news aggregator

Morning Legal Briefs

Recent Blue's News Posts - Thu, 07/24/2014 - 6:42am
Bitcoins.com domain auction cancelled after judge?s restraining order.

Game Reviews

Recent Blue's News Posts - Thu, 07/24/2014 - 6:42am
Magic 2015 - Duels of the Planeswalkers on Gamer Horizon and Strategy Informer. Unrest on IncGamers.com.

Hardware Reviews

Recent Blue's News Posts - Thu, 07/24/2014 - 6:42am
ASRock Fatal1ty Z97 Killer Motherboard on ThinkComputers.org. ASUS Maximus VII Formula on ocaholic. ASUS STRIX GTX 780 OC 6GB SLI - GTX 780 OC 6GB vs. R9 290X 4GB Overclocked at 4K on HARDOCP. ASUS...

Empathy For Virtual Characters Studied With FMRI Brain Imaging

Recent /. Posts - Thu, 07/24/2014 - 6:15am
vrml (3027321) writes "A novel brain imaging study published by the prestigious Neuroimage journal sheds light on different reactions that players' brains display when they meet a virtual character in a game world. While their head was inside a fMRI machine, participants played an interactive virtual experience in which they had to survive a serious fire emergency in a building by reaching an exit as soon as possible. However, when they finally arrived at the exit, they also found a virtual character trapped under an heavy cabinet, begging them for help. Some participants chose not to help the character and took the exit, while others stopped to help although the fire became more and more serious and moving away the cabinet required considerable time. Functional brain imaging showed activation of very different brain areas in players when they met the character. When there was an increased functional connectivity of the brain salience network, which suggests an enhanced sensitivity to the threatening situation and potential danger, players ignored the character screams and went for the exit. In those players who helped the character, there was an engagement of the medial prefrontal and temporo-parietal cortices, which in the neuroscience literature are associated with the human ability of taking the perspective of other individuals and making altruistic choices. The paper concludes by emphasizing how virtual worlds can be a salient and ecologically valid stimulus for modern social neuroscience."

Read more of this story at Slashdot.








Dutch Court Says Government Can Receive Bulk Data from NSA

Recent /. Posts - Thu, 07/24/2014 - 5:31am
jfruh (300774) writes Dutch law makes it illegal for the Dutch intelligence services to conduct mass data interception programs. But, according to a court in the Hague, it's perfectly all right for the Dutch government to request that data from the U.S.'s National Security Agency, and doing so doesn't violate any treaties or international law.

Read more of this story at Slashdot.








FCC Reminds ISPs That They Can Be Fined For Lacking Transparency

Recent /. Posts - Thu, 07/24/2014 - 4:49am
An anonymous reader writes The FCC issued a notice on Wednesday reminding ISPs that, according to the still-intact transparency rule of the 2010 Open Internet Order, they are required to be transparent about their services. "The FCC's transparency rule requires that consumers get the information they need to make informed choices about the broadband services they purchase." Applicable scenarios include "poorly worded service offers or inaccurate counts of data against a data cap...[as well as] blocking or slowing certain types of traffic without explaining that to the customer." The transparency rule gives the FCC the power to fine ISPs for non-compliance.

Read more of this story at Slashdot.








Internet Explorer Vulnerabilities Increase 100%

Recent /. Posts - Thu, 07/24/2014 - 4:06am
An anonymous reader writes Bromium Labs analyzed public vulnerabilities and exploits from the first six months of 2014. The research determined that Internet Explorer vulnerabilities have increased more than 100 percent since 2013, surpassing Java and Flash vulnerabilities. Web browsers have always been a favorite avenue of attack, but we are now seeing that hackers are not only getting better at attacking Internet Explorer, they are doing it more frequently.

Read more of this story at Slashdot.








