Feed slashdot Slashdot

Favorite IconSlashdot

Link https://slashdot.org/
Feed https://rss.slashdot.org/Slashdot/slashdotMain
Copyright Copyright Slashdot Media. All Rights Reserved.
Updated 2025-07-01 13:18
Southwest Canceled 5,400 Flights In Less Than 48 Hours
Southwest canceled more than 2,900 flights Monday -- at least 70% of its schedule for the day -- and more than 2,500 flights Tuesday as of 9:10 a.m. ET -- at least 60% of its schedule, according to flight tracker FlightAware. NPR reports: The number of canceled flights for Southwest Monday was more than 10 times higher than for Delta, which had the second-most cancellations by a U.S. airline with 265 flights called off. Other airlines have also ordered large-scale cancellations in the past week. Southwest spokesperson Chris Perry told NPR the airline's disruptions are a result of the winter storm's lingering effects, adding that it hopes to "stabilize and improve its operation" with more favorable weather conditions. Other issues that have exacerbated the airline's struggle to accommodate the holiday rush include problems with "connecting flight crews to their schedules," Perry said. That issue has made it difficult for employees to access crew scheduling services and get reassignments. Kyle Potter, executive editor of Thrifty Traveler, called it an incredibly complex task for an airline with a network as vast as Southwest's to coordinate staffing and scheduling, particularly after weather delays. But with many areas seeing clear skies on Monday, the airline would seem to have few obvious reasons to cancel so many flights. Potter calls it a "full-blown meltdown." "This is really as bad as it gets for an airline," Potter said. "We've seen this again and again over the course of the last year or so, when airlines really just struggle especially after a storm, but there's pretty clear skies across the country." The U.S. Department of Transportation called the cancellations "unacceptable," and will be investigating the airline to see whether cancellations were controllable and if Southwest is complying with its customer service plan (PDF).Read more of this story at Slashdot.
Microsoft Fined $64 Million By France Over Cookies Used in Bing Searches
France's privacy watchdog fined Microsoft $64 million for not offering clear enough instruction for users to reject cookies used for online ads, as part of the move to enforce Europe's tightening data protection law. From a report: CNIL, France's digital privacy regulator, said Thursday that it carried out several investigations on the Microsoft search engine Bing in September 2020 and May 2021 and found that the site dropped advertising cookies in users' terminals without their explicit consent. The website also lacked a button for users to reject cookies as simply as accepting them, CNIL said, where two clicks were required to refuse all cookies while only one was needed to accept them. Cookies are small files that track and monitor the sites users have visited and are often used to help personalize online ads. According to CNIL, the $64 million fine against Microsoft is justified partly because of the scope of revenue the company made from advertising indirectly generated from the data collected via cookies.Read more of this story at Slashdot.
Amazon Packages Burn in India, Final Stop in Broken Recycling System
Plastic wrappers and parcels that start off in Americans' recycling bins end up at illegal dumpsites and industrial furnaces -- and inside the lungs of people in Muzaffarnagar. From a report: Muzaffarnagar, a city about 80 miles north of New Delhi, is famous in India for two things: colonial-era freedom fighters who helped drive out the British and the production of jaggery, a cane sugar product boiled into goo at some 1,500 small sugar mills in the area. Less likely to feature in tourism guides is Muzaffarnagar's new status as the final destination for tons of supposedly recycled American plastic. On a November afternoon, mosquitoes swarmed above plastic trash piled 6 feet high off one of the city's main roads. A few children picked through the mounds, looking for discarded toys while unmasked waste pickers sifted for metal cans or intact plastic bottles that could be sold. Although much of it was sodden or shredded, labels hinted at how far these items had traveled: Kirkland-brand almonds from Costco, Nestle's Purina-brand dog food containers, the wrapping for Trader Joe's mangoes. Most ubiquitous of all were Amazon.com shipping envelopes thrown out by US and Canadian consumers some 7,000 miles away. An up-close look at the piles also turned up countless examples of the three arrows that form the recycling logo, while some plastic packages had messages such as "Recycle Me" written across them. Plastic that enters the recycling system in North America isn't supposed to end up in India, which has since 2019 banned almost all imports of plastic waste. So how did Muzaffarnagar become a dumping ground for foreign plastic? To answer that question, Bloomberg Green retraced a trail back from the industrial belt of northern India, through the brokers who ship refuse around the world, to the municipal waste companies in the US that look for takers of their lowest-value recycling. Finally, the search arrived at the point of origin: American consumers who thought -- wrongly, as it turns out -- that they were recycling their trash. It's a system that's supposed to cut pollution, spare landfills and give valuable materials a second life. But in Muzaffarnagar the failures are hard to miss. The region's other major industry is paper production, with more than 30 mills dotted among the furnaces for making jaggery. Paper factories in India often rely on imported waste paper, which is cheaper than wood pulp. The nation's paper makers need to import around 6 million tons annually to meet demand, and most of it comes from North America. This could be a recycling success story -- were it not for all the plastic that comes mixed into all the waste paper.Read more of this story at Slashdot.
Psychedelic Drugs May Launch a New Era in Psychiatric Treatment, Brain Scientists Say
An anonymous reader shares a report: One of the hottest tickets at this year's Society for Neuroscience meeting in San Diego was a session on psychedelic drugs. About 1,000 brain scientists squeezed into an auditorium at the San Diego Convention Center for the symposium, called Psychedelics and Neural Plasticity. They'd come to hear talks on how drugs like psilocybin and MDMA can alter individual brain cells, can help rewire the brain, and may offer a new way to treat disorders ranging from depression to chronic pain. [...] Brain plasticity may explain why a single dose of a psychedelic drug can have a long-lasting impact on disorders like anxiety, depression and PTSD. "It can be months or years," says Dr. Gitte Knudsen a neurologist from University of Copenhagen in Denmark who spoke at the psychedelics session. "It's a stunning effect." These long-term effects have been shown with drugs including psilocybin, LSD and DMT (ayahuasca), Knudsen says. In contrast, most existing psychiatric drugs need to be taken every day. But psychedelic drugs have some drawbacks. They can cause nausea or produce hallucinations that are frightening or unpleasant.Read more of this story at Slashdot.
Baidu Starts Offering Nighttime Driverless Taxis in China
Baidu, the Chinese internet giant that became known for its search engines, is making some big strides in autonomous driving. From a report: Starting this week, the public can ride its robotaxis in Wuhan between 7 am and 11 pm without safety drivers behind the wheel. Previously, its unmanned vehicles could only operate from 9 am to 5 pm in the city. The updated scheme is expected to cover one million customers in certain areas of Wuhan, a city of more than 10 million people. Like most autonomous vehicle startups, Baidu combines a mix of third-party cameras, radars, and lidars to help its cars see better in low-visibility conditions, in contrast to Tesla's vision-based solution. In August, Baidu started offering fully driverless robotaxi rides, charging passengers at taxi rates. In Q3, Apollo Go, the firm's robotaxi hailing app, completed more than 474,000 rides, up 311% year over year. Accumulatively, Apollo Go had exceeded 1.4 million orders as of Q3. That sounds like a potentially substantial revenue stream for Baidu, but one should take such figures with a grain of salt and ask: how many of these trips are subsidized by discounts? How many of them are repeatable, daily routes rather than one-off novelty rides taken by early adopters? To juice up performance numbers, it's not uncommon to see Chinese robotaxi operators enticing the public to ride in their vehicles with perks.Read more of this story at Slashdot.
The Rise of China GPU Makers
The number of GPU startups in China is extraordinary as the country tries to gain AI prowess as well as semiconductor sovereignty, according to a new report from Jon Peddie Research. From a report: In addition, the number of GPU makers grew worldwide in recent years as demand for artificial intelligence (AI), high-performance computing (HPC), and graphics processing increased at a rather unprecedented rate. When it comes to discrete graphics for PCs, AMD and Nvidia maintain lead, whereas Intel is trying to catch up. Tens of companies developed graphics cards and discrete graphics processors in the 1980s and the 1990s, but cut-throat competition for the highest performance in 3D games drove the vast majority of them out of business. By 2010, only AMD and Nvidia could offer competitive standalone GPUs for gaming and compute, whereas others focused either on integrated GPUs or GPU IP. The mid-2010s found the number of China-based PC GPU developers increasing rapidly, fueled by the country's push for tech self-sufficiency as well as the advent of AI and HPC as high-tech megatrends. In total, there are 18 companies developing and producing GPUs, according to Jon Peddie Research. There are two companies that develop SoC-bound GPUs primarily with smartphones and notebooks in mind, there are six GPU IP providers, and there are 11 GPU developers focused on GPUs for PCs and datacenters, including AMD, Intel, and Nvidia, which design graphics cards that end up in our list of the best graphics cards. In fact, if we added other China-based companies like Biren Technology and Tianshu Zhixin to the list, there would be even more GPU designers. However, Biren and Tianshu Zhixin are solely focused on AI and HPC for now, so JPR does not consider them GPU developers.Read more of this story at Slashdot.
Hackers Stole Data From Multiple Electric Utilities in Recent Ransomware Attack
Hackers stole data belonging to multiple electric utilities in an October ransomware attack on a US government contractor that handles critical infrastructure projects across the country, according to a memo describing the hack obtained by CNN. From the report: Federal officials have closely monitored the incident for any potential broader impact on the US power sector while private investigators have combed the dark web for the stolen data, according to the memo sent this month to power company executives by the North American grid regulator's cyberthreat sharing center. The previously unreported incident is a window into how ransomware attacks on critical US companies are handled behind the scenes as lawyers and federal investigators quietly spring into action to determine the extent of the damage. The ransomware attack hit Chicago-based Sargent & Lundy, an engineering firm that has designed more than 900 power stations and thousands of miles of power systems and that holds sensitive data on those projects. The firm also handles nuclear security issues, working with the departments of Defense, Energy and other agencies "to strengthen nuclear deterrence" and keep weapons of mass destruction out of terrorists' hands, according to its website. Two people familiar with the investigation of the Sargent & Lundy hack told CNN that the incident was contained and remediated, and didn't appear to have a broader impact on other power-sector firms. There is no sign that data stolen from Sargent & Lundy, which includes "model files" and "transmission data" the firm uses for utility projects, is on the dark web, according to the memo from the Electricity Information Sharing and Analysis Center.Read more of this story at Slashdot.
