Forgot your password?
typodupeerror

Please create an account to participate in the Slashdot moderation system

The Courts

Stan Lee Media and Disney Battle For Ownership of Marvel Characters 140

Posted by samzenpus
from the mine-now-I-take-it dept.
An anonymous reader writes "Stan Lee Media and The Walt Disney Co. have taken their arguments to the U.S. Court of Appeals over who owns the rights (and profits) to Marvel characters. Though Disney bought Marvel in 2009, Stan Lee Media (no longer associated with Stan Lee, himself) still claims copyright of the characters."
Education

Tech Giants Donate $750 Million In Goods and Services To Underprivileged Schools 140

Posted by Soulskill
from the go-big-or-go-home dept.
mrspoonsi sends news that a group of major tech companies has combined to donate $750 million worth of gadgets and services to students in 114 schools across the U.S. Apple is sending out $100 million worth of iPads, MacBooks, and other products. O'Reilly Media is making $100 million worth of educational content available for free. Microsoft and Autodesk are discounting software, while Sprint and AT&T are offering free wireless service. This is part of the ConnectED Initiative, a project announced by the Obama Administration last year to bring modern technology to K-12 classrooms. The FCC has also earmarked $2 billion to improve internet connectivity in schools and libraries over the next two years. Obama also plans to seek funding for training teachers to utilize this infusion of technology.
The Media

2600 Profiled: "A Print Magazine For Hackers" 71

Posted by Soulskill
from the not-the-atari-2600 dept.
HughPickens.com writes: Nicolas Niarchos has a profile of 2600 in The New Yorker that is well worth reading. Some excerpts: "2600 — named for the frequency that allowed early hackers and "phreakers" to gain control of land-line phones — is the photocopier to Snowden's microprocessor. Its articles aren't pasted up on a flashy Web site but, rather, come out in print. The magazine—which started as a three-page leaflet sent out in the mail, and became a digest-sized publication in the late nineteen-eighties — just celebrated its thirtieth anniversary. It still arrives with the turning of the seasons, in brown envelopes just a bit smaller than a 401k mailer."

"There's been now, by any stretch of the imagination, three generations of hackers who have read 2600 magazine," Jason Scott, a historian and Web archivist who recently reorganized a set of 2600's legal files, said. Referring to Goldstein, whose real name is Eric Corley, he continued: "Eric really believes in the power of print, words on paper. It's obvious for him that his heart is in the paper."

"2600 provides an important forum for hackers to discuss the most pressing issues of the day — whether it be surveillance, Internet freedom, or the security of the nation's nuclear weapons—while sharing new code in languages like Python and C.* For example, the most recent issue of the magazine addresses how the hacking community can approach Snowden's disclosures. After lampooning one of the leaked N.S.A. PowerPoint slides ("whoever wrote this clearly didn't know that there are no zombies in '1984' ") and discussing how U.S. government is eroding civil rights, the piece points out the contradictions that everyone in the hacking community currently faces. "Hackers are the ones who reveal the inconvenient truths, point out security holes, and offer solutions," it concludes. "And this is why hackers are the enemy in a world where surveillance and the status quo are the keys to power."
Books

Book Review: Measuring and Managing Information Risk: a FAIR Approach 46

Posted by samzenpus
from the read-all-about-it dept.
benrothke writes It's hard to go a day without some sort of data about information security and risk. Research from firms like Gartner are accepted without question; even though they can get their results from untrusted and unvetted sources. The current panic around Ebola shows how people are ill-informed about risk. While stressing over Ebola, the media is oblivious to true public health threats like obesity, heart disease, drunk driving, diabetes, and the like. When it comes to information security, it's not that much better. With myriad statistics, surveys, data breach reports, and global analyses of the costs of data breaches, there is an overabundance of data, and an under abundance of meaningful data. In Measuring and Managing Information Risk: A FAIR Approach, authors Jack Freund and Jack Jones have written a magnificent book that will change the way (for the better) you think about and deal with IT risk. Keep reading for the rest of Ben's review.
EU

EU Court Rules Embedding YouTube Videos Is Not Copyright Infringement 68

Posted by samzenpus
from the fair-share dept.
Maurits van der Schee writes "The Court of Justice of the European Union has ruled that embedding a copyrighted YouTube video in your site is not copyright infringement. From the article: "The case in question was referred to EU’s Court of Justice by a German court. It deals with a dispute between the water filtering company BestWater International and two men who work as independent commercial agents for a competitor. Bestwater accused the men of embedding one of their promotional videos, which was available on YouTube without the company’s permission. The video was embedded on the personal website of the two through a frame, as is usual with YouTube videos. While EU law is clear on most piracy issues, the copyright directive says very little about embedding copyrighted works. The Court of Justice, however, now argues that embedding is not copyright infringement."
Advertising

