g01d4 writes "I volunteer at a used bookstore that supports the local library. One of my tasks is to sort book donations. For > 5-year-old computer books the choices typically are to save it for sale (fifty cents soft cover, one dollar hardback), pack it, e.g. for another library's bookstore, put it on the free cart, or toss it in the recycle bin. I occasionally dumpster dive the recycle bin to 'rescue' books that I don't think should be pulped. Recently I found a copy of PostgresSQL Essential Reference (2002) and Programming Perl (1996). Would you have left them to RIP? Obviously we have very limited space, 20 shelf feet (storage + sale) for STEM. What criteria would you use when sorting these types of books?"
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×
cold fjord writes with this Business Week report: "LinkedIn Corp. ... was sued by customers who claim the company appropriated their identities for marketing purposes by hacking into their external e-mail accounts and downloading contacts' addresses. The customers, who aim to lead a group suit against LinkedIn, asked a federal judge in San Jose, California, to bar the company from repeating the alleged violations and to force it to return any revenue stemming from its use of their identities to promote the site ... 'LinkedIn's own website contains hundreds of complaints regarding this practice,' they said in the complaint filed Sept. 17. ... LinkedIn required the members to provide an external e-mail address as their username on its site, then used the information to access their external e-mail accounts when they were left open ... 'LinkedIn pretends to be that user and downloads the e-mail addresses contained anywhere in that account to LinkedIn's servers,' they said. 'LinkedIn is able to download these addresses without requesting the password for the external e-mail accounts or obtaining users' consent.'" "This puts an interesting twist on LinkedIn's recent call for transparency," adds cold fjord. (More at Bloomberg.)
occidental writes "Sanders Kleinfeld writes: In the past six years, the rise of the ebook has ushered in three successive revolutions that have roiled and reshaped the traditional publishing industry. Revolution #3 isn't really defined by a new piece of hardware, software product, or platform. Instead, it's really marked by a dramatic paradigm change among authors and publishers, who are shifting their toolsets away from legacy word processing and desktop publishing suites, and toward HTML5 and tools built on the Open Web Platform."
judgecorp writes "There's more than $13,000 pledged for a crowdfunded bounty for bypassing an iPhone 5S's fingerprint reader. The bounty, set up by a security expert and an exploit reseller, requires entrants to lift prints 'like from a beer mug.' It has a website — IsTouchIDHackedYet — and payments are pledged by tweets using #IsTouchIDHackedYet. One drawback: the scheme appears to rely on trust that sponsors will actually pay up." Other prizes include whiskey, books, and a bottle of wine.
Nate the greatest writes "Rumors are circulating that Barnes & Noble is going to release their new hardware soon. Two different sources inside B&N have confirmed that a launch is imminent, with one saying B&N will launch both a tablet and an ereader. The other says that a new tablet is coming. I tend to think that the first source is probably right because product pages for several accessories leaked in early August. The pages referenced 2 different new models. Also, B&N recently announced plans to continue to develop both new ereaders and tablets, though they've changed their minds so much that I don't know if that announcement is worth anything."
Hugh Pickens DOT Com writes "Mary Am Shah reports in the Toronto Sun that 26-year-old Blair McMillan has banned any technology in his house post-1986, the year he and his girlfriend Morgan were born. They're doing it because their kids – Trey, 5, and Denton, 2 – wouldn't look up from their parents' iPhones and iPads long enough to kick a ball around the backyard. 'That's kind of when it hit me because I'm like, wow, when I was a kid, I lived outside,' says Blair adding that now 'we're parenting our kids the same way we were parented for a year just to see what it's like.' The McMillans do their banking in person instead of online. They develop rolls of film for $20 each instead of Instagramming their sons' antics. They recently traveled across the United States using paper maps and entertaining their screaming kids with coloring books and stickers, passing car after car with TVs embedded in the headrests and content infants seated in the back. Their plan is to continue living like it's 1986 until April 2014. Morgan, who admits she thought her boyfriend was 'crazy,' now devours books to pass the time and only uses a computer at work. 'I remember the day before we started this, I was a wreck and I was like I can't believe I have to delete my Facebook!' Blair originally experienced a form of phantom pain for the first few days after giving up his cellphone. 'The strangest thing without having a cellphone is that I could almost feel my pocket vibrating and I wanted to check my pocket.' Still Morgan says the change has been good for their family's spirit. 'We're just closer, there's more talking,'"
An anonymous reader writes "A lot of us grew up tinkering with electronics and cherishing the one or two reference books we could find that explained exactly what we wanted to know. Nowadays, with internet access widely available and online educational materials coming into their own, we're going to see a lot more kindred spirits coming out of places all over the globe. The NY Times has a story about one such, a lad from Mongolia who hacked together complex sensors at the age of 16 and was one of the 0.2% of students to get a perfect score on MIT's first Massive Open Online Course. From the article: 'Battushig, playing the role of the car, moved into the sensor's path to show me how it worked, but it was clear he was not entirely satisfied with his design. "The use of the long wires is very inconvenient for my users," he said, almost apologetically, clasping his hands together in emphasis. He realized that contractors would be reluctant to install the siren in other buildings if they had to deal with cumbersome wiring, so he was developing a wireless version. ... Battushig has the round cheeks of a young boy, but he is not your typical teenager. He hasn't read Harry Potter ("What will I learn from that?") and doesn't like listening to music (when a friend saw him wearing headphones, he couldn't believe it; it turned out Battushig was preparing for the SAT). His projects are what make him happy. "In electrical engineering, there is no limit," he said.'"