Chip Inventories Swell as Consumers Buy Fewer Gadgets
The world is now awash in chips. The oversupply marks a sharp turnaround from a global shortage during two years of supercharged demand. From a report: Consumer appetite for electronics has weakened against a backdrop of rising interest rates, a falling stock market and recession fears. Chip inventories are swelling, mirroring what is happening in the wider economy where retailers are stuck with goods on their shelves and producers of a range of products in high demand early in the pandemic now face a glut. What is happening in chips amounts to good news for consumers who can get their hands on products from washing machines to laptops faster, and sometimes more cheaply, than a year ago. For chip makers, the shift has triggered a wave of job cuts and reduction in capital spending as companies try to restore profitability levels that have eroded in recent months. Chip inventory levels are "well above our target level," said Sanjay Mehrotra, chief executive of memory maker Micron as the company on Thursday missed Wall Street earnings projections, gave a subdued outlook and said it would cut about 10% of its workforce. Lead times between chip orders and deliveries that swelled early in the pandemic have fallen in recent months, according to an analysis by Susquehanna International Group. Inventory levels, typically measured in days, are at their highest levels in more than a decade, or about 40 days above the median for the chip industry and its supply chain, according to a UBS analysis. Much of what is playing out for chip makers is illustrated by the reversal in fortunes that gadget makers have experienced over recent months. HP and Dell, two of the largest PC makers, say their products that flew off the shelves early in the pandemic now are sitting there for longer.Read more of this story at Slashdot.
Neuroscientists Have Created a Mood Decoder That Can Measure Depression
An anonymous reader shares a report: Deep brain stimulation is already used to treat severe cases of epilepsy and a few movement disorders such as Parkinson's. But depression is more complicated -- partly because we still don't fully understand what's going on in the brain when it occurs. "Depression is a complex illness," says Patricio Riva Posse, a neurologist at the Emory School of Medicine in Atlanta, Georgia, who was not involved in the trial. "It's not like trying to correct one tremor -- there's a whole universe of symptoms." These include low mood, suicidality, inability to experience pleasure, and changes in motivation, sleep, and appetite. Doctors have been using electricity to treat brain disorders -- including depression -- for decades, and some studies have found that electrodes placed deep inside the brain can jolt some people out of their symptoms. But results vary. Neuroscientists hope that by getting a better idea of what's happening inside the brains of people with symptoms like John's, they can make the treatment more effective. John is one of five people who have volunteered to have their brains probed as part of a clinical trial. At the start of 2020, he had a total of 14 electrodes implanted across his brain. For nine days, he stayed in a hospital with protruding cables wrapped around his head, while neuroscientists monitored how his brain activity correlated with his mood. The researchers behind the trial say they have developed a "mood decoder" -- a way of being able to work out how someone is feeling just by looking at brain activity. Using the decoder, the scientists hope to be able to measure how severe a person's depression is, and target more precisely where the electrodes are placed to optimize the effect on the patient's mood. So far, they have analyzed the results of three volunteers. What they have found is extremely promising, says Sameer Sheth, a neurosurgeon based at Baylor College of Medicine in Houston, Texas, who is leading the trial. Not only have he and his colleagues been able to link volunteers' specific brain activity with their mood, but they have also found a way to stimulate a positive mood. "This is the first demonstration of successful and consistent mood decoding of humans in these brain regions," says Sheth. His colleague Jiayang Xiao presented the findings at the Society for Neuroscience's annual meeting in San Diego in November.Read more of this story at Slashdot.
For Sale on eBay: A Military Database of Fingerprints and Iris Scans
The shoebox-shaped device, designed to capture fingerprints and perform iris scans, was listed on eBay for $149.95. A German security researcher, Matthias Marx, successfully offered $68, and when it arrived at his home in Hamburg in August, the rugged, hand-held machine contained more than what was promised in the listing. The device's memory card held the names, nationalities, photographs, fingerprints and iris scans of 2,632 people. From a report: Most people in the database, which was reviewed by The New York Times, were from Afghanistan and Iraq. Many were known terrorists and wanted individuals, but others appeared to be people who had worked with the U.S. government or simply been stopped at checkpoints. Metadata on the device, called a Secure Electronic Enrollment Kit, or SEEK II, revealed that it had last been used in the summer of 2012 near Kandahar, Afghanistan. The device -- a relic of the vast biometric collection system the Pentagon built in the years after the Sept. 11, 2001, attacks -- is a physical reminder that although the United States has moved on from the wars in Afghanistan and Iraq, the tools built to fight them and the information they held live on in ways unintended by their creators. Exactly how the device ended up going from the battlefields in Asia to an online auction site is unclear. But the data, which offers detailed descriptions of individuals in addition to their photograph and biometric data, could be enough to target people who were previously unknown to have worked with U.S. military forces should the information fall into the wrong hands. For those reasons, Mr. Marx would not place the information online or share it in an electronic format, but he did allow a Times reporter in Germany to see the data in person alongside him. "Because we have not reviewed the information contained on the devices, the department is not able to confirm the authenticity of the alleged data or otherwise comment on it," Brig. Gen. Patrick S. Ryder, the Defense Department's press secretary, said in a statement. "The department requests that any devices thought to contain personally identifiable information be returned for further analysis." He provided an address for the military's biometrics program manager at Fort Belvoir in Virginia where the devices could be sent. The biometric data on the SEEK II was collected at detainment facilities, on patrols, during screenings of local hires and after the explosion of an improvised bomb. Around the time when the device was last used in Afghanistan, the American war effort there was winding down.Read more of this story at Slashdot.
Cyber Attacks Set To Become 'Uninsurable,' Says Zurich Chief
The chief executive of one of Europe's biggest insurance companies has warned that cyber attacks, rather than natural catastrophes, will become "uninsurable" as the disruption from hacks continues to grow. From a report: Insurance executives have been increasingly vocal in recent years about systemic risks, such as pandemics and climate change, that test the sector's ability to provide coverage. For the second year in a row, natural catastrophe-related claims are expected to top $100 billion. But Mario Greco, chief executive at insurer Zurich, told the Financial Times that cyber was the risk to watch. "What will become uninsurable is going to be cyber," he said. "What if someone takes control of vital parts of our infrastructure, the consequences of that?" Recent attacks that have disrupted hospitals, shut down pipelines and targeted government departments have all fed concern about this expanding risk among industry executives. Focusing on the privacy risk to individuals was missing the bigger picture, Greco added: "First off, there must be a perception that this is not just data ... this is about civilisation. These people can severely disrupt our lives." Spiralling cyber losses in recent years have prompted emergency measures by the sector's underwriters to limit their exposure. As well as pushing up prices, some insurers have responded by tweaking policies so clients retain more losses.Read more of this story at Slashdot.
US Copyright Office Finds 'Deep Disagreement' on Anti-Piracy Measures
The U.S. Copyright Office has completed its public consultations on the use of technical measures to identify and protect copyrighted content online. From a report: For many years, U.S. lawmakers have considered options to update the DMCA so it can more effectively deal with today's online copyright issues. Many proposals have come and gone, without resulting in any significant updates. Calls to change current legislation persist, however. Following repeated nudges from Senators Thom Tillis and Patrick Leahy, the Copyright Office launched a consultation on automated tools that online services can use to ensure that pirated content is less easily shared. The Copyright Office also asked stakeholders whether it's desirable to make certain standard technical measures mandatory for online platforms. Such measures could include upload filters to block pirated content from being reuploaded. This month the Copyright Office presents its conclusions, which are also shared with Senators Tillis and Leahy in two letters. After reviewing thousands of responses and input from stakeholders in plenary sessions, the overall conclusion is one of clear disagreement. Most parties agree that it's impossible to design an error-free takedown process but disagree on what error rate is acceptable when takedowns are automated. Opponents of filtering technology warn that fair use and First Amendment rights are at stake. Rightsholders did not dispute that but noted that these issues don't play a role when full copies of copyrighted content are shared. When it comes to the implementation of voluntary measures, the Copyright Office doesn't have any concrete suggestions. Instead, it will continue to back existing initiatives, while facilitating dialogue between various stakeholders. "The public comments and the consultations confirmed that there cannot be a one-size-fits-all approach to voluntary technical measures, and that there remains a lack of consensus in this area," the Office writes. "Nevertheless, the consultations served as valuable opportunities for dialogue among stakeholders, which may lead to further voluntary action. The Copyright Office proposed options to continue its role as convener of these conversations in the future."Read more of this story at Slashdot.
Bitcoin Hashrate Drops Nearly 40% as Deadly US Storm Unplugs Miners
The Bitcoin network hashrate has dropped by more than 38.8% from its peak, as many U.S.-based miners have been forced to switch down their facilities due to deadly blizzards. From a report: Bitcoin hashrate, the level of computing power used for mining and processing transactions, came in at 155.28 exahashes per second on Saturday, down from 253.88 exahashes on Wednesday, according to data from IntoTheBlock. A winter storm has claimed at least 32 lives across the U.S., as of Monday morning in Hong Kong, according to media reports.Read more of this story at Slashdot.
