By EditorDavid from Slashdot's can-you-hear-me-now? department
schwit1 shared WIRED's report on "a life-changing technology." Steven Levy spoke with Mathias Bahnmueller as he tested a new Apple sound processor that beams digital audio directly into hearing aids.
Bahnmueller suffers from hearing loss so severe that a year ago he underwent surgery to install a cochlear implant -- an electronic device in the inner ear that replaces the usual hearing mechanism. Around a million patients have undergone this increasingly mainstream form of treatment, and that's just a fraction of those who could benefit from it. (Of the 360 million people worldwide with hearing loss, about 10 percent would qualify for the surgery.) "For those who reach a point where hearing aids no longer help, this is the only solution," says Allison Biever, an audiologist in Englewood, CO who works with implant patients. "It's like restoring a signal in a radio station."
Cochlear implants bypass the usual hearing process by embedding a device in the inner ear and connecting it via electrodes to the nerve that sends audio signals to the brain... The system Bahnmueller was using came from a collaboration between Apple and Cochlear, a company that has been involved with implant technology since the treatment's early days. The firms announced last week that the first product based on this approach, Cochlear's Nucleus 7 sound processor, won FDA approval in June -- the first time that the agency has approved such a link between cochlear implants and phones or tablets. Those using the system can not only get phone calls directly routed inside their skulls, but also stream music, podcasts, audio books, movie soundtracks, and even Siri -- all straight to the implant... Apple will offer the technology free to qualified manufacturers.
Google's accessibility team for Android has no public timeline for any similar hearing aid support, though according to the article it's "on the roadmap."Read Replies (0)
By EditorDavid from Slashdot's stoked-on-storage department
An anonymous reader quotes Fortune:
Business software company Red Hat said on Monday that it is acquiring the technology assets of Permabit, a small company that specializes in cleaning up corporate data to make storage more efficient and data access faster. Terms of the deal were not disclosed but a Red Hat spokesman said 16 people from Permabit will be joining that company...
While the conventional wisdom is that data storage is cheap, it is not free. And with companies turning to more expensive flash storage, it saves money to remove redundant data, said Richard Fichera, vice president and principal analyst at Forrester Research... Red Hat, which sells a version of the Linux operating system used by many Fortune 500 companies, also offers its own storage software. And, it wants to become a more formidable challenger in data storage, a goal that can be furthered by buying Permabit's technology, Fichera said.
Slashdot reader See Attached points out that this week Red Hat also released RHEL 7.4, which introduces support for Network Bound Disk Encryption (NBDE) and system protection against intrusive USB devices.Read Replies (0)
By EditorDavid from Slashdot's pondering-prions department
sciencehabit quotes Science magazine:
Prions are insidious proteins that spread like infectious agents and trigger fatal conditions such as mad cow disease. A protein implicated in diabetes, a new study suggests, shares some similarities with these villains. Researchers transmitted diabetes from one mouse to another just by injecting the animals with this protein. The results don't indicate that diabetes is contagious like a cold, but blood transfusions, or even food, may spread the disease.
The work is "very exciting" and "well-documented" for showing that the protein has some prionlike behavior, says prion biologist Witold Surewicz of Case Western Reserve University in Cleveland, Ohio, who wasn't connected to the research. However, he cautions against jumping to the conclusion that diabetes spreads from person to person. The study raises that possibility, he says, but "it remains to be determined."Read Replies (0)
By EditorDavid from Slashdot's money-for-nothing department
A new class action lawsuit from a former Wells Fargo customer claimed the bank charged loan customers for auto insurance they did not need. With auto loans, the bank often requires that full coverage auto insurance be bought when the loan is made. However, lead plaintiff Paul Hancock says that Wells Fargo charged him for auto insurance even though he informed them he already had an insurance policy with another company. Wells Fargo also charged him a late fee when he disputed the charge. Wells Fargo does not dispute that it did this to customers and has offered to refund $80 million to 570,000 customers who were charged for insurance. The lawsuit however is to recoup late fees, delinquency charges, and other fees that the refund would not cover.
