Slashdot

Subscribe to Slashdot feed Slashdot
News for nerds, stuff that matters
Updated: 4 days 19 hours ago

Fighting Invasive Fish With Forks and Knives

Mon, 18/08/2014 - 07:10
An anonymous reader writes "NPR commentator Bonny Wolf has a unique solution to battle the threat of invasive fish species in our waterways. She proposes we fight them with a knife, fork, and a few lemon wedges. From the article: "Take the , which has made its way into tributaries of the Chesapeake Bay. It competes with native species for food, and then eats the native species, not to mention the odd frog or bird, with its mouthful of sharp teeth. It's been called "Fishzilla." It breeds fast, has no natural predators and can grow to be 4 feet long. The northern snakehead hangs out in grassy shallows, making it hard to catch. But a couple of years ago, Maryland started promoting the snakehead as an eating fish. Its harvest has increased from zero to 5,000 pounds a year.""

Read more of this story at Slashdot.








Facebook Tests "Satire" Tag To Avoid Confusion On News Feed

Sun, 17/08/2014 - 23:30
An anonymous reader writes "In an attempt to keep you from having to explain to your crazy relatives that despite what they read, Vice President Biden *didn't* get a grow light delivered to the White House under a fake name, Facebook is testing a "satire" tag on news feeds. A Facebook representative issued the following statement to Ars Technica: "We are running a small test which shows the text '[Satire]' in front of links to satirical articles in the related articles unit in News Feed. This is because we received feedback that people wanted a clearer way to distinguish satirical articles from others in these units."

Read more of this story at Slashdot.








Are Altcoins Undermining Bitcoin's Credibility?

Sun, 17/08/2014 - 22:22
An anonymous reader writes The editor of a Bitcoin advocacy site believes the proliferation of altcoins (cryptocurrencies other than Bitcoin) is harming Bitcoin's long-term potential as an alternative to traditional currencies. Posting at BadBitcoin.org, a site that seeks to expose online scams that target Bitcoin users, the pseudonymous ViK compares altcoins, including the Internet meme inspired Dogecoin, to a pump-and-dump scheme where developers create their own version of the Bitcoin wallet and blockchain and then "pre-mine" or generate a significant number of cryptocurrency units before the altcoin's official release. Later, when their value has risen, the pre-mined altcoins are exchanged for Bitcoin or in some cases converted directly to cash. While critics of cryptocurrencies in general might find ViK's comments about the altcoin "tulip" mania ironic, the self-confessed Bitcoin fan is nevertheless calling for an altcoin boycott: "The easiest way to stop them is to not participate. We all know that they only have one purpose, and that is to make Bitcoin for the so called developers."

Read more of this story at Slashdot.








New Cridex Malware Copies Tactics From GameOver Zeus

Sun, 17/08/2014 - 21:16
Trailrunner7 writes The GameOver Zeus malware had a nice run for itself, making untold millions of dollars for its creators. But it was a run that ended with a multi-continent operation from law enforcement and security researchers to disassemble the infrastructure. Now researchers have identified a new variant of the Cridex malware that has adopted some of the techniques that made GOZ so successful in its day. Researchers at IBM's X-Force research team have seen a new version of Cridex, which is also known as Bugat and Feodo, using some of the same techniques that GOZ used to such good effect. Specifically, the new strain of malware has adopted GOZ's penchant for using HTML injections, and the researchers say the technique is nearly identical to the way that GOZ handled it. "There are two possible explanations for this. First, someone from the GOZ group could have moved to the Bugat team. This would not be the first time something like this has happened, which we've witnessed in other cases involving Zeus and Citadel; however, it is not very likely in this case since Bugat and GOZ are essentially competitors, while Zeus and Citadel are closely related. The second and more likely explanation is that the Bugat team could have analyzed and perhaps reversed the GOZ malware before copying the HTML injections that made GOZ so highly profitable for its operators," Etay Maor, a senior fraud prevention strategist at IBM, wrote in an analysis of the new malware.

Read more of this story at Slashdot.








Is Storage Necessary For Renewable Energy?