The Worst-Selling Microsoft Software Product of All Time: OS/2 for the Mach 20
Raymond Chen, writing for Microsoft DevBlogs: In the mid-1980's, Microsoft produced an expansion card for the IBM PC and PC XT, known as the Mach 10. In addition to occupying an expansion slot, it also replaced your CPU: You unplugged your old and busted 4.77 MHz 8088 CPU and plugged into the now-empty socket a special adapter that led via a ribbon cable back to the Mach 10 card. On the Mach 10 card was the new hotness: A 9.54 MHz 8086 CPU. This gave you a 2x performance upgrade for a lot less money than an IBM PC AT. The Mach 10 also came with a mouse port, so you could add a mouse without having to burn an additional expansion slot. Sidebar: The product name was stylized as MACH [PDF] in some product literature. The Mach 10 was a flop. Undaunted, Microsoft partnered with a company called Portable Computer Support Group to produce the Mach 20, released in 1987. You probably remember the Portable Computer Support Group for their disk cache software called Lightning. The Mach 20 took the same basic idea as the Mach 10, but to the next level: As before, you unplugged your old 4.77 MHz 8088 CPU and replaced it with an adapter that led via ribbon cable to the Mach 20 card, which you plugged into an expansion slot. This time, the Mach 20 had an 8 MHz 80286 CPU, so you were really cooking with gas now. And, like the Mach 10, it had a mouse port built in. According to a review in Info World, it retailed for $495. The Mach 20 itself had room for expansion: it had an empty socket for an 80287 floating point coprocessor. One daughterboard was the Mach 20 Memory Plus Expanded Memory Option, which gave you an astonishing 3.5 megabytes of RAM, and it was high-speed RAM since it wasn't bottlenecked by the ISA bus on the main motherboard. The other daughterboard was the Mach 20 Disk Plus, which lets you connect 5 1/4 or 3 1/2 floppy drives. A key detail is that all these expansions connected directly to the main Mach 20 board, so that they didn't consume a precious expansion slot. The IBM PC came with five expansion slots, and they were in high demand. You needed one for the hard drive controller, one for the floppy drive controller, one for the video card, one for the printer parallel port, one for the mouse. Oh no, you ran out of slots, and you haven't even gotten to installing a network card or expansion RAM yet! You could try to do some consolidation by buying so-called multifunction cards, but still, the expansion card crunch was real. But why go to all this trouble to upgrade your IBM PC to something roughly equivalent to an IBM PC AT? Why not just buy an IBM PC AT in the first place? Who would be interested in this niche upgrade product?Read more of this story at Slashdot.
Americans Duped Into Losing $10 Billion By Illegal Indian Call Centres in 2022
US citizens lost over $10 billion due to phishing calls by illegal Indian call centres in 2022, as per the Federal Bureau of Investigation (FBI) data. From a report: Most of the victims of these fraud calls from Indian phishing gangs were elderly US citizens above the age of 60 years who lost over $3 billion, Times Of India reported citing FBI data. After several incidents were reported in 2022, the FBI has now deputed a permanent representative at the US embassy in New Delhi. The representative will work closely with the CBI, Interpol and the Delhi Police to bust these gangs that have put India under the threat to be termed as the hub of such illegal call centres. Several Americans lost a total of $10.2 billion in 2022 so far, which is a 47 per cent increase from 2021's $6.9 billion, to such fraud calls.Read more of this story at Slashdot.
Ask Slashdot: What Note-Taking App Do You Use?
An anonymous reader writes: This column about a writer's struggle to find the perfect note-taking app resonated a lot with me. "A singular productivity tool that works for everyone is a unicorn -- beautiful, perfect, and completely fictional. Still, there has to be some sort of middle ground between an unachievable fantasy and the current landscape. I would happily settle for two, maybe three apps. Honestly, less than 10 is all I'm asking for. Until then, my phone and laptop will be a cluttered mess of productivity apps that only do half their jobs," writes Victoria Song. Over the years, I have tried Notion, Apple Notes, the good old Windows' Notepad, Roam Research, Obsidian, Google Keep, Google Docs, and OneNote among possibly many more that I am unable to recall anymore. Some support Apple Pencil, which is one of the usecases I find useful. Roam Research did not even have a native app for mobile devices for the longest time. Some applications are good, but they don't support online syncing, or support syncing with only a particular storage service. And have you noticed just how expensive some of these apps could get? As much as $15-$30 a month! Out of curiosity, and forget my usecases -- as I admit I have not mentioned many -- how do you maintain your notes for work and personal life. (I have been using physical notepads a lot more in recent months but would like an app for digital notes.)Read more of this story at Slashdot.
Big Nonprofit Hospitals Expand in Wealthier Areas, Shun Poorer Ones
Many of the nation's largest nonprofit hospital systems, which give aid to poorer communities to earn tax breaks, have been leaving those areas and moving into wealthier ones as they have added and shed hospitals in the last two decades. From a report: As nonprofits, these regional and national giants reap $8.8 billion from tax breaks annually, by one Johns Hopkins University researcher's estimate. Among their obligations, they are expected to provide free medical care to those least able to afford it. Many top nonprofits, however, avoid communities where more people are likely to need that aid, according to a Wall Street Journal analysis of nearly 470 transactions. As these systems grew, many were more likely to divest or close hospitals in low-income communities than to add them. Since 2001, half the hospitals divested by CommonSpirit Health, a large Catholic system based in Chicago, were in communities where the poverty rate was above the medians for state hospital markets, compared with 30% of those it added. At Bon Secours Mercy Health, formed by the 2018 merger of two growing regional nonprofits, about 42% of hospitals it divested were in areas with higher poverty, compared with 27% of hospitals it added. Of hospitals divested or closed by St. Louis-based Ascension, about half were located in higher-poverty areas, compared with 40% of the Catholic system's acquisitions. At the same time, many top nonprofits were moving more aggressively to add hospitals in more affluent areas. At Mercy, a St. Louis-based hospital nonprofit, 56% of new hospitals were in places with lower poverty rates, compared with 25% of those it shed. About two-thirds of the hospitals it added were in markets where the share of households with incomes of at least $200,000 was above the state median. That compared with 25% of those the system shed. Of hospitals acquired by Florida-based AdventHealth, nearly two-thirds were in low-poverty areas, compared with 40% of those they divested. And 59% had a larger share of higher-income households, compared with 40% of those they exited.Read more of this story at Slashdot.
Washington State Power-Station Attacks Are Latest Assault on Grid
Four power substations in Washington State were attacked on Christmas Day, disrupting service to thousands of residents, just weeks after gunfire at electricity facilities in North Carolina prompted an investigation by the FBI. From a report: Law enforcement agencies are now investigating at least eight attacks on power stations in four states in the past month that have underscored the vulnerability of the nation's power grid. It remains unknown if they were connected. In the most recent incidents outside of Tacoma, Washington, thousands were left without power after vandals forced their way into four substations and damaged equipment, in one case leading to a fire, according to the Pierce County Sheriff's Department. In all, 14,000 people were left without power from that attacks on substations owned by Tacoma Public Utilities and Puget Sound Energy, according to the sheriff's office, which said most power has since been restored.Read more of this story at Slashdot.
Windows 95 Went the Extra Mile To Ensure Compatibility of SimCity, Other Games
It's still possible to learn a lot of interesting things about old operating systems. Sometimes those things were documented, or at least hinted at, in blog posts that miraculously still exist. One such quirk showed up recently when someone noticed how Microsoft made sure that SimCity and other popular apps worked on Windows 95. From a report: A recent tweet by @Kalyoshika highlights an excerpt from a blog post by Fog Creek Software co-founder, Stack Overflow co-creator, and longtime software blogger Joel Spolsky. The larger post is about chicken-and-egg OS/software appeal and demand. The part that caught the eye of a Hardcore Gaming 101 podcast co-host is how the Windows 3.1 version of SimCity worked on the Windows 95 system. Windows 95 merged MS-DOS and Windows apps, upgraded APIs from 16 to 32-bit, and was hyper-marketed. A popular app like SimCity, which sold more than 5 million copies, needed to work without a hitch. Spolsky's post summarizes how SimCity became Windows 95-ready, as he heard it, without input from Maxis or user workarounds. Jon Ross, who wrote the original version of SimCity for Windows 3.x, told me that he accidentally left a bug in SimCity where he read memory that he had just freed. Yep. It worked fine on Windows 3.x, because the memory never went anywhere. Here's the amazing part: On beta versions of Windows 95, SimCity wasn't working in testing. Microsoft tracked down the bug and added specific code to Windows 95 that looks for SimCity. If it finds SimCity running, it runs the memory allocator in a special mode that doesn't free memory right away. That's the kind of obsession with backward compatibility that made people willing to upgrade to Windows 95. Spolsky (in 2000) considers this a credit to Microsoft and an example of how to break the chicken-and-egg problem: "provide a backwards compatibility mode which either delivers a truckload of chickens, or a truckload of eggs, depending on how you look at it, and sit back and rake in the bucks."Read more of this story at Slashdot.
Phone Manufacturers: Please Give Us the Power Button Back
An anonymous reader shares a column: Every major phone manufacturer is guilty of a serious crime, and I won't be quiet about it any longer: they stole the power button from us. Apple, Google, Samsung: guilty, guilty, guilty. Long-pressing the power button used to bring up an option to turn your phone off, but then these companies decided to get cute and make this a shortcut to summon their digital assistant. This is bad and wrong, and I'm politely demanding that these companies return what they took from us. Look, I get the logic. When phone screens got bigger, physical buttons like Apple's home button were axed, and existing buttons had to pick up the slack. In the iPhone X, Apple re-homed the Siri function to the power button. Since then, turning your iPhone off has required pressing a combination of buttons. If you make the fatal mistake of long-pressing the power button in hopes of turning your phone off, Siri will start listening to you as you curse about how the power button doesn't work how it should anymore. And woe to you if you don't hold down the right button combination long enough -- you'll take a screenshot that you didn't want and will have to delete later. It's just as bad on Samsung and Google phones. Long-pressing the power button on the Pixel 7 Pro just now brought up the Google Assistant and a prompt to ask it how to say sorry in Spanish. No, Google. It is you who should be apologizing. And the Galaxy S22 phones I used this year all bid me to set up Bixby whenever I made the mistake of long-pressing the power button. Both Google and Samsung let you change it back to the power menu -- and Samsung has the decency to put a shortcut to side key options on its shutdown screen -- but enough is enough. Long-pressing the power button should, by default, just turn the phone off. The thing that really adds salt to the wound is that the button combination to turn your phone off isn't even the same on every phone. On an iPhone, you can press and hold the power button and either volume key to get to shutdown options. On a Pixel phone, it's a short press of the volume up key and power button. If you screw up and press the volume down key, you'll take a screenshot, which will make you feel stupid when you find it in your photo gallery later. Samsung makes you press and hold the volume down key and power button.Read more of this story at Slashdot.