NPR describes Wells Fargo actually repossessing the car of a man who was "marked as delinquent for not paying this insurance -- which he didn't want or need or even know about." Friday the bank also revealed the number of "potentially unauthorized accounts" from its earlier fake accounts scandal could be much higher than previous estimates -- and that they're now expecting their legal costs to exceed the $3.3 billion they'd already set aside.
And Reuters reports that the bank will also be paying $108 million "to settle a whistleblower lawsuit claiming it charged military veterans hidden fees to refinance their mortgages, and concealed the fees when applying for federal loan guarantees."Read Replies (0)
By EditorDavid from Slashdot's reading-between-the-channels department
Microsoft recently announced their plan to deploy unused television airwaves to solve the digital divide in America. And while the media painted this effort as a noble one, at Backchannel, Susan Crawford reveals the truth: "Microsoft's plans aren't really about consumer internet access, don't actually focus on rural areas, and aren't targeted at the US -- except for political purposes." So what is Microsoft really up to?
The article's author believes Microsoft's real game is "to be the soup-to-nuts provider of Internet of Things devices, software, and consulting services to zillions of local and national governments around the world. Need to use energy more efficiently, manage your traffic lights, target preventative maintenance, and optimize your public transport -- but you're a local government with limited resources and competence? Call Microsoft."
The article argues Microsoft wants to bypass mobile data carriers who "will want a pound of flesh -- a percentage -- in exchange for shipping data generated by Microsoft devices from Point A to Point B... [I]n many places, they are the only ones allowed to use airwave frequencies -- spectrum -- under licenses from local governments for which they have paid hundreds of millions of dollars."Read Replies (0)
By EditorDavid from Slashdot's core-applications department
AmiMoJo brings news about gedit, the default text editor for GNOME:
In a post to the gedit mailing list, Sébastien Wilmet states that gedit is no longer maintained and asks "any developer interested to take over the maintenance of gedit?" Just in case you were considering it, he warns "BTW while the gedit core is written in C (with a bit of Objective-C for Mac OS X support), some plugins are written in Vala or Python. If you take over gedit maintenance, you'll need to deal with four programming languages (without counting the build system). The Python code is not compiled, so when doing refactorings in gedit core, good luck to port all the plugins (the Python code is also less "greppable" than C). At least with Vala there is a compiler, even if I would not recommend Vala."
Sébastien's comments were surrounded by a <rant-on-languages> tag, but they're still crying out for some serious discussion. Any Slashdot readers want to share their own insights on Python, some fond thoughts on gedit, or suggestions for maintaining a great piece of open source software?Read Replies (0)
By BeauHD from Slashdot's disinformation-campaigns department
An anonymous reader quotes a report from CNN: The FBI monitored social media on Election Day last year in an effort to track a suspected Russian disinformation campaign utilizing "fake news," CNN has learned. In the months leading up to Election Day, Twitter and Facebook were the feeding grounds for viral "news" stories floating conspiracies and hoaxes, many aimed at spreading negative false claims about Hillary Clinton. On Election Day, dozens of agents and analysts huddled at a command center arrayed with large monitoring screens at the FBI headquarters in Washington watching for security threats, according to multiple sources. That included analysts monitoring cyber threats, after months of mounting Russian intrusions targeting every part of the US political system, from political parties to policy think-tanks to state election systems. On this day, there was also a group of FBI cyber and counterintelligence analysts and investigators watching social media. FBI analysts had identified social media user accounts behind stories, some based overseas, and the suspicion was that at least some were part of a Russian disinformation campaign, according to two sources familiar with the investigation.Read Replies (0)
By BeauHD from Slashdot's legal-trouble department
An anonymous reader shares a report from The Register: In late June, noted open-source programmer Bruce Perens [a longtime Slashdot reader] warned that using Grsecurity's Linux kernel security could invite legal trouble. "As a customer, it's my opinion that you would be subject to both contributory infringement and breach of contract by employing this product in conjunction with the Linux kernel under the no-redistribution policy currently employed by Grsecurity," Perens wrote on his blog. The following month, Perens was invited to court. Grsecurity sued the open-source doyen, his web host, and as-yet-unidentified defendants who may have helped him draft that post, for defamation and business interference. Grsecurity offers Linux kernel security patches on a paid-for subscription basis. The software hardens kernel defenses through checks for common errors like memory overflows. Perens, meanwhile, is known for using the