Forgot your password?
typodupeerror

Catch up on stories from the past week (and beyond) at the Slashdot story archive

Software

Ask Slashdot: Event Sign-Up Software Options For a Non-Profit? 32

Posted by timothy
from the which-con-do-you-mean? dept.
New submitter don_e_b writes I have been asked by a non-profit to help them gather a team of volunteer developers, who they wish to have write an online volunteer sign-up site. This organization has a one large event per year with roughly 1400 volunteers total.I have advised them to investigate existing online volunteer offerings, and they can afford to pay for most that I've found so far. In the past two years, they have used a site written by a volunteer that has worked fine for them, but that volunteer is unavailable to maintain or enhance his site this year. They believe the existing online volunteer sign-up sites are not quite right — they feel they have very specific sign-up needs, and can not picture using anything other than their own custom software solution. I am convinced it's a mistake for this non-profit to create a software development team from a rotating pool of volunteers to write software upon which it is critically dependent. How would you convince them to abandon their plan to dive into project management and use an existing solution?
Security

Google Adds USB Security Keys To 2-Factor Authentication Options 47

Posted by timothy
from the something-you-have dept.
An anonymous reader writes with this excerpt from VentureBeat: Google today announced it is beefing up its two-step verification feature with Security Key, a physical USB second factor that only works after verifying the login site is truly a Google website. The feature is available in Chrome: Instead of typing in a code, you can simply insert Security Key into your computer's USB port and tap it when prompted by Google's browser. "When you sign into your Google Account using Chrome and Security Key, you can be sure that the cryptographic signature cannot be phished," Google promises. While Security Key works with Google Accounts at no charge, you'll need to go out and buy a compatible USB device directly from a Universal 2nd Factor (U2F) participating vendor.
Government

Safercar.gov Overwhelmed By Recall For Deadly Airbags 81

Posted by timothy
from the give-it-to-the-healthcare.gov-folks dept.
darylb writes "The NHTSA's safercar.gov website appears to be suffering under the load of recent vehicle recalls, including the latest recall of some 4.7 million vehicles using airbags made by Takata. Searching recalls by VIN is non-responsive at present. Searching by year, make, and model hangs after selecting the year. What can sites serving an important public function do to ensure they stay running during periods of unexpected load?" More on the airbag recall from The New York Times and the Detroit Free Press.
Privacy

Speed Cameras In Chicago Earn $50M Less Than Expected 282

Posted by timothy
from the short-term-memory dept.
countach44 writes that (in the words of the below-linked article) "Chicagoans are costing the city tens of millions of dollars — through good behavior." The City of Chicago recently installed speed cameras near parks and schools as part of the "Children's Safety Zone Program," claiming a desire to decrease traffic-related incidents in those area. The city originally budgeted (with the help of the company providing the system) to have $90M worth of income from the cameras — of which only $40M is now expected. Furthermore, the city has not presented data on whether or not those areas have become safer.
Facebook

Facebook To DEA: Stop Using Phony Profiles To Nab Criminals 150

Posted by Soulskill
from the do-that-with-linkedin-like-everyone-else dept.
HughPickens.com writes: CNNMoney reports that Facebook has sent a letter to the U.S. Drug Enforcement Administration demanding that agents stop impersonating users on the social network. "The DEA's deceptive actions... threaten the integrity of our community," Facebook chief security officer Joe Sullivan wrote to DEA head Michele Leonhart. "Using Facebook to impersonate others abuses that trust and makes people feel less safe and secure when using our service." Facebook's letter comes on the heels of reports that the DEA impersonated a young woman on Facebook to communicate with suspected criminals, and the Department of Justice argued that they had the right to do so. Facebook contends that their terms and Community Standards — which the DEA agent had to acknowledge and agree to when registering for a Facebook account — expressly prohibit the creation and use of fake accounts. "Isn't this the definition of identity theft?" says privacy researcher Runa Sandvik. The DEA has declined to comment and referred all questions to the Justice Department, which has not returned CNNMoney's calls.
Japan

3D-Printed Gun Earns Man Two Years In Japanese Prison 212

Posted by Soulskill
from the forgot-to-read-the-fine-3d-print dept.
jfruh writes: Japan has some of the strictest anti-gun laws in the world, and the authorities there aim to make sure new technologies don't open any loopholes. 28-year-old engineer Yoshitomo Imura has been sentenced to two years in jail after making guns with a 3D printer in his home in Kawasaki.
Science

Australian Physicists Build Reversible Tractor Beam 53

Posted by Soulskill
from the take-that-wesley dept.
An anonymous reader writes: Physicists at Australian National University have developed a tiny tractor beam that improves in several ways upon previous attempts. First, it operates on scales which, while still tiny, are higher than in earlier experiments. The beam can move particles up to 200 microns in diameter, and it can do so over a distance of 20 cm. "Unlike previous techniques, which used photon momentum to impart motion, the ANU tractor beam relies on the energy of the laser heating up the particles and the air around them (abstract). The ANU team demonstrated the effect on gold-coated hollow glass particles. The particles are trapped in the dark center of the beam. Energy from the laser hits the particle and travels across its surface, where it is absorbed creating hotspots on the surface. Air particles colliding with the hotspots heat up and shoot away from the surface, which causes the particle to recoil, in the opposite direction. To manipulate the particle, the team move the position of the hotspot by carefully controlling the polarization of the laser beam."
Encryption

Security Company Tries To Hide Flaws By Threatening Infringement Suit 108

Posted by Soulskill
from the because-that-always-ends-well dept.
An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License.