cartechboy writes "Stephen King has sold more than 300 million books of horror, suspense, science fiction and fantasy. The guy has written so many works, and words, that he actually needs a "continuity adviser" to fact check him when he picks old stories up as a new book. Enter Rocky Wood — who is the world-wide leading expert on Stephen King's work. So much so, that King hired Wood (who has authored a 6000+ page encyclopedia on CD-ROM on every single aspect of King's work — including 26,000 different King characters) to fact check himself when he writes."
benrothke writes "It has been about 8 years since my friend Richard Bejtlich's (note, that was a full disclosure 'my friend') last book Extrusion Detection: Security Monitoring for Internal Intrusions came out. That and his other 2 books were heavy on technical analysis and real-word solutions. Some titles only start to cover ground after about 80 pages of introduction. With this highly informative and actionable book, you are already reviewing tcpdump output at page 16. In The Practice of Network Security Monitoring: Understanding Incident Detection and Response, Bejtlich takes the approach that your network will be attacked and breached. He observes that a critical part of your security posture must be that of network security monitoring (NSM), which is the collection and analysis of data to help you detect and respond to intrusions." Read below for the rest of Ben's review.
Bennett Haselton writes: "The ongoing case of New York Times reporter James Risen -- whom the U.S. Department of Justice wants to force to testify against one of his sources for leaking classified CIA information -- brings up a more general question about the Fifth Amendment: Why are criminal defendants allowed to remain silent, but not third-party witnesses like Risen?" You'll find the rest of Bennett's story below.
Ars Technica reviewer Casey Johnston gives a mildly positive review to the Oyster book-rental app (and associated site), which intentionally tries to be for books what Netflix has become for movies: a low-price, subscription-based, data-sifting source of first resort. For $10 a month, users can read any of the books in Oyster's catalog (in the range of 100,000, and growing), and their reading habits are used to suggest new books of interest (with some bum steers, it seems, at present). It's iOS-only for now, with an Android version expected soon. I've only grudgingly moved more and more of my reading to tablets, but now am glad I have; still, I don't like the idea of having my books disappear if I don't pay a continuing subscription.
An anonymous reader writes "Using a Lego Mindstorms set, a Mac, and optical character recognition, Austrian professor Peter Purgathofer created a makeshift ebook copier. From the article: 'It's sort of a combination of high tech meets low. The scanning is done by way of the Mac's iSight camera. The Mindstorms set does two things: Hits the page-advance button on the Kindle (it appears to be an older model, like the one in the picture above), then mashes the space bar on the Mac, causing it to take a picture.' Purgathofer calls the creation a 'reflection on the loss of long established rights.' Check out the Vimeo video for a demonstration."
itwbennett writes "The federal judge presiding over the U.S. electronic books case against Apple has barred the company from striking deals that would ensure that it could undercut prices of other retailers in the e-book market and also prohibited Apple from letting any one publisher know what deals the company is striking up with other publishers. For its part, Apple said it plans to appeal the ruling (PDF), denying that it conspired to fix ebook pricing. Meanwhile, Amazon is alerting customers of their potential payout, which could be as much as $3.82 for every eligible Kindle book."
nk497 writes "Amazon is bundling ebooks with print copies for the first time, via its Kindle MatchBook programme, admitting that 'bundling print and digital has been one of the most requested features from customers.' The digital copies won't all be free — as with AutoRip, which offers free MP3s for selected CDs and records — but Amazon promises to charge no more than $3 per digital copy. The programme will apply to books bought as far back as Amazon's 1995 launch. So far, only 10,000 books are listed as being part of Kindle MatchBook, but Amazon hopes to add more, telling publishers it 'adds a new revenue stream.'"
damnbunni writes "Frederik Pohl, one of the last Golden Age science fiction authors, passed away on September 2nd of respiratory distress, as reported on his blog. Pohl is perhaps best known for his Heechee Saga novels, beginning with Gateway in 1977, but his work in pulp magazines in the '30s and '40s helped give rise to science fiction fandom."
