Forgot your password?
typodupeerror

Slashdot is powered by your submissions, so send in your scoop

Google

Google Wants To Test Driverless Cars In a Simulation 106

Posted by timothy
from the do-you-want-to-be-a-virtual-pedestrian? dept.
An anonymous reader writes Google has been testing its autonomous vehicles on U.S. roads for a while now. In fact, they're required to, by law. "California's regulations stipulate autonomous vehicles must be tested under "controlled conditions" that mimic real-world driving as closely as possible. Usually, that has meant a private test track or temporarily closed public road." It's easy enough to test a few prototypes, but whenever autonomous cars start being produced by manufacturers, it'll become a lot more complicated. Now, Google is lobbying to change that law to allow testing via computer simulation. Safety director Ron Medford said, "Computer simulations are actually more valuable, as they allow manufacturers to test their software under far more conditions and stresses than could possibly be achieved on a test track." Google spokeswoman Katelin Jabbari said, "In a few hours, we can test thousands upon thousands of scenarios which in terms of driving all over again might take decades." Shee adds that simulator data can also easily provide information on how human behavior creeps into driving. "It's not just about the physics of avoiding a crash. It's also about the emotional expectation of passengers and other drivers." For example, when one of Google's computer-controlled cars is cut off, the software brakes harder than it needs to, because this makes the passengers feel safer. Critics say relying heavily on simulation data is flawed because it doesn't take into account how other cars react to the computer's driving.
Censorship

Illinois University Restricts Access To Social Media, Online Political Content 61

Posted by timothy
from the teach-the-controversy dept.
onproton writes Northern Illinois University recently began restricting student access to web pages that contain "illegal or unethical" content which, according to University policy, includes resources used for "political activities...and the organization or participation in meetings, rallies and demonstrations." A student raised concerns after attempting to access the Wikipedia page for Westboro Baptist Church, and receiving a filter message informing him that his access of this page would likely violate the University's Acceptable Use Policy, along with a warning that "all violations would be reviewed." This has lead to questions about whether some policies that restrict student access to information are in the best interest of the primary goal of education.
Google

Finding an ISIS Training Camp Using Google Earth 82

Posted by Soulskill
from the bet-you-wished-you'd-stuck-to-word-of-mouth dept.
An anonymous reader writes: Terrorist organization ISIS has been in the news a lot lately for their hostile activities in Iraq and Syria. They've also been very active online, posting propaganda and photos on various social networking sites to try to recruit more members. Frequently, they'll have pictures of themselves in nondescript locations — but even carefully selected images give clues to a real location. Citizen journalists at Bellingcat analyzed a group of these photos, comparing buildings and bridges in the background to images from Google Earth. With very little to go on, they were able to pinpoint the location of a terrorist training camp.
Android

Researchers Hack Gmail With 92 Percent Success Rate 65

Posted by Soulskill
from the good-enough-for-an-A dept.
SternisheFan sends this report from CNET: Researchers at the University of California Riverside Bourns College of Engineering and the University of Michigan have identified a weakness they believe to exist across Android, Windows, and iOS operating systems that could allow malicious apps to obtain personal information. Although it was tested only on an Android phone, the team believes that the method could be used across all three operating systems because all three share a similar feature: all apps can access a mobile device's shared memory. "The assumption has always been that these apps can't interfere with each other easily," said Zhiyun Qian, an associate professor at UC Riverside. "We show that assumption is not correct and one app can in fact significantly impact another and result in harmful consequences for the user." To demonstrate the method of attack, first a user must download an app that appears benign, such as a wallpaper, but actually contains malicious code. Once installed, the researchers can use it to access the shared memory statistics of any process (PDF), which doesn't require any special privileges.
Biotech

A Better Way To Make Mind-Controlled Prosthetic Limbs 24

Posted by Soulskill
from the resistance-is-futile dept.
the_newsbeagle writes: To make a brain-machine interface, you need a way to capture neurons' electric signals. The most precise and most invasive way uses implants that are stuck in the gray matter. The least precise and least invasive way uses EEG sensors stuck to the scalp. But researchers at Johns Hopkins University say there's a third way that gets the best of both worlds, which is not too invasive and fairly precise. They use ECoG systems, in which a mesh of electrodes is placed under the skull, draped over the surface of the cortex.