Ebola Outbreak Continues To Expand

Recent /. Posts - Thu, 07/24/2014 - 1:36am
symbolset writes in with the latest about an ebola outbreak spreading across West Africa. The World Health Organization (WHO) continues to monitor the evolution of the Ebola virus disease (EVD) outbreak in Sierra Leone, Liberia, and Guinea. The current epidemic trend of EVD outbreak in Sierra Leone and Liberia remains serious, with 67 new cases and 19 deaths reported July 15-17, 2014. These include suspect, probable, and laboratory-confirmed cases. The EVD outbreak in Guinea continues to show a declining trend, with no new cases reported during this period. Critical analyses and review of the current outbreak response is being undertaken to inform the process of developing prioritized national operational plans. Effective implementation of the prioritized plans will be vital in reversing the current trend of EVD outbreak, especially in Liberia and Sierra Leone.

Read more of this story at Slashdot.








How the Internet of Things Could Aid Disaster Response

Recent /. Posts - Wed, 07/23/2014 - 11:09pm
jfruh writes While the Internet has made communications easier, that ease had made us very dependent on the Internet for communications — and, when disaster strikes, power and infrastructure outages tend to shut down those communications networks when we need them most. But now researchers are examining how the so-called "Internet of Things" — the proliferating array of Internet-communicating devices in our lives — can transmit emergency messages via ad-hoc networks even when the Internet backbone in a region is inoperable.

Read more of this story at Slashdot.








The Psychology of Phishing

Recent /. Posts - Wed, 07/23/2014 - 8:29pm
An anonymous reader writes Phishing emails are without a doubt one of the biggest security issues consumers and businesses face today. Cybercriminals understand that we are a generation of clickers and they use this to their advantage. They will take the time to create sophisticated phishing emails because they understand that today users can tell-apart spam annoyances from useful email, however they still find it difficult identifying phishing emails, particularly when they are tailored to suit each recipient individually. Fake emails are so convincing and compelling that they fool 10% of recipients into clicking on the malicious link. To put that into context a legitimate marketing department at a FTSE 100 company typically expects less than a 2% click rate on their advertising campaigns. So, how are the cybercriminals out-marketing the marketing experts?

Read more of this story at Slashdot.








Dropbox Head Responds To Snowden Claims About Privacy

Recent /. Posts - Wed, 07/23/2014 - 6:00pm
First time accepted submitter Carly Page writes When asked for its response to Edward Snowden's claims that "Dropbox is hostile to privacy", Dropbox told The INQUIRER that users concerned about privacy should add their own encryption. The firm warned however that if users do, not all of the service's features will work. Head of Product at Dropbox for Business Ilya Fushman says: "We have data encrypted on our servers. We think of encryption beyond that as a users choice. If you look at our third-party developer ecosystem you'll find many client-side encryption apps....It's hard to do things like rich document rendering if they're client-side encrypted. Search is also difficult, we can't index the content of files. Finally, we need users to understand that if they use client-side encryption and lose the password, we can't then help them recover those files."

Read more of this story at Slashdot.








Verizon's Offer: Let Us Track You, Get Free Stuff

Recent /. Posts - Wed, 07/23/2014 - 4:32pm
mpicpp points out a new program from Verizon that is perfect if you don't mind being tracked. Are you comfortable having your location and Web browsing tracked for marketing purposes? If so, Verizon's got a deal for you. The wireless giant announced a new program this week called 'Smart Rewards' that offers customers credit card-style perks like discounts for shopping, travel and dining. You accrue points through the program by doing things like signing onto the Verizon website, paying your bill online and participating in the company's trade-in program. Verizon emphasizes that the data it collects is anonymized before it's shared with third parties. The program is novel in that offers Verizon users some compensation for the collection of their data, which has become big business for telecom and tech companies. Some privacy advocates have pushed data-collecting companies to reward customers for their personal information in the interest of transparency.

Read more of this story at Slashdot.








Microsoft's CEO Says He Wants to Unify Windows

Recent /. Posts - Wed, 07/23/2014 - 3:48pm
Deathspawner writes A lot of people have never been able to understand the logic behind Microsoft's Windows RT, with many urging the company to kill it off so that it can focus on more important products, like the mainline Windows. Well, this is probably not going to come as a huge surprise, especially in light of mass layoffs announced last week, but Microsoft CEO Satya Nadella has said that his company will be working to combine all Windows versions into a unified release by next year.

Read more of this story at Slashdot.








