Slashdot

Slashdot
News for nerds, stuff that matters
Updated: 19 min 47 sec ago

SMS Co-Inventor Matti Makkonen Dead At 63

15 hours 55 min ago
An anonymous reader writes: The BBC News reports that Matti Makkonen, a 'grand old man of mobile industry' who helped launch the worldwide sensation of texting, has died at the age of 63 after an illness. Although planning to retire later in 2015 from the board of Finnet Telecoms, Makkonen constantly remained fascinated with communications technologies, from the Nokia 2010 mobile phone to 3G connections. He lived just enough to witness the last remnants of former Finnish mobile industry giant Nokia disappear, as Redmond announced its intent last month to convert all Nokia stores into Microsoft-branded Authorized Reseller and Service Centers, offering Xbox game consoles alongside the Nokia-derived Lumia range of smartphones.

Read more of this story at Slashdot.

European Government Agrees On Net Neutrality Rules, With Exemptions

16 hours 14 min ago
An anonymous reader writes: The European Union's three main legislative bodies, the European Council, the European Parliment, and the European Commision, have reached an agreement on "Open Internet" rules that establish principles similar to Net Neutrality in the EU. The rules require that all internet traffic and users be treated equally, forbidding paid-for prioritisation of traffic. However, exemptions are permitted for particular "specialised services" where the service is not possible under the open network's normal conditions, provided that the customer using the service pays for the privilege. (The examples given are IPTV, teleconferencing, and telepresence surgery.) Zero-rating — exempting particular data from traffic caps — is also permitted, but will be subject to oversight. Notably, this means (if all goes as promised) the elimination of cellphone roaming fees within the EU; however, that's been promised and delayed before.

Read more of this story at Slashdot.

Lawsuit Filed Over Domain Name Registered 16 Years Before Plaintiff's Use

16 hours 45 min ago
HughPickens.com writes: Cybersquatting is registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark. It generally refers to the practice of buying up domain names that use the names of existing businesses with the intent to sell the names for a profit to those businesses. Now Andrew Allmann writes at Domain Name Wire that New York company Office Space Solutions, Inc. has filed a cybersquatting lawsuit against Jason Kneen over the domain name WorkBetter.com that Kneen registered in 1999 although Office Space Solutions didn't use the term "Work Better" in commerce until 2015. "Workbetter.com is virtually identical to, and/or confusingly similar to the WORK BETTER Service Mark, which was distinctive at the time that the Defendant renewed and/or updated the registration of workbetter.com," says the lawsuit. But according to an Office Space Solutions' filing with the USPTO, it didn't use the term "Work Better" in commerce until 2015. Office Space Solutions is making the argument that the domain name was renewed in bad faith. According to Kneen, Office Space previously tried to purchase the domain name from him and after it failed to acquire the domain name, is now trying to take it via a lawsuit.

Read more of this story at Slashdot.

How Computer Science Education Got Practical (Again)

17 hours 31 min ago
jfruh writes: In the 1980s and 1990s, thousands of young people who had grown up tinkering with PCs hit college and dove into curricula designed around the vague notion that they might want to "do something with computers." Today, computer science education is a lot more practical — though in many ways that's just going back to the discipline's roots. As Christopher Mims put it in the Wall Street Journal, "we've entered an age in which demanding that every programmer has a degree is like asking every bricklayer to have a background in architectural engineering."

Read more of this story at Slashdot.

Asteroid Day On June 30 Aims To Raise Awareness of Collision Risks

19 hours 33 min ago
benonemusic writes: International organizers--including Queen's Brian May, an astrophysicist--have organized the world's first Asteroid Day on June 30, as a means to raise awareness for future collision risks and encourage actions to minimize the threats from such events. "If we can track the trajectories of asteroids and monitor their movement in our solar system, then we can know if they are on a path to impact Earth," former Apollo astronaut Rusty Schweickart told the organizers of Asteroid Day in a statement. "If we find them early enough, we can move them out of Earth's orbit, thus preventing any kind of major natural disaster."

Read more of this story at Slashdot.