Debian Free Software Guidelines to draft the Open Source Definition, with the help of others. Grsecurity used to allow others to redistribute its patches, but the biz ended that practice for stable releases two years ago and for test patches in April this year. It offers its GPLv2 licensed software through a subscription agreement. The agreement says that customers who redistribute the code -- a right under the GPLv2 license -- will no longer be customers and will lose the right to distribute subsequent versions of the software. According to Perens, "GPL version 2 section 6 explicitly prohibits the addition of terms such as this redistribution prohibition." A legal complaint (PDF) filed on behalf of Grsecurity in San Francisco, California, insists the company's software complies with the GPLv2. Grsecurity's agreement, the lawsuit states, only applies to future patches, which have yet to be developed. Perens isn't arguing that the GPLv2 applies to unreleased software. Rather, he asserts the GPLv2, under section 6, specifically forbids the addition of contractual terms.Read Replies (0)
By BeauHD from Slashdot's there's-a-first-for-everything department
A company called MegaBots released a video two years ago challenging a Japanese collective to a giant robot fight. About a week later, the Japanese group, Suidobashi Heavy Industry, agreed. Now, according to MegaBots co-founderes, Matt Oehrlein and Gui Cavalcanti, the battle is set to take place in September. Quartz reports: The battle would have happened a bit sooner, but apparently there have been "logistical issues at the originally-chosen venue," according to a release shared with Quartz by MegaBots. Unfortunately for fans hoping to see the battle in action -- presumably including those who backed the Kickstarter project to the tune of $550,000 to bring this robot to life --
the event will be closed to the public and recorded, for fears over the teams' ability to keep spectators safe. (One of the earliest conversations MegaBots had with Suidobashi was trying to figure out how the human pilots inside the robots would themselves "figure out how to not die.") Fans will be able to watch the fight on MegaBots' Facebook and YouTube sites, but it's not clear whether the fight will be live.Read Replies (0)
By BeauHD from Slashdot's microbial-communities department
Aneri Pattani reports via The New York Times (Warning: source may be paywalled; alternate source): Couples who live together share a lot of things: beds, bathrooms, food, toiletries. But one thing they might not expect to share? Skin bacteria. In a study published Thursday in mSystems, an open-access journal of the American Society for Microbiology, researchers studied the skin microbiomes of 10 sexually active, heterosexual couples living together. A microbiome is a mini-ecosystem of bacteria, fungi, viruses and other microorganisms living on and in the body. Each square centimeter of skin hosts between one million and one billion microorganisms, according to the study. After analyzing 330 skin swabs collected from 17 parts of the body on each participant, the researchers found that each person significantly influenced the microbial communities on a lover's skin. In fact, computer algorithms relying on microbial data were able to accurately match couples with up to 86 percent accuracy.Read Replies (0)
By BeauHD from Slashdot's everybody's-doing-it department
By BeauHD from Slashdot's cut-ties department
According to Bloomberg, Apple is planning to release a version of the Apple Watch later this year that can connect directly to cellular networks, a move designed to reduce the device's reliance on the iPhone. From the report: Currently, Apple requires its smartwatch to be connected wirelessly to an iPhone to stream music, download directions in maps, and send messages while on the go. Equipped with LTE chips, at least some new Apple Watch models, planned for release by the end of the year, will be able to conduct many tasks without an iPhone in range, the people said. For example, a user would be able to download new songs and use apps and leave their smartphone at home. Intel Corp. will supply the LTE modems for the new Watch, according to another person familiar with the situation. Apple is already in talks with carriers in the U.S. and Europe about offering the cellular version, the people added. The carriers supporting the LTE Apple Watch, at least at launch, may be a limited subset of those that carry the iPhone, one of the people said.Read Replies (0)
By BeauHD from Slashdot's note-taking department
The University of Vermont's Larner College of Medicine has begun phasing out lectures in favor of what's known as "active learning" and plans to be done with lectures altogether by 2019. NPR spoke with William Jeffries, a dean at the school who's leading the effort, about the thinking behind this move. From the report: Why are lectures bad? Well, I wouldn't say that they're bad. The issue is that there is a lot of evidence that lectures are not the best way to accumulate the skills needed to become a scientist or a physician. We've seen much evidence in the literature, accumulated in the last decade, that shows that when you do a comparison between lectures and other methods of learning -- typically called "active learning" methods -- that lectures are not as efficient or not as successful in allowing students to accumulate knowledge in the same amount of time. Give us an example