Slashdot

Syndicate content Slashdot
News for nerds, stuff that matters
Updated: 34 min 35 sec ago

Amazon's eBook Math

1 hour 2 min ago
An anonymous reader writes: Amazon has waged a constant battle with publishers over the price of ebooks. They've now publicly laid out their argument and the business math behind it. "We've quantified the price elasticity of e-books from repeated measurements across many titles. For every copy an e-book would sell at $14.99, it would sell 1.74 copies if priced at $9.99. So, for example, if customers would buy 100,000 copies of a particular e-book at $14.99, then customers would buy 174,000 copies of that same e-book at $9.99. Total revenue at $14.99 would be $1,499,000. Total revenue at $9.99 is $1,738,000." They argue that capping most ebooks at $9.99 would be better for everyone, with the money split out 35% to the author, 35% to the publisher, and 30% to Amazon. Author John Scalzi says Amazon's reasoning and assumptions are a bit suspect. He disagrees that "books are interchangeable units of entertainment, each equally as salable as the next, and that pricing is the only thing consumers react to." Scalzi also points out that Amazon asserts itself as the only revenue stream for authors, which is not remotely true. "Amazon's assumptions don't include, for example, that publishers and authors might have a legitimate reason for not wanting the gulf between eBook and physical hardcover pricing to be so large that brick and mortar retailers suffer, narrowing the number of venues into which books can sell. Killing off Amazon's competitors is good for Amazon; there's rather less of an argument that it's good for anyone else."

Read more of this story at Slashdot.








The Problems With Drug Testing

Wed, 30/07/2014 - 22:30
gallifreyan99 writes: Every drug you take will have been tested on people before it—but that testing process is meant to be tightly controlled, for the safety of everyone involved. Two investigations document the questionable methods used in many studies, and the lack of oversight the FDA seems to have over the process. First, drugs are increasingly being tested on homeless, destitute and mentally ill people. Second, it turns out many human trials are being run by doctors who have had their licenses revoked for drug addiction, malpractice and worse.

Read more of this story at Slashdot.








Is the App Store Broken?

Wed, 30/07/2014 - 21:47
A recent post by Instapaper's Marco Arment suggests that design flaws in Apple's App Store are harming the app ecosystem, and users are suffering because of it. "The dominance and prominence of 'top lists' stratifies the top 0.02% so far above everyone else that the entire ecosystem is encouraged to design for a theoretical top-list placement that, by definition, won’t happen to 99.98% of them." Arment notes that many good app developers are finding continued development to be unsustainable, while scammy apps are encouraged to flood the market. "As the economics get tighter, it becomes much harder to support the lavish treatment that developers have given apps in the past, such as full-time staffs, offices, pixel-perfect custom designs of every screen, frequent free updates, and completely different iPhone and iPad interfaces. Many will give up and leave for stable, better-paying jobs. (Many already have.)" Brent Simmons points out the indie developers have largely given up the dream of being able to support themselves through iOS development. Yoni Heisler argues that their plight is simply a consequence of ever-increasing competition within the industry, though he acknowledges that more app curation would be a good thing. What strategies could Apple (and the operators of other mobile application stories) do to keep app quality high?

Read more of this story at Slashdot.








Meet Apache Software Foundation VP Rich Bowen (Video)

Wed, 30/07/2014 - 21:05
Apache is behind a huge percentage of the world's websites, and the Apache Software Foundation is the umbrella organization that provides licensing and stucture for open source projects ranging from the Apache Web server to Apache OpenOffice to small utilities that aren't household names but are often important to a surprising number of people and companies. Most of us never get to meet the people behind groups like the Apache Software Foundation -- except today we tag along with Tim Lord at OSCON and chat with Apache Software Foundation Executive Vice President Rich Bowen -- who is also Red Hat's OpenStack Community Liason. (Alternate Video Link)

Read more of this story at Slashdot.