Creating Bacterial "Fight Clubs" To Discover New Drugs

21 hours 50 min ago
Science_afficionado writes: Vanderbilt chemists have shown that creating bacterial 'fight clubs' is an effective way to discover natural biomolecules with the properties required for new drugs. They have demonstrated the method by using it to discover a new class of antibiotic with anti-cancer properties. From the Vanderbilt website: "That is the conclusion of a team of Vanderbilt chemists who have been exploring ways to get bacteria to produce biologically active chemicals which they normally hold in reserve. These compounds are called secondary metabolites. They are designed to protect their bacterial host and attack its enemies, so they often have the right kind of activity to serve as the basis for effective new drugs. In fact, many antibiotics and anticancer compounds in clinical use are either secondary metabolites or their derivatives."

Read more of this story at Slashdot.

The Programmer's Path To Management

Tue, 30/06/2015 - 4:27am
snydeq writes: The transition from command line to line-of-command requires a new mind-set — and a thick skin, writes InfoWorld's Paul Heltzel in a tips-based article aimed at programmers interested in breaking into management. "Talented engineers may see managing a team as the next step to growing their careers. So if you're moving in this direction, what tools do you need to make the transition? We'll look at some possible approaches, common pitfalls — and offer solutions."

Read more of this story at Slashdot.

How IKEA Patched Shellshock

Tue, 30/06/2015 - 2:03am
jones_supa writes: Magnus Glantz, IT manager at IKEA, revealed that the Swedish furniture retailer has more than 3,500 Red Hat Enterprise Linux servers. With Shellshock, every single one of those servers needed to be patched to limit the risk of exploitation. So how did IKEA patch all those servers? Glantz showed a simple one-line Linux command and then jokingly walked away from the podium stating "That's it, thanks for coming." On a more serious note, he said that it took approximately two and half hours to upgrade their infrastructure to defend against Shellshock. The key was having a consistent approach to system management, which begins with a well-defined Standard Operating Environment (SOE). Additionally, Glantz has defined a lifecycle management plan that describes the lifecycle of how Linux will be used at Ikea for the next seven years.

Read more of this story at Slashdot.

Study Suggests That HUD Tech May Actually Reduce Driving Safety

Tue, 30/06/2015 - 12:27am
Zothecula writes: Having a heads-up display constantly feed you information while cruising down the road may make you feel like a jet pilot ready to avoid any potential danger but recent findings suggest otherwise. Studies done at the University of Toronto show that the HUD multi-tasking method of driving a vehicle is dangerous. "Drivers need to divide their attention to deal with this added visual information," said Department of Psychology professor Ian Spence, who led the research. "Not only will drivers have to concentrate on what’s happening on the road around them as they’ve always done, they’ll also have to attend to whatever warning pops up on the windshield in front of them."

Read more of this story at Slashdot.

Ask Slashdot: Choosing the Right Open Source License

Mon, 29/06/2015 - 11:43pm
NicknamesAreStupid writes: I need to choose an open source license. I am developing an open source iOS application that use a significant number of other open source projects which, in turn, use a number of different open source licenses such as MPL/GPL, MIT, and BSD. I am also using sample code from Apple's developer site, which has their own terms of use. The code dependencies are such that my code would not be of much use without theirs. If this project is used, then it would be nice to pick a license that best fits in with this mashup. I am interested in maintaining the freedom of my code but do not want to create a catch-22 or make life hard for people who need to use this project for personal use or profit. My inclination is to use MIT's, as I have done so before. I asked an IP lawyer about this matter, and she replied (pro bono), "it probably doesn't matter." Of course, that advice was worth every penny. Moving away from legal issues and looking at this from a social perspective, which license would appeal most and offend least? I thought about no license but was warned (pro bono), "If you do not, then someone else may." Any suggestions?

Read more of this story at Slashdot.

Uber France Leaders Arrested For Running Illegal Taxi Company

Mon, 29/06/2015 - 11:00pm
An anonymous reader writes: Two Uber executives were arrested by French authorities for running an illegal taxi company and concealing illegal documents. This is not the first time Uber has run into trouble in France. Recently, taxi drivers started a nation-wide protest, blocking access to Roissy airport and the nation's interior minister issued a ban on UberPop. A statement from an Uber spokesperson to TechCrunch reads: "Our CEO for France and General Manager for Western Europe were invited to a police hearing this afternoon; following this interview, they were taken into custody. We are always available to answer all the questions on our service, and available to the authorities to solve any problem that could come up. Talks are in progress. In the meantime, we keep working in order to make sure that both our customers and drivers are safe following last week’s turmoils."

