Beta

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Verizon Throttles Data To "Provide Incentive To Limit Usage"

timothy posted 7 minutes ago | from the tell-me-more-about-the-word-unlimited dept.

Networking 2

An anonymous reader writes About a week ago, the Federal Communications Commission (FCC) asked for Verizon's justification on its policy of throttling users who pay for unlimited data usage. "I know of no past Commission statement that would treat 'as reasonable network management' a decision to slow traffic to a user who has paid, after all, for 'unlimited' service," the FCC wrote. In its response, Verizon has indicated that its throttling policy is meant to provide users with an incentive to limit their data usage. The company explained that "a small percentage of the customers on these [unlimited] plans use disproportionately large amounts of data, and, unlike subscribers on usage-based plans, they have no incentive not to do so during times of unusually high demand....our practice is a measured and fair step to ensure that this small group of customers do not disadvantage all others."

Edward Snowden Is Not Alone: US Gov't Seeks Another Leaker

timothy posted 2 hours ago | from the well-maybe-he's-just-that-good dept.

Government 81

bobbied (2522392) writes Apparently Edward Snowden is not alone. CNN is reporting that recent leaked documents published by The Intercept (a website that has been publishing Snowden's leaked documents) could not have been leaked by Snowden because they didn't exist prior to his fleeing the USA and he couldn't possibly have accessed them. Authorities are said to be looking for a new leaker.

Why Morgan Stanley Is Betting That Tesla Will Kill Your Power Company

timothy posted 3 hours ago | from the pure-greedy-capitalism dept.

Businesses 186

Jason Koebler (3528235) writes One major investment giant has now released three separate reports arguing that Tesla Motors is going to help kill power companies off altogether. Earlier this year, Morgan Stanley stirred up controversy when it released a report that suggested that the increasing viability of consumer solar, paired with better battery technology—that allows people to generate, and store, their own electricity—could send the decades-old utility industry into a death spiral. Then, the firm released another one. Now, it's tripling down on the idea with yet another report that spells out how Tesla and home solar will "disrupt" utilities.

EFF: US Gov't Bid To Alter Court Record in Jewel v. NSA

timothy posted 4 hours ago | from the they'll-get-you-next-time dept.

Electronic Frontier Foundation 51

The EFF is only today able to release details of an attempt by the government to alter the historical record in the case brought by the EFF against the NSA in Jewel v. NSA. "On June 6, the court held a long hearing in Jewel in a crowded, open courtroom, widely covered by the press. We were even on the local TV news on two stations. At the end, the Judge ordered both sides to request a transcript since he ordered us to do additional briefing. But when it was over, the government secretly, and surprisingly sought permission to "remove" classified information from the transcript, and even indicated that it wanted to do so secretly, so the public could never even know that they had done so." As you'd expect of the EFF, they fought back with vigorous objections, and in the end the government did not get its way, instead deciding that it hadn't given away any classified information after all. "The transcript of a court proceeding is the historical record of that event, what will exist and inform the public long after the persons involved are gone. The government's attempt to change this history was unprecedented. We could find no example of where a court had granted such a remedy or even where such a request had been made. This was another example of the government's attempt to shroud in secrecy both its own actions, as well as the challenges to those actions. We are pleased that the record of this attempt is now public. But should the situation recur, we will fight it as hard as we did this time."

T-Mobile Smartphones Outlast Competitors' Identical Models

timothy posted 4 hours ago | from the power-function dept.

Cellphones 80

An anonymous reader writes Laptop Mag battery tested the leading phones on all four major U.S. carriers and found that the same models on T-Mobile typically last 1 to 3 hours longer on a charge. This trend is not new, but has continued for over 3 years of testing. The article says While we don’t know for certain why T-Mobile phones last longer on a charge, there are some strong possibilities. T-Mobile’s network could be more efficient at sending and receiving data because of the bands it uses, or maybe there are far fewer customers on its LTE network, easing the strain. Another possibility is that T-Mobile tends to pre-load less bloatware on its flagship devices relative to the other carriers. AT&T is firmly in second place in the battery life findings presented, with Verizon and Sprint jockeying for last of the four carriers measured. It woud be interesting to see a similar test battery for phones in marginal reception areas; searching for service seems to deplete my battery faster than talking does.