FCC Can Finally Hammer Predatory Prison Phone Call Companies
A brand-new law (awaiting only the president's signature) will let the Federal Communications Commission directly regulate rates in the notoriously predatory prison calling industry. From a report: Under the threat of having to provide a solid product for a reasonable price, companies may opt to call it a day and open up the market to a more compassionate and forward-thinking generation of providers. Prison calling systems depend on the state and the prison system, and generally have run the gamut from good enough to shockingly bad. With a literally captive customer base, companies had no real reason to innovate, and financial models involving kickbacks to the prisons and states incentivized income at all costs. Inmates are routinely charged extortionate rates for simple services like phone calls and video calls (an upsell), and have even had visitation rights rescinded, leaving paid calls the only option. Needless to say, this particular financial burden falls disproportionately on people of color and those with low incomes, and it's a billion-dollar industry. It's been this way for a long time, and former FCC commissioner Mignon Clyburn spent years trying to change it. When I talked with her in 2017, before she left the agency, she called inmate calling "the clearest, most glaring type of market failure I've ever seen as a regulator." It was an issue she spent years working on, but she gave a lot of credit to Martha Wright-Reed, a grandmother who had organized and represented the fight to bring reform to the system right up until she died.Read more of this story at Slashdot.
Study Finds AI Assistants Help Developers Produce Code That's More Likely To Be Buggy
Computer scientists from Stanford University have found that programmers who accept help from AI tools like Github Copilot produce less secure code than those who fly solo. From a report: In a paper titled, "Do Users Write More Insecure Code with AI Assistants?", Stanford boffins Neil Perry, Megha Srivastava, Deepak Kumar, and Dan Boneh answer that question in the affirmative. Worse still, they found that AI help tends to delude developers about the quality of their output. "We found that participants with access to an AI assistant often produced more security vulnerabilities than those without access, with particularly significant results for string encryption and SQL injection," the authors state in their paper. "Surprisingly, we also found that participants provided access to an AI assistant were more likely to believe that they wrote secure code than those without access to the AI assistant." Previously, NYU researchers have shown that AI-based programming suggestions are often insecure in experiments under different conditions. The Stanford authors point to an August 2021 research paper titled "Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions," which found that given 89 scenarios, about 40 per cent of the computer programs made with the help of Copilot had potentially exploitable vulnerabilities. That study, the Stanford authors say, is limited in scope because it only considers a constrained set of prompts corresponding to 25 vulnerabilities and just three programming languages: Python, C, and Verilog. The Stanford scholars also cite a followup study from some of the same NYU eggheads, "Security Implications of Large Language Model Code Assistants: A User Study," as the only comparable user study they're aware of. They observe, however, that their work differs because it focuses on OpenAI's codex-davinci-002 model rather than OpenAI's less powerful codex-cushman-001 model, both of which play a role in GitHub Copilot, itself a fine-tuned descendant of a GPT-3 language model.Read more of this story at Slashdot.
How a US Funding Bill Targets Online Sites to Help Stop Retail Theft
This week America passed a $1.7 trillion federal spending bill — and it includes a big win for retailrs reporters the Associated Press. It forces online marketplaces like Amazon and Facebook "to verify high-volume sellers on their platforms amid heightened concerns about retail crime...."The bill, called the INFORM ACT, also seeks to combat sales of counterfeit goods and dangerous products by compelling online marketplaces to verify different types of information — including bank account, tax ID and contact details — for sellers who make at least 200 unique sales and earn a minimum of $5,000 in a given year. It's difficult to parse out how much money retailers are losing due to organized retail crime — or if the problem has substantially increased. But the issue has received more notice in the past few years as high-profile smash-and-grab retail thefts and mass shoplifting events grabbed national attention. Some retailers have also said in recent weeks they're seeing more items being taken from stores. Target executives said in November the number of thefts has gone up more than 50%, resulting in more than $400 million in losses. Its expected to be more than $600 million for the full fiscal year.... Walgreens, Best Buy and Home Depot have also pointed out similar problems. The National Retail Federation, the nation's largest retail trade group, said its latest security survey of roughly 60 retailers found that inventory loss — called shrink — clocked in at an average rate of 1.4% last year, representing $94.5 billion in losses [included damaged products and theft by employees] ... It also noted retailers, on average, saw a 26.5% uptick in organized theft incidents last year.Read more of this story at Slashdot.
AI Has Changed the Way We Explore Our Solar System
"Last week at the 2022 American Geophysical Union (AGU) Fall Meeting, planetary scientists and astronomers discussed how new machine-learning techniques are changing the way we learn about our solar system," reports Space.com, "from planning for future mission landings on Jupiter's icy moon Europa to identifying volcanoes on tiny Mercury...."For many tasks in astronomy, it can take humans months, years or even decades of effort to sift through all the necessary data... "You can find up to 10,000, hundreds of thousands of boulders, and it's very time consuming," Nils Prieur, a planetary scientist at Stanford University in California said during his talk at AGU. Prieur's new machine-learning algorithm can detect boulders across the whole moon in only 30 minutes. It's important to know where these large chunks of rock are to make sure new missions can land safely at their destinations. Boulders are also useful for geology, providing clues to how impacts break up the rocks around them to create craters. Computers can identify a number of other planetary phenomena, too: explosive volcanoes on Mercury, vortexes in Jupiter's thick atmosphere and craters on the moon, to name a few. During the conference, planetary scientist Ethan Duncan, from NASA's Goddard Space Flight Center in Maryland, demonstrated how machine learning can identify not chunks of rock, but chunks of ice on Jupiter's icy moon Europa. The so-called chaos terrain is a messy-looking swath of Europa's surface, with bright ice chunks strewn about a darker background. With its underground ocean, Europa is a prime target for astronomers interested in alien life, and mapping these ice chunks will be key to planning future missions. Upcoming missions could also incorporate artificial intelligence as part of the team, using this tech to empower probes to make real-time responses to hazards and even land autonomously. Landing is a notorious challenge for spacecraft, and always one of the most dangerous times of a mission.Read more of this story at Slashdot.
How Kindle Novelists Are Using ChatGPT's AI
The Verge presents what it's calling "an interview with an AI early adopter," who is currently using ChatGPT not just to generate titles, but also the plots for their mysteries. For example, "I need four murder suspects with information about why they're suspected and how they are cleared. And then tell me who the guilty killer is." The author says "It will do just that. It will spit that out." Q: You and a few other independent authors were early adopters of these tools. With ChatGPT, it feels like a lot of other people are suddenly grappling with the same questions you were confronting. What's that been like...? Every group, every private, behind-the-scenes author group I'm in, there's some kind of discussion going on. Right now, everybody's talking about using it on the peripherals. But there seems to be this moral chasm between: "It does blurbs really well, and I hate doing blurbs, and I have to pay somebody to do blurbs, and blurbs isn't writing, so I'm going to use it for blurbs." Or "Well, I'm going to have it help me tighten up my plot because I hate plotting, but it plots really well, so I'm going to use it for that." Or "Did you know that if you tell it to proofread, it'll make sure that it's grammatically correct?' Everybody gets closer and closer to using it to write their stuff, and then they stop, and everybody seems to feel like they have to announce when they're talking about this: "But I do not ever use its words to write my books." And I do.... The actual words, just to get them down faster and get it out, I do. So I've found myself in the past couple of weeks wondering, do I engage in this debate? Do I say anything? For the most part, I've said nothing. Q: What do you think the line is that people are drawing? It's a concern of plagiarism. Everybody knows that they crawled stuff with permission and without permission. And there's an ethical question.... I have three authors that I've read extensively, indie authors that I'm friends with, and I know they never gave permission for their stuff to be looked at, and I was able to reasonably recreate their style.... That I won't do. That, for me, is an ethical line.... But you could, if you were ethically okay with that, with this technology and what it allows you to do.Read more of this story at Slashdot.
Customers React to McDonalds' Almost Fully-Automated Restaurant
"The first mostly non-human-run McDonald's is open for business just outside Fort Worth, Texas," reports the Guardian. CNN calls it "an almost fully-automated restaurant," noting there's just one self-service kiosk (with a credit card reader) for ordering food. McDonalds tells CNN there's "some interaction between customers and the restaurant team" when picking up orders or drinks. But at the special "order ahead" drive-through lane, your app-ordered bag of food is instead delivered to a platform by your car's window using a vertical conveyor belt. CNN reports that it's targetted to customers on the go. For example, there's dedicated parking spaces outside for curbside pickup orders, while inside there's a room with bags to be picked up by food-delivery couriers (who also get their own designated parking spaces outside). But for regular customers, CBS emphasizes that "ordering is done through kiosks or an app — no humans involved there, either."But not all customers are loving it. "Well there goes millions of jobs," one commenter on a TikTok video said about the new restaurant said. "Oh no first we have to talk with Siri and Google [and] now we have to talk to another computer," another one opined. "I'm not giving my money to robots," another commenter wrote. "Raise the minimum wage!" Other customers had more personal concerns, expressing worries about how they could get their order fixed if it was incorrectly prepared or how to ask for extra condiments. "And if they forget an item. Who you supposed to tell, the robot? It defeats the purpose of using the drive thru if you have to go inside for it," one consumer noted.... To be sure, not everyone had negative views about the concept. Some customers expressed optimism that the automated restaurant could improve service and their experience.Read more of this story at Slashdot.
Mozilla Just Fixed an 18-Year-Old Firefox Bug
Mozilla recently fixed a bug that was first reported 18 years ago in Firebox 1.0, reports How-to Geek:Bug 290125 was first reported on April 12, 2005, only a few days before the release of Firefox 1.0.3, and outlined an issue with how Firefox rendered text with the ::first-letter CSS pseudo-element. The author said, "when floating left a :first-letter (to produce a dropcap), Gecko ignores any declared line-height and inherits the line-height of the parent box. [...] Both Opera 7.5+ and Safari 1.0+ correctly handle this." The initial problem was that the Mac version of Firefox handled line heights differently than Firefox on other platforms, which was fixed in time for Firefox 3.0 in 2007. The issue was then re-opened in 2014, when it was decided in a CSS Working Group meeting that Firefox's special handling of line heights didn't meet CSS specifications and was causing compatibility problems. It led to some sites with a large first letter in blocks of text, like The Verge and The Guardian, render incorrectly in Firefox compared to other browsers. The issue was still marked as low priority, so progress continued slowly, until it was finally marked as fixed on December 20, 2022. Firefox 110 should include the updated code, which is expected to roll out to everyone in February 2023.Read more of this story at Slashdot.