Sun, 17/08/2014 - 20:11
mdsolar writes Physicist and energy expert Amory Lovins, chief scientist at The Rocky Mountain Institute, recently released a video in which he claims that renewable energy can meet all of our energy needs without the need for a fossil fuel or nuclear baseload generation. There's nothing unusual about that — many people have made that claim — but he also suggests that this can be done without a lot of grid-level storage. Instead, Lovins describes a "choreography" between supply and demand, using predictive computer models models to anticipate production and consumption, and intelligent routing to deliver power where it's needed. This "energy dance," combined with advances in energy efficiency, will allow us to meet all of our energy needs without sacrificing reliability.

Read more of this story at Slashdot.








ISS Earth at Night Photos Crowdsourced For Science

Sun, 17/08/2014 - 19:03
teleyinex writes The Complutense University of Madrid (UCM) is leading a project called Cities at Night to catalog the images taken by astronauts from the ISS. The project uses the platform Crowdcrafting powered by the open source software PyBossa to catalog images in cities, stars or other objects, as well as geo-reference them."

Read more of this story at Slashdot.








Is Dolby Atmos a Flop For Home Theater Like 3DTV Was?

Sun, 17/08/2014 - 01:03
An anonymous reader writes: Object-based audio is supposed to be the future of surround sound. The ability to pan sound around the room in 3D space as opposed to fixed channel assignments of yesterday's decoders. While this makes a lot of sense at the cinema, it's less likely consumers rush to mount speakers on their ceilings or put little speaker modules on top of their existing ones to bounce sound around the room. ">Leading experts think this will be just a fad like 3DTV was. What do you think?

Read more of this story at Slashdot.








Broadband Subscribers Eclipsing Cable TV Subscribers

Sat, 16/08/2014 - 19:47
An anonymous reader writes: High-speed internet has become an everyday tool for most people, and cord-cutters have dramatically slowed the growth of cable TV, so this had to happen eventually: broadband internet subscribers now outnumber cable TV subscribers among the top cable providers in the U.S. According to a new report, these providers account for 49,915,000 broadband subscribers, edging out the number of cable subscribers by about 5,000. As Re/code's Peter Kafka notes, this means that for better or worse, the cable guys are now the internet guys. Kafka says their future is "selling you access to data pipes, and pay TV will be one of the things you use those pipes for."

Read more of this story at Slashdot.








Fukushima's Biological Legacy

Sat, 16/08/2014 - 18:44
An anonymous reader sends this report from Eurekalert: Scientists began gathering biological information only a few months after the disastrous 2011 meltdown of the Fukushima power plant in Japan. Results of these studies are now beginning to reveal serious biological effects of the Fukushima radiation on non-human organisms ranging from plants to butterflies to birds. A series of articles summarizing these studies has been published in the Journal of Heredity describing impacts ranging from population declines to genetic damage (abstract 1, abstract 2, abstract 3, abstract 4). Most importantly, these studies supply a baseline for future research on the effects of ionizing radiation exposure to the environment. Common to all of the published studies is the hypothesis that chronic (low-dose) exposure to ionizing radiation results in genetic damage and increased mutation rates in reproductive and non-reproductive cells. Meanwhile, efforts to restart Japan's nuclear power program are dead in the water.

Read more of this story at Slashdot.








Email Is Not Going Anywhere

Sat, 16/08/2014 - 17:40
An anonymous reader writes: It seems the latest trend sweeping the online world is the idea that email is on its way out. Kids are eschewing email for any of the hundreds of different instant messaging services, and startups are targeting email as a system they can "disrupt." Alexis C. Madrigal argues that attempts to move past email are shortsighted and faddish, as none of the alternatives give as much power to the user. "Email is actually a tremendous, decentralized, open platform on which new, innovative things can and have been built. In that way, email represents a different model from the closed ecosystems we see proliferating across our computers and devices. Email is a refugee from the open, interoperable, less-controlled 'web we lost.' It's an exciting landscape of freedom amidst the walled gardens of social networking and messaging services." Madrigal does believe that email will gradually lose some of its current uses as new technologies spring up and mature, but the core functionality is here to stay.

Read more of this story at Slashdot.








