Syndicate content Slashdot
News for nerds, stuff that matters
Updated: 14 min 42 sec ago

Tesla About To Start Battery-Swap Pilot Program

50 min 53 sec ago
cartechboy writes: Remember 18 months ago when Tesla promised it was going to launch battery-swap stations? Well, it's finally happening, sort of. It seems Tesla's about to announce a battery-swap pilot program that will launch next week. The swap site will be located across the street from a Tesla Supercharger site in Harris Ranch, California — 184 miles south of San Francisco and about 200 miles north of Los Angeles. The pilot program will involve an unspecified number of Model S electric-car owners, who will be invited to take part in the test. For now, the battery-swap service will be offered by appointment only, at a cost of roughly a tank of gas in a premium sedan. Tesla's using words to describe this pilot program like "exploratory work" and "intended to test technology and assess demand" for a swapping service. While originally pitched that the battery swap would take less time than it would to take to refill the gas tank of a comparable luxury sedan, the company says now that "for this specific iteration" the swap process will take "approximately 3 minutes" — though it adds Tesla has "the ability to improve that time with future iterations." Is this test going to show that battery swapping is or isn't a realistic initiative?

Read more of this story at Slashdot.








Categories: Science

Geoengineered Climate Cooling With Microbubbles

1 hour 33 min ago
Rambo Tribble writes: Scientists from the University of Leeds have proposed that brighter ships' wakes, created by reducing their component bubbles' sizes, could moderately increase the reflectivity of our oceans, which would have a cooling effect on the climate. The technology is touted as being available and simple, but there could be side effects, like wetter conditions in some regions. Still, compared to many speculative geoengineering projects, "The one advantage about this technology — of trying to generate these tiny 'micro-bubbles' — is that the technology does already exist," according to Leeds' Prof Piers Forster.

Read more of this story at Slashdot.








Categories: Science

LinuxFest Northwest 2015 Will be Held April 25 and 26 (Video)

2 hours 15 min ago
Their website says, 'Come for the code, stay for the people! We have awesome attendees and electrifying parties. Check out the robotics club, the automated home brewing system running on Linux, or the game room for extra conference fun.' This is an all-volunteer conference, and for a change the volunteers who run it are getting things together far in advance instead of having sessions that don't get scheduled until a few days before the conference, which has happened more than once with LFNW. So if you have an idea for a session, this is the time to start thinking about it. Sponsors are also welcome -- and since LFNW sponsorships regularly sell out, it's not to soon to start thinking about becoming a sponsor -- and if you are part of a non-profit group or FOSS project, LFNW offers free exhibit space because this is a conference that exists for the community, not to make money for a corporate owner. But don't delay. As you can imagine, those free exhibit spots tend to fill up early. (Alternate Video Link)

Read more of this story at Slashdot.








Categories: Science

Schneier Explains How To Protect Yourself From Sony-Style Attacks (You Can't)

2 hours 58 min ago
phantomfive writes: Bruce Schneier has an opinion piece discussing the Sony attack. He says, "Your reaction to the massive hacking of such a prominent company will depend on whether you're fluent in information-technology security. If you're not, you're probably wondering how in the world this could happen. If you are, you're aware that this could happen to any company." He continues, "The worst invasion of privacy from the Sony hack didn’t happen to the executives or the stars; it happened to the blameless random employees who were just using their company’s email system. Because of that, they’ve had their most personal conversations—gossip, medical conditions, love lives—exposed. The press may not have divulged this information, but their friends and relatives peeked at it. Hundreds of personal tragedies must be unfolding right now. This could be any of us." Related: the FBI has officially concluded that the North Korean government is behind the attack.

Read more of this story at Slashdot.








Categories: Science

Machine Learning Reveals Genetic Controls

3 hours 39 min ago
An anonymous reader writes with this quote from Quanta Magazine: Most genetic research to date has focused on just 1 percent of the genome — the areas that code for proteins. But new research, published today in Science, provides an initial map for the sections of the genome that orchestrate this protein-building process. "It's one thing to have the book — the big question is how you read the book," said Brendan Frey, a computational biologist at the University of Toronto who led the new research (abstract). For example, researchers can use the model to predict what will happen to a protein when there’s a mistake in part of the regulatory code. Mutations in splicing instructions have already been linked to diseases such as spinal muscular atrophy, a leading cause of infant death, and some forms of colorectal cancer. In the new study, researchers used the trained model to analyze genetic data from people afflicted with some of those diseases. The scientists identified some known mutations linked to these maladies, verifying that the model works. They picked out some new candidate mutations as well, most notably for autism. One of the benefits of the model, Frey said, is that it wasn’t trained using disease data, so it should work on any disease or trait of interest. The researchers plan to make the system publicly available, which means that scientists will be able to apply it to many more diseases.

