New submitter nrjperera (2669521) submits news of a new laptop from HP that's in Chromebook (or, a few years ago, "netbook") territory, price-wise, but loaded with Windows 8.1 instead. Microsoft has teamed up with HP to make an affordable Windows laptop to beat Google Chromebooks at their own game. German website Mobile Geeks have found some leaked information about this upcoming HP laptop dubbed Stream 14, including its specifications. According to the leaked data sheet the HP Stream 14 laptop will share similar specs to HP's cheap Chromebook. It will be shipped with an AMD A4 Micro processor, 2GB of RAM, 32GB of flash storage and a display with 1,366 x 768 screen resolution. Microsoft will likely offer 100GB of OneDrive cloud storage with the device to balance the limited storage option.
Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!
An anonymous reader writes Ars reports: "Delaware has become the first state in the U.S .to enact a law that ensures families' rights to access the digital assets of loved ones during incapacitation or after death." In other states, the social media accounts and email of people who die also die with them since the companies hosting those accounts are not obligated to transfer access even to the heirs of the deceased. In Delaware, however, this is no longer the case. The article notes that even if the deceased was a resident of another state, if his/her will is governed by Delaware law, his/her heirs will be allowed to avail of the new law and gain access to all digital assets of the deceased.
itwbennett (1594911) writes Community Health Systems said the attack occurred in April and June of this year, but it wasn't until July that it determined the theft had taken place. Working with a computer security company, it determined the attack was carried out by a group based in China that used 'highly sophisticated malware' to attack its systems. The hackers got away with patient names, addresses, birthdates, telephone numbers and Social Security numbers of the 4.5 million people who were referred to or received services from doctors affiliated with the company in the last five years. The stolen data did not include patient credit card, medical, or clinical information.
Jason Koebler writes The Royal Society of London, the world's oldest scientific publisher, has unveiled a proposal to create the first serious framework for future geoengineering experiments. It's a sign that what are still considered drastic and risky measures to combat climate change are drifting further into the purview of mainstream science. The scientific body has issued a call to create "an open and transparent review process that ensures such experiments have the necessary social license to operate."
An anonymous reader writes: The Electronic Frontier Foundation has updated its guide for protecting yourself and your cell phone at a protest. In addition to being extremely powerful tools (real-time communication to many watchers via social media, and video recording functionality), cell phones can also give authorities a lot of information about you if they confiscate it. The EFF is trying to encourage cell phone use and prepare people to use them. (The guide is based on U.S. laws, but much of the advice makes sense for other places as well.) Here are a few small snippets: "Start using encrypted communications channels. Text messages, as a rule, can be read and stored by your phone company or by surveillance equipment in the area. ... If the police ask to see your phone, tell them you do not consent to the search of your device. Again, since the Supreme Court's decision in Riley, there is little question that officers need a warrant to access the contents of your phone incident to arrest, though they may be able to seize the phone and get a warrant later. ... If your phone or electronic device was seized, and is not promptly returned when you are released, you can file a motion with the court to have your property returned."
An anonymous reader writes: It seems the latest trend sweeping the online world is the idea that email is on its way out. Kids are eschewing email for any of the hundreds of different instant messaging services, and startups are targeting email as a system they can "disrupt." Alexis C. Madrigal argues that attempts to move past email are shortsighted and faddish, as none of the alternatives give as much power to the user. "Email is actually a tremendous, decentralized, open platform on which new, innovative things can and have been built. In that way, email represents a different model from the closed ecosystems we see proliferating across our computers and devices. Email is a refugee from the open, interoperable, less-controlled 'web we lost.' It's an exciting landscape of freedom amidst the walled gardens of social networking and messaging services." Madrigal does believe that email will gradually lose some of its current uses as new technologies spring up and mature, but the core functionality is here to stay.
