By Soulskill from Slashdot's partly-sunny-with-a-chance-of-people department
sends an article by Orin Kerr about a court case where a judge has had to weigh Fourth Amendment protections against law enforcement's ability to use a Doppler radar device to tell whether people are present within a home
. Kerr writes: If the government has the burden of proving reasonable suspicion, should the court treat the absence of information in the record on this point as not changing its otherwise-reached view that there is reasonable suspicion (as it does), or should that be treated as a potentially serious deficiency in getting to reasonable suspicion that the government has to overcome?
I’m not sure of the answer. We don’t normally encounter this question because we normally understand the uses and limits of investigatory tools. If the officer looked through the window and didn’t see any other people, for example, we could intuitively factor that into the reasonable suspicion inquiry without having to think about burdens of proof. I’m less sure what we’re supposed to do when the government use a suspicion-testing technological device with unknown capabilities."
The judge in the court case wrote, "New technologies bring with them not only new opportunities for law enforcement to catch criminals but also new risks for abuse and new ways to invade constitutional rights
(PDF). ... Unlawful searches can give rise not only to civil claims but may require the suppression of evidence in criminal proceedings. We have little doubt that the radar device deployed here will soon generate many questions for this court and others along both of these axes."Read Replies (0)
By Roblimo from Slashdot's sometimes-a-survey-is-better-than-a-crystal-ball department
Our headline is the title of a survey SysAid did
, a "gathering of seasoned IT directors, service management implementers, and business analysts" that took place in early November. As Sysaid's marketing VP, Sophie Danby
was the person who designed and implemented the survey, which consisted of only three questions: 1) Where do you see the corporate IT department in five years’ time? 2) With the consumerization of IT continuing to drive employee expectations of corporate IT, how will this potentially disrupt the way companies deliver IT? 3) What IT process or activity is the most important in creating superior user experiences to boost user/customer satisfaction? || You can obviously follow the first link above and see the survey's results. But in the video, Sophie adds some insights beyond the numerical survey results into near-future IT changes and what they mean for people currently working in the field.Read Replies (0)
By timothy from Slashdot's for-contributions-and-general-awesomeness department
It's been a long time since Slashdot has awarded the Beanies -- nearly 15 years
, in fact. But there's no time like the present, especially since tomorrow edges on the new year, and in early 2015 we'd like to offer a Beanie once again, to recognize and honor your favorite person, people (or project; keep reading) of the past year. Rather than a fine-grained list of categories like in 2000, though, this time around we're keeping it simple: we can always complicate things later, if warranted. So, please nominate below whoever you think most deserves kudos for the last twelve months. Is it ...
Edward Snowden, for the impact his leaks (though they began in 2013) have continued to make? (Or William Binney, for similar reasons
Nobel Peace Prize winner Malala Yousafzay
, who fought a difficult battle for children's right to an education?
Telescope popularizer John Dobson, who died earlier this year at the age of 98
, after bringing space a little more down to earth for many thousands of people?
May-Britt Moser, her husband Edvard Moser, and John O'Keefe for their discoveries
about how the brain navigates through the world?
< article continued at Slashdot
>Read Replies (0)
By Soulskill from Slashdot's tortured-the-aliens-until-they-left department
sends word that the CIA has taken the blame for a majority of early UFO sightings
. In a tweet, the agency said, "It was us," and linked to a document summarizing their use of U-2 spy planes from 1954-1974
(PDF)."High-altitude testing of the U-2led to an unexpected side effect — a tremendous increase in reports of unidentified flying objects," the CIA wrote in the document, which it wrote in 1998. "In the mid-1950s, most commercial airliners flew at altitudes between 10,000 and 20,000 feet and [many] military aircraftoperated at altitudes below 40,000 feet. Consequently, once U-2s started flying at altitudes above 60,000 feet, air-traffic controllers began receiving increasing numbers of UFO reports." [T]he CIA cross-referenced UFO sightings to U-2 flight logs. "This enabled the investigators to eliminate the majority of the UFO reports," the CIA wrote, "although they could not reveal to the letter writers the true cause of the UFO sightings."Read Replies (0)
By Soulskill from Slashdot's tales-from-the-IT-kitchen department
An anonymous reader writes: A post at iFixit explains how one user with a failing MacBook Pro fixed it by baking it in the oven. The device had overheating issues for months, reaching temperatures over 100 C. When it finally died, some research suggested the extreme heat caused the logic board to flex and break the solder connections. The solution was to simply reflow the solder, but that's hard to do with a MBP. "Instead, I cracked open the back of my laptop, disconnected all eleven connectors and three heat sinks from the logic board, and turned the oven up to 340 F. I put my $900 part on a cookie sheet and baked it for seven nerve-wracking minutes. After it cooled, I reapplied thermal paste, put it all back together, and cheered when it booted. It ran great for the next eight months." The laptop failed again, and another brief vacation into the oven got it running once more.Read Replies (0)