The FBI Is Infecting Tor Users With Malware With Drive-By Downloads

timothy posted 5 hours ago | from the for-the-good-of-society dept.

Encryption 112

Advocatus Diaboli (1627651) writes For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement's knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system. The approach has borne fruit—over a dozen alleged users of Tor-based child porn sites are now headed for trial as a result. But it's also engendering controversy, with charges that the Justice Department has glossed over the bulk-hacking technique when describing it to judges, while concealing its use from defendants.

Big Bang Actors To Earn $1M Per Episode

timothy posted 5 hours ago | from the starving-grad-students dept.

Television 279

Cludge (981852) writes with a snippet from the BBC: "And rich they will be: With The Big Bang Theory commissioned until 2017, the show's three biggest names, Jim Parsons (Sheldon), Johnny Galecki (Leonard) and Kaley Cuoco (Penny) are guaranteed to earn $72m (£42.6m) each over the next three seasons. Unsurprisingly, the cost of producing the sitcom has spiraled." I wonder what that works out per line?

Hotel Charges Guests $500 For Bad Online Reviews

timothy posted 6 hours ago | from the may-require-substantial-deposit dept.

Social Networks 137

njnnja (2833511) writes In an incredibly misguided attempt to reduce the quantity of bad reviews (such as these), the Union Street Guest House, a hotel about 2 hours outside of New York City, had instituted a policy to charge groups such as wedding parties $500 for each bad review posted online. The policy has been removed from their webpage but the wayback machine has archived the policy. "If you have booked the Inn for a wedding or other type of event anywhere in the region and given us a deposit of any kind for guests to stay at USGH there will be a $500 fine that will be deducted from your deposit for every negative review of USGH placed on any internet site by anyone in your party and/or attending your wedding or event If you stay here to attend a wedding anywhere in the area and leave us a negative review on any internet site you agree to a $500. fine for each negative review."

Interviews: Ask Tim O'Reilly About a Life Steeped In Technology

timothy posted 6 hours ago | from the spawning-ideas dept.

Books 21

Today's interview guest is literally a household name: If you look at the shelves in nearly any programmer's house, developer shop or hackerspace, you'll probably see a stretch of books from O'Reilly Media (or O'Reilly & Associates, depending on how old the books are). Tim O'Reilly started out publishing a few technical manuals in the late '70s, branching from there into well-received technical reference and instructional books, notably ones covering open source languages and operating systems (how many people learned to install and run a new OS from Matt Walsh's Running Linux?), but neither Tim O'Reilly nor the company has gotten stuck in one place for long. As a publisher, he was early to make electronic editions available, in step with the increasing capabilities of electronic readers. Make Magazine (later spun off as part of Maker Media, which also produces Maker Faires around the world) started as an O'Reilly project; the company's conferences like OSCON, Fluent, and this year's Solid are just as much a manifestation of O'Reilly's proclivity for spreading knowledge as the books are, and those are only part of the picture, being joined with seminars, video presentations, and more. Tim O'Reilly is often hailed as a futurist and an activist (he was an early proponent of 3-D printing and hardware hacking, and a loud voice for patent reform) and he's got his eye on trends from global (how the Internet functions) to more personal -- like ways that physical goods can be produced, customized, and networked. So please go ahead and ask O'Reilly about what it's been like to be a publisher of paper books in an ever-more electronic world, as well as a visionary in the world of DIY and fabrication, or anything else on your mind. As usual, ask as many questions as you'd like, but please, one per post.

Senior RIKEN Scientist Involved In Stem Cell Scandal Commits Suicide

timothy posted 7 hours ago | from the one-way-to-handle-things dept.

Biotech 97

sciencehabit (1205606) writes "Yoshiki Sasai, a noted stem cell scientist at the RIKEN Center for Developmental Biology (CDB) in Kobe, Japan, who co-authored two controversial and later retracted papers that reported a simple way of reprogramming mature cells, was confirmed dead this morning, an apparent suicide. Local media reported he was found hanging from a stairway railing in the RIKEN complex in Kobe. Sasai was rushed to a nearby hospital but efforts to revive him were unsuccessful. He reportedly left a suicide note, but it has not been made public."

