Stories
Slash Boxes
Comments

SoylentNews is people

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2022-07-01 to 2022-12-31
(All amounts are estimated)
Base Goal:
$3500.00

Currently:
$438.92

12.5%

Covers transactions:
2022-07-02 10:17:28 ..
2022-10-05 12:33:58 UTC
(SPIDs: [1838..1866])
Last Update:
2022-10-05 14:04:11 UTC --fnord666

Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

The Best Star Trek

  • The Original Series (TOS) or The Animated Series (TAS)
  • The Next Generation (TNG) or Deep Space 9 (DS9)
  • Voyager (VOY) or Enterprise (ENT)
  • Discovery (DSC) or Picard (PIC)
  • Lower Decks or Prodigy
  • Strange New Worlds
  • Orville
  • Other (please specify in comments)

[ Results | Polls ]
Comments:77 | Votes:87

posted by n1 on Thursday February 26 2015, @11:53PM   Printer-friendly
from the no-love-for-ciri dept.

Online dating proved to be a rote, tedious process. I would click around aimlessly for a few hours after a long day spent grading. When I actually did stumble across a woman I liked, she usually hadn’t been online for months, had a full mailbox, or would simply ignore my message.

Whenever I came to him with a particularly sticky physics problem, my adviser Mike was fond of saying: “Getting a PhD in physics doesn’t mean anything, really. Ultimately what you’re doing here is earning a degree in quantitative problem solving. Any kind of problem.” With that spirit and a notebook, I did what any physicist would do. I fired up MATLAB, and started building my model.

My model visualized online dating as a series of Bernoulli trials, a type of randomized experiment where two people’s first impressions of each other could be modeled via a pair of biased coin flips. Only if both parties land on heads (ie “you’re hot!”) do they go out.'

posted by n1 on Thursday February 26 2015, @10:39PM   Printer-friendly
from the echo-chamber-awards dept.

We had another article that suggested that the Oscars do more harm than good, which reminded me of this one. Namely, that the voters who decide on the animation awards might be woefully unfit for making such decisions.

The article states it best:

Imagine a world where the most high-profile animation awards were selected by individuals who had neither working knowledge nor appreciation of the animation art form.

In this world, a voter would pick the best animated short based solely on whether the film contained a dog in it or not.

In this world, a voter would identify the Irish film Song of the Sea and the Japanese film The Tale of The Princess Kaguya as “Chinese fuckin’ things,” not watch either film, and still cast a vote for the best animated feature of the year.

In this world, a voter would give a visual effects award to a film not because the film’s vfx met a certain standard of achievement, but “just to kind of recognize it.”

Keep in mind that this is just a informal survey of seven voters, but perhaps it indicates a larger problem?

posted by janrinok on Thursday February 26 2015, @09:01PM   Printer-friendly
from the what-say-you? dept.

In a vote on the morning of Thursday, February 26, the FCC has approved Net Neutrality.

In a story on Ars Technica (http://arstechnica.com/business/2015/02/fcc-votes-for-net-neutrality-a-ban-on-paid-fast-lanes-and-title-ii/) the FCC has voted to approve Net Neutrality and reclassify fixed and mobile broadband services under Title II as telecommunications services. As expected, the vote was along party lines.

It is expected that Verizon, AT&T, Comcast and others will sue to overturn the decision.

What say you Soylentils, is the reclassification of these services under Title II a good thing?

posted by n1 on Thursday February 26 2015, @07:59PM   Printer-friendly
from the mothers-day-just-got-more-expensive dept.

The BBC reports that three-person IVF will soon be legal in the United Kingdom. The procedure involves replacing mitochondrial DNA in an embryo from that of a second woman in order to eliminate deadly mitochondrial genetic disorders. Alana Saarinen was successfully conceived in the U.S. using the procedure back in 2000, but the FDA banned ooplasm transfer in 2001.

The UK has now become the first country to approve laws to allow the creation of babies from three people. The modified version of IVF has passed its final legislative obstacle after being approved by the House of Lords. The fertility regulator will now decide how to license the procedure to prevent babies inheriting deadly genetic diseases. The first baby could be born as early as 2016. A large majority of MPs in the House of Commons approved "three-person babies" earlier this month. The House of Lords tonight rejected an attempt to block the plan by a majority of 232. Estimates suggest 150 couples would be suitable to have babies through the technique each year.

