Congratulations!

[Valid RSS] This is a valid RSS feed.

Recommendations

This feed is valid, but interoperability with the widest range of feed readers could be improved by implementing the following recommendations.

Source: http://slashdot.headfucking.net/feed.xml

  1. <?xml version="1.0" encoding="ISO-8859-1"?>
  2. <?xml-stylesheet type="text/xsl" media="screen" href="/~d/styles/rss2titles.xsl"?><?xml-stylesheet type="text/css" media="screen" href="http://feeds.feedburner.com/~d/styles/itemtitles.css"?><!-- generator="FeedCreator 1.7.2" --><rss xmlns:feedburner="http://rssnamespace.org/feedburner/ext/1.0" version="2.0">
  3.    <channel>
  4.        <title>Slashdot</title>
  5.        <description>News for nerds, stuff that matters</description>
  6.        <link>https://slashdot.org/</link>
  7.        <lastBuildDate>Wed, 15 Aug 2018 01:10:00 +0100</lastBuildDate>
  8.        <generator>FeedCreator 1.7.2</generator>
  9.        <feedburner:info uri="slashdotextended" /><atom10:link xmlns:atom10="http://www.w3.org/2005/Atom" rel="hub" href="http://pubsubhubbub.appspot.com/" /><atom10:link xmlns:atom10="http://www.w3.org/2005/Atom" rel="self" type="application/rss+xml" href="http://slashdot.headfucking.net/feed.xml" /><feedburner:feedFlare href="https://add.my.yahoo.com/rss?url=http%3A%2F%2Fslashdot.headfucking.net%2Ffeed.xml" src="http://us.i1.yimg.com/us.yimg.com/i/us/my/addtomyyahoo4.gif">Subscribe with My Yahoo!</feedburner:feedFlare><feedburner:feedFlare href="http://www.newsgator.com/ngs/subscriber/subext.aspx?url=http%3A%2F%2Fslashdot.headfucking.net%2Ffeed.xml" src="http://www.newsgator.com/images/ngsub1.gif">Subscribe with NewsGator</feedburner:feedFlare><feedburner:feedFlare href="http://feeds.my.aol.com/add.jsp?url=http%3A%2F%2Fslashdot.headfucking.net%2Ffeed.xml" src="http://o.aolcdn.com/favorites.my.aol.com/webmaster/ffclient/webroot/locale/en-US/images/myAOLButtonSmall.gif">Subscribe with My AOL</feedburner:feedFlare><feedburner:feedFlare href="http://www.bloglines.com/sub/http://slashdot.headfucking.net/feed.xml" src="http://www.bloglines.com/images/sub_modern11.gif">Subscribe with Bloglines</feedburner:feedFlare><feedburner:feedFlare href="http://www.netvibes.com/subscribe.php?url=http%3A%2F%2Fslashdot.headfucking.net%2Ffeed.xml" src="//www.netvibes.com/img/add2netvibes.gif">Subscribe with Netvibes</feedburner:feedFlare><feedburner:feedFlare href="http://fusion.google.com/add?feedurl=http%3A%2F%2Fslashdot.headfucking.net%2Ffeed.xml" src="http://buttons.googlesyndication.com/fusion/add.gif">Subscribe with Google</feedburner:feedFlare><feedburner:feedFlare href="http://www.pageflakes.com/subscribe.aspx?url=http%3A%2F%2Fslashdot.headfucking.net%2Ffeed.xml" src="http://www.pageflakes.com/ImageFile.ashx?instanceId=Static_4&amp;fileName=ATP_blu_91x17.gif">Subscribe with Pageflakes</feedburner:feedFlare><feedburner:feedFlare href="http://my.feedlounge.com/external/subscribe?url=http%3A%2F%2Fslashdot.headfucking.net%2Ffeed.xml" src="http://static.feedlounge.com/buttons/subscribe_0.gif">Subscribe with FeedLounge</feedburner:feedFlare><feedburner:browserFriendly>This is an XML content feed. It is intended to be viewed in a newsreader or syndicated to another site.</feedburner:browserFriendly><item>
  10.            <title>Slashdot Asks: Did You Have a Shared Family Computer Growing Up?</title>
  11.            <link>https://hardware.slashdot.org/story/18/08/14/2119205/slashdot-asks-did-you-have-a-shared-family-computer-growing-up?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  12.            <description>theodp writes: "Long before phone addiction panic gripped the masses and before screen time became a facet of our wellness and digital detoxes," begins Katie Reid's article, How the Shared Family Computer Protected Us from Our Worst Selves, "there was one good and wise piece of technology that served our families. Maybe it was in the family room or in the kitchen. It could have been a Mac or PC. Chances are it had a totally mesmerizing screensaver. It was the shared family desktop." She continues: "I can still see the Dell I grew up using as clear as day, like I just connected to NetZero yesterday. It sat in my eldest sister's room, which was just off the kitchen. Depending on when you peeked into the room, you might have found my dad playing Solitaire, my sister downloading songs from Napster, or me playing Wheel of Fortune or writing my name in Microsoft Paint. The rules for using the family desktop were pretty simple: homework trumped games; Dad trumped all. Like the other shared equipment in our house, its usefulness was focused and direct: it was a tool that the whole family used, and it was our portal to the wild, weird, wonderful internet. As such, we adored it." Did you have a shared family computer growing up? Can you relate to any of the experiences Katie mentioned in her article? Please share your thoughts in a comment below.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  13. &lt;a class="slashpop" href="http://twitter.com/home?status=Slashdot+Asks%3A+Did+You+Have+a+Shared+Family+Computer+Growing+Up%3F%3A+http%3A%2F%2Fbit.ly%2F2vJbgaN"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  14. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fhardware.slashdot.org%2Fstory%2F18%2F08%2F14%2F2119205%2Fslashdot-asks-did-you-have-a-shared-family-computer-growing-up%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  15.  
  16. &lt;a class="nobg" href="http://plus.google.com/share?url=https://hardware.slashdot.org/story/18/08/14/2119205/slashdot-asks-did-you-have-a-shared-family-computer-growing-up?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  17.  
  18.  
  19.  
  20. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://hardware.slashdot.org/story/18/08/14/2119205/slashdot-asks-did-you-have-a-shared-family-computer-growing-up?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12479534&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/EIhQYYs7CFI" height="1" width="1" alt=""/&gt;</description>
  21.            <pubDate>Tue, 14 Aug 2018 20:40:00 +0100</pubDate>
  22.        </item>
  23.        <item>
  24.            <title>Tinder Founders Sue Dating App's Owners For At Least $2 Billion</title>
  25.            <link>https://yro.slashdot.org/story/18/08/14/2030259/tinder-founders-sue-dating-apps-owners-for-at-least-2-billion?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  26.            <description>An anonymous reader quotes a report from TechCrunch: A group of Tinder founders and executives has filed a lawsuit against parent company Match Group and its controlling shareholder IAC. The plaintiffs in the suit include Tinder co-founders Sean Rad, Justin Mateen and Jonathan Badeen -- Badeen still works at Tinder, as do plaintiffs James Kim (the company's vice president of finance) and Rosette Pambakian (its vice president of marketing and communications). The suit alleges that IAC and Match Group manipulated financial data in order to create "a fake lowball valuation" (to quote the plaintiffs' press release), then stripped Rad, Mateen, Badeen and others of their stock options. It points to the removal of Rad as CEO, as well as other management changes, as moves designed "to allow Defendants to control the valuation of Tinder and deprive Tinder optionholders of their right to participate in the company's future success." The lawsuit also alleges that Greg Blatt, the Match CEO who became CEO of Tinder, groped and sexually harassed Pambakian at the company's 2016 holiday party, supposedly leading the company to "whitewash" his actions long enough for him to complete the valuation of Tinder and its merger with Match Group, and then to announce his departure. In response, the plaintiffs are asking for "compensatory damages in an amount to be determined at trial, but not less than $2,000,000,000." IAC and Match Group issued a statement denying the allegations: "...Match Group and the plaintiffs went through a rigorous, contractually-defined valuation process involving two independent global investment banks, and Mr. Rad and his merry band of plaintiffs did not like the outcome. Mr. Rad (who was dismissed from the Company a year ago) and Mr. Mateen (who has not been with the Company in years) may not like the fact that Tinder has experienced enormous success following their respective departures, but sour grapes alone do not a lawsuit make. Mr. Rad has a rich history of outlandish public statements, and this lawsuit contains just another series of them. We look forward to defending our position in court."&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  27. &lt;a class="slashpop" href="http://twitter.com/home?status=Tinder+Founders+Sue+Dating+App's+Owners+For+At+Least+%242+Billion%3A+http%3A%2F%2Fbit.ly%2F2vJ6RET"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  28. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fyro.slashdot.org%2Fstory%2F18%2F08%2F14%2F2030259%2Ftinder-founders-sue-dating-apps-owners-for-at-least-2-billion%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  29.  
  30. &lt;a class="nobg" href="http://plus.google.com/share?url=https://yro.slashdot.org/story/18/08/14/2030259/tinder-founders-sue-dating-apps-owners-for-at-least-2-billion?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  31.  
  32.  
  33.  
  34. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://yro.slashdot.org/story/18/08/14/2030259/tinder-founders-sue-dating-apps-owners-for-at-least-2-billion?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12479454&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/izROhtRhFB8" height="1" width="1" alt=""/&gt;</description>
  35.            <pubDate>Tue, 14 Aug 2018 20:00:00 +0100</pubDate>
  36.        </item>
  37.        <item>
  38.            <title>Vaping Can Damage Vital Immune System Cells, Researchers Find</title>
  39.            <link>https://science.slashdot.org/story/18/08/14/1818210/vaping-can-damage-vital-immune-system-cells-researchers-find?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  40.            <description>Vaping can damage vital immune system cells and may be more harmful than previously thought, a study suggests. Researchers found e-cigarette vapour disabled important immune cells in the lung and boosted inflammation. From a report: The researchers "caution against the widely held opinion that e-cigarettes are safe." However, Public Health England advises they are much less harmful than smoking and people should not hesitate to use them as an aid to giving up cigarettes. The small experimental study, led by Prof David Thickett, at the University of Birmingham, is published online in the journal Thorax. Previous studies have focused on the chemical composition of e-cigarette liquid before it is vaped. In this study, the researchers devised a mechanical procedure to mimic vaping in the laboratory, using lung tissue samples provided by eight non-smokers. They found vapour caused inflammation and impaired the activity of alveolar macrophages, cells that remove potentially damaging dust particles, bacteria and allergens.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  41. &lt;a class="slashpop" href="http://twitter.com/home?status=Vaping+Can+Damage+Vital+Immune+System+Cells%2C+Researchers+Find%3A+http%3A%2F%2Fbit.ly%2F2vIyUnT"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  42. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fscience.slashdot.org%2Fstory%2F18%2F08%2F14%2F1818210%2Fvaping-can-damage-vital-immune-system-cells-researchers-find%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  43.  
  44. &lt;a class="nobg" href="http://plus.google.com/share?url=https://science.slashdot.org/story/18/08/14/1818210/vaping-can-damage-vital-immune-system-cells-researchers-find?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  45.  
  46.  
  47.  
  48. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://science.slashdot.org/story/18/08/14/1818210/vaping-can-damage-vital-immune-system-cells-researchers-find?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12479266&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/v2FctZD9F4w" height="1" width="1" alt=""/&gt;</description>
  49.            <pubDate>Tue, 14 Aug 2018 19:20:00 +0100</pubDate>
  50.        </item>
  51.        <item>
  52.            <title>Mathematicians Solve Age-Old Spaghetti Mystery</title>
  53.            <link>https://science.slashdot.org/story/18/08/14/1839255/mathematicians-solve-age-old-spaghetti-mystery?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  54.            <description>If you happen to have a box of spaghetti in your pantry, try this experiment: Pull out a single spaghetti stick and hold it at both ends. Now bend it until it breaks. How many fragments did you make? If the answer is three or more, pull out another stick and try again. Can you break the noodle in two? If not, you're in very good company. From a report: The spaghetti challenge has flummoxed even the likes of famed physicist Richard Feynman '39, who once spent a good portion of an evening breaking pasta and looking for a theoretical explanation for why the sticks refused to snap in two. Feynman's kitchen experiment remained unresolved until 2005, when physicists from France pieced together a theory to describe the forces at work when spaghetti -- and any long, thin rod -- is bent. They found that when a stick is bent evenly from both ends, it will break near the center, where it is most curved. This initial break triggers a "snap-back" effect and a bending wave, or vibration, that further fractures the stick. Their theory, which won the 2006 Ig Nobel Prize, seemed to solve Feynman's puzzle. But a question remained: Could spaghetti ever be coerced to break in two? The answer, according to a new MIT study, is yes -- with a twist. In a paper published this week in the Proceedings of the National Academy of Sciences, researchers report that they have found a way to break spaghetti in two, by both bending and twisting the dry noodles. They carried out experiments with hundreds of spaghetti sticks, bending and twisting them with an apparatus they built specifically for the task. The team found that if a stick is twisted past a certain critical degree, then slowly bent in half, it will, against all odds, break in two. The researchers say the results may have applications beyond culinary curiosities, such as enhancing the understanding of crack formation and how to control fractures in other rod-like materials such as multifiber structures, engineered nanotubes, or even microtubules in cells.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  55. &lt;a class="slashpop" href="http://twitter.com/home?status=Mathematicians+Solve+Age-Old+Spaghetti+Mystery%3A+http%3A%2F%2Fbit.ly%2F2KSo974"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  56. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fscience.slashdot.org%2Fstory%2F18%2F08%2F14%2F1839255%2Fmathematicians-solve-age-old-spaghetti-mystery%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  57.  