More Quantum Strangeness: Particles Separated From Their Properties

Wed, 30/07/2014 - 20:20
Dupple sends word of new quantum mechanical research in which a neutron is sent along a different path from one of its characteristics. First, a neutron beam is split into two parts in a neutron interferometer. Then the spins of the two beams are shifted into different directions: The upper neutron beam has a spin parallel to the neutrons’ trajectory, the spin of the lower beam points into the opposite direction. After the two beams have been recombined, only those neutrons are chosen which have a spin parallel to their direction of motion. All the others are just ignored. ... These neutrons, which are found to have a spin parallel to its direction of motion, must clearly have travelled along the upper path — only there do the neutrons have this spin state. This can be shown in the experiment. If the lower beam is sent through a filter which absorbs some of the neutrons, then the number of the neutrons with spin parallel to their trajectory stays the same. If the upper beam is sent through a filter, than the number of these neutrons is reduced. Things get tricky when the system is used to measure where the neutron spin is located: the spin can be slightly changed using a magnetic field. When the two beams are recombined appropriately, they can amplify or cancel each other. This is exactly what can be seen in the measurement, if the magnetic field is applied at the lower beam – but that is the path which the neutrons considered in the experiment are actually never supposed to take. A magnetic field applied to the upper beam, on the other hand, does not have any effect.

Read more of this story at Slashdot.








More Quantum Strangeness: Particles Separated From Their Properties

Wed, 30/07/2014 - 20:20
Dupple sends word of new quantum mechanical research in which a neutron is sent along a different path from one of its characteristics. First, a neutron beam is split into two parts in a neutron interferometer. Then the spins of the two beams are shifted into different directions: The upper neutron beam has a spin parallel to the neutrons’ trajectory, the spin of the lower beam points into the opposite direction. After the two beams have been recombined, only those neutrons are chosen which have a spin parallel to their direction of motion. All the others are just ignored. ... These neutrons, which are found to have a spin parallel to its direction of motion, must clearly have travelled along the upper path — only there do the neutrons have this spin state. This can be shown in the experiment. If the lower beam is sent through a filter which absorbs some of the neutrons, then the number of the neutrons with spin parallel to their trajectory stays the same. If the upper beam is sent through a filter, than the number of these neutrons is reduced. Things get tricky when the system is used to measure where the neutron spin is located: the spin can be slightly changed using a magnetic field. When the two beams are recombined appropriately, they can amplify or cancel each other. This is exactly what can be seen in the measurement, if the magnetic field is applied at the lower beam – but that is the path which the neutrons considered in the experiment are actually never supposed to take. A magnetic field applied to the upper beam, on the other hand, does not have any effect.

Read more of this story at Slashdot.








More Quantum Strangeness: Particles Separated From Their Properties

Wed, 30/07/2014 - 20:20
Dupple sends word of new quantum mechanical research in which a neutron is sent along a different path from one of its characteristics. First, a neutron beam is split into two parts in a neutron interferometer. Then the spins of the two beams are shifted into different directions: The upper neutron beam has a spin parallel to the neutrons’ trajectory, the spin of the lower beam points into the opposite direction. After the two beams have been recombined, only those neutrons are chosen which have a spin parallel to their direction of motion. All the others are just ignored. ... These neutrons, which are found to have a spin parallel to its direction of motion, must clearly have travelled along the upper path — only there do the neutrons have this spin state. This can be shown in the experiment. If the lower beam is sent through a filter which absorbs some of the neutrons, then the number of the neutrons with spin parallel to their trajectory stays the same. If the upper beam is sent through a filter, than the number of these neutrons is reduced. Things get tricky when the system is used to measure where the neutron spin is located: the spin can be slightly changed using a magnetic field. When the two beams are recombined appropriately, they can amplify or cancel each other. This is exactly what can be seen in the measurement, if the magnetic field is applied at the lower beam – but that is the path which the neutrons considered in the experiment are actually never supposed to take. A magnetic field applied to the upper beam, on the other hand, does not have any effect.

Read more of this story at Slashdot.








Jesse Jackson: Tech Diversity Is Next Civil Rights Step

Wed, 30/07/2014 - 19:38
theodp writes: U.S. civil rights leader Rev. Jesse Jackson called on the Obama administration Monday to scrutinize the tech industry's lack of diversity. "There's no talent shortage. There's an opportunity shortage," Jackson said, calling Silicon Valley "far worse" than many others, such as car makers that have been pressured by unions. He said tech behemoths have largely escaped scrutiny by a public dazzled with their cutting-edge gadgets. Jackson spoke to press after meeting with Labor Secretary Tom Perez for a review of H-1B visas, arguing that data show Americans have the skills and should have first access to high-paying tech work. Jackson's Rainbow Push Coalition plans to file a freedom-of-information request next month with the EEOC to acquire employment data for companies that have not yet disclosed it publicly, which includes Amazon, Broadcom, Oracle, Qualcomm and Yelp. Unlike the Dept. of Labor, Jackson isn't buying Silicon Valley's argument that minority hiring statistics are trade secrets. Five years after Google's HR Chief would only reassure Congress the company had "a very strong internal Black Googler Network" and its CEO brushed off similar questions about its diversity numbers by saying "we're pretty happy with the way our recruiting work," Google — under pressure from Jackson — fessed up to having a tech workforce that's only 1% Black, apparently par for the course in Silicon Valley.

