Please create an account to participate in the Slashdot moderation system

typodupeerror

Submission+-Physicists Induce Superconductivity In Non-Superconducting Materials (phys.org)

An anonymous reader writes: Researchers at the University of Houston have reported a new method for inducing superconductivity in non-superconducting materials, demonstrating a concept proposed decades ago but never proven. The technique can also be used to boost the efficiency of known superconducting materials, suggesting a new way to advance the commercial viability of superconductors, said Paul C.W. Chu, chief scientist at the Texas Center for Superconductivity at UH (TcSUH) and corresponding author of a paper describing the work, published Oct. 31 in the Proceedings of the National Academy of Sciences. The research, demonstrating a new method to take advantage of assembled interfaces to induce superconductivity in the non-superconducting compound calcium iron arsenide, offers a new approach to finding superconductors that work at higher temperatures. Superconducting materials conduct electric current without resistance, while traditional transmission materials lose as much as 10 percent of energy between the generating source and the end user. That means superconductors could allow utility companies to provide more electricity without increasing the amount of fuel used to generate electricity. To validate the concept, researchers working in ambient pressure exposed the undoped calcium iron arsenide compound to heat — 350 degrees Centigrade, considered relatively low temperature for this procedure — in a process known as annealing. The compound formed two distinct phases, with one phase increasingly converted to the other the longer the sample was annealed. Chu said neither of the two phases was superconducting, but researchers were able to detect superconductivity at the point when the two phases coexist. Although the superconducting critical temperature of the sample produced through the process was still relatively low, Chu said the method used to prove the concept offers a new direction in the search for more efficient, less expensive superconducting materials.

Submission+-AT&T Falsely Claimed Pro-Google Fiber Rule Is Invalid, FCC Says (arstechnica.com)

An anonymous reader writes: The Federal Communications Commission has given a helping hand to Louisville, Kentucky, in the city's attempt to enforce local rules that would make it easier for Google Fiber to compete against AT&T. AT&T sued the local government in Louisville and Jefferson County in February to stop a One Touch Make Ready (OTMR) ordinance designed to give Google Fiber or other new competitors faster access to utility poles. Today, the US government submitted a statement of interest (full text) on behalf of the FCC, which says that one of AT&T’s primary legal arguments is incorrect. AT&T—also known as BellSouth Telecommunications in Kentucky—argued that the Louisville ordinance is preempted by the FCC’s pole-attachment rules. The local ordinance "conflicts with the procedures created by the FCC, and upsets the careful balances struck by the FCC in crafting its pole attachment regulations," AT&T's lawsuit said. But that is false, the FCC says. The FCC does have rules ensuring reasonable access to utility poles, but states are allowed to opt out of the federal pole-attachment rules if they certify to the commission that they regulate the rates, terms, and conditions of pole attachments. Kentucky is one of 20 states that has opted out of the federal regime and imposed its own rules, the FCC noted. Accordingly, the federal pole-attachment regulations enacted under Section 224 [of the Communications Act] simply do not apply here,” the FCC wrote. More generally, One Touch Make Ready rules are consistent with federal communications policies and regulations that seek expanded broadband deployment, the FCC also wrote.
User Journal

JournalJournal:Here's a scenario for you 'self driving car' advocates to consider:

It's the future; say, 20 years from now. 'Self-driving cars' have become fairly common. Naturally, they're wireless capable for software updates, traffic information -- and other things, like emergency control by 'proper authorities', of course. Now, here's where the dream turns into a nightmare: The 'authorities' (read as: the government) can completely control your self-driving car, totally overriding any destination you've set it for, and even to the extent of the doorlocks and the ability to
Windows

Google Discloses Exploited Windows Vulnerability 10 Days After Telling Microsoft (venturebeat.com) 101

An anonymous reader writes: Google today shared details about a security flaw in Windows, just 10 days after disclosing it to Microsoft on October 21. To make matters worse, Google says it is aware that this critical Windows vulnerability is being actively exploited in the wild. That means attackers have already written code for this specific security hole and are using it to break into Windows systems.In a blog post, security researchers at Google write, "The Windows vulnerability is a local privilege escalation in the Windows kernel that can be used as a security sandbox escape. It can be triggered via the win32k.sys system call NtSetWindowLongPtr() for the index GWLP_ID on a window handle with GWL_STYLE set to WS_CHILD. Chrome's sandbox blocks win32k.sys system calls using the Win32k lockdown mitigation on Windows 10, which prevents exploitation of this sandbox escape vulnerability."