Read more of this story at Slashdot.








Categories: Science

The Dominant Life Form In the Cosmos Is Probably Superintelligent Robots

4 hours 21 min ago
Jason Koebler writes: If and when we finally encounter aliens, they probably won't look like little green men, or spiny insectoids. It's likely they won't be biological creatures at all, but rather, advanced robots that outstrip our intelligence in every conceivable way. Susan Schneider, a professor of philosophy at the University of Connecticut, joins a handful of astronomers, including Seth Shostak, director of NASA's Search for Extraterrestrial Intelligence, NASA Astrobiologist Paul Davies, and Library of Congress Chair in Astrobiology Stephen Dick in espousing the view that the dominant intelligence in the cosmos is probably artificial. In her paper "Alien Minds," written for a forthcoming NASA publication, Schneider describes why alien life forms are likely to be synthetic, and how such creatures might think.

Read more of this story at Slashdot.








Categories: Science

The Dominant Life Form In the Cosmos Is Probably Superintelligent Robots

4 hours 21 min ago
Jason Koebler writes: If and when we finally encounter aliens, they probably won't look like little green men, or spiny insectoids. It's likely they won't be biological creatures at all, but rather, advanced robots that outstrip our intelligence in every conceivable way. Susan Schneider, a professor of philosophy at the University of Connecticut, joins a handful of astronomers, including Seth Shostak, director of NASA's Search for Extraterrestrial Intelligence, NASA Astrobiologist Paul Davies, and Library of Congress Chair in Astrobiology Stephen Dick in espousing the view that the dominant intelligence in the cosmos is probably artificial. In her paper "Alien Minds," written for a forthcoming NASA publication, Schneider describes why alien life forms are likely to be synthetic, and how such creatures might think.

Read more of this story at Slashdot.








Categories: Science

All the Evidence the Government Will Present In the Silk Road Trial Is Online

5 hours 4 min ago
apexcp writes: In less than a month, one of the biggest trials of 2015 will begin in New York City. The full list of government evidence and defense objections found its way online recently, shedding light on both the prosecutor's courtroom strategy and the defense team's attempted rebuttals. Also important is what's not presented as evidence. There's not a single piece of forensic documentation about how the FBI originally found Silk Road servers, an act the defense as called "blatantly criminal."

Read more of this story at Slashdot.








Categories: Science

All the Evidence the Government Will Present In the Silk Road Trial Is Online

5 hours 4 min ago
apexcp writes: In less than a month, one of the biggest trials of 2015 will begin in New York City. The full list of government evidence and defense objections found its way online recently, shedding light on both the prosecutor's courtroom strategy and the defense team's attempted rebuttals. Also important is what's not presented as evidence. There's not a single piece of forensic documentation about how the FBI originally found Silk Road servers, an act the defense as called "blatantly criminal."

Read more of this story at Slashdot.








Categories: Science

All the Evidence the Government Will Present In the Silk Road Trial Is Online

5 hours 4 min ago
apexcp writes: In less than a month, one of the biggest trials of 2015 will begin in New York City. The full list of government evidence and defense objections found its way online recently, shedding light on both the prosecutor's courtroom strategy and the defense team's attempted rebuttals. Also important is what's not presented as evidence. There's not a single piece of forensic documentation about how the FBI originally found Silk Road servers, an act the defense as called "blatantly criminal."

Read more of this story at Slashdot.








Categories: Science

Anyone Can Now Launch Their Own Version of the Pirate Bay

5 hours 46 min ago
An anonymous reader writes: Not satisfied with merely launching The Old Pirate Bay, torrent site isoHunt today debuted The Open Bay, which lets anyone deploy their own version of The Pirate Bay online. This is achieved via a new six-step wizard, which the group says requires you to be somewhat tech-savvy and have "minimal knowledge of how the Internet and websites work." The Pirate Bay, the most popular file sharing website on the planet, went down last week following police raids on its data center in Sweden. As we've noted before, The Old Pirate Bay appears to be the best alternative at the moment, but since The Pirate Bay team doesn't know if it's coming back yet, there is still a huge hole left to be filled.