of a topic taught in a traditional lecture versus an "active learning" setting. A good example would be the teaching of what we would call pharmacokinetics -- the science of drug delivery. So, how does a drug get to the target organ or targeted receptor? A lot of the science of pharmacokinetics is simply mathematical equations. If you have a lecture, it's simply presenting those equations and maybe giving examples of how they work. In an active learning setting, you expect the students to learn about the equations before they get there. And when you get into the classroom setting, the students work in groups solving pharmacokinetic problems. Cases are presented where the patient gets a drug in a certain dose at a certain time, and you're looking at the action of that over time and the concentration of the drug in the blood. So, those are the types of things where you're expecting the student to know the knowledge in order to use the knowledge. And then they don't forget it.Read Replies (0)
By BeauHD from Slashdot's government-debt department
randomErr shares a report from CNBC: If Apple were a foreign country, CEO Tim Cook might have considerable political clout in the United States. That's because the tech giant owns $52.6 billion in U.S. Treasury securities, which would rank it among the top 25 major foreign holders, according to estimates from the Treasury Department and Apple's SEC filings released Wednesday. Apple's stake in U.S. government securities as of June, up from $41.7 billion as of last September, puts it ahead of Israel, Mexico and the Netherlands, according to Treasury data released last month, which tracks up to May of this year. With $20.1 billion in short-term Treasury securities and $31.35 billion in long-term marketable Treasury securities, Apple still falls far below countries like China and Japan, which hold over a trillion dollars in U.S. government debt each -- which has caused considerable hand-wringing in Washington. Still, Apple is way above other big companies like Amazon, which owns less than $5 billion in U.S. government or agency securities combined, according to regulatory filings.Read Replies (0)
By BeauHD from Slashdot's new-guidance department
Due to "an increased awareness of cyber vulnerabilities with DJI products," the U.S. Army is asking all units to discontinue the use of DJI drones. The news comes from an internal memo obtained by the editor of SUAS News. It notes that the Army had issued over 300 separate releases authorizing the use of DJI products for Army missions, meaning a lot of hardware may have been in active use prior to the memo, which is dated August 2nd, 2017. The Verge reports: SUAS News published a piece back in May of this year that made a number of serious accusations about data gathered by DJI drones. Author Kevin Pomaski starts out writing, "Using a simple Google search the data mined by DJI from your provided flights (imagery, position and flight logs) and your audio can be accessed without your knowing consent." However, he never follows up with evidence to demonstrate how this data becomes public or can be found through a Google search. Pomaski also point out, correctly, that when DJI users elect to upload data to their SkyPixel accounts through the DJI app, this data can be stored on servers in the U.S., Hong Kong, and China. This data can include videos, photos, and audio recorded by your phone's microphone, and telemetry data detailing the height, distance, and position of your recent flights. DJI provided the following statement to The Verge: "People, businesses and governments around the world rely on DJI's products and technology for a variety of uses including sensitive and mission critical operations. The Department of the Army memo even reports that they have 'issued over 300 separate Airworthiness Releases for DJI products in support of multiple organizations with a variety of mission sets.' We are surprised and disappointed to read reports of the U.S. Army's unprompted restriction on DJI drones as we were not consulted during their decision. We are happy to work directly with any organization, including the U.S. Army, that has concerns about our management of cyber issues. We'll be reaching out to the U.S. Army to confirm the memo and to understand what is specifically meant by 'cyber vulnerabilities.' Until then, we ask everyone to refrain from undue speculation."Read Replies (0)
By BeauHD from Slashdot's cut-in-half department
An anonymous reader quotes a report from CBS Local: President Donald Trump's push to cut legal immigration to the United States in half is being met by opposition from Silicon Valley leaders, economists, and even some Republicans senators, who all say legal immigration is key to economic prosperity. The Trump administration Wednesday endorsed the Reforming American Immigration for a Strong Economy Act or RAISE Act, a Senate bill introduced by two Republican senators earlier this year, that aims to cut all U.S. immigration in half. Business leaders, especially those in California's tech industry, say the bill will stymie their ability to fill jobs and grow the U.S. economy. California's economy is the sixth largest in the world and many attribute that success, in part, to immigration. The Information Technology Industry Council, which represents companies including Amazon, Apple, Adobe, Dell, Facebook, Hewlett-Packard, Google, Visa, Nokia, and Microsoft railed against the bill.