Raspberry Pi Gameboy

Recent /. Posts - Wed, 07/23/2014 - 3:00pm
An anonymous reader writes: An enterprising hacker took on a project to rebuild a broken Gameboy using emulation software, a Raspberry Pi, and a few other easily-obtainable parts. The result: success! The hacker has posted a detailed walkthrough explaining all of the challenges and how they were solved. "Using a Dremel, I cut out a most of the battery compartment as well as some posts that on the case for the LCD that would no longer be needed. Doing so, the Pi sits flush with the back of the DMG case. ... The screen was the first challenge. The screen runs off 12V out of the box which wouldn't work with the USB battery pack. The USB battery pack is rated at 5V, 1000mAH so the goal was go modify the screen to allow it to run at 5V. ... I finally got it to work by removing the power converter chip as well as soldering a jumper between the + power in and the resister on the top right."

Read more of this story at Slashdot.








VP Biden Briefs US Governors On H-1B Visas, IT, and Coding

Recent /. Posts - Wed, 07/23/2014 - 2:19pm
theodp writes: Back in 2012, Computerworld blasted Vice President Joe Biden for his ignorance of the H-1B temporary work visa program. But Joe's got his H-1B story and he's sticking to it, characterizing the visa program earlier this month in a speech to the National Governors Association as "apprenticeships" of sorts that companies provide to foreign workers to expand the Information Technology industry only after proving there are no qualified Americans to fill the jobs. Biden said he also learned from his talks with tech's top CEOs that 200,000 of the jobs that companies provide each year to highly-skilled H-1B visa holders could in fact be done by Americans with no more than a two-year community college degree.

Read more of this story at Slashdot.








Finding Life In Space By Looking For Extraterrestrial Pollution

Recent /. Posts - Wed, 07/23/2014 - 1:37pm
coondoggie writes: If what we know as advanced life exists anywhere other than Earth, then perhaps they are dirtying their atmosphere as much as we are. We could use such pollution components to perhaps more easily spot such planets. That's the basis of new research published this week by researchers at the Harvard-Smithsonian Center for Astrophysics. They say that if we could spot the fingerprints of certain pollutants under ideal conditions (PDF), it would offer a new approach in the search for extraterrestrial intelligence."

Read more of this story at Slashdot.








The Secret Government Rulebook For Labeling You a Terrorist

Recent /. Posts - Wed, 07/23/2014 - 12:55pm
Advocatus Diaboli sends this report: The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither "concrete facts" nor "irrefutable evidence" to designate an American or foreigner as a terrorist, according to a key government document obtained by The Intercept. ...The heart of the document revolves around the rules for placing individuals on a watchlist. "All executive departments and agencies," the document says, are responsible for collecting and sharing information on terrorist suspects with the National Counterterrorism Center. It sets a low standard—"reasonable suspicion"—for placing names on the watchlists, and offers a multitude of vague, confusing, or contradictory instructions for gauging it. In the chapter on "Minimum Substantive Derogatory Criteria"—even the title is hard to digest—the key sentence on reasonable suspicion offers little clarity.

Read more of this story at Slashdot.








'Just Let Me Code!'

Recent /. Posts - Wed, 07/23/2014 - 12:14pm
An anonymous reader writes: Andrew Binstock has an article about the ever-increasing complexity required to write code. He says, "I got into programming because I like creating stuff. Not just any stuff, but stuff other people find useful. I like the constant problem solving, the use of abstractions that exist for long periods nowhere but in my imagination, and I like seeing the transformation into a living presence. ... The simple programs of a few hundred lines of C++ long ago disappeared from my experience. What was the experience of riding a bicycle has become the equivalent of traveling by jumbo jet; replete with the delays, inspections, limitations on personal choices, and sudden, unexplained cancellations — all at a significantly higher cost. ... Project overhead, even for simple projects, is so heavy that it's a wonder anyone can find the time to code, much less derive joy from it. Software development has become a mostly operational activity, rather than a creative one. The fundamental problem here is not the complexity of apps, but the complexity of tools. Tools have gone rather haywire during the last decade chasing shibboleths of scalability, comprehensiveness, performance. Everything except simplicity."

Read more of this story at Slashdot.








Syndicate content