The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.
The Internet

32 Cities Want To Challenge Big Telecom, Build Their Own Gigabit Networks 153

Posted by Soulskill
from the they-just-want-to-be-able-to-throttle-netflix dept.
Jason Koebler writes: More than two dozen cities in 19 states announced today that they're sick of big telecom skipping them over for internet infrastructure upgrades and would like to build gigabit fiber networks themselves and help other cities follow their lead. The Next Century Cities coalition, which includes a couple cities that already have gigabit fiber internet for their residents, was devised to help communities who want to build their own broadband networks navigate logistical and legal challenges to doing so.
China

China Staging a Nationwide Attack On iCloud and Microsoft Accounts 99

Posted by Soulskill
from the secure-browsing-advised dept.
New submitter DemonOnIce writes: According to The Verge and an original report from the site that monitor's China's Great Firewall activity, China is conducting a large-scale attack on iCloud and Microsoft accounts using its government firewall software. Chinese users may be facing an unpleasant surprise as they are directed to a dummy site designed to look like an Apple login page (or a Microsoft one, as appropriate).
Software

GNU Emacs 24.4 Released Today 143

Posted by timothy
from the please-have-more-than-8-megs-of-RAM dept.
New submitter Shade writes Well over one and a half years in the works, the latest and greatest release of GNU Emacs was made officially available today. Highlights of this release include a built-in web browser, improved multi-monitor and fullscreen support, "electric" indentation enabled by default, support for saving and restoring the state of frames and windows, pixel-based resizing for frames and windows, support for digitally signed ELisp packages, support for menus in text terminals, and much more. Read the official announcement and the full list of changes for more information.
Operating Systems

More Eye Candy Coming To Windows 10 194

Posted by timothy
from the sincere-flattery dept.
jones_supa writes Microsoft is expected to release a new build of the Windows 10 Technical Preview in the very near future, according to their own words. The only build so far to be released to the public is 9841 but the next iteration will likely be in the 9860 class of releases. With this new build, Microsoft has polished up the animations that give the OS a more comprehensive feel. When you open a new window, it flies out on to the screen from the icon and when you minimize it, it collapses back in to the icon on the taskbar. It is a slick animation and if you have used OS X, it is similar to the one used to collapse windows back in to the dock. Bah.
Open Source

Help ESR Stamp Out CVS and SVN In Our Lifetime 221

Posted by timothy
from the for-the-child-processes dept.
mtaht writes ESR is collecting specifications and donations towards getting a new high end machine to be used for massive CVS and SVN repository conversions, after encountering problems with converting the whole of netbsd over to git. What he's doing now sort of reminds me of holding a bake sale to build a bomber, but he's well on his way towards Xeon class or higher for the work. What else can be done to speed up adoption of git and preserve all the computer history kept in source code repositories? ESR says he'll match funds toward the purchase of the needed hardware, so if you want to help drive him into bankruptcy, now's your chance.
Debian

Debian's Systemd Adoption Inspires Threat of Fork 475

Posted by timothy
from the tine-to-weigh-priorities dept.
New submitter Tsolias writes It appears that systemd is still a hot topic in the Debian community. As seen earlier today, there is a new movement shaping up against the adoption of systemd for the upcoming stable release [of Debian], Jessie. They claim that "systemd betrays the UNIX philosophy"; it makes things more complex, thus breaking the "do one thing and do it well" principle. Note that the linked Debian Fork page specifically says that the anonymous developers behind it support a proposal to preserve options in init systems, rather than demanding the removal of systemd, and are not opposed to change per se. They just don't want other parts of the system to be wholly dependent on systemd. "We contemplate adopting more recent alternatives to sysvinit, but not those undermining the basic design principles of "do one thing and do it well" with a complex collection of dozens of tightly coupled binaries and opaque logs."
Encryption

'Endrun' Networks: Help In Danger Zones 27

Posted by timothy
from the pinging-mr-bourne-mr-jason-bourne dept.
kierny writes Drawing on networking protocols designed to support NASA's interplanetary missions, two information security researchers have created a networking system that's designed to transmit information securely and reliably in even the worst conditions. Dubbed Endrun, and debuted at Black Hat Europe, its creators hope the delay-tolerant and disruption-tolerant system — which runs on Raspberry Pi — could be deployed everywhere from Ebola hot zones in Liberia, to war zones in Syria, to demonstrations in Ferguson.
Cellphones