They're testing their systems on epilepsy patients, who have these ECoG systems inserted anyway while they're waiting for surgery (the electrodes record the source of their seizures). The researchers are capturing these patients' movement commands from their brains, and using them to control robotic limbs. Someday such a system could be used by amputees to control their prosthetic limbs.
Businesses

When Customer Dissatisfaction Is a Tech Business Model 191

Posted by Soulskill
from the friendly-until-they-have-your-money dept.
jammag writes: A new trend has emerged where tech companies have realized that abusing users pays big. Examples include the highly publicized Comcast harassing service call, Facebook "experiments," Twitter timeline tinkering, rude Korean telecoms — tech is an area where the term "customer service" has an Orwellian slant. Isn't it time customer starting fleeing abusive tech outfits?
Android

Apple CarPlay Rollout Delayed By Some Carmakers 66

Posted by Soulskill
from the methods-to-increase-auto-accidents dept.
Lucas123 writes: Some car makers are delaying the implementation of Apple's CarPlay iPhone interface for vehicle infotainment systems. The delays, which are prompting manufacturers such as Mercedes, Volvo and Honda to push their announcement from 2014 to 2015, appear to be related to a few snags in the integration process or in choosing which model cars should have the middleware. At the same time, many of the automakers rolling out CarPlay are also implementing Android Auto, which will provide a vehicle head unit user interface for Android smartphones. Analysts believe the addition of Android Auto earlier this year may also be causing delays because manufacturers want to be able to announce availability of both platforms in their new model vehicles.
The Internet

Students From States With Faster Internet Tend To Have Higher Test Scores 160

Posted by Soulskill
from the in-before-correlation-!=-causation dept.
An anonymous reader sends word of correlation found between higher internet speeds and higher test scores. Quoting: The numbers—first crunched by the Internet provider comparison site HSI — show a distinct trend between faster Internet and higher ACT test scores. On the high end, Massachusetts scores big with an average Internet speed of 13.1Mbps, and an average ACT test score of 24.1. Mississippi, on the other hand, has an average speed of just 7.6Mbps and an average score of 18.9.

In between those two states, the other 48 fall in a positive correlation that, while not perfect, is quite undeniable. According to HSI's Edwin Ivanauskas, the correlation is stronger than that between household income and test scores, which have long been considered to be firmly connected to each other. The ACT scores were gathered from ACT.org, which has the official rankings and averages for the 2013 test, and the speed ratings were taken from Internet analytics firm Akamai's latest report.
Businesses

What's After Big Data? 77

Posted by Soulskill
from the i'm-sure-the-marketroids-have-something-in-mind dept.
gthuang88 writes: As the marketing hype around "big data" subsides, a recent wave of startups is solving a new class of data-related problems and showing where the field is headed. Niche analytics companies like RStudio, Vast, and FarmLink are trying to provide insights for specific industries such as finance, real estate, and agriculture. Data-wrangling software from startups like Tamr and Trifacta is targeting enterprises looking to find and prep corporate data. And heavily funded startups such as Actifio and DataGravity are trying to make data-storage systems smarter. Together, these efforts highlight where emerging data technologies might actually be used in the business world.
Censorship

Researchers Made a Fake Social Network To Infiltrate China's Internet Censors 46

Posted by Soulskill
from the inside-job dept.
Jason Koebler writes: In order to get inside China's notorious internet filter, Harvard researcher Gary King created his own fake social network to gain access to the programs used to censor content, so he could reverse-engineer the system. "From inside China, we created our own social media website, purchased a URL, rented server space, contracted with one of the most popular software platforms in China used to create these sites, submitted, automatically reviewed, posted, and censored our own submissions," King wrote in a study published in Science. "We had complete access to the software; we were even able to get their recommendations on how to conduct censorship on our own site in compliance with government standards."
Businesses