Ushahidi Helps Track Everything From Election Violence to Oil Spills (Video)

Roblimo posted 8 hours ago | from the crowdsourcing-at-its-finest dept.

The Internet 16

Wikipedia says, "Ushahidi, Inc. is a non-profit software company that develops free and open-source software (LGPL) for information collection, visualization, and interactive mapping. Ushahidi (Swahili for 'testimony' or 'witness') created a website in the aftermath of Kenya's disputed 2007 presidential election (see 2007–2008 Kenyan crisis) that collected eyewitness reports of violence reported by email and text message and placed them on a Google Maps map." Ushahidi has also been used to map some of the BP oil spill damage in Louisiana and many other events both positive and negative around the globe. This is a mature project, headquarted in Kenya, that recently spun out the BRCK, a "go anywhere, do anything, self-powered, mobile WiFi device," which looks like it would be useful in bringing Internet connectivity to places where the electricity supply is unreliable. || According to Ushahidi, today's interviewee, Rob Baker, "is responsible for overseeing company deliverables and is a lead on communications strategies. Previously, with a 10-year background in software development and with his field experience for aid programs, Rob was a lead for Ushahidi deployments around the world, primarily working in East Africa, the Middle East, and the Caribbean. He’s spoken at the United Nations, World Bank, government, hackathons, and at technical conferences." (Alternate Video Link)

Ask Slashdot: Good Technology Conferences To Attend?

Unknown Lamer posted 9 hours ago | from the all-of-them dept.

IT 116

SSG Booraem (2553474) writes I've recently been hired to a IT supervisor position at a local college. My boss wants me to find some technology conferences that I'd like to attend and submit them to her. Since I've worked in IT for 18 years but usually done scut work, I don't have any ideas. I'd appreciate suggestions with personal experiences.

Inside the Facebook Algorithm Most Users Don't Even Know Exists

Unknown Lamer posted 9 hours ago | from the no-one-reads-my-posts dept.

Facebook 113

First time accepted submitter catparty (3600549) writes An examination of what we can know about Facebook's new machine learning News Feed algorithm. From the article: "Facebook's current News Feed algorithm might be smarter, but some of its core considerations don't stray too far from the groundwork laid by EdgeRank, though thanks to machine learning, Facebook's current algorithm has a better ear for 'signals from you.' Facebook confirmed to us that the new News Feed ranking algorithm does indeed take 100,000 weighted variables into account to determine what we see. These factors help Facebook display an average 300 posts culled from roughly 1,500 possible posts per day, per user."

The Man Who Invented the 26th Dimension

Unknown Lamer posted 10 hours ago | from the beards-give-you-science-powers dept.

Math 213

StartsWithABang (3485481) writes Based on all the experiments we've ever been able to perform, we're quite certain that our Universe, from the largest scales down to the microscopic, obeys the physical laws of three spatial dimensions (and one time dimension): a four-dimensional spacetime. But that's not the only possibility mathematically. People had experimented with bringing a fifth dimension in to unify General Relativity with Electromagnetism in the past, but that was regarded as a dead-end. Then in the 1970s, an unknown theoretical physicist working on the string model of the strong interactions discovered that by going into the 26th dimension, some incredibly interesting physics emerged, and String Theory was born.

PayPal's Two-Factor Authentication Can Be Bypassed Using eBay Bug

Unknown Lamer posted 11 hours ago | from the get-your-60day-exploits dept.

Bug 32

About six weeks ago, a hole in Paypal's two factor authentication and their mobile client was discovered. hypnosec (2231454) wrote in with news of another trivial way to bypass Paypal's two-factor authentication. A bug in a feature for eBay integration allows passing a GET parameter to completely bypass two-factor authentication, and you don't even need to be coming from eBay to use it. You still need the password, but additional protection is lost. From the article: eBay, in conjunction with Paypal, provide a service as to where you can link your eBay account to your Paypal account, and when you sell something on eBay, the fees automatically come out of your Paypal account. ... When you are redirected to the login page, the URL contains "=_integrated-registration." ... Once you're actually logged in, a cookie is set with your details, and you're redirected to a page to confirm the details of the process. And this is where the exploit lays. Now just load http://www.paypal.com/ , and you are logged in, and don't need to re-enter your login. So, the actual bug itself is that the "=_integrated-registration" function does not check for a 2FA code, despite logging you into Paypal. You could repeat the process using the same "=_integrated-registration" page unlimited times.