  58. &lt;a class="nobg" href="http://plus.google.com/share?url=https://science.slashdot.org/story/18/08/14/1839255/mathematicians-solve-age-old-spaghetti-mystery?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  59.  
  60.  
  61.  
  62. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://science.slashdot.org/story/18/08/14/1839255/mathematicians-solve-age-old-spaghetti-mystery?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12479292&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/I-D67mE6ckg" height="1" width="1" alt=""/&gt;</description>
  63.            <pubDate>Tue, 14 Aug 2018 18:40:00 +0100</pubDate>
  64.        </item>
  65.        <item>
  66.            <title>Intel Discloses Three More Chip Flaws</title>
  67.            <link>https://it.slashdot.org/story/18/08/14/1931231/intel-discloses-three-more-chip-flaws?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  68.            <description>Intel on Tuesday disclosed three more possible flaws in some of its microprocessors that can be exploited to gain access to certain data from computer memory. From a report: Its commonly used Core and Xeon processors were among the products that were affected, the company said. "We are not aware of reports that any of these methods have been used in real-world exploits, but this further underscores the need for everyone to adhere to security best practices," the company said in a blog post. Intel also released updates to address the issue and said new updates coupled those released earlier in the year will reduce the risk for users, including personal computer clients and data centres. In January, the company came under scrutiny after security researchers disclosed flaws that they said could let hackers steal sensitive information from nearly every modern computing device containing chips from Intel, Advanced Micro Devices and ARM.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  69. &lt;a class="slashpop" href="http://twitter.com/home?status=Intel+Discloses+Three+More+Chip+Flaws%3A+http%3A%2F%2Fbit.ly%2F2vLe8Up"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  70. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fit.slashdot.org%2Fstory%2F18%2F08%2F14%2F1931231%2Fintel-discloses-three-more-chip-flaws%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  71.  
  72. &lt;a class="nobg" href="http://plus.google.com/share?url=https://it.slashdot.org/story/18/08/14/1931231/intel-discloses-three-more-chip-flaws?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  73.  
  74.  
  75.  
  76. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://it.slashdot.org/story/18/08/14/1931231/intel-discloses-three-more-chip-flaws?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12479360&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/QkFi5k9IgYk" height="1" width="1" alt=""/&gt;</description>
  77.            <pubDate>Tue, 14 Aug 2018 18:00:00 +0100</pubDate>
  78.        </item>
  79.        <item>
  80.            <title>Putting Stickers On Your Laptop is Probably a Bad Security Idea</title>
  81.            <link>https://it.slashdot.org/story/18/08/14/1739252/putting-stickers-on-your-laptop-is-probably-a-bad-security-idea?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  82.            <description>From border crossings to hacking conferences, that Bitcoin or political sticker may be worth leaving on a case at home. From a report: Plenty of hackers, journalists, and technologists love to cover their laptop in all manner of stickers. Maybe one shows off their employer, another flaunts that local cryptoparty they attended, or others may display the laptop owner's interest in Bitcoin. That's all well and good, but a laptop lid full of stickers also arguably provides something of a red flag to authorities or hackers who may want to access sensitive information stored on that computer, or otherwise cause the owner hassle. "Conferences, border crossing[s], airports, public places -- stickers will/can get you targeted for opposition research, industrial espionage, legal or investigative scrutiny," Matt Mitchell, director of digital safety and privacy for technology and activism group Tactical Tech, told Motherboard in an online chat. Mitchell said political stickers, for instance, can land you in secondary search or result in being detained while crossing a border. In one case, Mitchell said a hacker friend ended up missing a flight over stickers.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  83. &lt;a class="slashpop" href="http://twitter.com/home?status=Putting+Stickers+On+Your+Laptop+is+Probably+a+Bad+Security+Idea%3A+http%3A%2F%2Fbit.ly%2F2vIyaPl"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  84. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fit.slashdot.org%2Fstory%2F18%2F08%2F14%2F1739252%2Fputting-stickers-on-your-laptop-is-probably-a-bad-security-idea%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  85.  
  86. &lt;a class="nobg" href="http://plus.google.com/share?url=https://it.slashdot.org/story/18/08/14/1739252/putting-stickers-on-your-laptop-is-probably-a-bad-security-idea?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  87.  
  88.  
  89.  
  90. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://it.slashdot.org/story/18/08/14/1739252/putting-stickers-on-your-laptop-is-probably-a-bad-security-idea?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12479184&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/DILlQDmdZB4" height="1" width="1" alt=""/&gt;</description>
  91.            <pubDate>Tue, 14 Aug 2018 17:20:00 +0100</pubDate>
  92.        </item>
  93.        <item>
  94.            <title>Hackers Can Falsify Patient Vitals</title>
  95.            <link>https://it.slashdot.org/story/18/08/14/1228214/hackers-can-falsify-patient-vitals?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  96.            <description>Hackers can falsify patients' vitals by emulating data sent from medical equipment clients to central monitoring systems, a McAfee security researcher revealed over the weekend at the DEF CON 26 security conference. BleepingComputer: The research, available here, takes advantage of a weak communications protocol used by some patient monitoring equipment to send data to a central monitoring station. McAfee security researcher Douglas McKee says he was able to reverse engineer this protocol, create a device that emulates patients vitals, and send incorrect information to a central monitoring station. This attack required physical access to the patient, as the attacker needed to disconnect the patient monitoring client and replace it with his own device that feeds incorrect patient vitals to the central station monitored by medical professionals. But McKee also devised another method of feeding central monitoring stations without needing to disconnect the patient monitoring client.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  97. &lt;a class="slashpop" href="http://twitter.com/home?status=Hackers+Can+Falsify+Patient+Vitals%3A+http%3A%2F%2Fbit.ly%2F2vKIHcX"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  98. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fit.slashdot.org%2Fstory%2F18%2F08%2F14%2F1228214%2Fhackers-can-falsify-patient-vitals%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  99.  
  100. &lt;a class="nobg" href="http://plus.google.com/share?url=https://it.slashdot.org/story/18/08/14/1228214/hackers-can-falsify-patient-vitals?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  101.  
  102.  
  103.  
  104. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://it.slashdot.org/story/18/08/14/1228214/hackers-can-falsify-patient-vitals?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12478338&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/AqLsxajjhH0" height="1" width="1" alt=""/&gt;</description>
  105.            <pubDate>Tue, 14 Aug 2018 16:40:00 +0100</pubDate>
  106.        </item>
  107.        <item>
  108.            <title>Built-in Lazy Loading Lands in Google Chrome Canary</title>
  109.            <link>https://tech.slashdot.org/story/18/08/14/1240213/built-in-lazy-loading-lands-in-google-chrome-canary?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  110.            <description>secwatcher writes: Google has started rolling out support for built-in lazy loading inside Chrome. Currently, support for image and iframe lazy loading is only available in Chrome Canary, the Chrome version that Google uses to test new features. Two flags are now available in the chrome://flags section of Chrome Canary. They are: chrome://flags/#enable-lazy-image-loading, chrome://flags/#enable-lazy-frame-loading. Enabling these two flags will activate a new type of content loading behavior inside the Chrome browser. The two flags have been available in Chrome Canary for a few days, since v70.0.3521.0.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  111. &lt;a class="slashpop" href="http://twitter.com/home?status=Built-in+Lazy+Loading+Lands+in+Google+Chrome+Canary%3A+http%3A%2F%2Fbit.ly%2F2vIztOq"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  112. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Ftech.slashdot.org%2Fstory%2F18%2F08%2F14%2F1240213%2Fbuilt-in-lazy-loading-lands-in-google-chrome-canary%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  113.  
  114. &lt;a class="nobg" href="http://plus.google.com/share?url=https://tech.slashdot.org/story/18/08/14/1240213/built-in-lazy-loading-lands-in-google-chrome-canary?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  115.  
  116.  
  117.  
  118. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://tech.slashdot.org/story/18/08/14/1240213/built-in-lazy-loading-lands-in-google-chrome-canary?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12478398&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/XJudmCQxiaM" height="1" width="1" alt=""/&gt;</description>
  119.            <pubDate>Tue, 14 Aug 2018 16:00:00 +0100</pubDate>
  120.        </item>
  121.        <item>
  122.            <title>Hundreds of Instagram Users Say Their Accounts Have Been Compromised By What Appears To Be a ...</title>
  123.            <link>https://it.slashdot.org/story/18/08/14/1715244/hundreds-of-instagram-users-say-their-accounts-have-been-compromised-by-what-appears-to-be-a-coordinated-attack?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  124.            <description>A number of people have reported having their Instagram accounts hacked this month, Mashable reports, and many of these hacks appear to have taken the same approach. From a report: Users suddenly find themselves logged out of their accounts and when they try to log back in, they discover that their handle, profile image, contact info and bios have all been changed. Often the profile image has been changed to a Disney or Pixar character and the email address connected to the account is changed to one with a .ru Russian domain, according to Mashable. Some even had their two-factor authentication turned off by hackers. A handful of Instagram users reported the same details to Mashable as have hundreds of others who have taken to Twitter and Reddit to report hacks of their accounts.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  125. &lt;a class="slashpop" href="http://twitter.com/home?status=Hundreds+of+Instagram+Users+Say+Their+Accounts+Have+Been+Compromised+By+What+Appears+To+Be+a+Coordinated+Attack%3A+http%3A%2F%2Fbit.ly%2F2vKP145"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  126. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fit.slashdot.org%2Fstory%2F18%2F08%2F14%2F1715244%2Fhundreds-of-instagram-users-say-their-accounts-have-been-compromised-by-what-appears-to-be-a-coordinated-attack%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  127.  
  128. &lt;a class="nobg" href="http://plus.google.com/share?url=https://it.slashdot.org/story/18/08/14/1715244/hundreds-of-instagram-users-say-their-accounts-have-been-compromised-by-what-appears-to-be-a-coordinated-attack?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  129.  
  130.  
  131.  
  132. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://it.slashdot.org/story/18/08/14/1715244/hundreds-of-instagram-users-say-their-accounts-have-been-compromised-by-what-appears-to-be-a-coordinated-attack?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12479128&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/xO1JqtgbJRY" height="1" width="1" alt=""/&gt;</description>
  133.            <pubDate>Tue, 14 Aug 2018 15:20:00 +0100</pubDate>
  134.        </item>
  135.        <item>
  136.            <title>Fewer Than Half of Young Americans Are Positive About Capitalism</title>
  137.            <link>https://news.slashdot.org/story/18/08/14/1628218/fewer-than-half-of-young-americans-are-positive-about-capitalism?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  138.            <description>gollum123 writes: According to a new poll from Gallup, young Americans are souring on capitalism. Less than half, 45 percent, view capitalism positively. "This represents a 12-point decline in young adults' positive views of capitalism in just the past two years and a marked shift since 2010, when 68 percent viewed it positively," notes Gallup, which defines young Americans as those aged 18 to 29. Meanwhile, 51 percent of young people are positive about socialism. This age group's "views of socialism have fluctuated somewhat from year to year," reports Gallup, "but the 51 percent with a positive view today is the same as in 2010."&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  139. &lt;a class="slashpop" href="http://twitter.com/home?status=Fewer+Than+Half+of+Young+Americans+Are+Positive+About+Capitalism%3A+http%3A%2F%2Fbit.ly%2F2vJTJ2l"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  140. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fnews.slashdot.org%2Fstory%2F18%2F08%2F14%2F1628218%2Ffewer-than-half-of-young-americans-are-positive-about-capitalism%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  141.  
  142. &lt;a class="nobg" href="http://plus.google.com/share?url=https://news.slashdot.org/story/18/08/14/1628218/fewer-than-half-of-young-americans-are-positive-about-capitalism?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  143.  