Submission+-Google Discloses Exploited Windows Vulnerability 10 Days After Telling Microsoft

An anonymous reader writes: Google today shared details about a security flaw in Windows, just 10 days after disclosing it to Microsoft on October 21. To make matters worse, Google says it is aware that this critical Windows vulnerability is being actively exploited in the wild. That means attackers have already written code for this specific security hole and are using it to break into Windows systems.
China

China's New Policing Computer Is Frontend Cattle Prod, Backend Supercomputer (computerworld.com) 69

Earlier this year, we learned about China's first "intelligent security robot," which was said to include "electrically charged riot control tool." We now know what this robot is up to, and what its developed unit looks like. Reader dcblogs writes: China recently deployed what it calls a "security robot" in a Shenzhen airport. It's named AnBot and patrols around the clock. It is a cone-shaped robot that includes a cattle prod. The U.S.-China Economic and Security Review Commission, which look at autonomous system deployments in a report last week, said AnBot, which has facial recognition capability, is designed to be linked with China's latest supercomputers. AnBot may seem like a 'Saturday Night Live' prop, but it's far from it. The back end of this "intelligent security robot" is linked to China's Tianhe-2 supercomputer, where it has access to cloud services. AnBot conducts patrols, recognizes threats and has multiple cameras that use facial recognition. These cloud services give the robots petascale processing power, well beyond onboard processing capabilities in the robot. The supercomputer connection is there "to enhance the intelligent learning capabilities and human-machine interface of these devices," said the U.S.-China Economic and Security Review.

Submission+-The FBI's years-long investigation into a fictional anti-goth cult (muckrock.com)

v3rgEz writes: In 2005, the FBI launched an investigation into the “Church of the Hammer,” a fundamentalist Christian sect which called for the wholesale slaughter of practitioners of the goth subculture. Two years later, the investigation was closed, on grounds that the Church didn’t exist. Here's the story behind that investigation into the anti-goth cult that never was.

Submission+-China's new policing computer is frontend cattle prod, backend, supercomputer (computerworld.com)

dcblogs writes: China recently deployed what it calls a "security robot" in a Shenzhen airport. It's named AnBot and patrols around the clock. It is a cone-shaped robot that includes a cattle prod. The U.S.-China Economic and Secruity Review Commission, which look at autonomous system deployments in a report last week, said AnBot, which has facial recognition capability, is designed to be linked with China's latest supercomputers.
Canada

Police Used Cell Tower Logs To Text 7,500 Possible Crime Witnesses (www.cbc.ca) 153

"Investigators are calling it a 'digital canvass' -- the high-tech equivalent of knocking on thousands of doors for information," reports the CBC, describing how an Ontario police department sent text messages to 7,500 potential witnesses of a homicide using phone numbers from a nearby cell tower's logs. Police obtained the numbers through a court order, and sent two texts -- one in English, and another one in French -- asking recipients to "voluntarily answer a few simple questions..." Slashdot reader itamblyn writes: On one hand, this seems like the natural progression from the traditional approach of canvassing local residents by putting up flyers and knocking on doors. On the other hand, I think one can reasonably ask -- Are we OK with this approach...? Do we want this to happen whenever there is a major crime?
The article adds that the police force "will keep the numbers on file until the killing is solved, officers said at a news conference on Wednesday... Investigators will also consider calling the numbers of people who don't respond voluntarily, but they would be required to obtain another court order to do so."