Read more of this story at Slashdot.








Categories: Science

Quantum Physics Just Got Less Complicated

6 hours 30 min ago
wabrandsma sends this news from Phys.org: Here's a nice surprise: quantum physics is less complicated than we thought. An international team of researchers has proved that two peculiar features of the quantum world previously considered distinct are different manifestations of the same thing. The result is published 19 December in Nature Communications. Patrick Coles, Jedrzej Kaniewski, and Stephanie Wehner made the breakthrough while at the Center for Quantum Technologies at the National University of Singapore. They found that wave-particle duality is simply the quantum uncertainty principle in disguise, reducing two mysteries to one.

Read more of this story at Slashdot.








Categories: Science

Hackers' Shutdown of 'The Interview' Confirms Coding Is a Superpower

7 hours 13 min ago
theodp writes: The idea of programming as a superpower was touched upon by CS teacher Alfred Thompson back in 2010, but it became a rallying call of sorts for the Hour of Code after Dropbox CEO Drew Houston described coding as "the closest thing we have to a superpower" in a Code.org video that went viral. And if the kids who learned to code with the President last week were dubious about the power of coding, this week's decision by Sony to scrap the release of the satirical film The Interview after a massive hack attack should put aside any doubts, especially after new revelations that Sony had reached out to the White House for help and screened the film for administration officials back in June. White House press secretary Josh Earnest said Thursday that the Obama Administration is viewing the Sony attack as a "serious national security matter" and is considering a range of possible options as a response, which could turn things into a contest of U.S. Superpower vs. Coding Superpower. In case it wasn't mentioned last week, remember to always use your coding superpower for good, kids!

Read more of this story at Slashdot.








Categories: Science

Hackers' Shutdown of 'The Interview' Confirms Coding Is a Superpower

7 hours 13 min ago
theodp writes: The idea of programming as a superpower was touched upon by CS teacher Alfred Thompson back in 2010, but it became a rallying call of sorts for the Hour of Code after Dropbox CEO Drew Houston described coding as "the closest thing we have to a superpower" in a Code.org video that went viral. And if the kids who learned to code with the President last week were dubious about the power of coding, this week's decision by Sony to scrap the release of the satirical film The Interview after a massive hack attack should put aside any doubts, especially after new revelations that Sony had reached out to the White House for help and screened the film for administration officials back in June. White House press secretary Josh Earnest said Thursday that the Obama Administration is viewing the Sony attack as a "serious national security matter" and is considering a range of possible options as a response, which could turn things into a contest of U.S. Superpower vs. Coding Superpower. In case it wasn't mentioned last week, remember to always use your coding superpower for good, kids!

Read more of this story at Slashdot.








Categories: Science

Hackers' Shutdown of 'The Interview' Confirms Coding Is a Superpower

7 hours 13 min ago
theodp writes: The idea of programming as a superpower was touched upon by CS teacher Alfred Thompson back in 2010, but it became a rallying call of sorts for the Hour of Code after Dropbox CEO Drew Houston described coding as "the closest thing we have to a superpower" in a Code.org video that went viral. And if the kids who learned to code with the President last week were dubious about the power of coding, this week's decision by Sony to scrap the release of the satirical film The Interview after a massive hack attack should put aside any doubts, especially after new revelations that Sony had reached out to the White House for help and screened the film for administration officials back in June. White House press secretary Josh Earnest said Thursday that the Obama Administration is viewing the Sony attack as a "serious national security matter" and is considering a range of possible options as a response, which could turn things into a contest of U.S. Superpower vs. Coding Superpower. In case it wasn't mentioned last week, remember to always use your coding superpower for good, kids!

Read more of this story at Slashdot.








Categories: Science

Hackers' Shutdown of 'The Interview' Confirms Coding Is a Superpower

7 hours 13 min ago
theodp writes: The idea of programming as a superpower was touched upon by CS teacher Alfred Thompson back in 2010, but it became a rallying call of sorts for the Hour of Code after Dropbox CEO Drew Houston described coding as "the closest thing we have to a superpower" in a Code.org video that went viral. And if the kids who learned to code with the President last week were dubious about the power of coding, this week's decision by Sony to scrap the release of the satirical film The Interview after a massive hack attack should put aside any doubts, especially after new revelations that Sony had reached out to the White House for help and screened the film for administration officials back in June. White House press secretary Josh Earnest said Thursday that the Obama Administration is viewing the Sony attack as a "serious national security matter" and is considering a range of possible options as a response, which could turn things into a contest of U.S. Superpower vs. Coding Superpower. In case it wasn't mentioned last week, remember to always use your coding superpower for good, kids!