Tech Looks To Obama To Save Them From 'Just Sort of OK' US Workers 387

Posted by Soulskill
from the right-in-the-pride dept.
theodp writes Following up on news that the White House met with big biz on immigration earlier this month, Bloomberg sat down with Joe Green, the head of Mark Zuckerberg's Fwd.US PAC, to discuss possible executive actions President Obama might take on high tech immigration (video) in September. "Hey, Joe," asked interviewer Alix Steel. "All we keep hearing about this earnings season though from big tech is how they're actually cutting jobs. If you look at Microsoft, Cisco, IBM, Hewlett-Packard, why do the tech companies then need more tech visas?" Green explained why tech may not want to settle for laid-off U.S. talent when the world is its oyster. "The difference between someone who's truly great and just sort of okay is really huge," Green said. "Culture in tech is a very meritocratic culture," he added. "The vast, vast majority of tech engineers that I talked to who are from the United States are very supportive of bringing in people from other countries because they want to work with the very best."
Encryption

NSA Agents Leak Tor Bugs To Developers 109

Posted by Soulskill
from the right-hand-thinks-the-left-hand-is-a-jerk dept.
An anonymous reader writes: We've known for a while that NSA specifically targets Tor, because they want to disrupt one of the last remaining communication methods they aren't able to tap or demand access to. However, not everybody at the NSA is on board with this strategy. Tor developer Andrew Lewman says even as flaws in Tor are rooted out by the NSA and British counterpart GCHQ, other agents from the two organizations leak those flaws directly to the developers, so they can be fixed quickly. He said, "You have to think about the type of people who would be able to do this and have the expertise and time to read Tor source code from scratch for hours, for weeks, for months, and find and elucidate these super-subtle bugs or other things that they probably don't get to see in most commercial software." Lewman estimates the Tor Project receives these reports on a monthly basis. He also spoke about how a growing amount of users will affect Tor. He suggests a massive company like Google or Facebook will eventually have to take up the task of making Tor scale up to millions of users.
Transportation

It's Easy To Hack Traffic Lights 129

Posted by Soulskill
from the looking-forward-to-the-mobile-app dept.
An anonymous reader notes coverage of research from the University of Michigan into the ease with which attackers can hack traffic lights. From the article: As is typical in large urban areas, the traffic lights in the subject city are networked in a tree-type topology, allowing them to pass information to and receive instruction from a central management point. The network is IP-based, with all the nodes (intersections and management computers) on a single subnet. In order to save on installation costs and increase flexibility, the traffic light system uses wireless radios rather than dedicated physical networking links for its communication infrastructure—and that’s the hole the research team exploited. ... The 5.8GHz network has no password and uses no encryption; with a proper radio in hand, joining is trivial. ... The research team quickly discovered that the debug port was open on the live controllers and could directly "read and write arbitrary memory locations, kill tasks, and even reboot the device (PDF)." Debug access to the system also let the researchers look at how the controller communicates to its attached devices—the traffic lights and intersection cameras. They quickly discovered that the control system’s communication was totally non-obfuscated and easy to understand—and easy to subvert.
United Kingdom

Would Scottish Independence Mean the End of UK's Nuclear Arsenal? 362

Posted by samzenpus
from the there-goes-the-boom dept.
Lasrick writes The referendum on Scottish independence on September 18th affects more than just residents of the United Kingdom. All of the UK's nuclear deterrent is located in Scotland, and Alex Salmond and the Scottish government have pledged to safely remove and permanently ban nuclear weapons from Scottish territory within the first term of a newly independent parliament.
Technology

Scientists Developing Remote-Control Cyborg Moths 27

Posted by samzenpus
from the stay-out-of-the-light dept.
Zothecula writes We've been hearing a lot about the development of tiny flying sensor-equipped robots, that could be sent into areas such as disaster sites to seek out survivors or survey the damage. However, why go to the trouble of designing those robots from scratch, when there are already ready-made insects that are about the right size? That's the thinking behind research being conducted at North Carolina State University, which is aimed at converting moths into "biobots".
Transportation

