-the-judge department
In 2015 the FBI took over a Tor-accessible child pornography site to infect its users with malware so they could be identified and prosecuted. But now one suspect is challenging that evidence in court, with three different privacy groups filing briefs in his support.
An anonymous reader writes.
One EFF attorney argues it's a classic case of an unreasonable search, which is prohibited by the U.S. Constitution. "If the FBI tried to get a single warrant to search 8,000 houses, such a request would unquestionably be denied." But there's another problem, since the FBI infected users in 120 different countries. "According to Privacy International, the case also raises important questions: What if a foreign country had carried out a similar hacking operation that affected U.S. citizens?" writes Computerworld. "Would the U.S. welcome this...? The U.S. was overstepping its bounds by conducting an investigation outside its borders without the consent of affected countries, the group said."
The FBI's evidence is also being challenged by the ACLU of Massachusetts, and the EFF plans to file two more challenges in March, warning that otherwise "the precedent is likely to impact the digital privacy rights of all Internet users for years to come... Courts need to send a very clear message that vague search warrants that lack the required specifics about who and what is to be searched wonâ(TM)t be upheld."Read Replies (0)