Additional coverage at Wired UK and The Guardian.

Related: UK Parliament Gives Three-"Source" IVF the Go-Ahead.

posted by n1 on Thursday February 26 2015, @06:43PM   Printer-friendly
from the customer-is-always-right dept.

Karl Bode over at techdirt brings the story of how things should work in the business world.

Graphics card powerhouse Nvidia hasn't been having very much fun lately. First, the company took an Internet wide beating from gamers after selling a 4 GB graphics card (the GTX 970) that wasn't really a 4 GB graphics card, resulting in the $300+ purchase choking on high-end resolutions (or when using, say, Oculus Rift). After months of complaints and a false advertising suit, the company finally took to its official blog to acknowledge that the company "failed to communicate" its graphics card's limitations to the marketing department and "externally to reviewers at launch." Yeah, whoops a daisy.

Perhaps a bigger deal was Nvidia's December decision to roll out mobile graphics card drivers that prevented paying customers from overclocking the cards they own. The ability for consumers to do as they see fit with their own hardware, Nvidia claimed at the time, was a bug in the company's driver software that needed to be removed for the safety of the consumer (read: Nvidia got tired of processing returns and calls from idiots who didn't understand things pushed to work harder get hotter than ever when in confined spaces).

The good news is that after being absolutely pummeled in the media for weeks, Nvidia has issued a statement in its forums saying that the company has had a change of heart and will reintroduce the "bug":

"As you know, we are constantly tuning and optimizing the performance of your GeForce PC. We obsess over every possible optimization so that you can enjoy a perfectly stable machine that balances game, thermal, power, and acoustic performance. Still, many of you enjoy pushing the system even further with overclocking. Our recent driver update disabled overclocking on some GTX notebooks. We heard from many of you that you would like this feature enabled again. So, we will again be enabling overclocking in our upcoming driver release next month for those affected notebooks. If you are eager to regain this capability right away, you can also revert back to 344.75."

It's nice to see a company really listen to its customers once in a while.

posted by janrinok on Thursday February 26 2015, @05:31PM   Printer-friendly
from the open-data dept.

The computer-aided design software packages (ECADs) available to electronics folks for creating schematics and printed circuit board layouts have long been an aggravation when trying to share data with someone who uses a package produced by a different vendor--due to proprietary file formats that are (apparently, purposely) incompatible.

Many years ago, Cadsoft's EAGLE was available as a demo that would do very limited PCB creation but which had unlimited ability to view/print already-created files. It was also cross-platform. For a short time, EAGLE-compatible files became a quasi-standard for amateurs and pros on a budget.

In 2006, however, Cadsoft got greedy and DRM'd their stuff so that it would lock you out of your work product under certain circumstances, as described by Markus Zingg on October 24. Cadsoft quickly lost what little luster it had in the community. CERN engineers are hoping to produce a package that will do the same job - but better.

More down the page...

Now, Cian O'Luanaigh at CERN, the European Organization for Nuclear Research, reports

[...]so far, the engineers who design [printed circuit] boards often have had no option but to use proprietary tools.[1] That's about to change: CERN experts are adapting the open-source software KiCad to make it an efficient tool for designing open-source hardware. This Free Software makes it easier for electronics engineers to share their designs.

KiCad development began in 1992. The software--which runs on the computer-operating systems GNU/Linux, Windows, and Apple OS X--creates schematics for printed circuit boards with up to 32 copper layers with additional technical layers. Since 2013, experts in the CERN Beams department have made important contributions to KiCad as part of the Open Hardware Initiative (OHI), which provides a framework to facilitate knowledge exchange across the electronic design community.

"Our vision is to allow the hardware developers to share as easily as their software colleagues," says Javier Serrano, head of the BE-CO-HT section and OHI initiator. "Software sources are easily shared online because they are text files and everyone has access to editors and compilers that turn the sources into a program. On the other hand, in the case of hardware design, most of the time this is done using proprietary tools. Therefore, in order for people to modify the sources, they need to use those proprietary tools."

When [development on] the KiCAD project started at CERN, many free tools were already available to hardware designers but none was easy enough to use when designing a complex circuit. Among them, KiCad showed the best potential.

"We started by cleaning the basic code and introducing a new graphical engine," says Tomasz Wlostowski, a member of the BE-CO-HT section who, among other things, is in charge of supervising the development of new features for KiCad. "With our contribution, we aim to develop KiCad up to a point where it becomes the de facto standard for sharing, and more and more users, including corporate ones, start working with it."