Submission+-What is a cheap Linux-friendly Net- or Chromebook?

Qbertino writes: I'm looking for a cheap lightweight Net- or Chromebook that is Linux-friendly, i.e. lets me install Linux without any shoddy modern bios getting in my way. Price should be in the 200$/200Euro range. The Lenovo 100S-11 looks really neat, but I just read about installation problems due to the WinTel driven bootloader lock-in and sh*t like that. Are there any alternatives? And if there aren't any, what experience do you guys perhaps have running Linux on a Chromebook using Crouton — the Linux-parallel-to-Chrome-OS Hack that appears to be working quite ok. Is it a feasible alternative to dumping ChromeOS and installing a 100% lightweight Linux or should I expect problems? Any experiences?
Please share your advice below. Many thanks from a fellow slashdotter.

Submission+-Police use cell tower logs to contact potential witnesses to unsolved murder (www.cbc.ca)

itamblyn writes: It what appears to be the first example of a new approach in investigative policing, Ontario Provincial Police are using cell phone tower logs to reach out to potential witnesses in an unsolved homicide case from 2015.

CBC reports (http://www.cbc.ca/news/canada/ottawa/frederick-john-hatch-homicide-cellphone-texts-1.3821821) that police "will be sending texts to about 7,500 people on Thursday to ask for information" to individuals that were, according to the cell phone tower logs, within the tower area near the time of the incident.

While we have heard lots of stories about cell phone tower logs being used in policing before (they are even discussed at length in Season 1 of Serial), I think this is the first case where they have been used to actively contact potential witnesses.

A news release by the police states that the texts will ask the recipient to "voluntarily answer a few simple questions to possibly help the Ontario Provincial Police solve this murder". CBC reports that "Investigators will also consider calling the numbers of people who don't respond voluntarily, but they would be required to obtain another court order to do so."

On one hand, this seems like the natural progression from the traditional approach of canvassing local residents by putting up flyers and knocking on doors. Indeed, the investigators use the term "digital canvas" to describe their plan.

On the other hand, I think one can reasonably ask — Are we OK with this approach? For example, presumably, it would be possible to get a better view of who was in the area by checking credit card transaction logs for all stores within the area. License plate readers and speed cameras might also give information about which vehicles were in the area. There are many levels of tracking that could be used simultaneously as a means of generating lists. The question is, do we want this to happen whenever there is a major crime? A minor one? Maybe this is just how things work now, and it really is no different than walking around, knocking on doors. I figured it was worth a discussion at the very least.

Submission+-Tesla shocks Wall St. with huge earnings surprise and actual profits (bgr.com)

anderzole writes: Tesla on Wednesday posted its earnings report for the quarter gone by and investors will have a lot to cheer about. While analysts on Wall St. were expecting Tesla to post a loss, Tesla during its September quarter actually posted a profit, and an impressive profit at that. When the dust settled, Tesla posted a quarterly profit of $22 million and EPS of $0.71. Revenue for the quarter checked in at $2.3 billion.

Illustrating how impressive Tesla’s performance was this past quarter, Wall St. was anticipating Tesla to post a loss amid $1.9 billion in revenue for the quarter.

Encryption

Security Company Tries To Hide Flaws By Threatening Infringement Suit124

An anonymous reader writes: An RFID-based access control system called IClass is used across the globe to provide physical access controls. This system relies on cryptography to secure communications between a tag and a reader. Since 2010, several academic papers have been released which expose the cryptographic insecurity of the IClass system. Based on these papers, Martin Holst Swende implemented the IClass ciphers in a software library, which he released under the GNU General Public License.

The library is useful to experiment with and determine the security level of an access control system (that you own or have explicit consent to study). However, last Friday, Swende received an email from INSIDE Secure, which notified him of (potential) intellectual property infringement, warning him off distributing the library under threat of "infringement action." Interestingly, it seems this is not the first time HID Global has exerted legal pressure to suppress information.

Slashdot Top Deals

Staff meeting in the conference room in 3 minutes.

Working...
close