  144.  
  145.  
  146. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://news.slashdot.org/story/18/08/14/1628218/fewer-than-half-of-young-americans-are-positive-about-capitalism?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12478992&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/4gSa4DPyHtE" height="1" width="1" alt=""/&gt;</description>
  147.            <pubDate>Tue, 14 Aug 2018 14:40:00 +0100</pubDate>
  148.        </item>
  149.        <item>
  150.            <title>Banks and Retailers Are Tracking How You Type, Swipe and Tap</title>
  151.            <link>https://yro.slashdot.org/story/18/08/14/1015222/banks-and-retailers-are-tracking-how-you-type-swipe-and-tap?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  152.            <description>When you're browsing a website and the mouse cursor disappears, it might be a computer glitch -- or it might be a deliberate test to find out who you are. The way you press, scroll and type on a phone screen or keyboard can be as unique as your fingerprints or facial features. To fight fraud, a growing number of banks and merchants are tracking visitors' physical movements as they use websites and apps. From a report: Some use the technology only to weed out automated attacks and suspicious transactions, but others are going significantly further, amassing tens of millions of profiles that can identify customers by how they touch, hold and tap their devices. The data collection is invisible to those being watched. Using sensors in your phone or code on websites, companies can gather thousands of data points, known as "behavioral biometrics," to help prove whether a digital user is actually the person she claims to be. To security officials, the technology is a powerful safeguard. Major data breaches are a near-daily occurrence. Cyberthieves have obtained billions of passwords and other sensitive personal information, which can be used to steal from customers' bank and shopping accounts and fraudulently open new ones.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  153. &lt;a class="slashpop" href="http://twitter.com/home?status=Banks+and+Retailers+Are+Tracking+How+You+Type%2C+Swipe+and+Tap%3A+http%3A%2F%2Fbit.ly%2F2vIggMX"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  154. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fyro.slashdot.org%2Fstory%2F18%2F08%2F14%2F1015222%2Fbanks-and-retailers-are-tracking-how-you-type-swipe-and-tap%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  155.  
  156. &lt;a class="nobg" href="http://plus.google.com/share?url=https://yro.slashdot.org/story/18/08/14/1015222/banks-and-retailers-are-tracking-how-you-type-swipe-and-tap?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  157.  
  158.  
  159.  
  160. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://yro.slashdot.org/story/18/08/14/1015222/banks-and-retailers-are-tracking-how-you-type-swipe-and-tap?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12477480&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/mjo6KHEyqkw" height="1" width="1" alt=""/&gt;</description>
  161.            <pubDate>Tue, 14 Aug 2018 14:00:00 +0100</pubDate>
  162.        </item>
  163.        <item>
  164.            <title>Hundreds of Researchers From Harvard, Yale and Stanford Were Published in Fake Academic Journals</title>
  165.            <link>https://science.slashdot.org/story/18/08/14/1245253/hundreds-of-researchers-from-harvard-yale-and-stanford-were-published-in-fake-academic-journals?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  166.            <description>In the so-called "post-truth era," science seems like one of the last bastions of objective knowledge, but what if science itself were to succumb to fake news? From a report: Over the past year, German journalist Svea Eckert and a small team of journalists went undercover to investigate a massive underground network of fake science journals and conferences. In the course of the investigation, which was chronicled in the documentary "Inside the Fake Science Factory," the team analyzed over 175,000 articles published in predatory journals and found hundreds of papers from academics at leading institutions, as well as substantial amounts of research pushed by pharmaceutical corporations, tobacco companies, and others. Last year, one fake science institution run by a Turkish family was estimated to have earned over $4 million in revenue through conferences and journals. Eckert's story begins with the World Academy of Science, Engineering and Technology (WASET), an organization based in Turkey. At first glance, WASET seems to be a legitimate organization. Its website lists thousands of conferences around the world in pretty much every conceivable academic discipline, with dates scheduled all the way out to 2031. It has also published over ten thousand papers in an "open science, peer reviewed, interdisciplinary, monthly and fully referred [sic] international research journal" that covers everything from aerospace engineering to nutrition. To any scientist familiar with the peer review process, however, WASET's site has a number of red flags, such as spelling errors and the sheer scope of the disciplines it publishes.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  167. &lt;a class="slashpop" href="http://twitter.com/home?status=Hundreds+of+Researchers+From+Harvard%2C+Yale+and+Stanford+Were+Published+in+Fake+Academic+Journals%3A+http%3A%2F%2Fbit.ly%2F2KMS9Bn"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  168. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fscience.slashdot.org%2Fstory%2F18%2F08%2F14%2F1245253%2Fhundreds-of-researchers-from-harvard-yale-and-stanford-were-published-in-fake-academic-journals%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  169.  
  170. &lt;a class="nobg" href="http://plus.google.com/share?url=https://science.slashdot.org/story/18/08/14/1245253/hundreds-of-researchers-from-harvard-yale-and-stanford-were-published-in-fake-academic-journals?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  171.  
  172.  
  173.  
  174. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://science.slashdot.org/story/18/08/14/1245253/hundreds-of-researchers-from-harvard-yale-and-stanford-were-published-in-fake-academic-journals?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12478430&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/BnEZZ_0NwxE" height="1" width="1" alt=""/&gt;</description>
  175.            <pubDate>Tue, 14 Aug 2018 13:20:00 +0100</pubDate>
  176.        </item>
  177.        <item>
  178.            <title>US Warns on Russia's New Space Weapons</title>
  179.            <link>https://politics.slashdot.org/story/18/08/14/1315248/us-warns-on-russias-new-space-weapons?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  180.            <description>The United States voiced deep suspicion on Tuesday over Russia's pursuit of new space weapons, including a mobile laser system to destroy satellites in space, and the launch of a new inspector satellite which was acting in an "abnormal" way. From a report: Russia's pursuit of counterspace capabilities was "disturbing," Yleem D.S. Poblete, U.S. Assistant Secretary of State for Arms Control, Verification and Compliance, told the U.N.'s Conference on Disarmament which is discussing a new treaty to prevent an arms race in outer space. A Russian delegate at the conference dismissed Poblete's remarks as unfounded and slanderous. Russian Foreign Minister Sergei Lavrov, at the Geneva forum in February, said a priority was to prevent an arms race in outer space, in line with Russia's joint draft treaty with China presented a decade ago.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  181. &lt;a class="slashpop" href="http://twitter.com/home?status=US+Warns+on+Russia's+New+Space+Weapons%3A+http%3A%2F%2Fbit.ly%2F2vJWhgJ"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  182. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fpolitics.slashdot.org%2Fstory%2F18%2F08%2F14%2F1315248%2Fus-warns-on-russias-new-space-weapons%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  183.  
  184. &lt;a class="nobg" href="http://plus.google.com/share?url=https://politics.slashdot.org/story/18/08/14/1315248/us-warns-on-russias-new-space-weapons?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  185.  
  186.  
  187.  
  188. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://politics.slashdot.org/story/18/08/14/1315248/us-warns-on-russias-new-space-weapons?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12478540&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/fKsABr_7h8M" height="1" width="1" alt=""/&gt;</description>
  189.            <pubDate>Tue, 14 Aug 2018 12:40:00 +0100</pubDate>
  190.        </item>
  191.        <item>
  192.            <title>Apple Pulls iOS 12 Beta 7 Update Due To Performance Issues</title>
  193.            <link>https://apple.slashdot.org/story/18/08/14/1419232/apple-pulls-ios-12-beta-7-update-due-to-performance-issues?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  194.            <description>Apple has quietly pulled iOS 12 Beta 7 software, aimed at developers and enthusiasts, less than a day after rolling it out. Even as the company has not offered an explanation -- or an acknowledgement -- according to users, performance issues might be the reason. MacRumors: On the MacRumors forums, there are multiple reports of problems when tapping on an icon, which can result in a very noticeable pause before the app launches. As MacRumors reader OldSchoolMacGuy explains: "I'm seeing apps take 10 seconds or more to launch on my X. Restarted and still seeing the same issue." Some users have said that the pausing issue disappeared for them after five or 10 minutes of using the iPhone, while others appear to be having continual problems. Prior to when Apple pulled the update, several MacRumors readers had warned other users against installing the update on their iPhones.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  195. &lt;a class="slashpop" href="http://twitter.com/home?status=Apple+Pulls+iOS+12+Beta+7+Update+Due+To+Performance+Issues%3A+http%3A%2F%2Fbit.ly%2F2OBzWZB"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  196. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fapple.slashdot.org%2Fstory%2F18%2F08%2F14%2F1419232%2Fapple-pulls-ios-12-beta-7-update-due-to-performance-issues%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  197.  
  198. &lt;a class="nobg" href="http://plus.google.com/share?url=https://apple.slashdot.org/story/18/08/14/1419232/apple-pulls-ios-12-beta-7-update-due-to-performance-issues?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  199.  
  200.  
  201.  
  202. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://apple.slashdot.org/story/18/08/14/1419232/apple-pulls-ios-12-beta-7-update-due-to-performance-issues?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12478732&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/EnZq88ymrEk" height="1" width="1" alt=""/&gt;</description>
  203.            <pubDate>Tue, 14 Aug 2018 12:20:00 +0100</pubDate>
  204.        </item>
  205.        <item>
  206.            <title>Bitcoin Sinks Below $6,000 as Almost Everything Crypto Tumbles</title>
  207.            <link>https://news.slashdot.org/story/18/08/14/1353231/bitcoin-sinks-below-6000-as-almost-everything-crypto-tumbles?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  208.            <description>Several readers have shared a report: Bitcoin touched below $6,000 and dozens of smaller digital tokens including Ether retreated as this month's sell-off in cryptocurrencies showed few signs of letting up. The largest digital currency fell as much as 6.2 percent to $5,887, the lowest level since June, before paring some of the drop, according to Bloomberg composite pricing. Ether sank as much as 13 percent, while all but one of the 100 biggest cryptocurrencies tracked by Coinmarketcap.com recorded declines over the past 24 hours. The total market capitalization of virtual currencies dropped to $193 billion. That&amp;#226;(TM)s down from a peak of about $835 billion in January.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  209. &lt;a class="slashpop" href="http://twitter.com/home?status=Bitcoin+Sinks+Below+%246%2C000+as+Almost+Everything+Crypto+Tumbles%3A+http%3A%2F%2Fbit.ly%2F2KRADfh"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  210. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fnews.slashdot.org%2Fstory%2F18%2F08%2F14%2F1353231%2Fbitcoin-sinks-below-6000-as-almost-everything-crypto-tumbles%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  211.  
  212. &lt;a class="nobg" href="http://plus.google.com/share?url=https://news.slashdot.org/story/18/08/14/1353231/bitcoin-sinks-below-6000-as-almost-everything-crypto-tumbles?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  213.  
  214.  
  215.  
  216. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://news.slashdot.org/story/18/08/14/1353231/bitcoin-sinks-below-6000-as-almost-everything-crypto-tumbles?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12478662&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/tyEMAaHJltI" height="1" width="1" alt=""/&gt;</description>
  217.            <pubDate>Tue, 14 Aug 2018 12:00:00 +0100</pubDate>
  218.        </item>
  219.        <item>
  220.            <title>Trump Signs Defense Bill With Watered-Down ZTE Sanctions</title>
  221.            <link>https://yro.slashdot.org/story/18/08/14/0610228/trump-signs-defense-bill-with-watered-down-zte-sanctions?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  222.            <description>An anonymous reader quotes a report from CNET: President Donald Trump on Monday signed a $716 billion defense policy bill that weakened efforts to punish Chinese telecom giant ZTE for violating trade laws. The bill, named for ailing Arizona Sen. John McCain, prohibits the U.S. government and its contractors from buying certain telecommunications and video surveillance equipment from ZTE, Huawei and a handful of other Chinese communications companies. The ban covers components and services deemed "essential" or "critical" to any government system. Some lawmakers had hoped to use the bill to reinstate tough penalties against ZTE, but the compromise bill removed a provision that would undo a deal the Commerce Department struck in June for ZTE to pay a $1 billion penalty to resume business with U.S. suppliers. But lawmakers agreed to abandon that effort in late July. Huawei called the inclusion of its products in the bill "ineffective, misguided and unconstitutional." They added: "It does nothing to identify real security risks or improve supply chain security, and will only serve to stifle innovation while increasing internet costs for U.S. consumers and businesses. We believe that the American people deserve equal access to the best possible connections and smart device options, and will keep working to make this happen."&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  223. &lt;a class="slashpop" href="http://twitter.com/home?status=Trump+Signs+Defense+Bill+With+Watered-Down+ZTE+Sanctions%3A+http%3A%2F%2Fbit.ly%2F2KQRnDj"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  224. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fyro.slashdot.org%2Fstory%2F18%2F08%2F14%2F0610228%2Ftrump-signs-defense-bill-with-watered-down-zte-sanctions%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  225.  