Ello Formally Promises To Remain Ad-Free, Raises $5.5M 167

Posted by timothy
from the now-how-much-would-you-pay? dept.
Social media site Ello is presented as the anti-Facebook, promising an ad-free social network, and that they won't sell private data. Today, they've also announced that Ello has become a Public Benefit Corporation, and that the site's anti-advertising promise has been enshrined in a corporate charter. The BBC reports on the restrictions that Ello has therefore entered into, which mean the site cannot, for monetary gain,
  1. Sell user-specific data to a third party
  2. Enter into an agreement to display paid advertising on behalf of a third party; and
  3. In the event of an acquisition or asset transfer, the Company shall require any acquiring entity to adopt these requirements with respect to the operation of Ello or its assets.

While that might turn off some potential revenue flows (the company says it will make money by selling optional features), as the linked article points out, it hasn't turned off investors; Ello has now raised $5.5 million from investors.

The Internet

Hungary To Tax Internet Traffic 324

Posted by Soulskill
from the how-to-kill-your-youtube-habit dept.
An anonymous reader writes: The Hungarian government has announced a new tax on internet traffic: 150 HUF ($0.62 USD) per gigabyte. In Hungary, a monthly internet subscription costs around 4,000-10,000 HUF ($17-$41), so it could really put a constraint on different service providers, especially for streaming media. This kind of tax could set back the country's technological development by some 20 years — to the pre-internet age. As a side note, the Hungarian government's budget is running at a serious deficit. The internet tax is officially expected to bring in about 20 billion HUF in income, though a quick look at the BIX (Budapest Internet Exchange) and a bit of math suggests a better estimate of the income would probably be an order of magnitude higher.
Cellphones

'Microsoft Lumia' Will Replace the Nokia Brand 150

Posted by timothy
from the not-many-years-from-dominance dept.
jones_supa writes The last emblems of Nokia are being removed from Microsoft products. "Microsoft Lumia" is the new brand name that takes their place. The name change follows a slow transition from Nokia.com over to Microsoft's new mobile site, and Nokia France will be the first of many countries that adopt "Microsoft Lumia" for its Facebook, Twitter, and other social media accounts. Microsoft has confirmed to The Verge that other countries will follow the rebranding steps in the coming weeks. Nokia itself continues as a reborn company focusing on mapping and network infrastructure services.
United Kingdom

Manga Images Depicting Children Lead to Conviction in UK 474

Posted by timothy
from the we-know-what-you-were-thinking dept.
An anonymous reader writes with this news from the UK, as reported by Ars Technica: A 39-year-old UK man has been convicted of possessing illegal cartoon drawings of young girls exposing themselves in school uniforms and engaging in sex acts. The case is believed to be the UK's first prosecution of illegal manga and anime images. Local media said that Robul Hoque was sentenced last week to nine months' imprisonment, though the sentence is suspended so long as the defendant does not break the law again. Police seized Hoque's computer in 2012 and said they found nearly 400 such images on it, none of which depicted real people but were illegal nonetheless because of their similarity to child pornography. Hoque was initially charged with 20 counts of illegal possession but eventually pled guilty to just 10 counts.
United Kingdom

In UK, Internet Trolls Could Face Two Years In Jail 489

Posted by timothy
from the don't-worry-he's-trolling dept.
An anonymous reader writes with this news from The Guardian about a proposed change in UK law that would greatly increase the penalties for online incivility: Internet trolls who spread "venom" on social media could be jailed for up to two years, the justice secretary Chris Grayling has said as he announced plans to quadruple the maximum prison sentence. Grayling, who spoke of a "baying cybermob", said the changes will allow magistrates to pass on the most serious cases to crown courts. The changes, which will be introduced as amendments to the criminal justice and courts bill, will mean the maximum custodial sentence of six months will be increased to 24 months. Grayling told the Mail on Sunday: "These internet trolls are cowards who are poisoning our national life. No one would permit such venom in person, so there should be no place for it on social media. That is why we are determined to quadruple the six-month sentence.
Science

