MrSeb writes "When we think of computer networks, we think of routers and servers and fiber optic cables and laptops and smartphones — we think of the internet. In actuality, though, the visible internet is just the tip of the iceberg. There are secret military networks, and ad hoc wireless networks, and utility companies have sprawling, cellular networks that track everything from the health of oil pipelines and uranium enrichment machines through to the remaining capacity of septic tanks — and much, much more. What if we connected all of these networks to the internet, to form an internet of things? What if we then put a massive computer at the middle of this internet of things and used this wealth of data to power smart cars, smart homes, smart supermarkets, and smart cities? Unsurprisingly, IBM and Cisco are already working on such smart cities. For nearly two years, Rio de Janeiro's utilities, traffic systems, and emergency services has been managed by a single 'Ops Center,' a huge hub of technologies provided by both IBM and Cisco. With 300 LCD screens spread across 100 rooms, connected via 30,000 meters of fiber optic cable, Ops Center staff monitor live video from 450 cameras and three helicopters, and track the location of 10,000 buses and ambulances via GPS. Other screens output the current weather, and simulations of tomorrow's weather up to 150 miles from the city — and yet more screens display heatmaps of disease outbreaks, and the probability of natural disasters like landslides. There's even a Crisis Room, which links the Ops Center to Rio's mayor and Civil Defense departments via a Cisco telepresence suite. This sounds awesome — but is it really a good idea to give a computer company (IBM is not an urban planner!) so much control over one of the world's biggest cities?"
Slashdot is powered by your submissions, so send in your scoop
First time accepted submitter a90Tj2P7 writes "Apple is building a 21,468 square foot private restaurant in Cupertino so employees can talk shop over lunch without being overheard. Apple's director of real estate facilities, Dan Wisenhunt, stated that: 'We like to provide a level of security so that people and employees can feel comfortable talking about their business, their research and whatever project they're engineering without fear of competition sort of overhearing their conversations.'"
gbrumfiel writes "The battle over whether to publish research into mutant bird flu got editors over at Nature News thinking about other potentially dangerous lines of scientific inquiry. They came up with a non-definitive list of four technologies with the potential to do great good or great harm: Laser isotope enrichment: great for making medical isotopes or nuclear weapons. Brain scanning: can help locked-in patients to communicate or a police state to read minds. Geoengineering: could lessen the effects of climate change or undermine the political will to fight it. Genetic screening of embryos: could spot genetic disorders in the womb or lead to a brave new world of baby selection. What would Slashdotters add to the list?"
wiedzmin writes "The House approved Cyber Intelligence Sharing and Protection Act with a 248 to 168 vote today. CISPA allows internet service providers to share Internet 'threat' information with government agencies, including DHS and NSA, without having to protect any personally identifying data of its customers, without a court order. It effectively immunizes ISPs from privacy lawsuits for disclosing customer information, grants them anti-trust protection on colluding on cybersecurity issues and allows them to bypass privacy laws when sharing data with each other."
Lucas123 writes "A newly published study by Britain's data protection regulatory agency found that more than one in 10 second-hand hard drives being sold online contain recoverable personal information from the original owner. "Many people will presume that pressing the delete button on a computer file means that it is gone forever. However this information can easily be recovered," Britain's Information Commissioner, Christopher Graham, said in a statement. In all, the research found 34,000 files containing personal or corporate information were recovered from the devices. Along with the study, a survey revealed that 65% of people hand down their old PC, laptop and cell phones to others. One in ten of those people who disposed of their old devices, left all their data on them. The British government also offered new guidelines for ensuring devices are properly wiped of data."
redletterdave writes "On Thursday, researchers at MIT announced a breakthrough in glass-making technology, which basically involves a new way to create surface textures on glass to eliminate all of the drawbacks of glass, including unwanted reflections and glare. The research team wanted to build glass that could be adaptable to any environment: Their 'multifunctional' glass is not only crystal clear, but it also causes water droplets to bounce right off its surface, 'like tiny rubber balls.' The glass is self-cleaning, anti-reflective, and superhydrophobic. The invention has countless applications, including TV screens, as well as smartphone and tablet displays that benefit from the self-cleaning ability of the glass by resisting moisture and contamination by sweat."
scibri writes "A comprehensive analysis published in Nature (abstract) suggests that organic farming could supply needs in some circumstances. But yields are lower than in conventional farming, so producing the bulk of the globe's diet will still require chemical fertilizers and pesticides. The meta-analysis reviewed 66 studies comparing the yields of 34 different crop species in organic and conventional farming systems. The researchers included only studies that assessed the total land area used, allowing them to compare crop yields per unit area. Many previous studies that have showed large yields for organic farming ignore the size of the area planted — which is often bigger than in conventional farming. Crop yields from organic farming are as much as 34% lower than those from comparable conventional farming practices, though in some cases, notably with strawberries and soybeans, the gap is as small as 3%."
