By EditorDavid from Slashdot's marking-the-cards department
Phil Ivey is a professional poker player who's won ten World Series of Poker bracelets -- but he's also got a new game. An anonymous reader write:
In 2012, Ivey requested that the Borgata casino let him play baccarat with an assistant named Cheng Yin Sun while using a specific brand of playing cards -- purple Gemaco Borgata playing cards -- and an automatic shuffler. He then proceeded to win $9.6 million over four visits. The pair would rotate certain cards 180 degrees, which allowed them to recognize those cards the next time they passed through the deck. (They were exploiting a minute lack of a symmetry in the pattern on the backs of the cards...)
But last month a U.S. district judge ruled that Ivey and his partner had a "mutual obligation" to the casino, in which their "primary obligation" was to not use cards whose values would be known to them -- and ordered them to return the $9.6 million [PDF]. "What this ruling says is a player is prohibited from combining his skill and intellect and visual acuity to beat the casino at its own game," Ivey's attorney told the AP, adding that the judge's ruling will be appealed.
The judge also ruled Ivey had to return the money he later won playing craps with his winnings from the baccarat game -- though the judge denied the casino's request for restitution over the additional $250,000 worth of goods and services they'd "comped" Ivey during his stay.Read Replies (0)
By EditorDavid from Slashdot's overdue department
"We're excited to double down on the findings of Ready to Code 1," says one Google program manager, "by equipping librarians with the knowledge and skills to cultivate computational thinking and coding skills in our youth."
Citing the need to fill "500,000 current job openings in the field of computer science," the American Library Association argues in a new whitepaper that "all 115,000 of the nation's school and public libraries are crucial community partners to guarantee youth have skills essential to future employment and civic participation"... The ALA's Google-funded "Libraries Ready to Code" project has entered Phase II, which aims to "equip Master's in Library Science students to deliver coding programs through public and school libraries and foster computational thinking skills among the nation's youth."
"Libraries play a vital role in our communities, and Google is proud to build on our partnership with ALA," added Hai Hong, who leads US outreach on Google's K-12 Education team... "Given the ubiquity of technology and the half-a-million unfilled tech jobs in the country, we need to ensure that all youth understand the world around them and have the opportunity to develop the essential skills that employers -- and our nation's economy -- require."Read Replies (0)
By EditorDavid from Slashdot's AI-roller department
schwit1 quotes the Associated Press: There's a new thrill on the streets of downtown Las Vegas, where high- and low-rollers alike are climbing aboard what officials call the first driverless electric shuttle operating on a public U.S. street. The oval-shaped shuttle began running Tuesday as part of a 10-day pilot program, carrying up to 12 passengers for free along a short stretch of the Fremont Street East entertainment district. The vehicle has a human attendant and computer monitor, but no steering wheel and no brake pedals. Passengers push a button at a marked stop to board it. The shuttle uses GPS, electronic curb sensors and other technology, and doesn't require lane lines to make its way. The shuttle -- which they've named Arma -- is traveling at 15 miles per hour, and the ride is smooth, according to the mayor of Las Vegas. ("It's clean and quiet and seats comfortably.") They've blocked all the side streets, so the shuttle doesn't have to deal with traffic signals yet, though eventually they'll install special transmitters at every intersection to communicate whether the lights are red or green, and the city plans to deploy more of the vehicles by the end of the year.Read Replies (0)
By EditorDavid from Slashdot's parenthetically-speaking department
Drawing on Haskell, Clojure, and ML, the new Lux language first targeted the Java Virtual Machine, but will be a universal, cross-platform language. An anonymous reader quotes JavaWorld:
Currently in an 0.5 beta release, Lux claims that while it implements features common to Lisp-like languages, such as macros, they're more flexible and powerful in Lux... [W]hereas Clojure is dynamically typed, as many Lisp-like languages have been, Lux is statically typed to reduce bugs and enhance performance. Lux also lets programmers create new types programmatically, which provides some of the flexibility found in dynamically typed languages. The functional language Haskell has type classes, but Lux is intended to be less constraining. Getting around any constraints can be done natively to the language, not via hacks in the type system.
There's a a 16-chapter book about the language on GitHub.Read Replies (0)
By EditorDavid from Slashdot's sensitive-data-breach department
Long-time Slashdot reader t0qer writes:
I'm the IT director at a medical marijuana dispensary. Last week the point of sales system we were using was hacked... What scares me about this breach is, I have about 30,000 patients in my database alone. If this company has 1,000 more customers like me, even half of that is still 15 million people on a list of people that "Smoke pot"...
" No patient, consumer, or client data was ever extracted or viewed," the company's data directory has said. "The forensic analysis proves that. The data was encrypted -- so it couldn't have been viewed -- and it was never extracted, so nobody has it and could attempt decryption." They're saying it was a "targeted" attack meant to corrupt the data rather than retrieve it, and they're "reconstructing historical data" from backups, though their web site adds that their backup sites were also targeted.