Brain Patterns Give Clues To Why Some People Just Keep Gambling 59

Posted by timothy
from the know-when-to-hold-'em dept.
Research from several UK universities, as reported by Time, indicates that the brain activity of compulsive gamblers shows a marked difference in response to pleasure-triggering behavior, which may help explain why they have trouble stopping: [The participants] took an amphetamine capsule, which unleashes endorphins with similar effects to the rush you get from exercise or alcohol, the study says. An additional PET scan revealed that pathological gamblers responded differently to the drug. They released fewer endorphins than those who didn't gamble, and they also reported lower levels of euphoria on a questionnaire afterward. This might help explain the addictive part of pathological gambling: to get pleasure from the act, problem gamblers might need more of it or to work harder for it.
GUI

Apple Doesn't Design For Yesterday 370

Posted by timothy
from the new-one-looks-nice-to-me dept.
HughPickens.com writes Erik Karjaluoto writes that he recently installed OS X Yosemite and his initial reaction was "This got hit by the ugly stick." But Karjaluoto says that Apple's decision to make a wholesale shift from Lucida to Helvetica defies his expectations and wondered why Apple would make a change that impedes legibility, requires more screen space, and makes the GUI appear fuzzy? The Answer: Tomorrow.

Microsoft's approach with Windows, and backward compatibility in general, is commendable. "Users can install new versions of this OS on old machines, sometimes built on a mishmash of components, and still have it work well. This is a remarkable feat of engineering. It also comes with limitations — as it forces Microsoft to operate in the past." But Apple doesn't share this focus on interoperability or legacy. "They restrict hardware options, so they can build around a smaller number of specs. Old hardware is often left behind (turn on a first-generation iPad, and witness the sluggishness). Meanwhile, dying conventions are proactively euthanized," says Karjaluoto. "When Macs no longer shipped with floppy drives, many felt baffled. This same experience occurred when a disk (CD/DVD) reader no longer came standard." In spite of the grumblings of many, Karjaluoto doesn't recall many such changes that we didn't later look upon as the right choice.
Transportation

Tesla Teardown Reveals Driver-facing Electronics Built By iPhone 6 Suppliers 158

Posted by Soulskill
from the you-got-your-smartphone-in-my-ev dept.
Lucas123 writes: The Tesla Model S gets attention because it's an EV that can go from from 0 to 60 mph (96 km/h) in 4.2 seconds and can travel 265 miles on a single charge. But, a teardown of the vehicle by IHS Technology has also revealed that Elon Musk avoided third-party design and build routes used traditionally by auto makers and spared no expense on the instrument cluster and infotainment (head unit) system, which is powered by two 1.4Ghz, quad-core NVIDIA Tegra processors. IHS called the Tesla's head unit the most sophisticated it's ever seen, with 1,000 more components than any it has previously analyzed. A bill of materials for the virtual instrument cluster and the premium media control unit is also roughly twice the cost of the highest-end infotainment unit examined by IHS.
Privacy

The Guardian Reveals That Whisper App Tracks "Anonymous" Users 180

Posted by samzenpus
from the you-keep-using-that-word-I-do-not-think-it-means-what-you-think-it-means dept.
New submitter qqod writes this story at The Guardian that raises privacy concerns over the Whisper app. "The company behind Whisper, the social media app that promises users anonymity and claims to be the “the safest place on the internet”, is tracking the location of its users, including some who have specifically asked not to be followed. The practice of monitoring the whereabouts of Whisper users – including those who have expressly opted out of geolocation services – will alarm users, who are encouraged to disclose intimate details about their private and professional lives. Whisper is also sharing information with the US Department of Defense gleaned from smartphones it knows are used from military bases, and developing a version of its app to conform with Chinese censorship laws."
Medicine

Positive Ebola Test In Second Texas Health Worker 463

Posted by Soulskill
from the bad-news-bears dept.
mdsolar tips news that a second healthcare worker at Texas Health Presbyterian Hospital has tested positive for the Ebola virus. Like the nurse who tested positive a few days ago, this worker was involved in providing care to Eric Duncan, the Liberian man who seems to have brought the virus into the country. The CDC is working to identify further exposures to the local community, though the Times says a second infection among the 70+ medical professionals who were around Duncan is not unexpected. The largest U.S. nurses union says a lack of proper protective gear and constantly changing protocols are to blame for exposures. Meanwhile, the World Health Organization says infection rates in West Africa are such that within a few months, they can expect 10,000 new Ebola cases a week. They also say the death rate for the current outbreak has risen to 70 percent.
Power

Battery Breakthrough: Researchers Claim 70% Charge In 2 Minutes, 20-Year Life 395