First time accepted submitter ian_po writes "The U.S. Attorney's office has filed indictments against 7 people, including two Transportation Security Administration Screeners and two former TSA employees, after federal agents set up several smuggling sting operations. The alleged smuggling scheme was revealed after a suspected drug courier went to Terminal 5, where his flight was departing, instead of going through the Terminal 6 checkpoint his written instructions directed him to. Court documents indicate the plan was to return to Terminal 5 through a secure tunnel after being allowed through security by the accused Screener. The courier was caught with 10 pounds of cocaine at the other checkpoint by a different TSA agent. If convicted, the four TSA employees face a minimum of 10 years in Federal prison." If ten pounds of anything can get onto a plane by the simple expedient of bribery, please explain again why adult travelers, but not children, must remove their shoes as they stand massed in an unsecured part of a typical U.S. airport.
MojoKid writes "At present, the government's ability to share data on its citizens is fairly restricted, insomuch as the various agencies must demonstrate cause and need. This has created a somewhat byzantine network of guidelines and laws that must be followed — a morass of red tape that CISPA is intended to cut through. One of the bill's key passages is a provision that gives private companies the right to share cybersecurity data with each other and with the government 'notwithstanding any other provision of law.' The problem with this sort of blank check clause is that, even if the people who write the law have only good intentions, it provides substantial legal cover to others who might not. Further, the core problem with most of the proposed amendments to the bill thus far isn't that they don't provide necessary protections, it's that they seek to bind the length of time the government can keep the data it gathers, or the sorts of people it can't collect data on, rather than protecting citizens as a whole. One proposed amendment, for example, would make it illegal to monitor protesters — but not other groups. It's not hard to see how those seeking to abuse the law could find a workaround — a 'protester' is just a quick arrest away from being considered a 'possible criminal risk.'"
coondoggie writes "Princeton University researchers are throwing some cold water on the hot notion that astrobiologists and other scientists expect to one day find life on other planets. Recent discoveries of planets similar to Earth in size and proximity to the planets' respective suns have sparked scientific and public excitement about the possibility of also finding Earth-like life on those worlds, but the expectation that life — from bacteria to sentient beings — has or will develop on other planets as on Earth might be based more on optimism than scientific evidence."
yoink! writes "It looks like Google is selling off SketchUp or, conversely, Trimble is acquiring it. Despite several indications there will continue to be a free version of the 3D modelling software, users are unsure about what this will mean for the SketchUp community at large as indicated by the comments on the official Google SketchUp Blog post. They are, however, rejoicing that they will be freed from Groups for SketchUp discussions."
First time accepted submitter cos(0) writes "Between O'Reilly, Wrox, Addison-Wesley, The Pragmatic Bookshelf, and many others, software developers have a wide variety of literature about languages, patterns, practices, and tools. Many publishers even offer subscriptions to online reading of the whole collection, exposing you to things you didn't even know you don't know — and many of us learn more from these publishers than from a Comp Sci curriculum. But what about publishers and books specializing in tech underneath software — like VHDL, Verilog, design tools, and wire protocols? In particular, best practices, modeling techniques, and other skills that separate a novice from an expert?"
milbournosphere writes "It looks like Steve drew up an idea for an ad-supported OS. A patent was filed back in 2009 detailing how it was done. From the article: 'Rather than charge the normal upgrade price, which in those days was $99, he was thinking of shipping a second version of Mac OS 9 that would be given away for free — but would be supported instead by advertising. The theory was that this would pull in a ton of people who didn't normally upgrade because of the price, but Apple would still generate income through the advertising. And any time an owner of the free version wanted to get rid of the advertising, he or she could simply pay for the ad-free version. Steve's team had worked out the preliminary numbers the concept seemed financially sound.'"
HerculesMO writes with word that "Looks as though Mozilla is considering using H264, one step closer to unification of a single protocol for video encoding. It's a big deal for HTML5 traction, but it still leaves Google holding onto WebM." The article, though a bit harsh on Ogg Theora, offers an interesting look at the way standards are chosen (and adopted by the browser makers).
First time accepted submitter Aguazul2 writes "In a familiar story relocated into the bizarre world of the Vatican, a whistle-blower who brought to light excessive overpayments on contracts to friendly suppliers was sent to the USA as punishment, and further sources of leaks are now being hunted down by a crack team headed by an 82-year old Opus Dei cardinal. It's just like Wikileaks, only with parchment and quills — probably."