How Does Tesla Build a Supercharger Charging Site? 173

Posted by samzenpus
from the power-up dept.
cartechboy writes Tesla's Superchargers are the talk of the electric car community. These charging stations can take a Model S battery pack from nearly empty to about 150 miles of range in around 30 minutes. That's crazy fast, and it's nothing short of impressive. But what does it take to actually build a Tesla Supercharger site? Apparently a lot of digging. A massive trench is created to run high-capacity electric cables before the charging stations themselves are even installed. A diagram and photos of the Electric Conduit Construction build out have surfaced on the Internet. The conduits connect the charging stations to a power distribution center, which in turn is connected to a transformer that provides the power for charging cars. It took 11 days to install the six charging stalls in Goodland, Kansas. If you thought it was a quick process to build a Supercharger station, you were clearly wrong.
The Internet

FCC Warned Not To Take Actions a Republican-Led FCC Would Dislike 330

Posted by samzenpus
from the you-wouldn't-like-me-whn-I'm-angry dept.
tlhIngan writes Municipal broadband is in the news again — this time Chief of Staff Matthew Berry, speaking at the National Conference of State Legislatures, has endorsed states' right to ban municipal broadband networks and warned the (Democrat-led) FCC to not do anything that a future Republican led FCC would dislike. The argument is that municipal broadband discourages private investment in broadband communications, that taxpayer-funded projects are barriers to future infrastructure investment.
Security

Future Hack: New Cybersecurity Tool Predicts Breaches Before They Happen 33

Posted by Soulskill
from the do-androids-dream-of-electric-wolves? dept.
An anonymous reader writes: A new research paper (PDF) outlines security software that scans and scrapes web sites (past and present) to identify patterms leading up to a security breach. It then accurately predicts what websites will be hacked in the future. The tool has an accuracy of up to 66%. Quoting: "The algorithm is designed to automatically detect whether a Web server is likely to become malicious in the future by analyzing a wide array of the site's characteristics: For example, what software does the server run? What keywords are present? How are the Web pages structured? If your website has a whole lot in common with another website that ended up hacked, the classifier will predict a gloomy future. The classifier itself always updates and evolves, the researchers wrote. It can 'quickly adapt to emerging threats.'"
Microsoft

Microsoft Lobby Denies the State of Chile Access To Free Software 146

Posted by Soulskill
from the lockin-leverage-legislate dept.
walterbyrd writes: Fresh on the heels of the entire Munich and Linux debacle, another story involving Microsoft and free software has popped up across the world, in Chile. A prolific magazine from the South American country says that the powerful Microsoft lobby managed to turn around a law that would allow the authorities to use free software. "An independent member of the Chilean Parliament, Vlado Mirosevic, pushed a bill that would allow the state to consider free software when the authorities needed to purchase or renew licenses. ... A while later, the same member of the Parliament, Daniel Farcas, proposed another bill that actually nullified the effects of the previous one that had just been adopted. To make things even more interesting, some of the people who voted in favor of the first law also voted in favor of the second one. ... The new bill is even more egregious, because it aggressively pushes for the adoption of proprietary software. Companies that choose to use proprietary software will receive certain tax breaks, which makes it very hard for free software to get adopted."
Books

Book Review: Social Engineering In IT Security Tools, Tactics, and Techniques 45

Posted by samzenpus
from the read-all-about-it dept.
benrothke writes When I got a copy of Social Engineering in IT Security Tools, Tactics, and Techniques by Sharon Conheady, my first thought was that it likely could not have much that Christopher Hadnagy didn't already detail in the definitive text on the topic: Social Engineering: The Art of Human Hacking. Obviously Hadnagy thought differently, as he wrote the forward to the book; which he found to be a valuable resource. While there is overlap between the two books; Hadnagy's book takes a somewhat more aggressive tool-based approach, while Conheady take a somewhat more passive, purely social approach to the topic. There are many more software tools in Hadnagy; while Conheady doesn't reference software tools until nearly half-way through the book. This book provides an extensive introduction to the topic and details how social engineering has evolved through the centuries. Conheady writes how the overall tactics and goals have stayed the same; while the tools and techniques have been modified to suit the times. Keep reading for the rest of Ben's review.

A rock store eventually closed down; they were taking too much for granite.

Working...