  226. &lt;a class="nobg" href="http://plus.google.com/share?url=https://yro.slashdot.org/story/18/08/14/0610228/trump-signs-defense-bill-with-watered-down-zte-sanctions?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  227.  
  228.  
  229.  
  230. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://yro.slashdot.org/story/18/08/14/0610228/trump-signs-defense-bill-with-watered-down-zte-sanctions?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12475828&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/RUP-DmlwRhM" height="1" width="1" alt=""/&gt;</description>
  231.            <pubDate>Tue, 14 Aug 2018 11:00:00 +0100</pubDate>
  232.        </item>
  233.        <item>
  234.            <title>Android Pie Breaks Pixel XL's Ability To Fast Charge</title>
  235.            <link>https://mobile.slashdot.org/story/18/08/14/0559223/android-pie-breaks-pixel-xls-ability-to-fast-charge?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  236.            <description>Google's recent launch of Android 9.0 Pie hasn't gone off without some early bugs and issues. According to The Verge, users are reporting that Android Pie prevents their phone from fast charging when plugged into many chargers. Google's own charger doesn't even appear to be working. From the report: Other Pixel XL owners say the bundled charger still functions properly and displays "charging rapidly," but third-party USB-PD (power delivery) chargers no longer juice up the XL as quickly as they did pre-update. Google has oddly marked a bug report on the problem as "won't fix (infeasible)," which is likely alarming to see for those experiencing it, especially since it can very clearly be attributed to the Android 9.0 update. Things were working normally, then Pie came, and then something broke. A second thread has been posted with more users chiming in to confirm they're affected.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  237. &lt;a class="slashpop" href="http://twitter.com/home?status=Android+Pie+Breaks+Pixel+XL's+Ability+To+Fast+Charge%3A+http%3A%2F%2Fbit.ly%2F2Oz4HOV"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  238. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fmobile.slashdot.org%2Fstory%2F18%2F08%2F14%2F0559223%2Fandroid-pie-breaks-pixel-xls-ability-to-fast-charge%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  239.  
  240. &lt;a class="nobg" href="http://plus.google.com/share?url=https://mobile.slashdot.org/story/18/08/14/0559223/android-pie-breaks-pixel-xls-ability-to-fast-charge?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  241.  
  242.  
  243.  
  244. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://mobile.slashdot.org/story/18/08/14/0559223/android-pie-breaks-pixel-xls-ability-to-fast-charge?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12475772&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/t3AYK9-a2OM" height="1" width="1" alt=""/&gt;</description>
  245.            <pubDate>Tue, 14 Aug 2018 08:00:00 +0100</pubDate>
  246.        </item>
  247.        <item>
  248.            <title>NVIDIA Unveils Next-Gen Turing Quadro RTX Professional Graphics Cards</title>
  249.            <link>https://hardware.slashdot.org/story/18/08/14/034205/nvidia-unveils-next-gen-turing-quadro-rtx-professional-graphics-cards?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  250.            <description>MojoKid shares a report from Hot Hardware: We been hearing a lot about NVIDA's next-generation GPU architecture since late last year, and today NVIDIA is announcing the first products based on Turing. NVIDIA is targeting the professional graphics market first with its new Quadro RTX 8000, RTX 6000 and RTX 5000 GPUs. Turing GPU architecture replaces Pascal, which has served both the consumer and professional markets since 2016. But as its 8th generation GPU architecture, NVIDIA is ushering in a number of advances with Turing and it's billed as the "world's first ray-tracing GPU." When it comes to content creators, NVIDIA claims that with the power of Turing, "applications can simulate the physical world at 6x the speed of the previous Pascal generation." Getting down to brass tacks, the entry-level Quadro RTX 5000 has 3,072 CUDA cores, 384 Tensor cores, and will come with 16GB of 14Gbps GDDR6 memory. Its ray-tracing performance is dialed in at 6 GigaRays/sec, according to NVIDIA. Both the Quadro RTX 6000 and RTX 8000 have 4,608 CUDA cores and 576 Tensor cores; the only difference between the two is that the former has 24GB of GDDR6, while the latter doubles that to 96GB. Ray-tracing performance for both of these GPUs tops out at 10 GigaRays/sec. NVIDIA is also claiming up to 16TFLOPs compute performance for the Quadro RTX 8000. NVIDIA's new Quadro GPUs will also be among the first to support both USB-C and VirtualLink for next-generation virtual reality and mixed reality headsets. Other VirtualLink backers include AMD, Oculus, Microsoft and Valve. The Quadro RTX 5000, RTX 6000 and RTX 8000 will all be available during the fourth quarter of 2018 priced at $2,300, $6,300 and $10,000 respectively.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  251. &lt;a class="slashpop" href="http://twitter.com/home?status=NVIDIA+Unveils+Next-Gen+Turing+Quadro+RTX+Professional+Graphics+Cards%3A+http%3A%2F%2Fbit.ly%2F2KQcDsR"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  252. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fhardware.slashdot.org%2Fstory%2F18%2F08%2F14%2F034205%2Fnvidia-unveils-next-gen-turing-quadro-rtx-professional-graphics-cards%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  253.  
  254. &lt;a class="nobg" href="http://plus.google.com/share?url=https://hardware.slashdot.org/story/18/08/14/034205/nvidia-unveils-next-gen-turing-quadro-rtx-professional-graphics-cards?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  255.  
  256.  
  257.  
  258. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://hardware.slashdot.org/story/18/08/14/034205/nvidia-unveils-next-gen-turing-quadro-rtx-professional-graphics-cards?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12475172&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/xiZ55TDOTkU" height="1" width="1" alt=""/&gt;</description>
  259.            <pubDate>Tue, 14 Aug 2018 05:00:00 +0100</pubDate>
  260.        </item>
  261.        <item>
  262.            <title>AI Identifies Heat-Resistant Coral Reefs In Indonesia</title>
  263.            <link>https://news.slashdot.org/story/18/08/14/0134214/ai-identifies-heat-resistant-coral-reefs-in-indonesia?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  264.            <description>An anonymous reader quotes a report from The Guardian: Between 2014 and 2017, the world's reefs endured the worst coral bleaching event in history, as the cyclical El Nino climate event combined with anthropogenic warming to cause unprecedented increases in water temperature. But the June survey, funded by Microsoft co-founder Paul Allen's family foundation, found the Sulawesi reefs were surprisingly healthy. In fact they were in better condition than when they were originally surveyed in 2014 -- a surprise for British scientist Dr Emma Kennedy, who led the research team.
  265. A combination of 360-degree imaging tech and Artificial Intelligence (AI) allowed scientists to gather and analyze more than 56,000 images of shallow water reefs. Over the course of a six-week voyage, the team deployed underwater scooters fitted with 360 degree cameras that allowed them to photograph up to 1.5 miles of reef per dive, covering a total of 1487 square miles in total. Researchers at the University of Queensland in Australia then used cutting edge AI software to handle the normally laborious process of identifying and cataloguing the reef imagery. Using the latest Deep Learning tech, they 'taught' the AI how to detect patterns in the complex contours and textures of the reef imagery and thus recognize different types of coral and other reef invertebrates. Once the AI had shown between 400 and 600 images, it was able to process images autonomously. The Ocean Agency has published a short 2-minute video on YouTube about the Coral Triangle survey.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  266. &lt;a class="slashpop" href="http://twitter.com/home?status=AI+Identifies+Heat-Resistant+Coral+Reefs+In+Indonesia%3A+http%3A%2F%2Fbit.ly%2F2KS8Hbj"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  267. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fnews.slashdot.org%2Fstory%2F18%2F08%2F14%2F0134214%2Fai-identifies-heat-resistant-coral-reefs-in-indonesia%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  268.  
  269. &lt;a class="nobg" href="http://plus.google.com/share?url=https://news.slashdot.org/story/18/08/14/0134214/ai-identifies-heat-resistant-coral-reefs-in-indonesia?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  270.  
  271.  
  272.  
  273. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://news.slashdot.org/story/18/08/14/0134214/ai-identifies-heat-resistant-coral-reefs-in-indonesia?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12475050&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/PtQEdmZGHac" height="1" width="1" alt=""/&gt;</description>
  274.            <pubDate>Tue, 14 Aug 2018 01:30:00 +0100</pubDate>
  275.        </item>
  276.        <item>
  277.            <title>California May Become First State To Require Companies To Have Women On Their Boards</title>
  278.            <link>https://yro.slashdot.org/story/18/08/14/0013220/california-may-become-first-state-to-require-companies-to-have-women-on-their-boards?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  279.            <description>Two female state senators from California are spearheading a bill to require companies to have women on their boards. "SB 826, which won Senate approval with only Democratic votes and has until the end of August to clear the Assembly, would require publicly held companies headquartered in California to have at least one woman on their boards of directors by end of next year," reports TechCrunch. "By 2021, companies with boards of five directors must have at least two women, and companies with six-member boards must have at least three women. Firms failing to comply would face a fine." From the report: "Gender diversity brings a variety of perspectives to the table that can help foster new and innovative ideas," said Democratic Sen. Hannah-Beth Jackson of Santa Barbara, who is sponsoring the bill with Senate President Pro Tem Toni Atkins of San Diego. "It's not only the right thing to do, it's good for a company's bottom line."
  280. Yet critics of the bill say it violates the federal and state constitutions. Business associations say the rule would require companies to discriminate against men wanting to serve on boards, as well as conflict with corporate law that says the internal affairs of a corporation should be governed by the state law in which it is incorporated. This bill would apply to companies headquartered in California. [A] legislative analysis of the bill cautioned that it could get challenged on equal protection grounds, and that it would be difficult to defend, requiring the state to prove a compelling government interest in such a quota system for a private corporation.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  281. &lt;a class="slashpop" href="http://twitter.com/home?status=California+May+Become+First+State+To+Require+Companies+To+Have+Women+On+Their+Boards%3A+http%3A%2F%2Fbit.ly%2F2Oyu6YW"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  282. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fyro.slashdot.org%2Fstory%2F18%2F08%2F14%2F0013220%2Fcalifornia-may-become-first-state-to-require-companies-to-have-women-on-their-boards%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  283.  
  284. &lt;a class="nobg" href="http://plus.google.com/share?url=https://yro.slashdot.org/story/18/08/14/0013220/california-may-become-first-state-to-require-companies-to-have-women-on-their-boards?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  285.  
  286.  
  287.  
  288. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://yro.slashdot.org/story/18/08/14/0013220/california-may-become-first-state-to-require-companies-to-have-women-on-their-boards?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12474930&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/WZl6DOAEkMU" height="1" width="1" alt=""/&gt;</description>
  289.            <pubDate>Tue, 14 Aug 2018 00:30:00 +0100</pubDate>
  290.        </item>
  291.        <item>
  292.            <title>'Do Not Buy a Smartwatch Right Now'</title>
  293.            <link>https://hardware.slashdot.org/story/18/08/14/0120236/do-not-buy-a-smartwatch-right-now?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  294.            <description>Since Qualcomm is set to launch a new wearable chipset on September 10, Kellen from DoidLife argues against buying a new Google Wear OS-powered smartwatch in the meantime. The new chipset will be able to execute commands quicker, and provide for substantially longer battery life. From the report: This new chipset is said to be built from the ground up, will allow watches to look pretty when you aren't using them (like a normal watch sitting idly by your side), and extend battery life. More importantly, Qualcomm is betting that this Snapdragon Wear chip will "significantly change the Wear OS ecosystem, what you expect from a smartwatch." If you buy a smartwatch today, before Qualcomm announces this chip, you will be stuck with a 2+ year old Snapdragon Wear 2100 chip. All of the new Wear OS watches that have been announced recently, use that chip. It's old. It's never been great. And it's about to be replaced by something potentially game-changing for smartwatches. A report from WinFuture says that this new Snapdragon chip will be called the Wear 3100 and will allow for "Ok Google" detection even when the display is off. It is rumored to come with Google's Pixel-branded smartwatch, although DroidLife thinks that LG will be one of the first to launch a watch with this new processor. "This LG watch is said to have physical watch hands, as well as the smarts of Wear OS and a touch display," reports DroidLife. It is expected to make its debut on September 10.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  295. &lt;a class="slashpop" href="http://twitter.com/home?status='Do+Not+Buy+a+Smartwatch+Right+Now'%3A+http%3A%2F%2Fbit.ly%2F2KPag9Q"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  296. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fhardware.slashdot.org%2Fstory%2F18%2F08%2F14%2F0120236%2Fdo-not-buy-a-smartwatch-right-now%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  297.  