Read more of this story at Slashdot.

Airplane Coatings Help Recoup Fuel Efficiency Lost To Bug Splatter

Mon, 29/06/2015 - 10:16pm
MTorrice writes: When bugs hit the wings of oncoming airplanes, they create a problem. Their blood, called hemolymph, sticks to an airplane's wings, disrupting the smooth airflow over them and reducing the aircraft's fuel efficiency. To fight the problem, NASA is working on developing a coating that could help aircraft repel bug remains during flight. After experimenting with almost 200 different formulations, researchers recently flight-tested a few promising candidates. Results showed that they could reduce the amount of stuck bug guts on the wings by up to 40%. With further optimization, NASA says such coatings could allow planes to use 5% less fuel.

Read more of this story at Slashdot.

Malwarebytes Offers Pirates Its Premium Antimalware Product For Free

Mon, 29/06/2015 - 9:33pm
An anonymous reader writes: If you have a cracked or pirated version of Malwarebytes Anti-Malware (MBAM) product the company has debuted an Amnesty program for you. Venturebeat reports: "If you pirated Malwarebytes Anti-Malware, purchased a counterfeit version of the software, or are having problems with your key in general, the company is offering a free replacement key." CEO Marcin Kleczynski explained the program and his statement reads in part: "When I started Malwarebytes, I absolutely had no idea how successful we would be today. I am extremely grateful for all of the support from everyone and how fast we’ve grown. That being said, I picked a very insecure license key algorithm and as such, generating a pirated key was, and is, very simple. The problem with pirated keys is that they may collide with a legitimate key just by the sheer numbers. For example, Larry may generate a pirated key that matches the exact key that I already bought. Yes, this is silly, and yes, this is literally the first thing a professional software company thinks of when building license key generation, but when you think you’re building a product for just a few people you don’t hash out these details. Now we’ve grown up, and we’ve got a new licensing system that we’ve rolled out in stages. The only problem is that we have millions of users that we’ve sold keys to, or a reseller has sold keys to, or we’ve given out keys to without keeping track. It is a mess, and you as a consumer have every right to be upset.

Read more of this story at Slashdot.

Avira Wins Case Upholding Its Right To Block Adware

Mon, 29/06/2015 - 8:49pm
Mark Wilson writes: Security firm Avira has won a court case that can not only be chalked up as a win for consumer rights, but could also set something of a precedent. Germany company Freemium.com took Avira to court for warning users about "potentially unwanted applications" that could be bundled along with a number of popular games and applications. Freemium.com downloads included a number of unwanted extras in the form of browser toolbars, free trial applications, adware, and other crapware. Avira's antivirus software warned users installing such applications; Freemium took objection to this and filed a cease and desist letter, claiming anti-competitive practices. But the court ruled in Avira's favor, saying it could continue to flag up and block questionable software.

Read more of this story at Slashdot.

To Learn (Or Not Learn) JQuery

Mon, 29/06/2015 - 8:05pm
Nerval's Lobster writes: jQuery isn't without its controversies, and some developers distrust its use in larger projects because (some say) it ultimately leads to breakage-prone code that's harder to maintain. But given its prevalence, jQuery is probably essential to know, but what are the most important elements to learn in order to become adept-enough at it? Chaining commands, understanding when the document is finished loading (and how to write code that safely accesses elements only after said loading), and learning CSS selectors are all key. The harder part is picking up jQuery's quirks and tricks, of which there are many... but is it worth studying to the point where you know every possible eccentricity?

Read more of this story at Slashdot.

The Real-Life Dangers of Augmented Reality

Mon, 29/06/2015 - 7:18pm
Tekla Perry writes: Today's augmented reality devices have yet to go through extensive tests of their impact on their wearers' health and safety. But by looking at existing research involving visual and motor impairments, two Kaiser Permanente researchers find they can draw conclusions about the promise and perils of augmented reality, and point to ways wearable developers can make these devices safer. The researchers write: "Peripheral vision is more important than you might think, because it provides a wealth of information about speed and distance from objects. Central vision, despite the great detail it offers, gives you only a rough estimate of movement toward or away from you, based on changes in size or in the parallax angle between your eyes. But objects moving within your peripheral vision stimulate photoreceptors from the center of the retina to the edge, providing much better information about the speed of motion. Your brain detects objects in your peripheral field and evaluates if and how they (or you) are moving. Interfering with this process can cause you to misjudge relative motion and could cause you to stumble; it might even get you hit by a car one day."

