Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 217 declined, 72 accepted (289 total, 24.91% accepted)

Submission + - Researchers show how easy it is to manipulate online opinions (ieee.org)

jcatcw writes: A recent study shows that a single random up-vote, randomly chosen, created a herding behavior in ratings that resulted in a 25% increase in the ratings but the negative manipulation had no effect. An intuitive explanation for this asymmetry is that we tend to go along with the positive opinions of others, but we tend to be skeptical of the negative opinions of others, and so we go in and correct what we think is an injustice. The third major result was that these effects varied by topic. So in business and society, culture, politics, we found substantial susceptibility to positive herding, whereas in general news, economics, IT, we found no such herding effects in the positive or negative direction.
Java

Submission + - 1 Billion at Risk from Java Vulnerability (computerworld.com)

jcatcw writes: "Just as Oracle is ramping up for the September 30 start of JavaOne 2012 in San Francisco, researchers from the Polish firm Security Explorations disclosed yet another critical Java vulnerability that might "spoil the taste of Larry Ellison's morning ... Java." According to Security Explorations researcher Adam Gowdiak, who sent the email to the Full Disclosure Seclist, this Java exploit affects one billion users of Oracle Java SE software, Java 5, 6 and 7. It could be exploited by apps on Chrome, Firefox, Internet Explorer, Opera and Safari. Wow, thanks a lot Oracle."
Security

Submission + - ToorCamp: Adventures in an American hacker camp (computerworld.com)

jcatcw writes: While a tech camping event might sound like an oxymoron, hackers, makers, breakers and shakers assembled at the northwestern tip of the USA for ToorCamp and dispelled the notion that all hackers avoid sunshine and the great outdoors. As you would expect from a hacker conference, there were workshops like the one for lock picking and a plethora of presentations from “hacking computers to brain hacking, from brewing soda to fighting robots, from civil rights to lightning guns.” Then unique aspects of this cool hacker camp get more bizarre . . like the laser that was so bright it required FAA clearance to deploy it, the ShadyTel community 'payphone,' the Temple of Robotron, an RFID implantation station, bike jousting, dancing robots and of course campfires. Need an even stranger adventure that's also in the ToorCon family of hacking conferences? There's the upcoming WorldToor, the first ever hacker conference in Antarctica.
Networking

Submission + - Stupid data center tricks (computerworld.com)

jcatcw writes: A university network is brought down when two network cables are plugged into the wrong hub. An employee is injured after an ill-timed entry into a data center. Overheated systems are shut down by a thermostat setting changed from Fahrenheit to Celsius. And, of course, Big Red Buttons. These are just a few of the data center disasters caused by human folly.
Censorship

Submission + - Fixing Internet censorship in schools (computerworld.com) 1

jcatcw writes: Schools and libraries are hurting students by setting up heavy-handed Web filtering. The problem goes back for years. A filter blocked the Web site of former House Majoirty Leader Richard Armey because it detected the word "dick," according to a 2001 study from the Brennan Center of Justice. The purpose of schools should be to teach students to live in a democratic society, and that means teaching critical thinking and showing students controversial Web sites, says Craig Cunningham, a professor at National-Louis University. He quoted from a National Research Council study, "Swimming pools can be dangerous for children. To protect them, one can install locks ... [or] teach them to swim." Web filtering also leads to inequities in education based on household income. Students from more affluent areas have access to Internet at home and, often, more enlightened parents who can let them access information blocked in schools and libraries. Poorer students without home access don't have those opportunities
Security

Submission + - Building a better CAPTCHA (computerworld.com)

jcatcw writes: Steven J. Vaughan-Nichols reports that CAPTCHA cracking isn't that difficult these days. It has even become a business. For example, DeCaptcher.com will solve CAPTCHAs for your spamming needs at a rate of $2 per 1,000 successfully cracked CAPTCHAs. In response, newer systems are in development. Both Carnegie Mellon and Penn State (is there something about the water in PA?) are working on image-based systems. ESP-PIX and SQ-PIX both require the viewer to interpret pictures. Imagination CAPTCHA from Penn has the user find the center of an image. The idea is that humans are better at image recognition that computers, but humans can legitimately disagree on their interpretations and some humans are color blind. Problems remain. For now, sites would be well advised to look at reCAPTCHA — the system that works with Google Books and the Internet Archive to digitize printed texts — which comes with a wide variety of application and programming plug-ins and an open API.
GNOME

Submission + - Ubuntu to Help Improve Linux (computerworld.com) 2

jcatcw writes: Steven J. Vaughan-Nichols reports that Mark Shuttleworth, CEO of Canonical, is using his millions to improve the Linux user experience., hiring people to work on X, OpenGL, Gtk, Qt, GNOME and KDE. He had doubted that desktop Linux could ever equal the smooth, graceful integration of the Mac OS. Now, between the driving pace of open-source development, and Shuttleworth's millions, it might be happening. Why not? After all, Mac OS itself is based on FreeBSD. Desktop Linux's future is starting to look brighter.
Programming