New submitter JonnyCalcutta writes: The football Premier League in England is warning about posting clips of goals on online services such as Vine and Twitter. The claim is that posting these clips is "illegal under copyright laws." I'm naturally dubious about blanket statements from rightsholders already known to push the truth, especially concerning such short clips, but I don't know enough about copyright law to understand the implications fully. Is it illegal? What can they actually do about it? Does adding commentary give the uploader any rights to post?
mdsolar sends this story from the NY Times: The Internet may be losing the war against trolls. At the very least, it isn't winning. And unless social networks, media sites and governments come up with some innovative way of defeating online troublemakers, the digital world will never be free of the trolls' collective sway. That's the dismal judgment of the handful of scholars who study the broad category of online incivility known as trolling, a problem whose scope is not clear, but whose victims keep mounting. "As long as the Internet keeps operating according to a click-based economy, trolls will maybe not win, but they will always be present," said Whitney Phillips, a lecturer at Humboldt State University and the author of This Is Why We Can't Have Nice Things, a forthcoming book about her years of studying bad behavior online. "The faster that the whole media system goes, the more trolls have a foothold to stand on. They are perfectly calibrated to exploit the way media is disseminated these days."
New submitter MutualFun sends this article from Science News: Which would you prefer: egalitarianism or totalitarianism? When it comes down to it, the choice you make may not be as obvious as you think. New research suggests that in the distant past, groups of hunter-gatherers may have recognized and accepted the benefits of living in hierarchical societies, even if they themselves weren't counted among the well-off. This model could help explain why bands of humans moved from largely egalitarian groups to hierarchical cultures in which social inequality was rife.
Detroit recently hosted the North American Science Fiction Convention, drawing thousands of SF fans to see and hear a variety of talks on all sorts of topics. One of the biggest panels featured a discussion on perhaps the greatest technological disappointment of the past fifty years: Where are our d@%& flying cars? Panelists included author and database consultant Jonathan Stars, expert in Aeronautical Management and 20-year veteran of the Air Force Douglas Johnson, author and founder of the Artemis Project Ian Randal Strock, novelist Cindy A. Matthews, Fermilab physicist Bill Higgins, general manager of a nanotechnology company Dr. Charles Dezelah, and astrobiology expert Dr. Nicolle Zellner. This video and the one you'll see tomorrow show their lively discussion about the economic, social, and political barriers to development and adoption of affordable flying cars. (Alternate Video Link)
An anonymous reader writes New research was released on cyber-attacks via human-rights NGO World Uyghur Congress over a period of four years. Academic analysis was conducted through the lens of a human-rights NGO representing a minority living in China and in exile when most targeted attack reports are against large organizations with apparent or actual financial or IP theft unlike WUC, and reported by commercial entities rather than academics. The attacks were a combination of sophisticated social engineering via email written primarily in the Uyghur language, in some cases through compromised WUC email accounts, and with advanced malware embedded in attached documents. Suspicious emails were sent to more than 700 different email addresses, including WUC leaders as well as journalists, politicians, academics and employees of other NGOs (including Amnesty International and Save Tibet — International Campaign for Tibet). The study will be presented at USENIX on August 21, and the full paper is already available.
An anonymous reader writes: In its most recent quarterly report to the Securities and Exchange Commission, Twitter disclosed that approximately 8.5% of its users are actually bots. Some of these 23 million bots were created to make revenue-generating URLs, others were created to collect followers that would later be sold to whoever needs a ready audience, and a few were created to mimic stereotypes just for fun. Now that Twitter is a public company, some wonder if these bots help or hinder Twitter's stock value.
Taco Cowboy (5327) writes Nine days before the announcement from WHO regarding the Ebola outbreak in West Africa, an online tool had the incident flagged. HealthMap, a team of 45 researchers, epidemiologists and software developers at Boston Children's Hospital founded in 2006, hosting an online tool that uses algorithms to scour tens of thousands of social media sites, local news, government websites, infectious-disease physicians' social networks and other sources to detect and track disease outbreaks. Sophisticated software filters irrelevant data, classifies the relevant information, identifies diseases and maps their locations with the help of experts. The tool was introduced in 2006 with a core audience of public health specialists, but that changed as the system evolved and the public became increasingly hungry for information during the swine flu pandemic. To get a feel of how HealthMap works, in the case of the Ebola outbreak, visit the site.
Lucas123 (935744) writes "A new company has just opened a crowdsourcing campaign for a heads-up display that plugs into your car's OBD II port and works with iPhones and Android OS-enabled mobile devices via Bluetooth to project a 5.1-in transparent screen that appears to float six feet in front of the windshield. The HUD, called Navdy, works with navigation apps such as Google Maps for turn-by-turn directions, and music apps such as Spotify, Pandora, iTunes Music and Google Play Music. Using voice commands via Apple's Siri or Google Voice, the HUD can also write, read aloud or display notifications from text messages or social media apps, such as Twitter. Phone calls, texting or other applications can also be controlled with hand gestures enabled by an infrared camera."