"In response to this attack, all client sites have been migrated to a new, more secure environment," the company's CEO announced on YouTube Saturday, adding that "Keeping our client's data secure has always been our top priority." Last week one industry publication had reported that the outage "has sent 1,000 marijuana retailers in 23 states scrambling to handle everything from sales and inventory management to regulatory compliance issues."Read Replies (0)
By EditorDavid from Slashdot's bienvenido-amigos department
There's been a dramatic change in one of the world's least-connected countries. An anonymous reader quotes the AP:
Since the summer of 2015, the Cuban government has opened 240 public Wi-Fi spots in parks and on street corners across the country... The government estimates that 100,000 Cubans connect to the internet daily. A new feature of urban life in Cuba is the sight of people sitting at all hours on street corners or park benches, their faces illuminated by the screen of smartphones connected by applications such as Facebook Messenger to relatives in Miami, Ecuador or other outposts of the Cuban diaspora...
Cuban ingenuity has spread internet far beyond those public places: thousands of people grab the public signals through commercially available repeaters, imported illegally into Cuba and often sold for about $100 -- double the original price. Mounted on rooftops, the repeaters grab the public signals and create a form of home internet increasingly available in private rentals for tourists and cafes and restaurants for Cubans and visitors alike.
The article also points out that last month, for the first time ever, 2,000 Cubans began receiving home internet access.Read Replies (0)
By EditorDavid from Slashdot's suggestions-from-the-sidelines department
Somebody I know has been searching up and down the internet for an open source software that can apply GPU pixel shaders (HLSL/GLSL/Cg/SweetFX) to a video and save the result out to a video file. He came up with nothing, so I said "Why not petition the open source community to create such a tool?" His reply was "Where exactly does one go to ask for a new open source software?"
So that is my question: Where on the internet can one best go to request that a new open source software tool that does not exist yet be developed? Or do open source tools only come into existence when someone -- a coder -- starts to build a software, opens the source, and invites other coders to join the fray?
This is a good place to discuss the general logistics of new open source projects -- so leave your best answers in the comments. What's the best place to suggest new open source software?Read Replies (0)
By EditorDavid from Slashdot's train-troubles department
schwit1 quotes the Los Angeles Times: California's bullet train could cost taxpayers 50% more than estimated — as much as $3.6 billion more. And that's just for the first 118 miles through the Central Valley, which was supposed to be the easiest part of the route between Los Angeles and San Francisco. A confidential Federal Railroad Administration risk analysis, obtained by the Times, projects that building bridges, viaducts, trenches and track from Merced to Shafter, just north of Bakersfield, could cost $9.5 billion to $10 billion, compared with the original budget of $6.4 billion.
The federal document outlines far-reaching management problems: significant delays in environmental planning, lags in processing invoices for federal grants and continuing failures to acquire needed property. The California High-Speed Rail Authority originally anticipated completing the Central Valley track by this year, but the federal risk analysis estimates that that won't happen until 2024, placing the project seven years behind schedule.
The whole project is expected to cost more than $68 billion.Read Replies (0)
By EditorDavid from Slashdot's hunting-for-hijackers department
Six months after the FBI closed the only unsolved air piracy in American aviation history -- after a 45-year investigation -- there's a new clue. An anonymous reader quotes Seattle news station KING:
A band of amateur scientists selected by the Seattle FBI to look for clues in the world's most infamous skyjacking may have found new evidence in the 45-year-old case. They're asking for the public's help because of new, potential leads that could link DB Cooper to the Puget Sound aerospace industry in the early 1970s. The scientific team has been analyzing particles removed from the clip-on tie left behind by Cooper after he hijacked a Northwest Orient passenger jet in November 1971. A powerful electron microscope located more than 100,000 particles on old the JCPenny tie. The team has identified particles like Cerium, Strontium Sulfide, and pure titanium.
Tom Kaye, lead researcher for the group calling itself Citizen Sleuths, says the group is intrigued by the finding, because the elements identified were rarely used in 1971, during the time of Cooper's daring leap with a parachute from a passenger jet. One place they were being used was for Boeing's high-tech Super Sonic Transport plane...
Interestingly, it was even a Boeing aircraft that Cooper hijacked, and witnesses say he wasn't nervous on the flight, and seemed familiar with the terrain below.Read Replies (0)
By EditorDavid from Slashdot's write-a-keylogger-go-to-jail department
An anonymous reader quotes Motherboard:
A 21-year-old from Virginia plead guilty on Friday to writing and selling custom spyware designed to monitor a victim's keystrokes. Zachary Shames, from Great Falls, Virginia, wrote a keylogger, malware designed to record every keystroke on a computer, and sold it to more than 3,000 people who infected more than 16,000 victims with it, according to a press release from the U.S. Department of Justice.
Shames, who appears to be a student at James Madison University, developed the first version of the spyware while he was still a high school student in 2013, "and continued to modify and market the illegal product from his college dorm room," according to the feds... While the feds only vaguely referred to it as "some malicious keylogger software," it appears the spyware was actually called "Limitless Keylogger Pro," according to evidence found by a security researcher who asked to remain anonymous... According to what appears to be Shames Linkedin page, he was an intern for the defense contractor Northrop Grumman from May 2015 until August 2016.
The Department of Justice announced that he'll be sentenced on June 16, and faces a maximum of 10 years in prison.Read Replies (0)