Submission + - Web 2.0 Lessons for Corporate Dev Teams (computerworld.com)

jcatcw writes: Quick, incremental updates, along with heavy user involvement, are key characteristics of the emerging software development methods championed by a new generation of Web 2.0 start-ups. A survey conducted for Computerworld showed that an overwhelmingly majority of the respondents said that traditional corporate development teams could benefit from Web 2.0 techniques, specifically the incremental feature releases, quick user feedback loops and quality assurance programs that include users. Fifty seven percent of the respondents said that problem-solving and analytical skills will be key requirements for next generation developers. The bottom-line: corporate development teams need to get to know their users.
HP

Submission + - The State of R&D at HP, IBM and Microsoft (computerworld.com)

jcatcw writes: "In Computerworld's analysis of the R&D efforts at HP, IBM and Microsoft ($17 billion annually) the question remains: Are these companies supporting more long-term basic research or just the usual short-term, product-oriented work? HP is consolidating its focus on a few "big bet" projects in five major research areas — information explosion, dynamic cloud services, content transformation, intelligent infrastructure and sustainability. IBM has four "high-risk" basic research areas — nanotechnology, cloud computing, integrated systems and chip architecture, and managing business integrity through advanced math and computer science. Many of the 272 research projects named at the Microsoft Research's Web site are structured with major product lines like Windows, Office or Xbox in mind, but many also seem to have no likely application in anything the company sells today."
Portables

Submission + - This old laptop: Revitalizing an aging notebook (computerworld.com)

jcatcw writes: Brian Nadel's ThinkPad R50 just hit its fifth birthday, and the years haven't been kind to it. When it was new, the notebook was reliable and fast. Now it's slow and prone to annoying shutdowns. Is it a good investment to revamp a notebook that's worth about $350? It sure is, because this old notebook will get a new lease on life for about $125 — a bargain, considering what it could cost to replace.
United States

Submission + - Data mining for terrorists (computerworld.com)

jcatcw writes: Scott McPherson, CIO for the Florida House of Representatives and Computerworld blogger, says we don't need al Qaida to blow us up. We are perfectly capable of lighting the fuse ourselves, courtesy of our inability to share information. He has a story to tell about what happened in Florida that had direct bearing on 9/11, could have even stopped 9/11, and still is not taken as seriously as it should. It starts with the fact that Mohammed Atta was a terrible driver. It concludes that since 9/11, nothing of real substance has apparently changed in the data-sharing arena.
Security

Submission + - Malware vs. anti-malware, 20 years into the fray (computerworld.com)

jcatcw writes: Steven J. Vaughan-Nichols considers the dissimilarities between maleware of yore and current infiltrations as we approach the 20th anniversary of the William Morris worm. Modern malware apps curl up and make themselves at home in your system, where they wait for a chance to snatch an important password or a credit card number. Welcome to the era of capitalist hacking. Any self-respecting malware program today is polymorphic, making signature-based av approaches difficult. Heuristics and virtual sandboxes offer alternatives, but all such methods are reactive. Unfortunately, montoring lists and networks is about the only current alternative.
Data Storage

Submission + - Stored Data to Exceed 1.8 Zettabytes by 2011 (computerworld.com)

jcatcw writes: By 2011, there will be 1.8 zettabytes of electronic data stored in 20 quadrillion files, packets or other containers because of, among other things, the massive growth rate of social networks, and digital equipment such as cameras, cell phones and televisions, according to a new study by IDC. Data is growing by a factor of 10 every five years. According to John Gantz, IDC's lead analyst, "at some point in the life of every file, or bit or packet, 85% of that information somewhere goes through a corporate computer, website, network or asset," meaning any given corporation becomes responsible for protecting large amounts of data that it and its customers may not have created. The study, which coincided with the launch of a " digital footprint" calculator, also found that as the world changes over to digital televisions, analog sets and obsolete set-top boxes and DVDs "will be heaped on the waste piles, which will double by 2011."
Data Storage

Submission + - 7 Secure USB Drives -- review (computerworld.com)

jcatcw writes: Computerworld has reviewed seven USB drives that use either encryption or a physical keypad to protect stored data, and found big differences in I/O speeds, ease of use and strength of security. In the case of the drive using a key pad, the editors were able to break open the device and access the data, bypassing the PIN security. They also state that there is little difference between 128-bit and 256-bit AES encryption because neither has been broken yet. The drives reviewed were the SanDisk Cruzer, the Lexar JumpDrive, the Kingston DataTraveler, the Imation Pivot Plus, the Corsair Survivor, the Corsair Padlock and the IronKey Secure USB Drive. The editors chose the IronKey as the most secure.
Star Wars Prequels

Submission + - Teleportation: Fact and Fiction (computerworld.com)

jcatcw writes: "Last night actor Hayden Christensen, of Star Wars fame, and director Doug Liman discussed teleportation with MIT professors to compare the reality to the special effects version in the upcoming movie, Jumper. Edward Farhi, director of the Center for Theoretical Physics at MIT, said, "It's a little less exotic than what you see in the movie. Teleportation has been done, moving a single proton over two miles. [But] teleporting a person? That is pretty far down the line. The quantum state of a living creature is pretty formidable. That is just not in the foreseeable future.""

Slashdot Top Deals

Men take only their needs into consideration -- never their abilities. -- Napoleon Bonaparte

Working...