Barometers In iPhones Mean More Crowdsourcing In Weather Forecasts 77

Posted by timothy
from the under-pressure dept.
cryptoz (878581) writes Apple is now adding barometers to its mobile devices: both new iPhones have valuable atmospheric pressure sensors being used for HealthKit (step counting). Since many Android devices have been carrying barometers for years, scientists like Cliff Mass have been using the sensor data to improve weather forecasts. Open source data collection projects like PressureNet on Android automatically collect and send the atmospheric sensor data to researchers.
Piracy

Google Changes 'To Fight Piracy' By Highlighting Legal Sites 146

Posted by timothy
from the sponsored-links-you-might-also-enjoy dept.
mrspoonsi writes Google has announced changes to its search engine in an attempt to curb online piracy. The company has long been criticised for enabling people to find sites to download entertainment illegally. The entertainment industry has argued that illegal sites should be "demoted" in search results. The new measures, mostly welcomed by music trade group the BPI, will instead point users towards legal alternatives such as Spotify and Google Play. Google will now list these legal services in a box at the top of the search results, as well as in a box on the right-hand side of the page. Crucially, however, these will be adverts — meaning if legal sites want to appear there, they will need to pay Google for the placement.
Debian

Ubuntu Turns 10 109

Posted by timothy
from the ten-years-is-a-long-time dept.
Scott James Remnant, now Technical Lead on ChromeOS, was a Debian developer before that. That's how he became involved from the beginning (becoming Developer Manager, and then serving on the Technical Board) on the little derivative distribution that Mark Shuttleworth decided to make of Debian Unstable, and for which the name Ubuntu was eventually chosen. On this date in 2004, Ubuntu 4.10 -- aka Warty Warthog, or just Warty -- was released, and Remnant has shared a detailed, nostalgic look back at the early days of the project that has (whatever else you think of it ) become one of the most influential in the world of open source and Free software. I was excited that Canonical sent out disks that I could pass around to friends and family that looked acceptably polished to them in a way that Sharpie-marked Knoppix CD-ROMs didn't, and that the polish extended to the installer, the desktop, and the included constellation of software, too.
Transportation

The Largest Ship In the World Is Being Built In Korea 263

Posted by timothy
from the and-vice-versa dept.
HughPickens.com writes Alastair Philip Wiper writes that at 194 feet wide and 1,312 feet long, the Matz Maersk Triple E is the largest ship ever built, capable of carrying 18,000 20-foot containers. Its propellers weigh 70 tons apiece and it is too big for the Panama Canal, though it can shimmy through the Suez. A U-shaped hull design allows more room below deck, providing capacity for 18,000 shipping containers arranged in 23 rows – enough space to transport 864 million bananas. The Triple-E is constructed from 425 pre-fabricated segments, making up 21 giant "megablock" cross sections. Most of the 955,250 liters of paint used on each ship is in the form of an anti- corrosive epoxy, pre-applied to each block. Finally, a polyurethane topcoat of the proprietary Maersk brand color "Hardtop AS-Blue 504" is sprayed on.

Twenty Triple-E class container ships have been commissioned by Danish shipping company Maersk Lines for delivery by 2015. The ships are being built at the Daewoo Shipbuilding and Marine Engineering factory in the South Korean port of Opko. The shipyard, about an hour from Busan in the south of the country, employs about 46,000 people, and "could reasonably be described as the worlds biggest Legoland," writes Wiper. "Smiling workers cycle around the huge shipyard as massive, abstractly over proportioned chunks of ships are craned around and set into place." The Triple E is just one small part of the output of the shipyard, as around 100 other vessels including oil rigs are in various stages of completion at the any time." The vessels will serve ports along the northern-Europe-to-Asia route, many of which have had to expand to cope with the ships' size. "You don't feel like you're inside a boat, it's more like a cathedral," Wiper says. "Imagine this space being full of consumer goods, and think about how many there are on just one ship. Then think about how many are sailing round the world every day. It's like trying to think about infinity."
Network

Ask Slashdot: LTE Hotspot As Sole Cellular Connection? 104

Posted by timothy
from the points-of-contact dept.
New submitter iamacat writes I am thinking of canceling my regular voice plan and using an LTE hotspot for all my voice and data needs. One big draw is ability to easily use multiple devices without expensive additional lines or constantly swapping SIMs. So I can have an ultra compact Android phone and an iPod touch and operate whichever has the apps I feel like using. Or, if I anticipate needing more screen real estate, I can bring only a Nexus 7 or a laptop and still be able to make and receive VoIP calls. When I am home or at work, I would be within range of regular WiFi and not need to eat into the data plan or battery life of the hotspot.

Has anyone done something similar? Did the setup work well? Which devices and VoIP services did you end up using? How about software for automatic WiFi handoffs between the hotspot and regular home/work networks?

Are we running light with overbyte?

Working...