Read more of this story at Slashdot.








Categories: Science

Researchers Discover SS7 Flaw, Allowing Total Access To Any Cell Phone, Anywhere

7 hours 57 min ago
krakman writes: Researchers discovered security flaws in SS7 that allow listening to private phone calls and intercepting text messages on a potentially massive scale – even when cellular networks are using the most advanced encryption now available. The flaws, to be reported at a hacker conference in Hamburg this month, are actually functions built into SS7 for other purposes – such as keeping calls connected as users speed down highways, switching from cell tower to cell tower – that hackers can repurpose for surveillance because of the lax security on the network. It is thought that these flaws were used for bugging German Chancellor Angela's Merkel's phone. Those skilled at the housekeeping functions built into SS7 can locate callers anywhere in the world, listen to calls as they happen or record hundreds of encrypted calls and texts at a time for later decryption (Google translation of German original). There is also potential to defraud users and cellular carriers by using SS7 functions, the researchers say. This is another result of security being considered only after the fact, as opposed to being part of the initial design.

Read more of this story at Slashdot.








Categories: Science

Researchers Discover SS7 Flaw, Allowing Total Access To Any Cell Phone, Anywhere

7 hours 57 min ago
krakman writes: Researchers discovered security flaws in SS7 that allow listening to private phone calls and intercepting text messages on a potentially massive scale – even when cellular networks are using the most advanced encryption now available. The flaws, to be reported at a hacker conference in Hamburg this month, are actually functions built into SS7 for other purposes – such as keeping calls connected as users speed down highways, switching from cell tower to cell tower – that hackers can repurpose for surveillance because of the lax security on the network. It is thought that these flaws were used for bugging German Chancellor Angela's Merkel's phone. Those skilled at the housekeeping functions built into SS7 can locate callers anywhere in the world, listen to calls as they happen or record hundreds of encrypted calls and texts at a time for later decryption (Google translation of German original). There is also potential to defraud users and cellular carriers by using SS7 functions, the researchers say. This is another result of security being considered only after the fact, as opposed to being part of the initial design.

Read more of this story at Slashdot.








Categories: Science

Researchers Discover SS7 Flaw, Allowing Total Access To Any Cell Phone, Anywhere

7 hours 57 min ago
krakman writes: Researchers discovered security flaws in SS7 that allow listening to private phone calls and intercepting text messages on a potentially massive scale – even when cellular networks are using the most advanced encryption now available. The flaws, to be reported at a hacker conference in Hamburg this month, are actually functions built into SS7 for other purposes – such as keeping calls connected as users speed down highways, switching from cell tower to cell tower – that hackers can repurpose for surveillance because of the lax security on the network. It is thought that these flaws were used for bugging German Chancellor Angela's Merkel's phone. Those skilled at the housekeeping functions built into SS7 can locate callers anywhere in the world, listen to calls as they happen or record hundreds of encrypted calls and texts at a time for later decryption (Google translation of German original). There is also potential to defraud users and cellular carriers by using SS7 functions, the researchers say. This is another result of security being considered only after the fact, as opposed to being part of the initial design.

Read more of this story at Slashdot.








Categories: Science

Researchers Discover SS7 Flaw, Allowing Total Access To Any Cell Phone, Anywhere

7 hours 57 min ago
krakman writes: Researchers discovered security flaws in SS7 that allow listening to private phone calls and intercepting text messages on a potentially massive scale – even when cellular networks are using the most advanced encryption now available. The flaws, to be reported at a hacker conference in Hamburg this month, are actually functions built into SS7 for other purposes – such as keeping calls connected as users speed down highways, switching from cell tower to cell tower – that hackers can repurpose for surveillance because of the lax security on the network. It is thought that these flaws were used for bugging German Chancellor Angela's Merkel's phone. Those skilled at the housekeeping functions built into SS7 can locate callers anywhere in the world, listen to calls as they happen or record hundreds of encrypted calls and texts at a time for later decryption (Google translation of German original). There is also potential to defraud users and cellular carriers by using SS7 functions, the researchers say. This is another result of security being considered only after the fact, as opposed to being part of the initial design.

Read more of this story at Slashdot.








Categories: Science