Read more of this story at Slashdot.

SCOTUS Denies Google's Request To Appeal Oracle API Case

Mon, 29/06/2015 - 6:35pm
New submitter Neil_Brown writes: The Supreme Court of the United States has today denied Google's request to appeal against the Court of Appeals for the Federal Circuit's ruling (PDF) that the structure, sequence and organization of 37 of Oracle's APIs (application program interfaces) was capable of copyright protection. The case is not over, as Google can now seek to argue that, despite the APIs being restricted by copyright, its handling amounts to "fair use". Professor Pamela Samuelson has previously commented (PDF) on the implications if SCOTUS declined to hear the appeal. The Verge reports: "A district court ruled in Google's favor back in 2012, calling the API "a utilitarian and functional set of symbols" that couldn't be tied up by copyrights. Last May, a federal appeals court overturned that ruling by calling the Java API copyrightable. However, the court said that Google could still have lawfully used the APIs under fair use, sending the case back to a lower court to argue the issue. That's where Google will have to go next, now that the Supreme Court has declined to hear the issue over copyright itself.

Read more of this story at Slashdot.

Interviews: Ask Steve Jackson About Designing Games

Mon, 29/06/2015 - 5:53pm
Since starting his own company in 1980, Steve Jackson, founder and editor-in-chief of Steve Jackson Games, has created a number of hits, starting with Car Wars . . . followed shortly by Illuminati, and later by GURPS, the "Generic Universal Roleplaying System." In 1983, he was elected to the Adventure Gaming Hall of Fame - the youngest person ever so honored. He has personally won 11 Origins Awards. In the early 90's, Steve got international press due to the Secret Service's invasion of his office. The EFF helped make it possible for SJ Games to bring suit against the Secret Service and the U.S. government and win more than $50,000 in damages. His Ogre kickstarter a couple of years ago brought in close to a million dollars. His current hits are Munchkin, a very silly card game about killing monsters and taking their stuff, and Zombie Dice, in which you eat brains and try not to get shotgunned. His current projects include a variety of Munchkin follow-ups, and the continuing quest to get his games translated into digital form. Steve has agreed to put down the dice and answer any questions you may have. As usual, ask as many as you'd like, but please, one per post.

Read more of this story at Slashdot.

When a Company Gets Sold, Your Data May Be Sold, Too

Mon, 29/06/2015 - 5:11pm
An anonymous reader writes: A new report points out that many of the top internet sites have language in their privacy policies saying that your private data might be transferred in the event of an acquisition, bankruptcy sale, or other transaction. They effectively say, "We won't ever sell your information, unless things go bad for us." 85 of the top 100 websites in the U.S. (ranked by Alexa), had this sort of language, including Amazon, Apple, Facebook, Google, Hulu, and LinkedIn. (RadioShack did this recently.) "The potential ramifications of the fire sale provisions became clear two years ago when True.com, a dating site based in Plano, Tex., that was going through a bankruptcy proceeding, tried to sell its customer database on 43 million members to a dating site based in Canada. The profiles included consumers' names, birth dates, sexual orientation, race, religion, criminal convictions, photos, videos, contact information and more. Because the site's privacy policy had promised never to sell or share members' personal details without their permission, Texas was able to intervene to stop the sale of customer data, including intimate details on about two million Texans." But with this new language, users no longer enjoy that sort of protection. Only 17 of the top 100 sites even say they will notify customers of the data transfer. Only a handful allow users to opt out.

Read more of this story at Slashdot.

MIT System Fixes Software Bugs Without Access To Source Code

Mon, 29/06/2015 - 4:28pm
jan_jes writes: MIT researchers have presented a new system at the Association for Computing Machinery's Programming Language Design and Implementation conference that repairs software bugs by automatically importing functionality from other, more secure applications. According to MIT, "The system, dubbed CodePhage, doesn't require access to the source code of the applications. Instead, it analyzes the applications' execution and characterizes the types of security checks they perform. As a consequence, it can import checks from applications written in programming languages other than the one in which the program it's repairing was written."

Read more of this story at Slashdot.