Next week, the team is going to release two new features that many in the free/Open Source EDA community have been asking for: differential pair routing and trace-length matching.

"Thanks to the new differential pair routing, you can more easily design PCBs that support fast signals over a long distance and with less noise. This is particularly important for devices that deal with great amounts of data," says Wlostowski.

"The second tool--length matching--automatically ensures that two signals take exactly the same time to cross the PCB. When the feature is selected, the tool automatically adds meanders to adjust the delay. This is very useful when timing and synchronisation become important parameters to take into account."

[...]Raspberry Pi and Arduino have already donated to the CERN KiCad initiative. You can join the effort to enhance KiCad and make it an efficient tool for PCB design by making a donation via the CERN and Society website.

[1] This guy has a list of what he perceives as the shortcomings of the current KiCad package.

posted by janrinok on Thursday February 26 2015, @03:56PM   Printer-friendly
from the stomp-stomp-stomp dept.

European law enforcement agencies seized command-and-control servers used by Ramnit, a malware program that steals online banking credentials, FTP passwords, session cookies and personal files from victims.

Ramnit started out in 2010 as a computer worm capable of infecting EXE, DLL, HTM, and HTML files. However, over time it evolved into an information-stealing Trojan that’s distributed in a variety of ways.

Ramnit is capable of hijacking online banking sessions, stealing session cookies which can then be used to access accounts on various sites, copying sensitive files from hard drives, giving attackers remote access to infected computers and more.

Researchers from antivirus vendor Symantec described the malware program as “a fully-featured cybercrime tool” in a blog post Wednesday ( http://www.symantec.com/connect/blogs/ramnit-cybercrime-group-hit-major-law-enforcement-operation ) and said that it infected over 3.2 million computers over its five years of existence.

http://www.pcworld.com/article/2889092/europol-and-security-vendors-disrupt-massive-ramnit-botnet.html

posted by janrinok on Thursday February 26 2015, @02:27PM   Printer-friendly

Gizmorati.com reports that a Japanese university professor is building Japan’s first anonymous web platform for whistleblowers. But the professor isn't sure journalists will even pay attention to it.

The reason:

Even if Professor Hatta’s service manages to attract individuals bold enough to blow the whistle, there’s the question of whether or not Japan’s lapdog press will follow through with reporting their leaks. Japanese news outlets are notoriously reluctant to cover controversial news. In 2011, for example, Michael Woodford, the first first non-Japanese CEO at Olympus, was fired after uncovering attempts to hide US$ 1.5 billion in losses. What was front-page news across much of the western world was barely mentioned in Japan.

When it comes on line Whistleblowing.jp will provide an "untraceable" way for journalists to receive leaked information without fear of compromising a source – of paramount importance since the passage of Japan’s so-called State Secrets Law in December 2013. The law has stiff penalties for "government leakers" as well as the journalists that encourage those leaks.

Whistleblowing is only only accessible via TOR. Then information is delivered to the journalists the leaker selects via GlobalLeaks.org adding another layer of indirection. Professor Hatta says he does not fully trust TOR. No actual leaks will be published on the Whistleblowing.jp site itself. It merely serves as a conduit. And all information transits the system fully encrypted with the key of the journalist who is the intended receiver.

The professor does expect spam, but figures there might be a few important leaks hidden in the spam. No mention is made of any method of detecting entrapment attempts by authorities. Journalists may have to take hint from US police agencies and practice parallel construction.

posted by janrinok on Thursday February 26 2015, @12:58PM   Printer-friendly
from the what-else-would-they-say dept.

In a press release late Tuesday night ( http://www.gemalto.com/press/Pages/Gemalto-presents-the-findings-of-its-investigations-into-the-alleged-hacking-of-SIM-card-encryption-keys.aspx ), Gemalto, one of the world’s largest SIM manufacturers, denied recent allegations that the company had a vast number of sensitive SIM encryption keys stolen by the National Security Agency (NSA) and Britain’s General Communications Headquarters (GCHQ).