Most of us don't think of Microsoft when our thoughts turn to open source. This is probably because the company's main products, Windows and Office, are so far from open that just thinking about them probably violates their user agreement.. But wait! says Olivier Bloch, Senior Technical Evangelist at Microsoft Open Technologies, Inc., we have lots and lots of open source around here. Look at this. And this and this and even this. Lots of open source. Better yet, Olivier works for Microsoft Open Technologies, Inc., not directly for the big bad parent company. Watch the video or read the transcript, and maybe you'll figure out where Microsoft is going with their happy talk about open source. (Alternate Video Link)
njnnja (2833511) writes In an incredibly misguided attempt to reduce the quantity of bad reviews (such as these), the Union Street Guest House, a hotel about 2 hours outside of New York City, had instituted a policy to charge groups such as wedding parties $500 for each bad review posted online. The policy has been removed from their webpage but the wayback machine has archived the policy. "If you have booked the Inn for a wedding or other type of event anywhere in the region and given us a deposit of any kind for guests to stay at USGH there will be a $500 fine that will be deducted from your deposit for every negative review of USGH placed on any internet site by anyone in your party and/or attending your wedding or event If you stay here to attend a wedding anywhere in the area and leave us a negative review on any internet site you agree to a $500. fine for each negative review."
First time accepted submitter catparty (3600549) writes An examination of what we can know about Facebook's new machine learning News Feed algorithm. From the article: "Facebook's current News Feed algorithm might be smarter, but some of its core considerations don't stray too far from the groundwork laid by EdgeRank, though thanks to machine learning, Facebook's current algorithm has a better ear for 'signals from you.' Facebook confirmed to us that the new News Feed ranking algorithm does indeed take 100,000 weighted variables into account to determine what we see. These factors help Facebook display an average 300 posts culled from roughly 1,500 possible posts per day, per user."
benrothke writes Cyberwarfare is a controversial topic. At the 2014 Infosec World Conference, Marcus Ranum gave a talk on Cyberwar: Putting Civilian Infrastructure on the Front Lines, Again. Whether it was the topic or just Marcus being Marcus, about a third of the participants left within the first 15 minutes. They should have stayed, as Ranum, agree with him or not, provided some riveting insights on the topic. In Introduction to Cyber-Warfare: A Multidisciplinary Approach, authors Paulo Shakarian, Jana Shakarian and Andrew Ruef provide an excellent overview of the topic. The book takes a holistic, or as they call it multidisciplinary, approach. It looks at the information security aspect of cyberwarfare, as well the military, sociological and other aspects. Keep reading for the rest of Ben's review.
KentuckyFC writes In a classic The Far Side cartoon by Gary Larson, a group of cows stand on two legs chatting by the side of a road when a lookout shouts "car". The cows immediately drop to a four-legged stance as the car passes by and return to their usual position and continue chatting when it has gone. Now a team of animal behavior specialists have discovered that the social lives of cattle are more complex than biologists had ever imagined (although not quite into Larson territory). These guys attached RFID tags to 70 Holstein-Fresian calves kept in three pens. They then monitored the position of each cow for a week to see which other animals they tended to have contact with. This allowed them to construct the social network for the cows with unprecedented detail. It turns out these social networks have many of the properties of human social networks. Cows have preferred partners who they tend to spend more time with and 60 per cent of their contacts occur during feeding which amounts to only 6 per cent of their time. The work has important applications. It should help biologists more accurately model how disease spreads through herds of cattle and therefore better understand how to tackle epidemics.
An anonymous reader writes with this look at how Facebook tries to make and sell "thumbstopper" ads compelling enough to get people to stop scrolling through their news feeds. With its trove of knowledge about the likes, histories and social connections of its 1.3 billion users worldwide, Facebook executives argue, it can help advertisers reach exactly the right audience and measure the impact of their ads — while also, like TV, conveying a broad brand message. Facebook, which made $1.5 billion in profit on $7.9 billion in revenue last year, sees particular value in promoting its TV-like qualities, given that advertisers spend $200 billion a year on that medium. "We want to hold ourselves accountable for delivering results," said Carolyn Everson, Facebook's vice president for global marketing solutions, in a recent interview. "Not smoke and mirrors, maybe it works, maybe it doesn't."