Did YouTube Pay Too Much to Broadcast Sunday Football Games?
Subscribers to "NFL Sunday Ticket" can watch broadcasts of every Sunday game of American football. But for access next season, "fans will have to Google it..." warns the Associated Press — because Thursday the football league announced plans to distribute their game package on YouTube TV and YouTube Primetime Channels. Google beat out both Apple and Amazon by offering over $2 billion a year for 7 years — but Yahoo Finance believes it's more about drawing attention to YouTube's streaming TV services. "Don't expect the package to be profitable, one analyst warned.""They're not making money on this — this is a loss leader," Michael Pachter, managing director of equity research at Wedbush, told Yahoo Finance Live, referencing YouTube TV's current price point of $64.99. "I don't think they make a penny at that level...." "It's an extremely expensive package of content," Tim Nollen, analyst at Macquarie Group, previously told Yahoo Finance Live, noting the Sunday Ticket package was not a profitable service for DirecTV [which since 1994 has held the exclusive broadcast rights in the U.S.] [...] YouTube TV has more than 5 million subscribers and trial users as of July. "Five million subscribers is just not enough," Pachter stressed. "Even if all 5 million pay the $400 bucks a year...they're going to barely cover their costs." Still, despite the lack of profitability and sky-high price tag, Pachter noted YouTube might be best positioned to take advantage of the package, especially as the demand for live sports escalates. "I think they can be smart about how they carve up the content," Pachter said, suggesting the platform could more easily sell games to bars and restaurants.Read more of this story at Slashdot.
Linux Kernel Security Bug Allows Remote Code Execution for Authenticated Remote Users
The Zero Day Initiative, a zero-day security research firm, announced a new Linux kernel security bug that allows authenticated remote users to disclose sensitive information and run code on vulnerable Linux kernel versions. ZDNet reports:Originally, the Zero Day Initiative ZDI rated it a perfect 10 on the 0 to 10 common Vulnerability Scoring System scale. Now, the hole's "only" a 9.6.... The problem lies in the Linux 5.15 in-kernel Server Message Block (SMB) server, ksmbd. The specific flaw exists within the processing of SMB2_TREE_DISCONNECT commands. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the kernel context. This new program, which was introduced to the kernel in 2021, was developed by Samsung. Its point was to deliver speedy SMB3 file-serving performance.... Any distro using the Linux kernel 5.15 or above is potentially vulnerable. This includes Ubuntu 22.04, and its descendants; Deepin Linux 20.3; and Slackware 15.Read more of this story at Slashdot.
Microsoft Employee Accidentally Announces That Notepad is Getting Tabs in Windows 11
"A Microsoft employee appears to have accidentally announced that Windows 11's Notepad app is getting a tabs feature," reports the Verge:The employee, a senior product manager at Microsoft, posted a photo of a version of Notepad with tabs, enthusiastically announcing "Notepad in Windows 11 now has tabs!" with a loudspeaker emoji. The tweet was deleted minutes later, but not before Windows Central and several Windows enthusiast Twitter accounts had spotted the mistake. The Notepad screenshot includes a Microsoft internal warning: "Confidential Don't discuss features or take screenshots...." The addition of tabs in Notepad could signal a shift towards tabs appearing in more built-in Windows apps.Read more of this story at Slashdot.
Patched Windows Bug Was Actually a Dangerous Wormable Code-Execution Vulnerability
Ars Technica reports on a dangerously "wormable" Windows vulnerability that allowed attackers to execute malicious code with no authentication required — a vulnerability that was present "in a much broader range of network protocols, giving attackers more flexibility than they had when exploiting the older vulnerability."Microsoft fixed CVE-2022-37958 in September during its monthly Patch Tuesday rollout of security fixes. At the time, however, Microsoft researchers believed the vulnerability allowed only the disclosure of potentially sensitive information. As such, Microsoft gave the vulnerability a designation of "important." In the routine course of analyzing vulnerabilities after they're patched, IBM security researcher Valentina Palmiotti discovered it allowed for remote code execution in much the way EternalBlue did [the flaw used to detonate WannaCry]. Last week, Microsoft revised the designation to critical and gave it a severity rating of 8.1, the same given to EternalBlue.... One potentially mitigating factor is that a patch for CVE-2022-37958 has been available for three months. EternalBlue, by contrast, was initially exploited by the NSA as a zero-day. The NSA's highly weaponized exploit was then released into the wild by a mysterious group calling itself Shadow Brokers. The leak, one of the worst in the history of the NSA, gave hackers around the world access to a potent nation-state-grade exploit. Palmiotti said there's reason for optimism but also for risk: "While EternalBlue was an 0-Day, luckily this is an N-Day with a 3 month patching lead time," said Palmiotti. There's still some risk, Palmiotti tells Ars Technica. "As we've seen with other major vulnerabilities over the years, such as MS17-010 which was exploited with EternalBlue, some organizations have been slow deploying patches for several months or lack an accurate inventory of systems exposed to the internet and miss patching systems altogether." Thanks to Slashdot reader joshuark for sharing the article.Read more of this story at Slashdot.
CNET Touts 'Massive' Microsoft Office Deal: 91% Discount on a Lifetime License
Meanwhile, over in the Microsoft ecosystem, CNET reports:You can ditch the subscription (with recurring charges) and snag a lifetime license of access to Microsoft's Word, Excel, PowerPoint, Outlook, Teams, OneNote, Publisher and Access for just $30... That's back at the lowest price we've ever seen, and a whopping 91% off the usual price of $349. However, this deal expires in just a few days, so be sure to get your order in soon.The offer, from StackSocial, applies to both the Windows and Mac version of the software. Now, you can always opt to use the free online version of Microsoft Office (which has far fewer features). But compared to the online Microsoft 365 subscription suite that costs $10 per month or $100 per year, this downloadable version is a phenomenal bargain. The Mac deal ends today, but the Windows deal extends through December 28th, according to CNET's article. "The two big caveats: You get a single key — which only works on a single computer — and there's no Microsoft OneDrive Cloud Storage included."Read more of this story at Slashdot.
America's FTC Demands End to Mastercard's 'Illegal' Blocking of Competing Debit Card Payment Networks
Friday America's Federal Trade Commission issued an announcement on what it called "illegal business tactics that Mastercard has been using to force merchants to route debit card payments through its payment network," saying the FTC is now requiring Mastercard "to stop blocking the use of competing debit payment networks."The popularity of debit cards has been growing especially quickly for purchases consumers make using their personal devices equipped with ewallet applications such as Apple Pay, Google Pay, and Samsung Wallet. Payment card networks play a critical role in those debit card transactions.... Payment card networks compete for the business of banks that issue cards and for the business of merchants that accept card payments. Mastercard, along with Visa, is one of the two leading payment card networks in the United States. The processing fees charged by networks total billions of dollars every year, affecting every purchase made with a debit card, according to the FTC. Most of these fees are paid by the merchants to the card-issuing banks and the payment card networks.... Mastercard was flouting the law by setting policies to block merchants from routing ecommerce transactions using Mastercard-branded debit cards saved in ewallets to alternative payment card networks, including networks that may charge lower fees than Mastercard, the FTC alleged. Specifically, Mastercard used its control over a process called "tokenization" to block the use of competing payment card networks, the agency alleged. Transactions commonly are "tokenized" by replacing the cardholder's primary account number with a different number to protect the account number during some stages of a debit transaction. Tokens are stored in ewallets such as Apple Pay, Google Pay, and Samsung Wallet and serve as a substitute credential to provide additional protection for a cardholder's account number.... According to the FTC, Mastercard refuses to provide conversion services to competing networks for remote ewallet debit transactions...thereby making it impossible for merchants to route their ewallet transactions on a network other than Mastercard.Read more of this story at Slashdot.
Stack Overflow Survey Finds More Developers Now Use Linux Than MacOS
Justin Garrison works at Amazon Web Services on the Kubernetes team (and was senior systems engineer on several animated films). This week he spotted a new milestone for Linux in the 2022 StackOverflow developer survey:[Among the developers surveyed] Linux as a primary operating system had been steadily climbing for the past 5 years. 2018 through 2021 saw steady growth with 23.2%, 25.6%, 26.6%, 25.3%, and finally in 2022 the usage was 40.23%. Linux usage was more than macOS in 2021, but only by a small margin. 2022 it is now 9% more than macOS. Their final stats for "professional use" operating system:Windows: 48.82%Linux-based: 39.89%MacOs: 32.97%But Garrison's blog post notes that that doesn't include the million-plus people all the Linux-based cloud development environments (like GitHub Workspaces) — not to mention the 15% of WSL users on Windows and all the users of Docker (which uses a Linux VM). "It's safe to say more people use Linux as part of their development workflow than any other operating system."Read more of this story at Slashdot.
Donald Knuth's 2022 'Christmas Tree' Lecture Is About Trees
Like a visit from an old friend, it's Donald Knuth's annual Christmas tree lecture for 2022. "Because of the pandemic, it's been three years since Knuth has been able to honor this tradition," notes The New Stack:2022 marks the 60th anniversary of that fateful day in 1962 when a 24-year-old Donald Knuth started writing " The Art of Computer Programming." Now approaching his 85th birthday, Knuth has become almost a legend in the world of computer programming — and he's still writing additional volumes for his massive analysis of algorithms. But every year, right around Christmas time, there's another tradition. Knuth gives a special lecture "pitched at non-specialists" for a small audience at Stanford University (where Knuth is a professor emeritus) and a larger audience online... Hunched over a notepad (which was projected onto a screen behind him), Knuth began the 26th annual Christmas lecture by pointing out that the evening's topic had been hiding in plain sight for two decades. For the first 20 years, they'd called them the "Christmas tree" lectures, since "trees are one of the most important things to a computer scientist. And every year I learned at least two new cool things about trees..." About five years ago they'd changed the name to just "Christmas lectures" — but the problem wasn't that trees stopped being interesting. "I still learn cool things about trees every year. But they're getting harder and harder to explain to a general audience!" So this year's triumphant "homecoming" lecture would indeed include trees — specifically a phenomenon Knuth describes as "twintrees," along with Baxter permutations, and Floorplans. Knuth noted they're all topics touched on in the latest volume of The Art of Computer Programming, before jokingly reminding the audience that his book makes an excellent Christmas present. By the end of the lecture, Knuth had written algorithms for all three mathematical concepts — then connected all three algorithms with Linux pipes to show what happens when you convert one kind of sequence into the other and then into the other. "I get back, of course, the one I started with!"Read more of this story at Slashdot.