The company's statement addressed a number of confidential documents from 2010 which were leaked by former NSA contractor Edward Snowden and published last week by The Intercept. The documents indicated that a task force organized by the NSA and GCHQ broke into Gemalto employee e-mails and found ways to steal the encryption keys corresponding to the SIMs that Gemalto manufactured and sent to mobile carriers. Such a hack would allow state-sponsored spies to decrypt traffic coming to a fake cell tower and thereby watch voice, data, and text messages without a wiretap.

But Gemalto says that after a “thorough investigation,” it concluded that although the company did experience hacks in 2010, it suffered none that could have resulted in the loss of the vast number of SIM encryption keys that The Intercept article referenced. And, the company continued, if some keys had been stolen, then technology pertaining to the 3G and 4G networks that Gemalto builds SIMs for would have prevented substantial hacking. The company believed 2G networks were the only ones that would have truly suffered under such a hack.

http://arstechnica.com/security/2015/02/gemalto-says-reports-of-its-hack-by-the-nsa-and-gchq-were-greatly-exaggerated/

posted by LaminatorX on Thursday February 26 2015, @11:27AM   Printer-friendly
from the pushing-tin dept.

On Friday, September 26, 2014, a telecommunications contractor named Brian Howard woke early and headed to Chicago Center, an air traffic control hub in Aurora, Illinois, where he had worked for eight years. He had decided to get stoned and kill himself, and as his final gesture he planned to take a chunk of the US air traffic control system with him.

Court records say Howard entered Chicago Center at 5:06 am and went to the basement, where he set a fire in the electronics bay, sliced cables beneath the floor, and cut his own throat. Paramedics saved Howard's life, but Chicago Center, which controls air traffic above 10,000 feet for 91,000 square miles of the Midwest, went dark. Airlines canceled 6,600 flights; air traffic was interrupted for 17 days. Howard had wanted to cause trouble, but he hadn't anticipated a disruption of this magnitude. He had posted a message to Facebook saying that the sabotage “should not take a large toll on the air space as all comms should be switched to the alt location.” It's not clear what alt location Howard was talking about, because there wasn't one. Howard had worked at the center for nearly a decade, and even he didn't know that.

http://www.wired.com/2015/02/air-traffic-control/

posted by LaminatorX on Thursday February 26 2015, @09:25AM   Printer-friendly
from the trust-no-one dept.

The ACLU has released documents obtained from Florida public records requests to law enforcement agencies that give a more complete account of the use of Stingray surveillance technology. "Stingrays, also known as 'cell site simulators,' or 'IMSI catchers,' are invasive cell phone surveillance devices that mimic cell phone towers and force phones in the area to broadcast information that can be used to identify and locate them." The Register reports:

Documents obtained by the American Civil Liberties Union have shown that US cops are using the FBI's Stingray mobile phone tracking tech much more often than first thought. And the Feds are going to great lengths to hide the full extent of its use.

"The documents paint a detailed picture of police using an invasive technology - one that can follow you inside your house - in many hundreds of cases and almost entirely in secret," said Nathan Freed Wessler, staff attorney at the ACLU. "The secrecy is not just from the public, but often from judges who are supposed to ensure that police are not abusing their authority. Partly relying on that secrecy, police have been getting authorization to use Stingrays based on the low standard of 'relevance,' not a warrant based on probable cause as required by the Fourth Amendment."

The ACLU requested information about Stingray use from three dozen Florida police departments and found out that the system has been in use in the Sunshine State since 2007 - much earlier than first thought. According to a May 2014 email, the Stingray system has been used in 1,835 cases in Florida, none of which were national-security related. More than a third of cases using the technology involved robbery, burglary, and theft, and the rest were largely "wanted persons" cases.

The documents also included details of a few specific cases where Stingrays have been used. In one, defense lawyers were able to use the FBI's reluctance to reveal details about the technology to get a sweetheart deal of a sentence for their clients.

posted by LaminatorX on Thursday February 26 2015, @07:23AM   Printer-friendly
from the Welcome-you've-got-mail dept.

Is anyone really happy with their email handling?

Slate author Chris Kirk got fed up, designed a workflow-based email client, and learned to code. He built on the open source ecosystem, of course.

The article is interesting for ideas about how to make email more usable, pointers to related projects, and what it was like for a non-programmer to try to create an application.

I wonder, though, if an adroit use of Gmail labels would have gotten him most of the way there.

http://www.slate.com/articles/technology/technology/2015/02/email_overload_building_my_own_email_app_to_reach_inbox_zero.html

posted by mrcoolbp on Thursday February 26 2015, @04:08AM   Printer-friendly
from the who-you-gonna-call-now dept.