Read more of this story at Slashdot.








Raspberry Pi-Compatible Development Board Released

Wed, 30/07/2014 - 18:55
kodiaktau writes: Hardkernel has released a new Raspberry Pi-compatible development board based on the Samsung Exynos SoC. The board is smaller than a typical Pi, keeping basic HDMI, USB and CSI interfaces. It also has a 26-pin expansion board with more GPIO available, though it lacks an Ethernet jack. Initial prices as estimated around $30. The article makes the interesting point that this and other devices are marketed as "Raspberry Pi-compatible." The Raspberry Pi Foundation may run into name retention issues (similar to the ones Arduino had) as related hardware piggybacks on its success.

Read more of this story at Slashdot.








Quiet Cooling With a Copper Foam Heatsink

Wed, 30/07/2014 - 18:13
Zothecula writes: The Silent Power PC is claimed to be the first high-end PC able to ditch noisy electric fans in favor of fully passive cooling. In place of a conventional fan, the unit uses an open-air metal foam heatsink that boasts an enormous surface area thanks to the open-weave copper filaments of which it's composed. The Silent Power creators claim that the circulation of air through the foam is so efficient in dissipating heat that the exterior surface temperature never rises above 50 C (122 F) in normal use.

Read more of this story at Slashdot.








UK To Allow Driverless Cars By January

Wed, 30/07/2014 - 17:29
rtoz sends this news from the BBC: The UK government has announced that driverless cars will be allowed on public roads starting in January next year. It also invited cities to compete to host one of three trials of the tech, which would start at the same time. In addition, ministers ordered a review of the UK's road regulations to provide appropriate guidelines. ... The debate now is whether to allow cars, like the prototype unveiled by Google in May, to abandon controls including a steering wheel and pedals and rely on the vehicle's computer. Or whether, instead, to allow the machine to drive, but insist a passenger be ready to wrest back control at a moment's notice.

Read more of this story at Slashdot.








Black Hat Researchers Actively Trying To Deanonymize Tor Users

Wed, 30/07/2014 - 16:47
An anonymous reader writes: Last week, we discussed news that a presentation had been canceled for the upcoming Black Hat security conference that involved the Tor Project. The researchers involved hadn't made much of an effort to disclose the vulnerability, and the Tor Project was scrambling to implement a fix. Now, the project says it's likely these researchers were actively attacking Tor users and trying to deanonymize them. "On July 4 2014 we found a group of relays that we assume were trying to deanonymize users. They appear to have been targeting people who operate or access Tor hidden services. The attack involved modifying Tor protocol headers to do traffic confirmation attacks. ...We know the attack looked for users who fetched hidden service descriptors, but the attackers likely were not able to see any application-level traffic (e.g. what pages were loaded or even whether users visited the hidden service they looked up). The attack probably also tried to learn who published hidden service descriptors, which would allow the attackers to learn the location of that hidden service." They also provide a technical description of the attack, and the steps they're taking to block such attacks in the future.

Read more of this story at Slashdot.








Black Hat Researchers Actively Trying To Deanonymize Tor Users

Wed, 30/07/2014 - 16:47
An anonymous reader writes: Last week, we discussed news that a presentation had been canceled for the upcoming Black Hat security conference that involved the Tor Project. The researchers involved hadn't made much of an effort to disclose the vulnerability, and the Tor Project was scrambling to implement a fix. Now, the project says it's likely these researchers were actively attacking Tor users and trying to deanonymize them. "On July 4 2014 we found a group of relays that we assume were trying to deanonymize users. They appear to have been targeting people who operate or access Tor hidden services. The attack involved modifying Tor protocol headers to do traffic confirmation attacks. ...We know the attack looked for users who fetched hidden service descriptors, but the attackers likely were not able to see any application-level traffic (e.g. what pages were loaded or even whether users visited the hidden service they looked up). The attack probably also tried to learn who published hidden service descriptors, which would allow the attackers to learn the location of that hidden service." They also provide a technical description of the attack, and the steps they're taking to block such attacks in the future.

Read more of this story at Slashdot.