How One Man Proved No Snowflakes Are Alike
CNN shares the historic close-up snowflake photos of Wilson Bentley, the first person to capture the details of the individual "snow crystal" ice that makes up snowflakes. It was 1885, just 69 years after the invention of the camera, and after years of trial and error, "He went on to photograph more than 5,000 of these "ice flowers" during his lifetime — never finding any duplicates — and the images still mesmerize to this day."Every snow crystal shares a common six-sided or six-pointed structure — it's how frozen water molecules arrange themselves — but they will always vary from one another because each falls from the sky in its own unique way and experiences slightly different atmospheric conditions on its travel down to earth. Some of their arms may look long and skinny. Others may appear short and flat or somewhere in between. The possibilities are endless and fascinating.... "He had the mind of a scientist and the soul of a poet, and you can see that in his writings," said Sue Richardson, Bentley's great-grandniece who is vice president of the board for the Jericho Historical Society. "He wrote many, many articles over the years for scientific publications and for other magazines like Harper's Bazaar and National Geographic. "He also kept very detailed weather records and very detailed journals of every photograph that he took of a snow crystal — the temperature, the humidity, what part of the storm it came from. He kept very detailed information, and then these weather records that he kept and the theories that he developed about how snow crystals formed in the atmosphere, those were proven true...." It wasn't easy, however, to get those snow crystals on camera. It took almost three years, Richardson said, for Bentley to figure out how to successfully photograph one — which he did just a month shy of his 20th birthday. The first obstacle was figuring out how to attach the microscope to the camera. And then there was the challenge of getting each crystal photographed before it could melt away. "He worked in an unheated woodshed at the back of the house. He had to," Richardson said. "And the microscope slides, everything, had to be an ambient temperature or they'd melt" the crystal.... A children's book about him won the Caldecott Medal in 1999. Bentley never had formal education, according to his grandniece (who grew up hearing stories about this famous ancestor). One says that when Wilson Bentley was given an old microscope at age 15, "The first time he looked at a snow crystal under it, he was hooked. Just the beauty, the intricate detail. He was totally hooked."Read more of this story at Slashdot.
A Startup Wants To Pay You To Share Your Data For Advertising
®Yahoo co-founder Jerry Yang (through his AME Cloud Ventures) contributed to $6 million in seed funding in November for startup Caden, which plans to pay users to share their personal data -- including what they buy or watch on mobile apps. The Wall Street Journal reports:The startup, Caden Inc., operates an app by the same name that helps users download their data from apps and servicesâ"whether thatâ(TM)s Amazon.com Inc. or Airbnb Inc. â"into a personal âoevault.â Users who consent to share that data for advertising purposes can earn a cut of the revenue that the app generates from it. They also can access personal analytics based on that data.... Caden, which has been testing with a limited group of users, plans to begin a public beta test of 10,000 users early next year.... One option in the public beta test will anonymize and pool the data before sharing it with outside parties in exchange for $5 to $20 a month, according to Caden founder and Chief Executive John Roa. The amount of compensation will be determined by a âoedata scoreâ reflecting factors such as whether consumers answer demographic survey questions and which apps and servicesâ(TM) data consumers are sharing. Consumers will eventually be given the option to share more specific information for more tailored advertising. A marketer could then form audience segments and tailor their ad targeting and messaging to those groups. For instance, a user could consent to sharing his ride-share history so advertisers could create segments of people who ride a certain amount. That would eventually pay consumers up to $50 a month, Caden said. A third option would let advertisers take a direct action based on the data that Caden understands about a specific user. If a consumer were part of a department storeâ(TM)s loyalty program, for example, the store might reward her for sharing her individual Amazon shopping history and use it to provide more personalized offers.ÂThat could generate thousands of dollars a year for participating users, the company said. ÂCaden also hopes that the data it can aggregate will be compelling for consumers. Users could search for restaurants theyâ(TM)ve eaten at in a certain city, for instance, or how much they spent in certain categories across different apps, executives said. âoeItâ(TM)s like Spotify Wrapped for your whole life,â said Amarachi Miller, Cadenâ(TM)s head of product, referring to the streaming music serviceâ(TM)s year-end distillation of each userâ(TM)s listening.... Caden said it will initially sell only anonymized and aggregated data that doesnâ(TM)t tie back to individuals. As it starts to let brands do more personal promotions for users, it said it will let users see which brands and partners itâ(TM)s working with, and will let users control which brands can access their information. The digital ad industry has been seeking new marketing-guiding data, the article points out, especially since Apple began require apps to ask for permission before tracking users. Thanks to Slashdot reader guest reader for sharing the article.Read more of this story at Slashdot.
Neal Stephenson's Lamina1 Launches Fund to Invest in Open Metaverse Projects
Neal Stephenson coined the phrase "metaverse" in his 1992 book Snow Crash. 30 years later, Stephenson is part of a blockchain startup "optimized for the Open Metaverse" called Lamina1. This week they announced their "first-of-its-kind fund" for investing in early stage Layer 1 blockchain projects ("largely focused" on the Open Metaverse).. The goal is "to provide broad economic access to global accredited investors looking to support the next era of the internet," according to the announcement — and to also provide Web3 builders "a vehicle for raising capital for their Open Metaverse ventures." The fund will be led by Lamina1's co-founder Peter Vessenes (who, among other things, was the first Chairman of the Bitcoin foundation), "offering investors a chance to join him at the forefront of the emerging Open Metaverse economy..." "Investors and builders can both apply to participate immediately."The fund launch will be closely followed by the much-anticipated launch of Lamina1's testnet.... The L1EF fund works by allowing accredited investors to access and co-invest in companies and entrepreneurs through quarterly subscriptions. Investments will be largely focused on the technology and experiences users can access in the Open Metaverse, ranging from immersive computing to open AI at scale. To support the rapid advancement and expansion of the Open Metaverse, L1EF is simultaneously focused on investing in builders and creators who will foster the quality tech and infrastructure necessary to support the protocol, and create immersive experiences that bring Lamina1's vision of an Open Metaverse to life. Some of these early stage projects include layer 2 protocols, DeFi, GameFi, marketplaces, bridges, and many more. "We're thrilled to introduce L1EF to serve both creators and investors who are actively promoting the development of an Open Metaverse," said Rebecca Barkin, President of Lamina1. "Peter has a deep understanding and demonstrated success of growing economies around a chain, and his approach to grant builders early access to capital — right as we're preparing to place testnet in their hands — is in perfect alignment with our mission to build the open infrastructure that brings together the most powerful creative community on the planet...." In addition to capital, projects that are part of L1EF will receive early access and support for Lamina1 developer tooling through the forthcoming Lamina1 Early Access Program. "The team has a front row seat to all happening in the ecosystem," Vessenes said this week, "and essentially gets a 'first look' at what many of the most compelling creators and storytellers of our time are doing, building, making, and producing around the world. "We want to share that front row seat with as many people as possible." In 2004 Neal Stephenson answered questions from Slashdot's readers.Read more of this story at Slashdot.
NORAD Answers Questions About Their Annual Santa-Tracking Operation
The North American Aerospace Defense Command is a US/Canada organization protecting the air sovereignty of the two nations. But every year on December 24th, they also tell you where Santa is. From NORADSanta.org:The modern tradition of tracking Santa began in 1955 when a young child accidentally dialed the unlisted phone number of the Continental Air Defense Command Operations Center upon seeing an newspaper advertisement telling kids to call Santa. The Director of Operations, Colonel Harry Shoup, answered the phone and instructed his staff to check the radar for indications of Santa making his way south from the North Pole.... Each year since, NORAD has dutifully reported Santa's location on Dec. 24 to millions of children and families across the globe. NORAD receives calls from around the world on Dec. 24 asking for Santa's location. Children, families and fans also keep track of Santa's location on the NORAD Tracks Santa® website and our social media platforms. The page lists the NORAD technologies involved in tracking Santa — including 47 radar installations and geo-synchronous satellites with infrared heat sensors. ("Rudolph's nose gives off an infrared signature similar to a missile launch...") And this year NORAD also produced a special video highlighting the various military fleets protecting Santa. ("He may know when you're sleeping, he may know when you're awake... " it tells viewers. "But for 67 years now, when he takes flight, we'll know.") More from NORADSanta.org:Canadian NORAD fighter pilots, flying the CF-18, take off out of Newfoundland and welcome Santa to North America. Then at numerous locations in Canada other CF-18 fighter pilots escort Santa. While in the United States, American NORAD fighter pilots in either the F-15s, F16s or F-22s get the thrill of flying with Santa and the famous Reindeer... Q: How can Santa travel the world within 24 hours? A: NORAD intelligence reports indicate that Santa does not experience time the way we do. His trip seems to take 24 hours to us, but to Santa it might last days, weeks or even months. Santa would not want to rush the important job of delivering presents to children and spreading joy to everyone, so the only logical conclusion is that Santa somehow functions within his own time-space continuum.... How does Santa get down chimneys? Although NORAD has different hypotheses and theories as to how Santa actually gets down the chimneys, we don't have definitive information to explain the magical phenomenon. Do your planes ever intercept Santa? Over the past 65 years, our fighter jets (F-16s, F-15s, F-22s and CF-18s) have intercepted Santa many, many times. When the jets intercept Santa, they tip their wings to say, "Hello Santa! NORAD is tracking you again this year!" Santa always waves. He loves to see the pilots...! How many people support this effort, and are they active duty military personnel? More than 1,250 Canadian and American uniformed personnel and DOD civilians volunteer their time on December 24th to answer the thousands of phone calls and emails that flood in from around the world. In addition to the support provided by our corporate contributors to make this program possible, NORAD has two lead project officers who manage the program. How much money is spent on this project? The NORAD Tracks Santa program is made possible by volunteers and through the generous support of corporate licensees who bear virtually all of the costs. Corporate contributors include Microsoft (with separate contributions from Microsoft's search engine Bing and from Microsoft Azure), AWS (and Amazon's Alexa), Verizon, and HP. NORADSanta.org also boasts extra features like an "arcade" of online games, a jukebox of Christmas tunes, and a library of online books about Santa. And the site even provides some technical data on the weight of Santa's sleigh — although the unit of measurement used is gumdrops.Read more of this story at Slashdot.