Open Source Pioneer Michael Tiemann On Open Source Business Success

Unknown Lamer posted 11 hours ago | from the smash-the-system dept.

Open Source 36

ectoman (594315) writes Opensource.com has a summary of an interview with Michael Tiemann, co-founder of Cygnus Solutions and one of the world's first open source entrepreneurs. Now VP of Open Source Affairs at Red Hat, Tiemann offers an historical perspective on what makes open source businesses successful, and shares how he dealt with the open source movement's early skeptics. "A lot of the skepticism is a response to the abstract; it's a response to the unknown," Tiemann says, "And when you bring a concrete success story with just absolutely stellar credentials that doesn't just outperform the field, but embarrasses the field, then the skeptics begin to look like they're on the wrong side." The full audio interview on Hacker Public radio (~1 hour).

Ex-Autonomy CFO: HP Trying To Hide Truth

Unknown Lamer posted 12 hours ago | from the bad-decisions dept.

Businesses 57

jfruh (300774) writes The fallout from HP's Autonomy acquisition keeps getting more dramatic. Autonomy's ex-CFO is trying to block the settlement of lawsuits that arsoe the botched deal, claiming that HP is trying to hide its "own destruction of Autonomy's success after the acquisition." HP hit back, saying the ex-CFO "was one of the chief architects of the massive fraud on HP that precipitated this litigation."

Leaked Docs Offer Win 8 Tip: FinFisher Spyware Can't Tap Skype's Metro App

Unknown Lamer posted 13 hours ago | from the never-trust-proprietary-software dept.

Security 71

mask.of.sanity (1228908) writes "A string of documents detailing the operations and effectiveness of the FinFisher suite of surveillance platforms appears to have been leaked. The documents, some dated 4 April this year, detail the anti-virus detection rates of the FinFisher spyware which German based Gamma Group sold to governments and law enforcement agencies. The dump also reveals Windows 8 users should opt for the Metro version of Skype rather than the desktop client because it cannot be tapped by FinFisher."

LinkedIn Busted In Wage Theft Investigation

Unknown Lamer posted 13 hours ago | from the sudden-outbreak-of-workers-rights dept.

Businesses 102

fiannaFailMan (702447) writes that LinkedIn was just fined for the all too common practice of requiring workers to work off the clock Following an investigation by the U.S. Department of Labor, LinkedIn has agreed to pay over $3 million in overtime back wages and $2.5 million in liquidated damages to 359 former and current employees working at company branches in four states. The Fair Labor Standards Act requires companies to have record-keeping systems in place to record overtime hours worked and to ensure that employees are paid for those hours, requirements that the company was not meeting.

Ross Ulbricht's Lawyer Requests Suppression Of Silk Road Evidence

Unknown Lamer posted yesterday | from the go-long dept.

The Courts 48

Despite a failed attempt to have charges dismissed, the alleged Silk Road operator Ross Ulbricht's lawyer has filed a new motion to have evidence dismissed, citing recent court rulings in an argument that the Silk Road related searches were overly broad. From the article: Dratel [Ulbricht's lawyer] argues in his 102-page motion filed last Friday that "the government conducted a series of 14 searches and seizures of various physical devices containing electronically stored information ('ESI'), and of ESI itself from Internet providers and other sources. Some of the ESI was obtained via search warrant, but other ESI was obtained via court order, and still other ESI was obtained without benefit of any warrant at all." ...

The defense lawyer argues that even the searches for which the government had a warrant were overbroad and based on evidence that may have been obtained illegally. The attorney writes: " As set forth ante, all of the searches and seizures conducted pursuant to warrants and/or orders were based on the initial ability of the government to locate the Silk Road Servers, obtain the ESI on them, and perform extensive forensic analysis of that ESI. Thus, all subsequent searches and seizures are invalid if that initial locating the Silk Road Servers, obtaining their ESI, and gaining real-time continued access to those servers, was accomplished unlawfully."

Slashdot Login

Need an Account?

Forgot your password?
or Connect with...

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>