Black Hat Researchers Actively Trying To Deanonymize Tor Users

Wed, 30/07/2014 - 16:47
An anonymous reader writes: Last week, we discussed news that a presentation had been canceled for the upcoming Black Hat security conference that involved the Tor Project. The researchers involved hadn't made much of an effort to disclose the vulnerability, and the Tor Project was scrambling to implement a fix. Now, the project says it's likely these researchers were actively attacking Tor users and trying to deanonymize them. "On July 4 2014 we found a group of relays that we assume were trying to deanonymize users. They appear to have been targeting people who operate or access Tor hidden services. The attack involved modifying Tor protocol headers to do traffic confirmation attacks. ...We know the attack looked for users who fetched hidden service descriptors, but the attackers likely were not able to see any application-level traffic (e.g. what pages were loaded or even whether users visited the hidden service they looked up). The attack probably also tried to learn who published hidden service descriptors, which would allow the attackers to learn the location of that hidden service." They also provide a technical description of the attack, and the steps they're taking to block such attacks in the future.

Read more of this story at Slashdot.








Black Hat Researchers Actively Trying To Deanonymize Tor Users

Wed, 30/07/2014 - 16:47
An anonymous reader writes: Last week, we discussed news that a presentation had been canceled for the upcoming Black Hat security conference that involved the Tor Project. The researchers involved hadn't made much of an effort to disclose the vulnerability, and the Tor Project was scrambling to implement a fix. Now, the project says it's likely these researchers were actively attacking Tor users and trying to deanonymize them. "On July 4 2014 we found a group of relays that we assume were trying to deanonymize users. They appear to have been targeting people who operate or access Tor hidden services. The attack involved modifying Tor protocol headers to do traffic confirmation attacks. ...We know the attack looked for users who fetched hidden service descriptors, but the attackers likely were not able to see any application-level traffic (e.g. what pages were loaded or even whether users visited the hidden service they looked up). The attack probably also tried to learn who published hidden service descriptors, which would allow the attackers to learn the location of that hidden service." They also provide a technical description of the attack, and the steps they're taking to block such attacks in the future.

Read more of this story at Slashdot.








Black Hat Researchers Actively Trying To Deanonymize Tor Users

Wed, 30/07/2014 - 16:47
An anonymous reader writes: Last week, we discussed news that a presentation had been canceled for the upcoming Black Hat security conference that involved the Tor Project. The researchers involved hadn't made much of an effort to disclose the vulnerability, and the Tor Project was scrambling to implement a fix. Now, the project says it's likely these researchers were actively attacking Tor users and trying to deanonymize them. "On July 4 2014 we found a group of relays that we assume were trying to deanonymize users. They appear to have been targeting people who operate or access Tor hidden services. The attack involved modifying Tor protocol headers to do traffic confirmation attacks. ...We know the attack looked for users who fetched hidden service descriptors, but the attackers likely were not able to see any application-level traffic (e.g. what pages were loaded or even whether users visited the hidden service they looked up). The attack probably also tried to learn who published hidden service descriptors, which would allow the attackers to learn the location of that hidden service." They also provide a technical description of the attack, and the steps they're taking to block such attacks in the future.

Read more of this story at Slashdot.








Ask Slashdot: Is Running Mission-Critical Servers Without a Firewall Common?

Wed, 30/07/2014 - 16:05
An anonymous reader writes: I do some contract work on the side, and am helping a client set up a new point-of-sale system. For the time being, it's pretty simple: selling products, keeping track of employee time, managing inventory and the like. However, it requires a small network because there are two clients, and one of the clients feeds off of a small SQL Express database from the first. During the setup, the vendor disabled the local firewall, and in a number of emails back and forth since (with me getting more and more aggravated) they went from suggesting that there's no need for a firewall, to outright telling me that's just how they do it and the contract dictates that's how we need to run it. This isn't a tremendous deal today, but with how things are going, odds are there will be e-Commerce worked into it, and probably credit card transactions... which worries the bejesus out of me. So my question to the Slashdot masses: is this common? In my admittedly limited networking experience, it's been drilled into my head fairly well that not running a firewall is lazy (if not simply negligent), and to open the appropriate ports and call it a day. However, I've seen forum posts here and there with people admitting they run their clients without firewalls, believing that the firewall on their incoming internet connection is good enough, and that their client security will pick up the pieces. I'm curious how many real professionals do this, or if the forum posts I'm seeing (along with the vendor in question) are just a bunch of clowns.

Read more of this story at Slashdot.








Ask Slashdot: Is Running Mission-Critical Servers Without a Firewall Common?