TikTok Spied On Forbes Journalists
ByteDance confirmed it used TikTok to monitor three journalists' physical location using their IP addresses, reports Forbes, "to unearth the source of leaks inside the company following a drumbeat of stories exposing the company's ongoing links to China."As a result of the investigation into the surveillance tactics, ByteDance fired Chris Lepitak, its chief internal auditor who led the team responsible for them. The China-based executive Song Ye, who Lepitak reported to and who reports directly to ByteDance CEO Rubo Liang, resigned.... "It is standard practice for companies to have an internal audit group authorized to investigate code of conduct violations," TikTok General Counsel Erich Andersen wrote in a second internal email shared with Forbes. "However, in this case individuals misused their authority to obtain access to TikTok user data...." "This new development reinforces serious concerns that the social media platform has permitted TikTok engineers and executives in the People's Republic of China to repeatedly access private data of U.S. users despite repeated claims to lawmakers and users that this data was protected," Senator Mark Warner told Forbes.... ByteDance is not the first tech giant to use an app to monitor specific users. In 2017, the New York Times reported that Uber had identified various local politicians and regulators and served them a separate, misleading version of the Uber app to avoid regulatory penalties.... Both Uber and Facebook also reportedly tracked the location of journalists reporting on their apps. Ironically, TikTok's journalist-tracking project involved the company's Chief Security and Privacy Office, according to Forbes, and targeted three Forbes journalists who had formerly worked at BuzzFeed News. It was back in October that Forbes first reported ByteDance had discussed tracking journallists. ByteDance had immediately denied the charges on Twitter, saying "TikTok has never been used to 'target' any members of the U.S. government, activists, public figures or journalists," and that "TikTok could not monitor U.S. users in the way the article suggested." Forbes also notes that in 2021, TikTok became the most visited website in the world. Thanks to long-time Slashdot reader newbie_fantod for submitting the story!Read more of this story at Slashdot.
Could We Make It To Mars Without NASA?
Reason.com notes NASA's successful completion of its Artemis I mission, calling it "part of NASA's ambitious program to bring American astronauts back to the moon for the first time in half a century. And then on to Mars." But then they ask if the project is worth the money, with the transportation policy director at the libertarian "Reason Foundation" think tank, Robert W. Poole, arguing instead that NASA "isn't particularly interested in cost savings, and its decision making is overly driven by politics."NASA would have been better off replacing the costly and dated Space Launch System used in the Artemis program. But it didn't. This probably has a lot to do with the fact that it was largely constructed and engineered in Alabama, the home state of Senate Appropriations Committee Chair Richard Shelby, who has a history of strong-arming NASA to preserve jobs for his constituents. Long-time Slashdot reader SonicSpike shared the article, which ultimately asks whether it'd be faster and cheaper to just rely on private companies:In 2009, the private sector saw one of its biggest champions ascend to become the number two person at NASA. Lori Garver pushed to scrap the Constellation program as a way to entice the private sector to fill in the gaps. She also spearheaded the Commercial Crew Program, which continues to employ commercial contractors to ferry astronauts to the International Space Station. Today, companies like Elon Musk's SpaceX are launching rockets at a faster pace and for a fraction of what NASA spends. In 2022, the company successfully launched 61 rockets, each with a price tag between $100 million and 150 million. Private companies already design and lease NASA much of its hardware. Poole says there's no reason NASA can't take it a step further and just use the SpaceX starship to cover the entire journey from Earth to the moon and eventually to Mars. "If the current NASA plan goes ahead to have the SpaceX Starship actually deliver the astronauts from the lunar outpost orbit to the surface of the moon and bring them back, that would be an even more dramatic refutation of the idea that only NASA should be doing space transportation," he says. Poole says that instead of flying its own missions, NASA should play a more limited and supportive role. "The future NASA role that makes the most sense is research and development to advance science," he says. But for a contrary opinion, Slashdot reader youn counters that "You can bash NASA all you want but a big reason the private sector is where it is at is because it funded research 12 years ago." They share a CNET article noting the $6 billion NASA budgeted over five years "to kick-start development of a new commercial manned spaceflight capability." And Slashdot reader sg_oneill argues that "Its gonna be a century before we're really colonizing the moon and/or Mars... because we have a lot of science to do first. How do you do a civilization with zero energy inputs from the rest of humanity? How do we deal with radiation? How do bodies work in low G? (Mars is about 1/3 the gravbity of earth). This needs science, and to get science we need NASA, even if private enterprise is building the rockets."Read more of this story at Slashdot.
FSF Warns: Stay Away From iPhones, Amazon, Netflix, and Music Steaming Services
For the last thirteen years the Free Software Foundation has published its Ethical Tech Giving Guide. But what's interesting is this year's guide also tags companies and products with negative recommendations to "stay away from."Stay away from: iPhones It's not just Siri that's creepy: all Apple devices contain software that's hostile to users. Although they claim to be concerned about user privacy, they don't hesitate to put their users under surveillance. Apple prevents you from installing third-party free software on your own phone, and they use this control to censor apps that compete with or subvert Apple's profits. Apple has a history of exploiting their absolute control over their users to silence political activists and help governments spy on millions of users. Stay away from: M1 MacBook and MacBook Pro macOS is proprietary software that restricts its users' freedoms. In November 2020, macOS was caught alerting Apple each time a user opens an app. Even though Apple is making changes to the service, it just goes to show how bad they try to be until there is an outcry. Comes crawling with spyware that rats you out to advertisers. Stay away from: Amazon Amazon is one of the most notorious DRM offenders. They use this Orwellian control over their devices and services to spy on users and keep them trapped in their walled garden. Be aware that Amazon isn't the peddler of ebook DRM. Disturbingly, it's enthusiastically supported by most of the big publishing houses. Read more about the dangers of DRM through our Defective by Design campaign. Stay away from: Spotify, Apple Music, and all other major streaming servicesIn addition to streaming music encumbered by DRM, people who want to use Spotify are required to install additional proprietary software. Even Spotify's client for GNU/Linux relies on proprietary software. Apple Music is no better, and places heavy restrictions on the music streamed through the platform. Stay away from: Netflix Netflix is continuing its disturbing trend of making onerous DRM the norm for streaming media. That's why they were a target for last year's International Day Against DRM (IDAD). They're also leveraging their place in the Motion Picture Association of America (MPAA) to advocate for tighter restrictions on users, and drove the effort to embed DRM into the fabric of the Web. "In your gift giving this year, put freedom first," their guide begins. And for a freedom-respecting last-minute gift idea, they suggest giving the gift of a FSF membership (which comes with a code and a printable page "so that you can present your gift as a physical object, if you like.") The membership is valid for one year, and includes the many benefits that come with an FSF associate membership, including a USB member card, email forwarding, access to our Jitsi Meet videoconferencing server and member forum, discounts in the FSF shop and on ThinkPenguin hardware, and more. If you are in the United States, your gift would also be fully tax-deductible in the USA.Read more of this story at Slashdot.
Fedora Change Proposal: Supporting Unified Kernel Images for Improved Security
While "this proposal will only be implemented if approved by the Fedora Engineering Steering Committee," Phoronix reports:Red Hat and Fedora engineers are plotting a path to supporting Unified Kernel Images (UKI) with Fedora Linux and for the Fedora 38 release in the spring they are aiming to get their initial enablement in place. Unified Kernel Images have been championed by the systemd folks for better securing and trusting Linux distributions. Unified kernel images are a combination of the kernel image, initrd, and UEFI stub program all distributed as one.... The initial phase would focus on shipping a UKI as an optional sub-RPM that users can opt into initially, updating kernel install scripts so unified kernels are installed and properly updated, and bootloader support for unified kernel images. Adding systemd-boot support to the installers, better measurement and remote attestation support, and switching Fedora Cloud images to using unified kernels are among the additional goals but of lower priority. Fedora's wiki includes a detailed description of the change proposal:The goal is to move away from initrd images being generated on the installed machine. They are generated while building the kernel package instead, then shipped as part of a unified kernel image. A unified kernel image is an all-in-one efi binary containing kernel, initrd, cmdline and signature.... Main motivation for this move is to make the distro more robust and more secure.Read more of this story at Slashdot.