Processors and the Limits of Physics

Sat, 16/08/2014 - 16:34
An anonymous reader writes: As our CPU cores have packed more and more transistors into increasingly tiny spaces, we've run into problems with power, heat, and diminishing returns. Chip manufacturers have been working around these problems, but at some point, we're going to run into hard physical limits that we can't sidestep. Igor Markov from the University of Michigan has published a paper in Nature (abstract) laying out the limits we'll soon have to face. "Markov focuses on two issues he sees as the largest limits: energy and communication. The power consumption issue comes from the fact that the amount of energy used by existing circuit technology does not shrink in a way that's proportional to their shrinking physical dimensions. The primary result of this issue has been that lots of effort has been put into making sure that parts of the chip get shut down when they're not in use. But at the rate this is happening, the majority of a chip will have to be kept inactive at any given time, creating what Markov terms 'dark silicon.' Power use is proportional to the chip's operating voltage, and transistors simply cannot operate below a 200 milli-Volt level. ... The energy use issue is related to communication, in that most of the physical volume of a chip, and most of its energy consumption, is spent getting different areas to communicate with each other or with the rest of the computer. Here, we really are pushing physical limits. Even if signals in the chip were moving at the speed of light, a chip running above 5GHz wouldn't be able to transmit information from one side of the chip to the other."

Read more of this story at Slashdot.








Why the Universe Didn't Become a Black Hole

Sat, 16/08/2014 - 15:30
StartsWithABang writes: With some 10^90 particles in the observable Universe, even stretched across 92 billion light-years today, the Universe is precariously close to recollapsing. How, then, is it possible that back in the early stages after the Big Bang, when all this matter-and-energy was concentrated within a region of space no bigger than our current Solar System, the Universe didn't collapse down to a black hole? Not only do we have the explanation, but we learn that even if the Universe did recollapse, we wouldn't get a black hole at all!

Read more of this story at Slashdot.








Knocking Down the Great Firewall of China

Sat, 16/08/2014 - 14:28
New submitter Nocturrne writes: The FOSS project Lantern is having great success in unblocking the internet for many users in oppressive regimes, like China and Iran. Much like Tor and BitTorrent, Lantern is using peer-to-peer networking to overcome firewalls, but with the additional security of a trusted network of friends. "If you download Lantern in an uncensored region, you can connect with someone in a censored region, who can then access whatever content they want through you. What makes the system so unique is that it operates on the basis of trust. ... Through a process called consistent routing, the amount of information any single Lantern user can learn about other users is limited to a small subset, making infiltration significantly more difficult." The network of peers is growing, but we need more friends in uncensored countries to join us.

Read more of this story at Slashdot.








Apple Begins Storing Chinese User Data On Servers In China

Sat, 16/08/2014 - 10:13
An anonymous reader writes Reuters reported on Friday that Apple "has begun keeping the personal data of some Chinese users on servers in mainland China." Apple has claimed that the move is meant "to improve the speed and reliability of its iCloud service", but given China's track record with censorship and privacy, the explanation rings hollow for some skeptics. Nevertheless, Apple assures its Chinese users that their personal data on China Telecom is encrypted and that the encryption keys will be stored offshore. Only time will tell if Apple will be able to resist Chinese government requests to access its China-based servers.

Read more of this story at Slashdot.








Tesla Removes Mileage Limits On Drive Unit Warranty Program

Sat, 16/08/2014 - 01:10
Ars Technica reports that Elon Musk today wrote that Tesla will remove mileage limits on its warranty policy for all Tesla Model S drive units. The warranty, which will still span eight years, won't have a cap on the number of owners for each vehicle. People who purchased Teslas before today were told that the warranty period for the drive unit expired after eight years or once the car logged over 125,000 miles. The revised warranty applies to new vehicles and Model S cars that are already on the road. The article mentions that quite a few Tesla owners have had to have their drive units replaced; out of warranty, that runs about $15,000. Musk's announcement acknowledges that the change may cost the company some money, but says he's "confident it will work out well in the long run."

Read more of this story at Slashdot.