  298. &lt;a class="nobg" href="http://plus.google.com/share?url=https://hardware.slashdot.org/story/18/08/14/0120236/do-not-buy-a-smartwatch-right-now?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  299.  
  300.  
  301.  
  302. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://hardware.slashdot.org/story/18/08/14/0120236/do-not-buy-a-smartwatch-right-now?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12475028&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/qe5A7jB7qJk" height="1" width="1" alt=""/&gt;</description>
  303.            <pubDate>Mon, 13 Aug 2018 23:50:00 +0100</pubDate>
  304.        </item>
  305.        <item>
  306.            <title>Court Blocks FCC's Attempt To Take a Broadband Subsidy Away From Tribal Areas</title>
  307.            <link>https://news.slashdot.org/story/18/08/14/0045251/court-blocks-fccs-attempt-to-take-a-broadband-subsidy-away-from-tribal-areas?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  308.            <description>Jon Brodkin reports via Ars Technica: The FCC decision, originally slated to take effect later this year, would have made it difficult or impossible for Tribal residents to obtain a $25-per-month Lifeline subsidy that reduces the cost of Internet or phone service for poor people. But on Friday, a court stayed the FCC decision pending appeal, saying that Tribal organizations and small wireless carriers are likely to win their case against the commission. "Petitioners have demonstrated a likelihood of success on the merits of their arguments that the facilities-based and rural areas limitations contained in the Order are arbitrary and capricious," said the stay order issued by the U.S. Court of Appeals for the District of Columbia Circuit. "In particular, petitioners contend that the Federal Communications Commission failed to account for a lack of alternative service providers for many tribal customers."
  309. The tribes and small carriers that sued the FCC "have shown a substantial risk that tribal populations will suffer widespread loss of vital telecommunications services absent a stay," the court said. The FCC hasn't proven that its plan won't result in "mass disconnection," the court also said. The court ruling was welcomed by the Crow Creek Sioux Tribe and Oceti Sakowin Tribal Utility Authority, which are among the groups suing the FCC. Several small carriers and the non-profit National Lifeline Association are also plaintiffs in the lawsuit.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  310. &lt;a class="slashpop" href="http://twitter.com/home?status=Court+Blocks+FCC's+Attempt+To+Take+a+Broadband+Subsidy+Away+From+Tribal+Areas%3A+http%3A%2F%2Fbit.ly%2F2vJIAye"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  311. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fnews.slashdot.org%2Fstory%2F18%2F08%2F14%2F0045251%2Fcourt-blocks-fccs-attempt-to-take-a-broadband-subsidy-away-from-tribal-areas%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  312.  
  313. &lt;a class="nobg" href="http://plus.google.com/share?url=https://news.slashdot.org/story/18/08/14/0045251/court-blocks-fccs-attempt-to-take-a-broadband-subsidy-away-from-tribal-areas?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  314.  
  315.  
  316.  
  317. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://news.slashdot.org/story/18/08/14/0045251/court-blocks-fccs-attempt-to-take-a-broadband-subsidy-away-from-tribal-areas?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12474972&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/SCqqnlpA1-0" height="1" width="1" alt=""/&gt;</description>
  318.            <pubDate>Mon, 13 Aug 2018 23:10:00 +0100</pubDate>
  319.        </item>
  320.        <item>
  321.            <title>Zuckerberg Doesn't Care About Publishers; Media Firms That Don't Work With Us Will End Up 'In ...</title>
  322.            <link>https://tech.slashdot.org/story/18/08/13/2134239/zuckerberg-doesnt-care-about-publishers-media-firms-that-dont-work-with-us-will-end-up-in-hospice-facebook-executive?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  323.            <description>Olivia Solon, writing for The Guardian: A senior Facebook executive told Australian media companies that if they didn't cooperate with the social network, their businesses would die. According to a report by The Australian, Campbell Brown, Facebook's head of news partnerships, told a group of more than 20 broadcasters and publishers that she wanted to help media companies develop sustainable business models through the platform. "We will help you revitalise journalism ... in a few years the reverse looks like I'll be holding your hands with your dying business like in a hospice," she said, in comments corroborated by five people who attended the meeting in Sydney on Tuesday. The Australian also reported that Brown said that Facebook's chief executive, Mark Zuckerberg, "doesn't care about publishers but is giving me a lot of leeway and concessions to make these changes," although both Facebook and Brown vehemently deny this comment was made, referring to a transcript they have from the meeting. Facebook would not release the transcript from the meeting.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  324. &lt;a class="slashpop" href="http://twitter.com/home?status=Zuckerberg+Doesn't+Care+About+Publishers%3B+Media+Firms+That+Don't+Work+With+Us+Will+End+Up+'In+Hospice'%3A+Facebook+Executive%3A+http%3A%2F%2Fbit.ly%2F2KPDAwE"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  325. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Ftech.slashdot.org%2Fstory%2F18%2F08%2F13%2F2134239%2Fzuckerberg-doesnt-care-about-publishers-media-firms-that-dont-work-with-us-will-end-up-in-hospice-facebook-executive%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  326.  
  327. &lt;a class="nobg" href="http://plus.google.com/share?url=https://tech.slashdot.org/story/18/08/13/2134239/zuckerberg-doesnt-care-about-publishers-media-firms-that-dont-work-with-us-will-end-up-in-hospice-facebook-executive?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  328.  
  329.  
  330.  
  331. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://tech.slashdot.org/story/18/08/13/2134239/zuckerberg-doesnt-care-about-publishers-media-firms-that-dont-work-with-us-will-end-up-in-hospice-facebook-executive?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12474764&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/JhQ2bLT4UzM" height="1" width="1" alt=""/&gt;</description>
  332.            <pubDate>Mon, 13 Aug 2018 22:30:00 +0100</pubDate>
  333.        </item>
  334.        <item>
  335.            <title>FBI Warns of 'Unlimited' ATM Cashout Scheme</title>
  336.            <link>https://news.slashdot.org/story/18/08/13/2142241/fbi-warns-of-unlimited-atm-cashout-scheme?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  337.            <description>The FBI is warning banks about a global fraud scheme known as an "ATM cash-out," in which criminals hack a bank or payment card processor and use cloned cards at cash machines around the world to fraudulently withdraw millions of dollars in just a few hours. "The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an 'unlimited operation,'" reads a confidential alert the FBI shared with banks privately on Friday. Krebs on Security reports: The FBI said unlimited operations compromise a financial institution or payment card processor with malware to access bank customer card information and exploit network access, enabling large scale theft of funds from ATMs. "Historic compromises have included small-to-medium size financial institutions, likely due to less robust implementation of cyber security controls, budgets, or third-party vendor vulnerabilities," the alert continues. "The FBI expects the ubiquity of this activity to continue or possibly increase in the near future."
  338. Organized cybercrime gangs that coordinate unlimited attacks typically do so by hacking or phishing their way into a bank or payment card processor. Just prior to executing on ATM cashouts, the intruders will remove many fraud controls at the financial institution, such as maximum ATM withdrawal amounts and any limits on the number of customer ATM transactions daily. The perpetrators also alter account balances and security measures to make an unlimited amount of money available at the time of the transactions, allowing for large amounts of cash to be quickly removed from the ATM.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  339. &lt;a class="slashpop" href="http://twitter.com/home?status=FBI+Warns+of+'Unlimited'+ATM+Cashout+Scheme%3A+http%3A%2F%2Fbit.ly%2F2KQm6QN"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  340. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fnews.slashdot.org%2Fstory%2F18%2F08%2F13%2F2142241%2Ffbi-warns-of-unlimited-atm-cashout-scheme%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  341.  
  342. &lt;a class="nobg" href="http://plus.google.com/share?url=https://news.slashdot.org/story/18/08/13/2142241/fbi-warns-of-unlimited-atm-cashout-scheme?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  343.  
  344.  
  345.  
  346. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://news.slashdot.org/story/18/08/13/2142241/fbi-warns-of-unlimited-atm-cashout-scheme?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12474776&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/2jA6Usyp4Eo" height="1" width="1" alt=""/&gt;</description>
  347.            <pubDate>Mon, 13 Aug 2018 21:50:00 +0100</pubDate>
  348.        </item>
  349.        <item>
  350.            <title>Australia To Pass Bill Providing Backdoors Into Encrypted Devices, Communications</title>
  351.            <link>https://it.slashdot.org/story/18/08/13/2123238/australia-to-pass-bill-providing-backdoors-into-encrypted-devices-communications?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  352.            <description>An anonymous reader quotes a report from The Register: The Australian government has scheduled its "not-a-backdoor" crypto-busting bill to land in parliament in the spring session, and we still don't know what will be in it. The legislation is included in the Department of Prime Minister and Cabinet's schedule of proposed laws to be debated from today (13 August) all the way into December. All we know, however, is what's already on the public record: a speech by Minister for Law Enforcement and Cybersecurity Angus Taylor in June, and the following from the digest of bills for the spring session: "Implement measures to address the impact of encrypted communications and devices on national security and law enforcement investigations. The bill provides a framework for agencies to work with the private sector so that law enforcement can adapt to the increasingly complex online environment. The bill requires both domestic and foreign companies supplying services to Australia to provide greater assistance to agencies."
  353. Apart from the dodgy technological sophistry involved, this belief somewhat contradicts what Angus Taylor said in June (our only contemporary reference to what the government has in mind). "We need access to digital networks and devices, and to the data on them, when there are reasonable grounds to do so," he said (emphasis added). If this accurately reflects the purpose of the legislation, then the Australian government wants access to the networks, not just the devices. It wants a break-in that will work on networks, if law enforcement demands it, and that takes us back to the "government wants a backdoor" problem. And it remains clear that the government's magical thinking remains in place: having no idea how to achieve the impossible, it wants the industry to cover for it under the guise of "greater assistance to agencies."&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  354. &lt;a class="slashpop" href="http://twitter.com/home?status=Australia+To+Pass+Bill+Providing+Backdoors+Into+Encrypted+Devices%2C+Communications%3A+http%3A%2F%2Fbit.ly%2F2vIGw9L"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  355. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fit.slashdot.org%2Fstory%2F18%2F08%2F13%2F2123238%2Faustralia-to-pass-bill-providing-backdoors-into-encrypted-devices-communications%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  356.  
  357. &lt;a class="nobg" href="http://plus.google.com/share?url=https://it.slashdot.org/story/18/08/13/2123238/australia-to-pass-bill-providing-backdoors-into-encrypted-devices-communications?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  358.  
  359.  
  360.  
  361. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://it.slashdot.org/story/18/08/13/2123238/australia-to-pass-bill-providing-backdoors-into-encrypted-devices-communications?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12474738&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/N5kvFjlpG2M" height="1" width="1" alt=""/&gt;</description>
  362.            <pubDate>Mon, 13 Aug 2018 21:10:00 +0100</pubDate>
  363.        </item>
  364.        <item>
  365.            <title>Linux 4.18 Releases With Steam Controller Kernel Driver, Spectre Updates</title>
  366.            <link>https://linux.slashdot.org/story/18/08/13/2054247/linux-418-releases-with-steam-controller-kernel-driver-spectre-updates?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  367.            <description>fstack writes: Linus Torvalds has released Linux 4.18 as the newest kernel bringing a Steam Controller kernel driver, Spectre updates for ARM64, power management updates, a "Restartable Services" system call, AMD Radeon graphics driver improvements, V3D DRM as Broadcom's new graphics driver, DM writecache support, USB 3.2 support, and many other updates. Linus Torvalds wrote of the 4.18 final release: "It was a very calm week, and arguably I could just have released on schedule last week, but we did have some minor updates. Mostly networking, but some vfs race fixes (mentioned in the rc8 announcement as 'pending') and a couple of driver fixes (scsi, networking, i2c). Some other minor random things (arm crypto fix, parisc memory ordering fix)." In a separate article, Phoronix details all the changes and new features available in this release.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  368. &lt;a class="slashpop" href="http://twitter.com/home?status=Linux+4.18+Releases+With+Steam+Controller+Kernel+Driver%2C+Spectre+Updates%3A+http%3A%2F%2Fbit.ly%2F2KPdwBY"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  369. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Flinux.slashdot.org%2Fstory%2F18%2F08%2F13%2F2054247%2Flinux-418-releases-with-steam-controller-kernel-driver-spectre-updates%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  370.  
  371. &lt;a class="nobg" href="http://plus.google.com/share?url=https://linux.slashdot.org/story/18/08/13/2054247/linux-418-releases-with-steam-controller-kernel-driver-spectre-updates?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  372.  
  373.  
  374.  
