Oggi e' 22.01.2017
Sei qui: Home arrow Slashdot
Slashdot
Slashdot
News for nerds, stuff that matters

Slashdot
  • NASA Names an Asteroid After 'Star Trek' Actor Wil Wheaton
    "An asteroid going boldly through the universe now carries a new name that honors actor Will Wheaton, who played Wesley Crusher on Star Trek: The Next Generation," reports CNET. An anonymous reader quotes their article. The announcement showed up on Twitter Wednesday from NASA's Ron Baalke, who describes himself as a "space explorer at the Jet Propulsion Laboratory". Wheaton is in good company with other Star Trek alumni. Asteroid 7307 Takei is named for Sulu actor George Takei and 68410 Nichols gets its name from Nichelle Nichols, who played Uhura. There's also asteroid 4659 Roddenberry for Star Trek creator Gene Roddenberry. "Today, I found out that I kind of get to be in space and live right here on Earth..." Wheaton wrote on his blog Wednesday, describing his life-long interest in space exploration. "As soon as it gets dark here, I'm going to walk out into my backyard, look up into the sky, just a little above Sirius, and know that, even though I can't see it with my naked eye, it's out there, and it's named after me."

    Read more of this story at Slashdot.



  • An AI Is Finally Trouncing The World's Best Poker Players
    Halfway through the "Brains vs. AI" poker competition, an AI named Libratus is trouncing its human opponents, who are four of the world's top professional players. One of the pros, Jimmy Chou, said he and his colleagues initially underestimated Libratus, but have come to regard it as one tough player. "The bot gets better and better every day," Chou said. "It's like a tougher version of us"... Chou said he and the other pros have shared notes and tips each day, looking for weaknesses they can each exploit. "The first couple of days, we had high hopes," Chou said. "But every time we find a weakness, it learns from us and the weakness disappears the next day." By Saturday, the AI had amassed a lead of $693,531 after 56,732 hands in the 120,000-hand match (which is being livestreamed by the Rivers Casino on Twitch). "I'm feeling good," said Tuomas Sandholm, the computer science professor at Carnegie Mellon who co-created the AI. "The algorithms are performing great. They're better at solving strategy ahead of time, better at driving strategy during play and better at improving strategy on the fly."

    Read more of this story at Slashdot.



  • Geek Avenges Stolen Laptop By Remotely Accessing Thief's Facebook Account
    An anonymous reader quotes Hot Hardware: Stu Gale, who just so happens to be a computer security expert, had the misfortune of having his laptop stolen from his car overnight. However, Gale did have remote software installed on the device which allowed him to track whenever it came online. So, he was quite delighted to see that a notification popped up on one of his other machines alerting him that his stolen laptop was active. Gale took the opportunity to remote into the laptop, only to find that the not-too-bright thief was using his laptop to login to her Facebook account. The thief eventually left her Facebook account open and left the room, after which Gale had the opportunity to snoop through her profile and obtain all of her private information. "I went through and got her phone numbers, friends list and pictures..." Given that Gale was able to see her phone numbers listed on Facebook, he sent text messages to all of those numbers saying that he was going to report her to the police. He also posted her info to a number of Facebook groups, which spooked the thief enough to not only delete her Facebook account, but also her listed phone numbers. In 2008 Slashdot ran a similar story, where it took several weeks of remote monitoring before a laptop thief revealed his identity. (The victim complained that "It was kind of frustrating because he was mostly using it to watch porn.") But in this case, Gale just remotely left a note on the laptop -- and called one of the thief's friends -- and eventually turned over all the information to the police, who believe an arrest will follow. Gale seems less confident, and tells one Calgary newspaper "I'm realistic. I'm not going to see that computer again. But at least I got some comic relief."

    Read more of this story at Slashdot.



  • Free Software Foundation Shakes Up Its List of Priority Projects
    alphadogg quotes Network World: The Free Software Foundation Tuesday announced a major rethinking of the software projects that it supports, putting top priority on a free mobile operating system, accessibility, and driver development, among other areas. The foundation has maintained the High Priority Projects list since 2005, when it contained just four free software projects. [That rose to 12 projects by 2008, though the changelog shows at least seven projects have since been removed.] Today's version mostly identifies priority areas, along with a few specific projects in key areas. The new list shows the FSF will continue financially supporting Replicant, their free version of Android, and they're also still supporting projects to create a free software replacement for Skype with real-time voice and video capabilities. But they're now also prioritizing various projects to replace Siri, Google Now, Alexa, and Cortana with a free-software personal assistant, which they view as "crucial to preserving users' control over their technology and data while still giving them the benefits such software has for many." And other priorities now include internationalization, accessibility, decentralization and self-hosting, and encouraging governments to adopt free software.

