By BeauHD from Slashdot's level-playing-field department
An anonymous reader writes: Non-profit public interest group Public Knowledge has filed a complaint with the Federal Communications Commission regarding Comcast's Stream TV service. The complaint says that Comcast excludes Stream TV traffic from its own data cap, which is both a violation of its merger agreement and counter to the FCC's Open Internet rules. Stream TV is a $15 per month offering for Xfinity internet customers. It includes local channels, some basic cable, HBO, and the use of a cloud DVR. Most content is streamed over the home network. Public Knowledge's senior staff attorney, John Bergmayer says, "Comcast's actions could result in fewer online video choices for viewers nationwide, while increasing its dominance as a video gatekeeper. If its behavior persists, prices will go up, the number of choices will go down, creators will have a harder time reaching an audience, and viewers will have a harder time accessing diverse and independent programming."Read Replies (0)
By BeauHD from Slashdot's secrets-are-meant-to-be-shared department
An anonymous reader writes: In traditional computing, numbers are represented by either 0s or 1s, but quantum computing relies on atomic-scale units, or "quibits," that can be simultaneously 0 and 1 -- a state known as a superposition that's far more efficient. It typically takes about 12 qubits to factor the number 15, but researchers at MIT and the University of Innsbruck in Austria have found a way to pare that down to five qubits, each represented by a single atom, they said this week. Using laser pulses to keep the quantum system stable by holding the atoms in an ion trap, the new system promises scalability as well, as more atoms and lasers can be added to build a bigger and faster quantum computer able to factor much larger numbers. That, in turn, presents new risks for factorization-based methods such as RSA, used for protecting credit cards, state secrets and other confidential data. "If you are a nation state, you probably don't want to publicly store your secrets using encryption that relies on factoring as a hard-to-invert problem," said Chuang. "Because when these quantum computers start coming out, [adversaries will] be able to go back and unencrypt all those old secrets."Read Replies (0)
By timothy from Slashdot's allegedly-apparently-oh-just-give-it-up department
Seattle software developer Saul Pwanson has a hobby of developing crossword puzzles, but another related hobby, too: analyzing the way that existing puzzles have been constructed. He created a database that aggregates puzzles that have appeared in various publications, including, crucially, the New York Times and USA Today, and sorts them based on similarities. Puzzles that have a greater percentage of the same black squares, or the same letters in identical positions, are ranked as more similar. Crosswords often re-use answers; puzzle-solvers are used to encountering some of the usual glue words that connect parts of the grid. As 538 reports, though, Pwanson noticed something odd in the data: Many of the puzzles that appeared in USA Today and affiliated publications, listed under various creators' names but all published under Timothy Parker as editor, were highly similar to each other, differing in as little as four answer words. These Pwanson classifies as "shoddy" -- they seem to be about as different as test responses based on a passed-around answer sheet. These seem to shortchange readers expecting original works, but may represent no real copyright problem, since Universal Uclick holds the copyright to them all. Perhaps puzzle enthusiasts aren't surprised that a publishing syndicate economizes on crosswords with slight variations, or that horoscopes are sometimes recycled.
< article continued at Slashdot's allegedly-apparently-oh-just-give-it-up department
>Read Replies (0)
By timothy from Slashdot's use-more-rice department
MojoKid writes: The Samsung Galaxy S7 and S7 Edge don't officially launch for a few more days, but some carriers appear to have shipped pre-orders early and some phones are already in consumers' hands. One early Galaxy S7 Edge owner appears to have tested his phones' water-resistance already and uncovered another new feature in the process. The user submerged his Galaxy S7 Edge in water and snapped a photo, then about four hours later plugged the phone into its fast charger and a warning popped-up on screen that stated, "Moisture detected in charging port", and the phone wouldn't charge. The user dried the phone and let it sit for a while, and it eventually started to charge again, but it wouldn't quick charge any longer. Frustrated, the user RMA'd the phone and plans to send it back to T-Mobile. The Galaxy S7 is IP68 rated, which means it is sealed against dust and can handle continuous submersion in up to 1 meter of water. However, the water detection feature that's apparently built into the Galaxy S7 is a good idea. Though the devices are IP68 rated, a few drops of water in the charging port could easily cause a short when the phone is plugged in.Read Replies (0)
BorgBackup 1.0.0 Released
Posted by News Fetcher on March 06 '16 at 09:52 AM
By timothy from Slashdot's two-is-one-and-one-is-none department
An anonymous reader writes: After almost a year of development, bug fixing and cleanup, BorgBackup 1.0.0 has been released. BorgBackup is a fork of the Attic-Backup project — a deduplicating, compressing, encrypting and authenticating backup program for Linux, FreeBSD, Mac OS X and other unixoid operating systems (Windows may also work using CygWin, but that is rather experimental/unsupported).
It works on 32bit as well as on 64bit platforms, x86/x64 and ARM CPUs (maybe as well on others, but these are the tested ones).
For Linux, FreeBSD and Mac OS X, there are single-file binaries which can be just copied onto a system and contain everything needed (Python, libraries, BorgBackup itself). Of course, it can be also installed from source.
BorgBackup is FOSS (BSD License) and implemented in Python 3 (91%), speed critical parts are in C or Cython (9%).Read Replies (0)