  375. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://linux.slashdot.org/story/18/08/13/2054247/linux-418-releases-with-steam-controller-kernel-driver-spectre-updates?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12474698&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/rZTzycqlZF0" height="1" width="1" alt=""/&gt;</description>
  376.            <pubDate>Mon, 13 Aug 2018 20:30:00 +0100</pubDate>
  377.        </item>
  378.        <item>
  379.            <title>Apple Delays 32-Person Group FaceTime From iOS 12 Launch</title>
  380.            <link>https://apple.slashdot.org/story/18/08/13/2047212/apple-delays-32-person-group-facetime-from-ios-12-launch?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  381.            <description>Developer Guilherme Rambo has revealed that the 32-person FaceTime group chat feature "has been removed from the initial release of iOS 12." Apple says the feature "will ship in a future software update later this fall." The Verge: Group FaceTime chats will allow 32 participants in a video call, with tiles of people's faces where you can manually select people to highlight them in the main interface. Apple's delay to group FaceTime chats comes after the company delayed its AirPlay 2 introduction in iOS.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  382. &lt;a class="slashpop" href="http://twitter.com/home?status=Apple+Delays+32-Person+Group+FaceTime+From+iOS+12+Launch%3A+http%3A%2F%2Fbit.ly%2F2vGNzzJ"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  383. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fapple.slashdot.org%2Fstory%2F18%2F08%2F13%2F2047212%2Fapple-delays-32-person-group-facetime-from-ios-12-launch%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  384.  
  385. &lt;a class="nobg" href="http://plus.google.com/share?url=https://apple.slashdot.org/story/18/08/13/2047212/apple-delays-32-person-group-facetime-from-ios-12-launch?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  386.  
  387.  
  388.  
  389. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://apple.slashdot.org/story/18/08/13/2047212/apple-delays-32-person-group-facetime-from-ios-12-launch?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12474692&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/P1-vBqK_sBg" height="1" width="1" alt=""/&gt;</description>
  390.            <pubDate>Mon, 13 Aug 2018 20:00:00 +0100</pubDate>
  391.        </item>
  392.        <item>
  393.            <title>Facebook Bans the Sale of All Kodi Boxes</title>
  394.            <link>https://yro.slashdot.org/story/18/08/13/2039202/facebook-bans-the-sale-of-all-kodi-boxes?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  395.            <description>An anonymous reader quotes a report from TorrentFreak: Facebook previously banned the sale of fully-loaded pirate streaming devices, as did Amazon and eBay, but the social network appears to have expanded this to all Kodi-powered hardware now. This is made clear in the prohibited content section of the company's commerce policies, as shown below. Facebook states that users are no longer allowed to promote "the sale or use of streaming devices with KODI installed." In addition, jailbroken or loaded devices are also banned from the platform. The issue was first noticed by CordCuttersNews which notes that sellers who violate the policy may have their Facebook accounts banned. Interestingly, Facebook will still permit the sale of "add-on equipment for KODI devices," including keyboards and remotes. However, selling any devices with the software itself is no longer allowed.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  396. &lt;a class="slashpop" href="http://twitter.com/home?status=Facebook+Bans+the+Sale+of+All+Kodi+Boxes%3A+http%3A%2F%2Fbit.ly%2F2OwjolS"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  397. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fyro.slashdot.org%2Fstory%2F18%2F08%2F13%2F2039202%2Ffacebook-bans-the-sale-of-all-kodi-boxes%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  398.  
  399. &lt;a class="nobg" href="http://plus.google.com/share?url=https://yro.slashdot.org/story/18/08/13/2039202/facebook-bans-the-sale-of-all-kodi-boxes?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  400.  
  401.  
  402.  
  403. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://yro.slashdot.org/story/18/08/13/2039202/facebook-bans-the-sale-of-all-kodi-boxes?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12474684&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/AqqTIhS6DaM" height="1" width="1" alt=""/&gt;</description>
  404.            <pubDate>Mon, 13 Aug 2018 19:30:00 +0100</pubDate>
  405.        </item>
  406.        <item>
  407.            <title>Internet Engineering Task Force Releases the Final Version of TLS 1. ...</title>
  408.            <link>https://news.slashdot.org/story/18/08/13/2043243/internet-engineering-task-force-releases-the-final-version-of-tls-13-newest-chrome-and-firefox-versions-already-support-a-draft-version-of-it?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  409.            <description>The encryption that protects your browser's connection to websites is getting a notch faster and a notch safer to use. From a report: That's because the Internet Engineering Task Force (IETF) on Friday finished a years-long process of modernizing the technology used to secure website communications. You may never have heard of Transport Layer Security -- TLS for short -- but version 1.3 is now complete and headed to websites, browsers and other parts of the internet that rely on its security. "Publishing TLS 1.3 is a huge accomplishment. It is one the best recent examples of how it is possible to take 20 years of deployed legacy code and change it on the fly, resulting in a better internet for everyone," said Nick Sullivan, head of cryptography for Cloudflare, which helps customers distribute their websites and other content around the world, in a blog post. TLS 1.3 brings some significant improvements over TLS 1.2, which was finished 10 years ago. Perhaps first on the list is that it'll mean websites load faster. Setting up an encrypted connection on the web historically has caused delays since your browser and the website server must send information back and forth in a process called a handshake. The slower your broadband or the more congested your mobile network is, the more you'll notice these delays. Firefox and Chrome already support a draft version of TLS 1.3.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  410. &lt;a class="slashpop" href="http://twitter.com/home?status=Internet+Engineering+Task+Force+Releases+the+Final+Version+of+TLS+1.3%3B+Newest+Chrome+and+Firefox+Versions+Already+Support+a+Draft+Version+of+It%3A+http%3A%2F%2Fbit.ly%2F2vF23Ag"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  411. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fnews.slashdot.org%2Fstory%2F18%2F08%2F13%2F2043243%2Finternet-engineering-task-force-releases-the-final-version-of-tls-13-newest-chrome-and-firefox-versions-already-support-a-draft-version-of-it%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  412.  
  413. &lt;a class="nobg" href="http://plus.google.com/share?url=https://news.slashdot.org/story/18/08/13/2043243/internet-engineering-task-force-releases-the-final-version-of-tls-13-newest-chrome-and-firefox-versions-already-support-a-draft-version-of-it?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  414.  
  415.  
  416.  
  417. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://news.slashdot.org/story/18/08/13/2043243/internet-engineering-task-force-releases-the-final-version-of-tls-13-newest-chrome-and-firefox-versions-already-support-a-draft-version-of-it?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12474688&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/rOvTJjv3Dk4" height="1" width="1" alt=""/&gt;</description>
  418.            <pubDate>Mon, 13 Aug 2018 18:50:00 +0100</pubDate>
  419.        </item>
  420.        <item>
  421.            <title>Apple Asked Developers To Adopt Subscriptions and Hike App Prices, Report Says</title>
  422.            <link>https://apple.slashdot.org/story/18/08/13/1953229/apple-asked-developers-to-adopt-subscriptions-and-hike-app-prices-report-says?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  423.            <description>Apple invited a group of app developers to a secret April 2017 meeting in New York's Tribeca district, asking them to move from selling apps at low prices to renting app access through subscriptions, Business Insider reports. From a story: This change is intended to keep users paying for apps "on a regular basis, putting money into developer coffers on a regular schedule," the report claims.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  424. &lt;a class="slashpop" href="http://twitter.com/home?status=Apple+Asked+Developers+To+Adopt+Subscriptions+and+Hike+App+Prices%2C+Report+Says%3A+http%3A%2F%2Fbit.ly%2F2vFRr3W"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  425. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fapple.slashdot.org%2Fstory%2F18%2F08%2F13%2F1953229%2Fapple-asked-developers-to-adopt-subscriptions-and-hike-app-prices-report-says%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  426.  
  427. &lt;a class="nobg" href="http://plus.google.com/share?url=https://apple.slashdot.org/story/18/08/13/1953229/apple-asked-developers-to-adopt-subscriptions-and-hike-app-prices-report-says?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  428.  
  429.  
  430.  
  431. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://apple.slashdot.org/story/18/08/13/1953229/apple-asked-developers-to-adopt-subscriptions-and-hike-app-prices-report-says?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12474612&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/l2C4wdQusrU" height="1" width="1" alt=""/&gt;</description>
  432.            <pubDate>Mon, 13 Aug 2018 18:10:00 +0100</pubDate>
  433.        </item>
  434.        <item>
  435.            <title>IBM Promised Its AI Platform Watson Would Be a Big Step Forward in Treating Cancer. ...</title>
  436.            <link>https://science.slashdot.org/story/18/08/13/1912217/ibm-promised-its-ai-platform-watson-would-be-a-big-step-forward-in-treating-cancer-but-after-pouring-billions-into-the-project-the-diagnosis-is-gloomy?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  437.            <description>Can Watson cure cancer? That's what IBM asked soon after its AI system beat humans at the quiz show "Jeopardy!" in 2011. Watson could read documents quickly and find patterns in data. Could it match patient information with the latest in medical studies to deliver personalized treatment recommendations? "Watson represents a technology breakthrough that can help physicians improve patient outcomes," said Herbert Chase, a professor of biomedical informatics at Columbia University, in a 2012 IBM press release. Six years and billions of dollars later, the diagnosis for Watson is gloomy [Editor's note: the link may be paywalled; alternative source]. WSJ: More than a dozen IBM partners and clients have halted or shrunk Watson's oncology-related projects. Watson cancer applications have had limited impact on patients, according to dozens of interviews with medical centers, companies and doctors who have used it, as well as documents reviewed by The Wall Street Journal. In many cases, the tools didn't add much value. In some cases, Watson wasn't accurate. Watson can be tripped up by a lack of data in rare or recurring cancers, and treatments are evolving faster than Watson's human trainers can update the system. Dr. Chase of Columbia said he withdrew as an adviser after he grew disappointed in IBM's direction for marketing the technology. No published research shows Watson improving patient outcomes. IBM said Watson has important cancer-care benefits, like helping doctors keep up with medical knowledge.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  438. &lt;a class="slashpop" href="http://twitter.com/home?status=IBM+Promised+Its+AI+Platform+Watson+Would+Be+a+Big+Step+Forward+in+Treating+Cancer.+But+After+Pouring+Billions+Into+the+Project%2C+the+Diagnosis+is+Gloomy.%3A+http%3A%2F%2Fbit.ly%2F2vEQoBu"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  439. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fscience.slashdot.org%2Fstory%2F18%2F08%2F13%2F1912217%2Fibm-promised-its-ai-platform-watson-would-be-a-big-step-forward-in-treating-cancer-but-after-pouring-billions-into-the-project-the-diagnosis-is-gloomy%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  440.  
  441. &lt;a class="nobg" href="http://plus.google.com/share?url=https://science.slashdot.org/story/18/08/13/1912217/ibm-promised-its-ai-platform-watson-would-be-a-big-step-forward-in-treating-cancer-but-after-pouring-billions-into-the-project-the-diagnosis-is-gloomy?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  442.  
  443.  
  444.  
  445. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://science.slashdot.org/story/18/08/13/1912217/ibm-promised-its-ai-platform-watson-would-be-a-big-step-forward-in-treating-cancer-but-after-pouring-billions-into-the-project-the-diagnosis-is-gloomy?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12474540&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/QsIZv6rBloo" height="1" width="1" alt=""/&gt;</description>
  446.            <pubDate>Mon, 13 Aug 2018 17:30:00 +0100</pubDate>
  447.        </item>
  448.        <item>
  449.            <title>Hacked Water Heaters Could Trigger Mass Blackouts Someday</title>
  450.            <link>https://it.slashdot.org/story/18/08/13/1840246/hacked-water-heaters-could-trigger-mass-blackouts-someday?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  451.            <description>At the Usenix Security conference this week, a group of Princeton University security researchers will present a study that considers a little-examined question in power grid cybersecurity: What if hackers attacked not the supply side of the power grid, but the demand side? From a report: In a series of simulations, the researchers imagined what might happen if hackers controlled a botnet composed of thousands of silently hacked consumer internet of things devices, particularly power-hungry ones like air conditioners, water heaters, and space heaters. Then they ran a series of software simulations to see how many of those devices an attacker would need to simultaneously hijack to disrupt the stability of the power grid. Their answers point to a disturbing, if not quite yet practical scenario: In a power network large enough to serve an area of 38 million people -- a population roughly equal to Canada or California -- the researchers estimate that just a one percent bump in demand might be enough to take down the majority of the grid. That demand increase could be created by a botnet as small as a few tens of thousands of hacked electric water heaters or a couple hundred thousand air conditioners. "Power grids are stable as long as supply is equal to demand," says Saleh Soltan, a researcher in Princeton's Department of Electrical Engineering, who led the study. "If you have a very large botnet of IoT devices, you can really manipulate the demand, changing it abruptly, any time you want."&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  452. &lt;a class="slashpop" href="http://twitter.com/home?status=Hacked+Water+Heaters+Could+Trigger+Mass+Blackouts+Someday%3A+http%3A%2F%2Fbit.ly%2F2vIcKlv"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  453. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fit.slashdot.org%2Fstory%2F18%2F08%2F13%2F1840246%2Fhacked-water-heaters-could-trigger-mass-blackouts-someday%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  454.  