Google Brings Chrome OS User Management To Chrome

Sat, 16/08/2014 - 00:23
An anonymous reader writes "Google is toying with a complete revamp of the user account system in its browser. Google is essentially pulling the user management system from Chrome OS back into Chrome. The company's thinking is likely two-layered. First, it wants users to stay in the browser for as long as possible, and thus it wants the switching process to be part of Chrome as opposed to Windows, Mac, or Linux. Second, if it can teach users to have accounts in Chrome (as well as use incognito and guest modes), the learning curve will have been flattened for when they encounter Chrome OS."

Read more of this story at Slashdot.








Project Aims To Build a Fully Open SoC and Dev Board

Fri, 15/08/2014 - 23:42
DeviceGuru (1136715) writes "A non-profit company is developing an open source 64-bit system-on-chip that will enable fully open hardware, 'from the CPU core to the development board.' The 'lowRISC' SoC is the brainchild of a team of hardware and software hackers from the University of Cambridge, with the stated goal of implementing a 'fully open computing eco-system, including the instruction set architecture (ISA), processor silicon, and development boards.' The lowRISC's design is based on a new 64-bit RISC-V ISA, developed at UC Berkeley. The RISC-V core design has now advanced enough for the lowRISC project to begin designing an SoC around it. Prototype silicon of a 'RISC-V Rocket' core itself has already been benchmarked at UC Berkeley, with results results (on GitHub) suggesting that in comparison to a 32-bit ARM Cortex-A5 core, the RISC-V core is faster, smaller, and uses less power. And on top of that it's open source. Oh, and there's a nifty JavaScript-based RISC-V simulator that runs in your browser."

Read more of this story at Slashdot.








Switching Game Engines Halfway Through Development

Fri, 15/08/2014 - 23:23
An anonymous reader writes: Third-party game engines are wonderful creations, allowing developers to skip a lengthy and complicated part of the development process and spend more time on content creation. But each engine has its own strengths and weaknesses, and they may not be apparent at the beginning of a project. If you realize halfway through that your game doesn't work well on the engine you picked, what do you do? Jeff LaMarche describes how he and his team made the difficult decision to throw out all their work with Unity and start over with Unreal. He describes some technical limitations, like Unity's 32-bit nature, and some economic ones, like needing to pay $500 per person for effective version control. He notes that Unreal Engine 4 has its problems, too, but the biggest reason to switch was this: "Our team just wasn't finding it easy to collaborate. We weren't gelling as a cohesive team and we often felt like the tools were working against us."

Read more of this story at Slashdot.








Groundwork Laid For Superfast Broadband Over Copper

Fri, 15/08/2014 - 23:01
itwbennett writes: Telecom equipment vendor Adtran has developed a technology that will make it easier for operators to roll out broadband speeds close to 500Mbps over copper lines. Adtran's FDV (Frequency Division Vectoring), enhances the capabilities of two technologies — VDSL2 with vectoring and G.fast — by enabling them to better coexist over a single subscriber line, the company said. VDSL2 with vectoring, which improves speeds by reducing noise and can deliver up to 150Mbps, is currently being rolled out by operators, while G.fast, which is capable of 500Mbps, is still under development, with the first deployments coming in mid-2015. FDV will make it easier for operators to roll out G.fast once it's ready and expand where it can be used, according to Adtran. Meanwhile, Ars Technica has an article about how Verizon is letting its copper network rot in order to passively encourage customers to switch to fiber.

Read more of this story at Slashdot.








Supervalu Becomes Another Hacking Victim

Fri, 15/08/2014 - 22:18
plover sends this news about another possible exposure of customer data: Supervalu is the latest retailer to experience a data breach, announcing today that cybercriminals had accessed payment card transactions at some of its stores. The Minneapolis-based company said it had "experienced a criminal intrusion" into the portion of its computer network that processes payment card transactions for some of its stores. There was no confirmation that any cardholder data was in fact stolen and no evidence the data was misused, according to the company. The event occurred between June 22 and July 17, 2014 at 180 Supervalu stores and stand-alone liquor stores. Affected banners include Cub Foods, Farm Fresh, Hornbacher's, Shop 'n Save and Shoppers Food & Pharmacy.

Read more of this story at Slashdot.








Pages