Google's Quest for Clean Energy Impeded by Small-but-Dominant Utilities in Some US States
Meta, Microsoft and Apple, and Google all want carbon-free power. But Google "says its goals for carbon-free power are impeded by state-regulated utilities," reports the New York Times, especially those in America's Southeastern states which aren't facing a competitive market.Google's battle in the region, where it has a major concentration of data centers, raises a question that applies to the energy transition everywhere: Is what's good for a few companies good for all? At the heart of their campaign, Google and its tech giant allies want to dismantle a decades-old regulatory system in the Southeast that allows a handful of utilities to generate and sell the region's electricity — and replace it with a market in which many companies can compete to do so. Such markets exist in some form in much of the country, but the Southeastern utilities are staunchly defending the status quo. Senior utility executives contend that their system better insulates consumers from spikes in prices of commodities like natural gas, promotes reliability and supports the long-term investments needed to develop clean-power technologies.... Most electricity in the United States was long generated and distributed by heavily regulated monopoly utilities in each state. But just before the start of this century, lawmakers and regulators, arguing that competition would bring efficiencies, made it possible to set up power markets and end the dominance of the utilities — a revolution that bypassed the Southeast. Google and others contend that the markets have brought cost savings, innovation and the capital needed to increase clean power generation from wind and solar. The most recent move toward a form of power market, in a group of Western states, has saved nearly $3 billion since 2014, according to the market operator. Self-interest also plays a role: In power markets, large companies can strike deals with independent producers that give them more leeway to bargain on price and secure more clean energy. Google entered a landmark deal last year to provide clean power to its data centers in Virginia, which is in a sprawling market called PJM.... The big utilities in the Southeast are now building more solar projects, but those pushing for a market in the region say it's not enough. In the region, the proposed solar projects' generating capacity is equivalent to just over a fourth of total capacity, which is far below the 80 percent for PJM, according to an analysis by Tyler Norris, a senior executive at Cypress Creek Renewables, a solar company, and a special adviser in the Energy Department during the Obama administration. "Project developers are attracted to open wholesale electricity markets with price transparency, independent oversight and the ability to trade with multiple potential customers," Mr. Norris said.Read more of this story at Slashdot.
Six Arrested After Manipulating Gas Station Pumps To Steal 30,000 Gallons of Gas
A Valero gas station sells approximately 5,000 gallons of gas a day, one employee estimates. But local police arrested six men who, in a series of robberies, tricked the pumps out of 30,000 gallons of gasoline, reports the Mercury News, "a haul authorities estimated was worth at least $180,000."Upon further inspection of surveillance video, authorities said, police saw one of the suspects activate a gas-pump computer, allowing another suspect to pump fuel into his vehicle.... An employee from the Valero station, who declined to give their name, called the process the gas thieves used "nearly untraceable." "You must have a deep understanding of how the pump system works," the person said. "There is a time frame anywhere from 75 seconds to two minutes for the authorization to go through the network [after sliding a credit card into a gas pump]. In this (time period), there's an opportunity to manipulate the pump ... You're able to manipulate the pump and confuse the programming to an extent that the pump starts dispensing gas...." In a Facebook post, authorities said the three suspects had been "conspiring together in a sophisticated operation to thwart security devices and pump electronics to steal large amounts of gasoline from the business...." Authorities say $20,000 of damage was done to gas pumps. Thanks to Slashdot reader k6mfw for submitting the story.Read more of this story at Slashdot.
Rust-GPU Project Now Supports SPIR-V Ray-tracing
For three years Stockholm-based games studio Embark has been working on the Rust-gpu project to make Rust "a first class language and ecosystem for GPU programming." The project's latest announcement? rust-gpu now supports ray-tracing. Their original announcement explained the rationale for this years-long dvelopment effort:Historically in games GPU programming has been done through writing either HLSL, or to a lesser extent GLSL. These are simple programming languages that have evolved along with rendering APIs over the years. However, as game engines have evolved, these languages have failed to provide mechanisms for dealing with large codebases, and have generally stayed behind the curve compared to other programming languages. In part this is because it's a niche language for a niche market, and in part this has been because the industry as a whole has sunk quite a lot of time and effort into the status quo. While over-all better alternatives to both languages exist, none of them are in a place to replace HLSL or GLSL. Either because they are vendor locked, or because they don't support the traditional graphics pipeline. Examples of this include CUDA and OpenCL. And while attempts have been made to create language in this space, none of them have gained any notable traction in the gamedev community. Our hope with this project is that we push the industry forward by bringing an existing, low-level, safe, and high performance language to the GPU; namely Rust. And with it come some additional benefits that can't be overlooked: a package/module system that's one of the industry's best, built in safety against race-conditions or out of bounds memory access, a wide range of tools and utilities to improve programmer workflows, and many others! Along with ray-tracing, this week they announced plans to keep rust-gpu on the same schedule as the stable Rust release, "so you can use your favorite new language features as new stable versions of Rust are being released, by just updating your rust-gpu version." Thanks to Slashdot reader guest reader for sharing the news!Read more of this story at Slashdot.
Linux Foundation's 'AgStack Project' Plans First Dataset of the World's Agricultural Field Boundaries
The nonprofit Linux Foundation not only pays the salary of Linus Torvalds and Greg Kroah-Hartman. It also runs the AgStack Foundation, which seeks more efficient agriculture through "free, re-usable, open and specialized digital infrastructure for data and applications." And this week that Foundation announced a new open source code base for creating and maintaining a global dataset that's a kind of registry for the boundaries of agricultural fields to enable field-level analytics like carbon tracking, food traceability, and crop production.AgStack's Asset Registry dataset, the first of its kind in the world, is built and continuously updated using data from satellites and actual field registrations that contain information on boundaries, not ownership, which will then train machine learning models to ascertain more boundaries. Precise knowledge of field boundaries can help farmers, agricultural companies, and the public sector to monitor and manage crop production, study management practices (crop rotations, cover cropping, tillage, irrigation), determinants of productivity, pest and disease spread, and species diversity. By sharing reusable agricultural data, new insights can also be gleaned for global food security research and innovation. Crop field boundaries are the fundamental unit of addressing such datasets.... By leveraging computer science and artificial intelligence, members will create, curate, and maintain global field boundaries as an open source digital public good available for anyone to use. The project has the potential to unlock the next revolution of digital agri-services in public and private sectors, especially for smallholder farmers.... "We think that a public field boundary dataset can help turbocharge a lot of smart people and businesses focused on improving agriculture and food security around the world," said Professor David Lobell at The Center on Food Security and the Environment at Stanford University, who hosted the original research as the Gloria and Richard Kushel Director of the Center on Food Security and the Environment at Stanford University and the Benjamin Page Professor of Earth System Science. "We're excited to help bring this dataset to life." All code will be contributed under an open source license and will be governed by the AgStack community within the Linux Foundation, using open source and permissively licensed tools and processes. It's using code funded in part by the NASA Harvest Consortium.Read more of this story at Slashdot.
23 Years Ago, Amazon Gave Barnes & Noble a 1-Click Patent Lawsuit For Xmas
Long-time Slashdot reader theodp writes: In recognition of the innovation and unique nature of 1-Click, the U.S. Patent Office awarded Patent No. 5960411 to Amazon.com for 1-Click on September 28, 1999," boasted an Oct. 1999 Amazon press release. "First made available to Amazon.com customers in September 1997, 1-Click combines with Gift-Click and Wish List to make Amazon.com the most convenient, easiest-to-use shopping destination this holiday season." The following day, Amazon weaponized its new patent, filing a lawsuit on Oct. 20th saying defendant and competitor Barnes and Noble had illegally copied Amazon's patented 1-Click ordering technology. "We're pleased that Judge Pechman recognized the innovation underlying our 1-Click feature," said Amazon CEO and 1-Click co-inventor Jeff Bezos in a Dec. 1999 Amazon press release celebrating a preliminary injunction that barred barnesandnoble.com from using its 'copycat version of 1-Click technology' while the lawsuit was pending (Amazon and B&N settled in 2002). "The patent system is designed to encourage innovation on behalf of customers," Amazon had written in its 1999 press release, arguing that in 1997 its 1-Click technology "was a significant step forward for online shoppers that required thousands of hours of effort." It's been noted that B&N first threw down the litigation gauntlet, slapping Amazon with a lawsuit over its marketing claim as "World's Largest Bookstore" just days before Amazon's IPO in May 1997. USPTO continuity records show a 'child' patent of the original Method and System for Placing a Purchase Order Via a Communications Network patent finally expired due to non-payment of maintenance fees on 10/10/2022, more than 25 years after Amazon applied for its 1-Click patent on 9/22/1997.Read more of this story at Slashdot.
Hotels Say Goodbye To Daily Room Cleanings and Hello To Robots as Workers Stay Scarce
An anonymous reader shares a report: This holiday season at the Garden City Hotel on Long Island, Merle Ayers is feeling especially grateful for the Whiz. At two feet tall and 66 pounds, the powerful robot vacuum doesn't mind working late into the night after the parties are over. The Whiz doesn't care that it's the holidays. It doesn't even need a day off. "It just needs to be cared for. We have to change the vacuum bags periodically and keep the batteries charged," says Ayers, the hotel's director of banquets. Amid ongoing staffing shortages, the two robot vacuums the hotel purchased late last year for about $30,000 each are proving their worth many times over, filling gaps in both the catering department and housekeeping. "If we vacuum every floor with a robot, that saves one whole shift," says Garden City Hotel managing director Grady Colin. "That's one whole person per day that can be redeployed to do something else." These days, he'll take all the help he can get. Travelers have returned from the pandemic, but hotel workers have not, creating unprecedented staffing challenges for the hospitality industry. According to the Labor Department, there are 350,000 fewer people working in hotels today than there were in February 2020, before the pandemic. It's not for lack of trying. Hotels have raised hourly wages by 25% since early 2020, and employers are offering greater flexibility in scheduling. Still, workers are nowhere to be seen. "I've been in the hotel business for a long time," says Colin. "I've never seen anything like this."Read more of this story at Slashdot.
TikTok Banned on Government Devices Under Spending Bill Passed by Congress
Under the bipartisan spending bill that passed both chambers of Congress as of Friday, TikTok will be banned from government devices, underscoring the growing concern about the popular video-sharing app owned by China's ByteDance. From a report: The bill, which still has to be signed into law by President Joe Biden, also calls on e-commerce platforms to do more vetting to help deter counterfeit goods from being sold online, and forces companies pursuing large mergers to pay more to file with federal antitrust agencies. Congress failed to pass many of the most aggressive bills targeting tech, including antitrust legislation that would require app stores developed by Apple and Google to give developers more payment options, and a measure mandating new guardrails to protect kids online. And though Congress made more headway this year than in the past toward a compromise bill on national privacy standards, there remains only a patchwork of state laws determining how consumer data is protected. Center-left tech industry group Chamber of Progress cheered the exclusion of several antitrust bills that would have targeted its backers, which include Apple, Amazon, Google and Meta.Read more of this story at Slashdot.
...323324325326327328329330331332...