  455. &lt;a class="nobg" href="http://plus.google.com/share?url=https://it.slashdot.org/story/18/08/13/1840246/hacked-water-heaters-could-trigger-mass-blackouts-someday?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  456.  
  457.  
  458.  
  459. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://it.slashdot.org/story/18/08/13/1840246/hacked-water-heaters-could-trigger-mass-blackouts-someday?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12474476&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/I-5W7C3pfqE" height="1" width="1" alt=""/&gt;</description>
  460.            <pubDate>Mon, 13 Aug 2018 16:50:00 +0100</pubDate>
  461.        </item>
  462.        <item>
  463.            <title>US House Candidates Vulnerable To Hacks, Researchers Say</title>
  464.            <link>https://news.slashdot.org/story/18/08/13/189210/us-house-candidates-vulnerable-to-hacks-researchers-say?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  465.            <description>About 30 percent of House candidates running for office this year have significant cybersecurity issues with their campaign websites, according to a new study. Reuters: The research was unveiled on Sunday at the annual Def Con security conference in Las Vegas, where some attendees have spent three days hacking into voting machines to highlight vulnerabilities in technology running polling operations. A team of four independent researchers led by former National Institutes for Standards and Technology security expert Joshua Franklin concluded that the websites of nearly one-third of U.S. House candidates, Democrats and Republicans alike, are vulnerable to attacks. NIST is a U.S. Commerce Department laboratory that provides advice on technical issues, including cyber security. Using automated scans and test programs, the team identified multiple vulnerabilities, including problems with digital certificates used to verify secure connections with users, Franklin told Reuters ahead of the presentation. The warnings about the midterm elections, which are less than three months away, come after Democrats have spent more than a year working to bolster cyber defenses of the party's national, state and campaign operations.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  466. &lt;a class="slashpop" href="http://twitter.com/home?status=US+House+Candidates+Vulnerable+To+Hacks%2C+Researchers+Say%3A+http%3A%2F%2Fbit.ly%2F2OyXheI"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  467. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fnews.slashdot.org%2Fstory%2F18%2F08%2F13%2F189210%2Fus-house-candidates-vulnerable-to-hacks-researchers-say%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  468.  
  469. &lt;a class="nobg" href="http://plus.google.com/share?url=https://news.slashdot.org/story/18/08/13/189210/us-house-candidates-vulnerable-to-hacks-researchers-say?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  470.  
  471.  
  472.  
  473. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://news.slashdot.org/story/18/08/13/189210/us-house-candidates-vulnerable-to-hacks-researchers-say?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12474430&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/bfQatINrQGg" height="1" width="1" alt=""/&gt;</description>
  474.            <pubDate>Mon, 13 Aug 2018 16:10:00 +0100</pubDate>
  475.        </item>
  476.        <item>
  477.            <title>The Mining Town Where People Live Under the Earth</title>
  478.            <link>https://science.slashdot.org/story/18/08/13/1729203/the-mining-town-where-people-live-under-the-earth?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  479.            <description>Claire Reilly, writing for CNET: After spending a night in an underground rock cave in the middle of the Australian desert, I learned three things: The silence is deafening. Your eyes never adjust to the darkness. And if nobody brushes the ceiling before you arrive, that clump of dirt is going to scare the living hell out of you when it drops on your face at 2 a.m. I've flown 1,200 miles for the privilege of sleeping in a hole in Coober Pedy. There's no Wi-Fi down here. The glare of my MacBook feels obnoxious in the subterranean stillness. The TV plays ads for a "local" cleaning service from the next town over, but that just happens to be 400 miles away. Australia is a country defined by "the tyranny of distance," but traveling to the underground opal mining town of Coober Pedy feels like taking a holiday on Mars. In the middle of the South Australian desert and an eight hour drive in either direction from the nearest capital city (Adelaide to the south or Alice Springs to the north), Coober Pedy is off the grid and mostly hidden underground. More than half the residents live buried in the bedrock in cavelike homes called "dugouts" in order to escape freezing winters, scorching summers and the occasional cyclone. Often, the only sign you're walking on someone's roof is the air vent that's sprouted up next to your boots. While first nation peoples have lived in the central Australian desert for thousands of years, the Coober Pedy we know today wouldn't exist without opals. Miners rushed here in the 1920s, enduring extreme conditions to hunt for the multicolored gems, digging, bulldozing and eventually blasting out earth in a bid to find the elusive seam that would make them rich. Living in Coober Pedy is not just about surviving. It's about carving out a way of life in one of the harshest environments on the planet. [...] "It's not like we're living thousands of kilometers under the ground," he tells me. "It's pretty similar to living in a normal house." Sam's family, who live in a dugout close to Crocodile Harry's, have solar panels for power -- but those generate only enough electricity for a few hours a day. Diesel handles the rest, he says. "We have to rely on tourists to pay for our fuel," he says. "Gasoline is valuable out here. Fuel is really expensive." That means no fridge running all day and night -- they keep nonperishable food and get the rest from town every day. Otherwise, life is pretty similar to what other 18-year-olds in the city experience. Sam says he can still charge his phone and use the TV "for a bit." "We have internet when the generator's on. Dad's got an Xbox but we don't even try to use the solar for that."&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  480. &lt;a class="slashpop" href="http://twitter.com/home?status=The+Mining+Town+Where+People+Live+Under+the+Earth%3A+http%3A%2F%2Fbit.ly%2F2KPDN2Y"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  481. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fscience.slashdot.org%2Fstory%2F18%2F08%2F13%2F1729203%2Fthe-mining-town-where-people-live-under-the-earth%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  482.  
  483. &lt;a class="nobg" href="http://plus.google.com/share?url=https://science.slashdot.org/story/18/08/13/1729203/the-mining-town-where-people-live-under-the-earth?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  484.  
  485.  
  486.  
  487. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://science.slashdot.org/story/18/08/13/1729203/the-mining-town-where-people-live-under-the-earth?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12474334&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/vQzMRf-Rrzk" height="1" width="1" alt=""/&gt;</description>
  488.            <pubDate>Mon, 13 Aug 2018 15:30:00 +0100</pubDate>
  489.        </item>
  490.        <item>
  491.            <title>Malicious Faxes Leave Firms 'Open' To Cyber-Attack</title>
  492.            <link>https://hardware.slashdot.org/story/18/08/13/1636202/malicious-faxes-leave-firms-open-to-cyber-attack?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  493.            <description>Booby-trapped image data sent by fax can let malicious hackers sneak into corporate networks, security researchers have found. From a report: Since many companies use fax machines that are also printers and photocopiers, they often have a connection to the internal network. The malicious images exploit protocols established in the 1980s that define the format of fax messages. The research was presented at the Def Con hacker conference in Las Vegas. The two researchers said millions of companies could be at risk because they currently did little to secure fax lines. "Fax has no security measures built in -- absolutely nothing," security researcher Yaniv Balmas, from Check Point software, told the BBC. Mr Balmas uncovered the security holes in the fax protocols with the help of colleague Eyal Itkin and said they were "surprised" by the extent to which fax was still used.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  494. &lt;a class="slashpop" href="http://twitter.com/home?status=Malicious+Faxes+Leave+Firms+'Open'+To+Cyber-Attack%3A+http%3A%2F%2Fbit.ly%2F2KOpv2F"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  495. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fhardware.slashdot.org%2Fstory%2F18%2F08%2F13%2F1636202%2Fmalicious-faxes-leave-firms-open-to-cyber-attack%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  496.  
  497. &lt;a class="nobg" href="http://plus.google.com/share?url=https://hardware.slashdot.org/story/18/08/13/1636202/malicious-faxes-leave-firms-open-to-cyber-attack?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  498.  
  499.  
  500.  
  501. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://hardware.slashdot.org/story/18/08/13/1636202/malicious-faxes-leave-firms-open-to-cyber-attack?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12474234&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/hcAKbO0JtGA" height="1" width="1" alt=""/&gt;</description>
  502.            <pubDate>Mon, 13 Aug 2018 14:40:00 +0100</pubDate>
  503.        </item>
  504.        <item>
  505.            <title>The Flourishing Business of Fake YouTube Views</title>
  506.            <link>https://news.slashdot.org/story/18/08/13/164252/the-flourishing-business-of-fake-youtube-views?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  507.            <description>An anonymous reader shares a report: Martin Vassilev makes a good living selling fake views on YouTube videos. Working from home in Ottawa, he has sold about 15 million views so far this year, putting him on track to bring in more than $200,000, records show. Mr. Vassilev, 32, does not provide the views himself. His website, 500Views.com, connects customers with services that offer views, likes and dislikes generated by computers, not humans. When a supplier cannot fulfill an order, Mr. Vassilev -- like a modern switchboard operator -- quickly connects with another. "I can deliver an unlimited amount of views to a video," Mr. Vassilev said in an interview. "They've tried to stop it for so many years, but they can't stop it. There's always a way around." [...] Just as other social media companies have been plagued by impostor accounts and artificial influence campaigns, YouTube has struggled with fake views for years. The fake-view ecosystem of which Mr. Vassilev is a part can undermine YouTube's credibility by manipulating the digital currency that signals value to users. While YouTube says fake views represent just a tiny fraction of the total, they still have a significant effect by misleading consumers and advertisers.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  508. &lt;a class="slashpop" href="http://twitter.com/home?status=The+Flourishing+Business+of+Fake+YouTube+Views%3A+http%3A%2F%2Fbit.ly%2F2vFF73T"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  509. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fnews.slashdot.org%2Fstory%2F18%2F08%2F13%2F164252%2Fthe-flourishing-business-of-fake-youtube-views%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  510.  
  511. &lt;a class="nobg" href="http://plus.google.com/share?url=https://news.slashdot.org/story/18/08/13/164252/the-flourishing-business-of-fake-youtube-views?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  512.  
  513.  
  514.  
  515. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://news.slashdot.org/story/18/08/13/164252/the-flourishing-business-of-fake-youtube-views?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12474174&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/Gv70pg9U5E0" height="1" width="1" alt=""/&gt;</description>
  516.            <pubDate>Mon, 13 Aug 2018 14:05:00 +0100</pubDate>
  517.        </item>
  518.        <item>
  519.            <title>Google DeepMind's AI Beats Doctors at Spotting Eye Disease in Scan</title>
  520.            <link>https://tech.slashdot.org/story/18/08/13/1518227/google-deepminds-ai-beats-doctors-at-spotting-eye-disease-in-scan?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  521.            <description>DeepMind, Google's artificial intelligence business, is planning clinical trials of technology that can help diagnose eye disease by analyzing medical images after early tests showed its results were more accurate than human doctors. From a report: Published in the scientific journal Nature, the study claims that DeepMind, in partnership with Moorfields Eye Hospital in London, has trained its algorithms to detect over 50 sight-threatening conditions to the same accuracy as expert clinicians. It is also capable of correctly recommending the most appropriate course of action for patients and prioritise those in most urgent need of care. In a project that began two years ago, DeepMind trained its machine learning algorithms using thousands of historic and fully anonymized eye scans to identify diseases that could lead to sight loss. According to the study, they can now do so with 94 percent accuracy, and the hope is that they could eventually be used to transform how eye exams are conducted around the world. You might be wondering why we need AI to do this job that has up until now been carried out by medical staff. But diagnosing eye diseases from ocular scans is incredibly time-consuming for doctors due to their complexity. Due to the aging global population, eye disease is also becoming more prevalent not less, increasing the burden on healthcare systems.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  522. &lt;a class="slashpop" href="http://twitter.com/home?status=Google+DeepMind's+AI+Beats+Doctors+at+Spotting+Eye+Disease+in+Scan%3A+http%3A%2F%2Fbit.ly%2F2vCFADI"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  523. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Ftech.slashdot.org%2Fstory%2F18%2F08%2F13%2F1518227%2Fgoogle-deepminds-ai-beats-doctors-at-spotting-eye-disease-in-scan%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  524.  
  525. &lt;a class="nobg" href="http://plus.google.com/share?url=https://tech.slashdot.org/story/18/08/13/1518227/google-deepminds-ai-beats-doctors-at-spotting-eye-disease-in-scan?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  526.  
  527.  
  528.  