    Read more of this story at Slashdot.



  • Knuth Previews New Math Section For 'The Art of Computer Programming'
    In 1962, 24-year-old Donald Knuth began writing The Art of Computer Programming -- and 55 years later, he's still working on it. An anonymous reader quotes Knuth's web site at Stanford: Volume 4B will begin with a special section called 'Mathematical Preliminaries Redux', which extends the 'Mathematical Preliminaries' of Section 1.2 in Volume 1 to things that I didn't know about in the 1960s. Most of this new material deals with probabilities and expectations of random events; there's also an introduction to the theory of martingales. You can have a sneak preview by looking at the current draft of pre-fascicle 5a (52 pages), last updated 18 January 2017. As usual, rewards will be given to whoever is first to find and report errors or to make valuable suggestions. I'm particularly interested in receiving feedback about the exercises (of which there are 125) and their answers (of which there are 125). Over the years Knuth gave out over $20,000 in rewards, though most people didn't cash his highly-coveted "hexadecimal checks", and in 2008 Knuth switched to honorary "hexadecimal certificates". In 2014 Knuth complained about the "dumbing down" of computer science history, and his standards remain high. In his most-recent update, 79-year-old Knuth reminds readers that "There's stuff in here that isn't in Wikipedia yet!"

    Read more of this story at Slashdot.



  • New Wyoming Bill Penalizes Utilities Using Renewable Energy
    An anonymous reader quotes a Christian Science Monitor report on "a bill that would essentially ban large-scale renewable energy" in Wyoming. The new Wyoming bill would forbid utilities from using solar or wind sources for their electricity by 2019, according to Inside Climate News... The bill would require utilities to use "eligible resources" to meet 95 percent of Wyoming's electricity needs in 2018, and all of its electricity needs in 2019. Those "eligible resources" are defined solely as coal, hydroelectric, natural gas, nuclear, oil, and individual net metering... Utility-scale wind and solar farms are not included in the bill's list of "eligible resources," making it illegal for Wyoming utilities to use them in any way if the legislation passes. The bill calls for a fine of $10 per megawatt-hour of electricity from a renewable source to be slapped on Wyoming utilities that provide power from unapproved sources to in-state customers. The bill also prohibits utilities from raising rates to cover the cost of those penalties, though utilities wouldn't be penalized if they exported that energy to other states. But one local activist described it as 'talking-point' legislation, and even the bill's sponsor gives it only a 50% chance of passing.

    Read more of this story at Slashdot.



  • The SHA-1 End Times Have Arrived
    "Deadlines imposed by browser makers deprecating support for the weakened SHA-1 hashing algorithm have arrived," writes Slashdot reader msm1267. "And while many websites and organizations have progressed in their migrations toward SHA-2 and other safer hashing algorithms, pain points and potential headaches still remain." Threatpost reports: Starting on Jan. 24, Mozilla's Firefox browser will be the first major browser to display a warning to its users who run into a site that doesn't support TLS certificates signed by the SHA-2 hashing algorithm... "SHA-1 deprecation in the context of the browser has been an unmitigated success. But it's just the tip of the SHA-2 migration iceberg. Most people are not seeing the whole problem," said Kevin Bocek, VP of security strategy and threat intelligence for Venafi. "SHA-1 isn't just a problem to solve by February, there are thousands more private certificates that will also need migrating"... Experts warn the move to SHA-2 comes with a wide range of side effects; from unsupported applications, new hardware headaches tied to misconfigured equipment and cases of crippled credit card processing gear unable to communicate with backend servers. They say the entire process has been confusing and unwieldy to businesses dependent on a growing number of digital certificates used for not only their websites, but data centers, cloud services, and mobile apps... According to Venafi's research team, 35 percent of the IPv4 websites it analyzed in November are still using insecure SHA-1 certificates. However, when researchers scanned Alexa's top 1 million most popular websites for SHA-2 compliance it found only 536 sites were not compliant. The article describes how major tech companies are handling the move to SHA-2 compliance -- including Apple, Google, Microsoft, Facebook, Salesforce and Cloudflare

    Read more of this story at Slashdot.