Posted by Soulskill
from the but-only-works-for-left-handed-people dept.
New submitter chaosdivine69 writes: According to Scientists at Nanyang Technology University (NTU), they have developed ultra-fast charging batteries that can be recharged up to 70 per cent in only two minutes and have a 20-year lifespan (10,000 charges). The impact of this is potentially a game changer for a lot of industries reliant on lithium ion batteries. In the car industry, for example, consumers would save on costs for battery replacement and manufacturers would save on material construction (the researchers are using a nanotube structure of Titanium dioxide, which is an abundant, cheap, and safe material found in soil). Titanium dioxide is commonly used as a food additive or in sunscreen lotions to absorb harmful ultraviolet rays. It is believed that charging an electric car can be done in as little as 5 minutes, making it comparable to filling up a tank of gasoline.
Media

Netflix Video Speed On FiOS Doubles After Netflix-Verizon Deal 204

Posted by Soulskill
from the all-about-the-benjamins dept.
An anonymous reader writes: Verizon now joins AT&T and Time Warner Cable in the list of ISPs on which Netflix streaming has significantly improved after Netflix paid for access to their networks. Ars Technica notes that "[t]he interconnection deals give Netflix a direct connection to the edge of the Internet providers' networks, bypassing congested links, but without receiving priority treatment after entering the networks." The success of these deals, however, gives the ISPs no incentive whatsoever to fix their congested links. Toll roads have, in essence, been created for the internet.
Open Source

Linux Foundation Launches Open Source Dronecode Project 24

Posted by samzenpus
from the open-to-the-public dept.
garymortimer writes with news about a project that hopes to create an open source code platform for drones. "The Linux Foundation, the nonprofit organization dedicated to accelerating the growth of Linux and collaborative development, today announced the founding of the Dronecode Project. The Project will bring together existing open source drone projects and assets under a nonprofit structure governed by The Linux Foundation. The result will be a common, shared open source platform for Unmanned Aerial Vehicles (UAVs). Founding members include 3D Robotics, Baidu, Box, DroneDeploy, Intel, jDrones, Laser Navigation, Qualcomm, SkyWard, Squadrone System, Walkera and Yuneec. Dronecode includes the APM UAV software platform and associated code, which until now has been hosted by 3D Robotics, a world leader in advanced UAV autopilot and autonomous vehicle control. The company was co-founded by Chris Anderson, formerly editor-in-chief of Wired"
Education

Despite Push From Tech Giants, AP CS Exam Counts Don't Budge Much In Most States 144

Posted by timothy
from the can't-argue-with-a-pig dept.
theodp (442580) writes "Well, the College Board has posted the 2014 AP Computer Science Test scores. So, before the press rushes out another set of Not-One-Girl-In-Wyoming-Took-an-AP-CS-Exam stories, let's point out that no Wyoming students of either gender took an AP CS exam again in 2014 (.xlsx). At the overall level, the final numbers have changed somewhat (back-of-the-Excel-envelope calculations, no warranty expressed or implied!), but tell pretty much the same story as the preliminary figures — the number of overall AP CS test takers increased, while pass rates decreased despite efforts to cherry pick students with a high likelihood of success. What is kind of surprising is how little the test numbers budged for most states — only 8 states managed to add more than 100 girls to the AP CS test taker rolls — despite the PR push by the tech giants, including Microsoft, Google, and, Facebook. Also worth noting are some big percentage decreases at the top end of the score segments (5 and 4), and still-way-too-wide gaps that exist between the score distributions of the College Board's various ethnic segments (more back of the envelope calcs). If there's a Data Scientist in the house, AP CS exam figures grabbed from the College Board's Excel 2013 and 2014 worksheets can be found here (Google Sheets) together with the (unwalkedthrough) VBA code that was used to collect it. Post your insight (and code/data fixes) in the comments!"
China

China Bans "Human Flesh Searching" 109

Posted by timothy
from the but-human-flesh-is-delicious dept.
hackingbear writes The Supreme People's Court, China's top court, has outlined the liabilities of network service providers in a document on the handling of online personal rights violation cases. "Rights violators usually hide in the dark online. They post harmful information out of the blue, and victims just can't be certain whom they should accuse when they want to bring the case to court," said Yao Hui, a senior SPC judge specializing in civil cases. Those re-posting content that violates others' rights and interests will also answer for their actions, and their liability will be determined based on the consequences of their posts, the online influence of re-posters, and whether they make untruthful changes to content that mislead. This essentially tries to ban the so-called human flesh searching. Though this does not stop others from using the chance to highlight the country's censorship problems even though the rulings seem to focus on personal privacy protection.

Facts are stubborn, but statistics are more pliable.

Working...