Tampa Bay News10 TV has a story about the loop holes in the E911 system that costs lives. It points the finger at State Government money-grabs, silly procedures in 911 call centers, and arcane routing of 911 calls.

The story relates the death of a woman who was able to report her exact position to 911, but the call center couldn't locate her because she was just across a county line. She drowned in her car which had gone into a pond.

More past the break:

We all have GPS receivers in our mobile phones, because the FCC mandated them for E911 services.
It turns out that up to 80% of all calls to 911 from cellular phones can not be accurately located, even when the phone was equipped with a working GPS.

What about the FCC regulations requiring 95% of GPS phones to report their location (regulations passed 19 years ago)? Those 1996 regulations have been delayed by various FCC actions and waivers so that they will not be fully in force until 2019.

We were all told that our calls to 911 automatically sent the location GPS data. However this hasn't been implemented in a many 911 call centers, even when the carriers deliver the call and pass along the GPS coordinates. Carriers don't do this in many small locations, and its not always the carriers fault.

However, its worse than that:

"the address of that tower determines which 9-1-1 center that call goes to. It's not based on the location of the telephone. It's the physical address of the tower, not the physical address of the phone."

If your call goes to the wrong call center, that call center is likely to be unable to locate your call.

The 911 industry standard uses proprietary maps. The Geographic Information System, or GIS, is a hyper-accurate mapping system with several overlays, integrated with the computer aided dispatch system. The system's map displays the nearest fire truck, hydrant, power poles, even underground utilities.

The problem with the GIS map is that it stops at the county line.

Dispatchers are DISCOURAGED from using Google maps. In many cases, simply entering a street address or cross streets reported by the caller would get any 911 operator a location within meters. Today, you can press a button on your phone, and Uber will send a car to your doorstep. Not so with 911.

Note: there is at least one inaccuracy in the story, about GPS coordinates not being passed automatically to 911 call centers. In most competent jurisdictions, this does happen. But it turns out in Georgia, where the reported event occurred, The STATE had pocketed $13.7 million dollars in 911 funds paid to them yearly by the federal government, and hadn't improved the call centers.

posted by mrcoolbp on Thursday February 26 2015, @01:43AM   Printer-friendly
from the series-of-tubes dept.

After more than a decade of controversy and debate, the stage is set for Thursday morning’s vote on new FCC Net neutrality rules. If all goes as hoped for, the commission will reclassify broadband as a “common carrier,” a public utility like telephones, power and water — a major step toward insuring an open, free and fair Internet for everyone.

More at http://billmoyers.com/2015/02/25/fccs-net-neutrality-vote-set-thursday-morning/

Live stream from FCC will be available online, assuming you have a connection with sufficient bandwidth : )

Ars Technica has an article on some potentially negative implications if the new rules pass.

Anti-Title II groups are arguing that utility status will bring new taxes that would cost customers billions of dollars a year...the annual increase in federal fees per household will be roughly $17. When you add it all up, reclassification could add a whopping $15 billion in new user fees.

The Consumerist also has a "what you need to know" piece.

posted by janrinok on Wednesday February 25 2015, @11:57PM   Printer-friendly
from the renewables-rock dept.

The Center for American Progress reports

As part of its first major retrofit in 30 years, two custom-designed wind turbines have started generating power for the Eiffel Tower. Located above the World Heritage Site's second level, about 400 feet off the ground, the sculptural wind turbines are now producing 10,000 kWh of electricity annually, equivalent to the power used by the commercial areas of the Eiffel Tower's first floor. The vertical axis turbines, which are capable of harnessing wind from any direction, were also given a custom paint job to further incorporate them into the iconic monument's 1,000-foot frame. At the same time they bring the image of the 1889 tower firmly into the 21st Century.

[...]In addition to the wind turbines, the renovation includes energy efficient LED lighting, high-performance heat pumps, a rainwater recovery system, and 10 square meters of rooftop solar panels on the visitor pavilion.

There was no required renewable energy target for the Eiffel Tower's facelift, but the project developers see it as a major landmark in Paris' climate plan. The city's plan(PDF) aims for a 25 percent reduction in greenhouse gas emissions, a 25 percent drop in energy consumption, and for 25 percent of energy to come from renewable energy sources by 2020.