The Hugo awards were presented last night, providing recognition to the best science fiction of the past year. The award for Best Novel was presented to John Scalzi for Redshirts, a comedic work playing on the trope of low-ranking officers frequently getting themselves killed in sci-fi works. Best Novella went to Brandon Sanderson for The Emperor's Soul, and Best Novelette went to The Girl-Thing Who Went Out for Sushi by Pat Cadigan. Best Graphic Story was awarded to the creators of Saga. Best Dramatic Presentation (long form) was given for Joss Whedon's The Avengers movie, and (short form) was presented for the "Blackwater" episode of the Game of Thrones TV show. The Best New Writer was Mur Lafferty. Here's a full list of the nominees and winners.
Giulia D'Amico, Business Development VP for One Laptop Per Child (OLPC) talks about the new OLPC tablets, which are now available in the U.S. through Target, Amazon, Walmart, and other retailers, with some of the $150 sales price for each tablet going to support the OLPC project in places like Uruguay, Cambodia, Rwanda, and other countries where a tablet loaded with teaching software is a way better deal than trying to supply all the books a child needs for six or eight years of school. While there are many Android tablets for sale for less than $150, Giulia points out that the OLPC tablets contain up to $300 worth of software. Plus, of course, just as with almost any other Android device, there are many thousands of apps available for it through Google Play. And let's not forget the original OLPC laptop. It has been redesigned, and renamed the OLPC XO-4 and looks much cooler than the original. You can learn more about it through olpc.tv, which has videos from the introduction of both the OPLC tablet and the XO-4 at CES 2013. OLPC has shipped close to 3 million laptops so far, and is working to port Sugar to Android so that the laptop and the tablet can use the same software. One more thing: OLPC is now focusing on software rather than hardware. When the project started at MIT, back in 2006 or so, there was no suitable hardware available. Today, many companies make low-cost tablets and keyboards for them, so there's no real need for OLPC to make its own instead of using existing hardware.
Kelly Beatty has a unique perspective on the world of astronomy: Beatty's been on the staff of Sky & Telescope magazine for nearly 40 years as a writer and editor, including a stint heading "Night Sky" magazine. He's also written what's been called "the definitive guide for the armchair astronomer," and teaches astronomy to people of all ages. (He even has an asteroid named after him.) Besides being fascinated with the objects we can see in Earth's skies, Beatty takes the skies themselves seriously: his Twitter handle is NightSkyGuy for a reason. We talked a few weeks ago, in dark-skied rural Maine, about his involvement with the International Dark-Sky Association, and why you should care about ubiquitous light pollution, even if you don't have a deep interest in star-gazing. (And it's not just to be courteous to your neighbors.)
Esther Schindler writes "If you ever needed evidence that Isaac Asimov was a genius at extrapolating future technology from limited data, you'll enjoy this 1964 article in which he predicts what we'll see at the 2014 world's fair. For instance: "Robots will neither be common nor very good in 2014, but they will be in existence. The I.B.M. exhibit at the present fair has no robots but it is dedicated to computers, which are shown in all their amazing complexity, notably in the task of translating Russian into English. If machines are that smart today, what may not be in the works 50 years hence? It will be such computers, much miniaturized, that will serve as the "brains" of robots. In fact, the I.B.M. building at the 2014 World's Fair may have, as one of its prime exhibits, a robot housemaid*large, clumsy, slow- moving but capable of general picking-up, arranging, cleaning and manipulation of various appliances. It will undoubtedly amuse the fairgoers to scatter debris over the floor in order to see the robot lumberingly remove it and classify it into 'throw away' and 'set aside.' (Robots for gardening work will also have made their appearance.)" It's really fun (and sometimes sigh-inducing) to see where he was accurate and where he wasn't. And, of course, the whole notion that we'd have a world's fair is among the inaccurate predictions."
benrothke writes "Little did anyone know that when the first Hacking Exposed book came out over 15 years ago, that it would launch a set of sequels on topics from Windows, Linux, web development, to virtualization and cloud computing, and much more. In 2013, the newest edition is Hacking Exposed Mobile Security Secrets & Solutions. In this edition, authors Neil Bergman, Mike Stanfield, Jason Rouse & Joel Scambray provide an extremely detailed overview of the security and privacy issues around mobile devices. The authors have heaps of experience in the topics and bring that to every chapter." Read below for the rest of Ben's review.