Dean Garfield, President and CEO of the council said, "This is not the right proposal to fix our immigration system because it does not address the challenges tech companies face, injects more bureaucratic dysfunction, and removes employers as the best judge of the employee merits they need to succeed and grow the U.S. economy." Garfield argues that the tech industry cannot find enough STEM-skilled Americans to fill open positions and that U.S. immigration policy "stops us from keeping the best and brightest innovators here in the U.S. and instead we lose out to our overseas competitors."Read Replies (0)
By msmash from Slashdot's where-things-are-now department
An anonymous reader shares a report: In November, LastPass made a big change to its service, allowing users to keep track of their passwords across all their internet-enabled mobile and desktop devices, free of charge. In addition to the free tier, the cross-platform password manager - available on iOS, Android, and Windows 10 -- also offered a Premium plan with additional features, priced at $12 per year. Today, LastPass announced another wave of changes to its lineup for individual users -- but this time, the changes are unlikely to be welcomed with open arms by its customers. LastPass Premium has now doubled in price to $24 a year, which includes "emergency access, the ability to share single passwords and items with multiple people, priority tech support, advanced multi-factor authentication, LastPass for applications, and 1GB of encrypted file storage," along with all the other features of the Free tier. In a statement, the company said, "While LastPass Free continues to offer access on all browsers and devices and the core LastPass password management functionality, unlimited sharing and emergency access are now Premium features. Free users will be able to share one item with one other individual.Read Replies (0)
By msmash from Slashdot's fearmongering department
An anonymous reader writes: ESET has taken fear mongering, something that some security firms continue to do, to a new level by issuing a blanket warning to users to view torrent files and clients as a threat. The warning came from the company's so-called security evangelist Ondrej Kubovic, (who used extremely patchy data to try and scare the bejesus out of computer users (Google cache). Like all such attempts at FUD, his treatise ended with a claim that ESET was the one true source whereby users could obtain "knowledge" to protect themselves. "If you want to stay informed and protect yourself by building up your knowledge, read the latest pieces by ESET researchers on WeLiveSecurity," he wrote. Kubovic used the case of Transmission -- a BitTorrent client that was breached in March and August 2016 with malware implanted and aimed at macOS users -- to push his barrow. But to use this one instance to dissuade people from downloading BitTorrent clients en masse is nothing short of scaremongering. There are dozens, if not more, BitTorrent clients which enjoy much wider usage, with uTorrent being one good example. Kubovic then used the old furphy which is resorted to by those who lobby on behalf of the copyright industry -- torrents are mostly illegal files and downloading them is Not The Right Thing To Do. But then he failed to mention that hundreds of thousands of perfectly legitimate files are also offered as torrents -- for instance, this writer regularly downloads images of various GNU/Linux distributions using a BitTorrent client because it is the more community-friendly thing to do, rather than using a direct HTTP link and hogging all the bandwidth available.Read Replies (0)