By samzenpus from Slashdot's high-horse department
writes: In Silicon Valley they think differently, and if that leads to arrogance, so be it. At least that's what Bloomberg Businessweek's Joel Stein implies in his long meditation on the area's outlook on technology, money and changing the world. Stein set out to examine the underlying notion that Silicon Valley's and San Francisco's tech entrepreneurs are feeding a backlash by being, in a word, jerks. His conclusion seems to be that they may well be jerks, but they're misunderstood jerks. He doesn't deny that there's sexism and boorishness at play in the young tech community, but he sees the industry trying to make itself better. He sees a lot of egotism at work, too, but he says if you're setting out to change the world, you're probably going to need a big ego to do it. But tell that to other people in Northern California: undoubtedly, you've read about the tempest in San Francisco recently, where urban activists are decrying the influx of highly paid tech professionals, who they argue are displacing residents suddenly unable to keep up with skyrocketing rents.Read Replies (0)
By samzenpus from Slashdot's lock-it-down department
writes In an open letter to Automotive CEOs, a group of security researchers has called on automobile industry executives to implement five security programs to improve car safety and build cyber-security safeguards inside the software systems powering various features in modern cars. As car automation systems become more sophisticated, they need to be locked down to prevent tampering or unauthorized access. The Five Star Automotive Cyber Safety Program outlined in the letter asked industry executives for safety by design, third-party collaboration, evidence capture, security updates, and segmentation and isolation. Vehicles are "computers on wheels," Josh Corman, CTO of Sonatype and a co-founder of I am the Cavalry, the group who penned the letter (PDF. The group aims to bring security researchers together with representatives from non-security fields, such as home automation and consumer electronics, medical devices, transportation, and critical infrastructure, to improve security. Read Replies (0)
By timothy from Slashdot's so-very-simple department
writes One year after their last release "Luna", Elementary OS (a Linux distribution with a very heavy emphasis on design and usability which draws a lot of comparisons to Mac OS X) Has released the public beta of their latest version "Freya."
Using core components from Ubuntu 14.04, "Freya" sports many improvements including the usual newer kernel, better hardware support and newer libraries.Other updates include a GSignon-based online accounts system, improved searches, Grub-free uEFI booting, GTK+ 3.12, an updated theme, and much more.
This being a beta, the usual warnings apply, but I would also point out that the Elementary OS Team also has over $5,000 worth of bugs still available on Bountysource which can be a great way to contribute to the project and make a little dough while you are at it.Read Replies (0)
By timothy from Slashdot's future-is-now department
Ars Technica takes a look at the next generation of TrackingPoint's automatically aimed rifles
(not "automatic" in the usual sense), and visited the shooting range where they're tested out. Like the company's previous generation of gun (still in production, and increasingly being sold to government buyers), TrackingPoint's offerings integrate a Linux computer that makes acquiring and tracking a target far easier and more accurate than it would otherwise be. Unlike the older models
, though, this year TrackingPoint is concentrating on AR-15s, rather than longer, heavier bolt-action rifles. A slice:
< article continued at Slashdot
>Read Replies (0)
By timothy from Slashdot's wifi-password-|"pl['as[cnp department
writes "Security researcher Gene Bransfield, with the help of his wife's grandmother's cat, decided to see how many neighborhood WiFi access points he could map and potentially compromise. With a collar loaded with a Spark chip, a Wi-Fi module, a GPS module, and a battery, Coco the cat helped Gene identify Wi-Fi networks around the neighborhood and then reported back. The goal here is obvious: Discover all of the unsecured, or at least poorly-secured, wireless access points around the neighborhood. During his journey, Coco identified dozens of Wi-Fi networks, with four of them using easily-broken WEP security, and another four that had no security at all. Gene has dubbed his collar the "WarKitteh", and it cost him less than $100 to make. He admits that such a collar isn't a security threat, but more of a goofy hack. Of course, it could be used for shadier purposes."
(Here's Wired's article
on the connected cat-collar.)Read Replies (0)