Wed, 30/07/2014 - 16:05
An anonymous reader writes: I do some contract work on the side, and am helping a client set up a new point-of-sale system. For the time being, it's pretty simple: selling products, keeping track of employee time, managing inventory and the like. However, it requires a small network because there are two clients, and one of the clients feeds off of a small SQL Express database from the first. During the setup, the vendor disabled the local firewall, and in a number of emails back and forth since (with me getting more and more aggravated) they went from suggesting that there's no need for a firewall, to outright telling me that's just how they do it and the contract dictates that's how we need to run it. This isn't a tremendous deal today, but with how things are going, odds are there will be e-Commerce worked into it, and probably credit card transactions... which worries the bejesus out of me. So my question to the Slashdot masses: is this common? In my admittedly limited networking experience, it's been drilled into my head fairly well that not running a firewall is lazy (if not simply negligent), and to open the appropriate ports and call it a day. However, I've seen forum posts here and there with people admitting they run their clients without firewalls, believing that the firewall on their incoming internet connection is good enough, and that their client security will pick up the pieces. I'm curious how many real professionals do this, or if the forum posts I'm seeing (along with the vendor in question) are just a bunch of clowns.

Read more of this story at Slashdot.








Ask Slashdot: Is Running Mission-Critical Servers Without a Firewall Common?

Wed, 30/07/2014 - 16:05
An anonymous reader writes: I do some contract work on the side, and am helping a client set up a new point-of-sale system. For the time being, it's pretty simple: selling products, keeping track of employee time, managing inventory and the like. However, it requires a small network because there are two clients, and one of the clients feeds off of a small SQL Express database from the first. During the setup, the vendor disabled the local firewall, and in a number of emails back and forth since (with me getting more and more aggravated) they went from suggesting that there's no need for a firewall, to outright telling me that's just how they do it and the contract dictates that's how we need to run it. This isn't a tremendous deal today, but with how things are going, odds are there will be e-Commerce worked into it, and probably credit card transactions... which worries the bejesus out of me. So my question to the Slashdot masses: is this common? In my admittedly limited networking experience, it's been drilled into my head fairly well that not running a firewall is lazy (if not simply negligent), and to open the appropriate ports and call it a day. However, I've seen forum posts here and there with people admitting they run their clients without firewalls, believing that the firewall on their incoming internet connection is good enough, and that their client security will pick up the pieces. I'm curious how many real professionals do this, or if the forum posts I'm seeing (along with the vendor in question) are just a bunch of clowns.

Read more of this story at Slashdot.








Ask Slashdot: Is Running Mission-Critical Servers Without a Firewall Common?

Wed, 30/07/2014 - 16:05
An anonymous reader writes: I do some contract work on the side, and am helping a client set up a new point-of-sale system. For the time being, it's pretty simple: selling products, keeping track of employee time, managing inventory and the like. However, it requires a small network because there are two clients, and one of the clients feeds off of a small SQL Express database from the first. During the setup, the vendor disabled the local firewall, and in a number of emails back and forth since (with me getting more and more aggravated) they went from suggesting that there's no need for a firewall, to outright telling me that's just how they do it and the contract dictates that's how we need to run it. This isn't a tremendous deal today, but with how things are going, odds are there will be e-Commerce worked into it, and probably credit card transactions... which worries the bejesus out of me. So my question to the Slashdot masses: is this common? In my admittedly limited networking experience, it's been drilled into my head fairly well that not running a firewall is lazy (if not simply negligent), and to open the appropriate ports and call it a day. However, I've seen forum posts here and there with people admitting they run their clients without firewalls, believing that the firewall on their incoming internet connection is good enough, and that their client security will pick up the pieces. I'm curious how many real professionals do this, or if the forum posts I'm seeing (along with the vendor in question) are just a bunch of clowns.

Read more of this story at Slashdot.








intelliWARE news

Domenica 24 Giugno è nato Emanuele, figlio del nostro Socio Denis e di Cristina!

Fri, 29/06/2012 - 10:10

In collaborazione con AcquistiVerdi.it, 4 webinar su: usabilità, strumenti di visibilità social e "2.0", campagne di web marketing, Google Apps e Google Analytics.

Tue, 19/06/2012 - 16:58

Venerdì 15 giugno, intelliWARE a Roma per Popularize Artificial Intelligence (PAI) 2012.

Mon, 11/06/2012 - 13:47

contact us

intelliWARE snc
via Kennedy 15
44122 Ferrara
Italia
mappa

telefono
0532 1860611

web
www.i-ware.it

email
info@i-ware.it

Languages

partner

ferraraterraeacqua