  529. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://tech.slashdot.org/story/18/08/13/1518227/google-deepminds-ai-beats-doctors-at-spotting-eye-disease-in-scan?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12474038&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/-RxGBTX6b_A" height="1" width="1" alt=""/&gt;</description>
  530.            <pubDate>Mon, 13 Aug 2018 13:20:00 +0100</pubDate>
  531.        </item>
  532.        <item>
  533.            <title>Hackers Who Attended Black Hat and DefCon Conferences Say Hotel Security Personnel and Las ...</title>
  534.            <link>https://it.slashdot.org/story/18/08/13/1314216/hackers-who-attended-black-hat-and-defcon-conferences-say-hotel-security-personnel-and-las-vegas-strip-demanded-access-to-their-rooms?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  535.            <description>More than two dozen hackers and security experts who attended security events last week say security personnel at the Mandalay Bay, Luxor, Caesars Palace, Flamingo, Aria, Cromwell, Tuscany, Linq, or Mirage hotels had entered their rooms. Security news site The Parallax reports: Except for Tuscany, which is independent, all of these hotels are owned by either Caesars Entertainment or MGM Resorts International. And of the three hotel companies, only Caesars returned a request for comment. Richard Broome, executive vice president of communications and government relations for Caesars Entertainment, whose Caesars Palace is co-hosting DefCon this year with the Flamingo, said that following the deadliest mass shooting in U.S. history last year, "periodic" hotel room checks are now standard operating procedure in Las Vegas. On October 1, 2017, from his room at the Mandalay Bay, Stephen Paddock used semiautomatic weapons he'd outfitted with bump stocks to kill 58 people and wound at least 527 others attending a gated country music concert on the Strip below. [...] Two apparent Caesars security officers wearing hotel name tags displaying only the first names "Cynthia" and "Keith," respectively, as well as sheriff's style badges that looked like they came out of a Halloween costume kit, visited my room while I was writing this story. Cynthia told me that they are instructed to refer to the front desk guests who decline to allow their room to be searched. After Cynthia and Keith declined to disclose their last names to me, I asked what they intended to do in the room. They told me that they would enter it, type a code into the room's phone line to signal that it's been checked, and then do a visual spot check. When I asked what they would be looking for, Cynthia replied, "WMDs -- that sort of thing." Other conference attendees reported similar but less pleasant interactions. Katie Moussouris, CEO of Luta Security, wrote on Twitter that two hotel security personnel were "banging" on her room door and "shouted" at her. She also said the hotel's security team supervisor "dismissed" her concerns over how the hotel was treating single, female travelers. Google security engineer Maddie Stone tweeted that a man wearing a light-blue shirt and a walkie-talkie entered her Caesars Palace room with a key, but without knocking, while she was getting dressed. "He left when I started screaming," she wrote, adding that a hotel manager, upon her request, said Caesars would look into whether the man was actually an employee. Stone tweeted that she left DefCon early because of the incident.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  536. &lt;a class="slashpop" href="http://twitter.com/home?status=Hackers+Who+Attended+Black+Hat+and+DefCon+Conferences+Say+Hotel+Security+Personnel+and+Las+Vegas+Strip+Demanded+Access+To+Their+Rooms%3A+http%3A%2F%2Fbit.ly%2F2KNwVTY"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  537. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fit.slashdot.org%2Fstory%2F18%2F08%2F13%2F1314216%2Fhackers-who-attended-black-hat-and-defcon-conferences-say-hotel-security-personnel-and-las-vegas-strip-demanded-access-to-their-rooms%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  538.  
  539. &lt;a class="nobg" href="http://plus.google.com/share?url=https://it.slashdot.org/story/18/08/13/1314216/hackers-who-attended-black-hat-and-defcon-conferences-say-hotel-security-personnel-and-las-vegas-strip-demanded-access-to-their-rooms?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  540.  
  541.  
  542.  
  543. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://it.slashdot.org/story/18/08/13/1314216/hackers-who-attended-black-hat-and-defcon-conferences-say-hotel-security-personnel-and-las-vegas-strip-demanded-access-to-their-rooms?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12473670&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/nmxgbZMJyp4" height="1" width="1" alt=""/&gt;</description>
  544.            <pubDate>Mon, 13 Aug 2018 12:40:00 +0100</pubDate>
  545.        </item>
  546.        <item>
  547.            <title>Many Google Services on Android Devices and iPhones Store Location Data, Even if Location ...</title>
  548.            <link>https://tech.slashdot.org/story/18/08/13/1335202/many-google-services-on-android-devices-and-iphones-store-location-data-even-if-location-sharing-is-disabled-from-privacy-settings-ap?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  549.            <description>Google wants to know where you go so badly that it records your movements even when you explicitly tell it not to. An Associated Press investigation found that many Google services on Android devices and iPhones store your location data even if you've used privacy settings that say they will prevent it from doing so. The Associated Press reports that it has confirmed its findings with computer science researchers at Princeton. From the report: For the most part, Google is upfront about asking permission to use your location information. An app like Google Maps will remind you to allow access to location if you use it for navigating. If you agree to let it record your location over time, Google Maps will display that history for you in a "timeline" that maps out your daily movements. Storing your minute-by-minute travels carries privacy risks and has been used by police to determine the location of suspects -- such as a warrant that police in Raleigh, North Carolina, served on Google last year to find devices near a murder scene. So the company will let you "pause" a setting called Location History. Google says that will prevent the company from remembering where you've been. Google's support page on the subject states: "You can turn off Location History at any time. With Location History off, the places you go are no longer stored." That isn't true. Even with Location History paused, some Google apps automatically store time-stamped location data without asking. For example, Google stores a snapshot of where you are when you merely open its Maps app. Automatic daily weather updates on Android phones pinpoint roughly where you are. And some searches that have nothing to do with location, like "chocolate chip cookies," or "kids science kits," pinpoint your precise latitude and longitude -- accurate to the square foot -- and save it to your Google account. The privacy issue affects some two billion users of devices that run Google's Android operating software and hundreds of millions of worldwide iPhone users who rely on Google for maps or search. Storing location data in violation of a user's preferences is wrong, said Jonathan Mayer, a Princeton computer scientist and former chief technologist for the Federal Communications Commission's enforcement bureau.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  550. &lt;a class="slashpop" href="http://twitter.com/home?status=Many+Google+Services+on+Android+Devices+and+iPhones+Store+Location+Data%2C+Even+if+Location+Sharing+is+Disabled+From+Privacy+Settings%3A+AP%3A+http%3A%2F%2Fbit.ly%2F2vETGop"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  551. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Ftech.slashdot.org%2Fstory%2F18%2F08%2F13%2F1335202%2Fmany-google-services-on-android-devices-and-iphones-store-location-data-even-if-location-sharing-is-disabled-from-privacy-settings-ap%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  552.  
  553. &lt;a class="nobg" href="http://plus.google.com/share?url=https://tech.slashdot.org/story/18/08/13/1335202/many-google-services-on-android-devices-and-iphones-store-location-data-even-if-location-sharing-is-disabled-from-privacy-settings-ap?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  554.  
  555.  
  556.  
  557. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://tech.slashdot.org/story/18/08/13/1335202/many-google-services-on-android-devices-and-iphones-store-location-data-even-if-location-sharing-is-disabled-from-privacy-settings-ap?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12473768&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/yV5RGPB9ptk" height="1" width="1" alt=""/&gt;</description>
  558.            <pubDate>Mon, 13 Aug 2018 12:00:00 +0100</pubDate>
  559.        </item>
  560.        <item>
  561.            <title>Many Google Services on Android Devices and iPhones Store Location Data, Even if Location ...</title>
  562.            <link>https://tech.slashdot.org/story/18/08/13/1335202/many-google-services-on-android-devices-and-iphones-store-location-data-even-if-location-sharing-is-disabled-from-privacy-settings-ap?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  563.            <description>Google wants to know where you go so badly that it records your movements even when you explicitly tell it not to. An Associated Press investigation found that many Google services on Android devices and iPhones store your location data even if you've used privacy settings that say they will prevent it from doing so. The Associated Press reports that it has confirmed its findings with computer science researchers at Princeton. From the report: For the most part, Google is upfront about asking permission to use your location information. An app like Google Maps will remind you to allow access to location if you use it for navigating. If you agree to let it record your location over time, Google Maps will display that history for you in a "timeline" that maps out your daily movements. Storing your minute-by-minute travels carries privacy risks and has been used by police to determine the location of suspects -- such as a warrant that police in Raleigh, North Carolina, served on Google last year to find devices near a murder scene. So the company will let you "pause" a setting called Location History. Google says that will prevent the company from remembering where you've been. Google's support page on the subject states: "You can turn off Location History at any time. With Location History off, the places you go are no longer stored." That isn't true. Even with Location History paused, some Google apps automatically store time-stamped location data without asking. For example, Google stores a snapshot of where you are when you merely open its Maps app. Automatic daily weather updates on Android phones pinpoint roughly where you are. And some searches that have nothing to do with location, like "chocolate chip cookies," or "kids science kits," pinpoint your precise latitude and longitude -- accurate to the square foot -- and save it to your Google account. The privacy issue affects some two billion users of devices that run Google's Android operating software and hundreds of millions of worldwide iPhone users who rely on Google for maps or search. Storing location data in violation of a user's preferences is wrong, said Jonathan Mayer, a Princeton computer scientist and former chief technologist for the Federal Communications Commission's enforcement bureau.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  564. &lt;a class="slashpop" href="http://twitter.com/home?status=Many+Google+Services+on+Android+Devices+and+iPhones+Store+Location+Data%2C+Even+if+Location+Sharing+is+Disabled+From+Privacy+Settings%3A+AP%3A+http%3A%2F%2Fbit.ly%2F2vETGop"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  565. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Ftech.slashdot.org%2Fstory%2F18%2F08%2F13%2F1335202%2Fmany-google-services-on-android-devices-and-iphones-store-location-data-even-if-location-sharing-is-disabled-from-privacy-settings-ap%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  566.  
  567. &lt;a class="nobg" href="http://plus.google.com/share?url=https://tech.slashdot.org/story/18/08/13/1335202/many-google-services-on-android-devices-and-iphones-store-location-data-even-if-location-sharing-is-disabled-from-privacy-settings-ap?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  568.  
  569.  
  570.  
  571. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://tech.slashdot.org/story/18/08/13/1335202/many-google-services-on-android-devices-and-iphones-store-location-data-even-if-location-sharing-is-disabled-from-privacy-settings-ap?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12473768&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/yV5RGPB9ptk" height="1" width="1" alt=""/&gt;</description>
  572.            <pubDate>Mon, 13 Aug 2018 11:36:00 +0100</pubDate>
  573.        </item>
  574.        <item>
  575.            <title>Reddit Blocked In China</title>
  576.            <link>https://yro.slashdot.org/story/18/08/13/0919218/reddit-blocked-in-china?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  577.            <description>An anonymous reader quotes a report from Quartz: Many Reddit users in China who tried to access the social network this weekend were slightly annoyed to find the company's site and app weren't working. But in China, it's second nature for internet users to turn on their VPNs, and in almost no time at all, they were surfing the "front page of the internet" again. According to users' posts, the crackdown appeared to have started on Friday (Aug. 10). By today (Aug. 13), more people said they were able to access Reddit again. Many, however, report that Reddit remains behind the Great Firewall for them. Comparitech, a tool that checks if a domain is blocked in China, continues to show that reddit.com is not accessible via regular internet access, but reachable over VPN. It's unclear if geography is a factor for why some people are and aren't able to access the site.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  578. &lt;a class="slashpop" href="http://twitter.com/home?status=Reddit+Blocked+In+China%3A+http%3A%2F%2Fbit.ly%2F2vEU0n3"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  579. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fyro.slashdot.org%2Fstory%2F18%2F08%2F13%2F0919218%2Freddit-blocked-in-china%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  580.  
  581. &lt;a class="nobg" href="http://plus.google.com/share?url=https://yro.slashdot.org/story/18/08/13/0919218/reddit-blocked-in-china?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  582.  
  583.  
  584.  
  585. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://yro.slashdot.org/story/18/08/13/0919218/reddit-blocked-in-china?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12471816&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/qfJFUcYCLXY" height="1" width="1" alt=""/&gt;</description>
  586.            <pubDate>Mon, 13 Aug 2018 11:00:00 +0100</pubDate>
  587.        </item>
  588.        <item>
  589.            <title>Google Play Shows Warning To Anyone Searching For Fortnite APKs</title>
  590.            <link>https://games.slashdot.org/story/18/08/12/1854203/google-play-shows-warning-to-anyone-searching-for-fortnite-apks?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  591.            <description>Mark Wilson quotes a report from BetaNews: The arrival of Fortnite on Android has not only been eagerly awaited, but also steeped in controversy. In addition to making the game a Samsung exclusive (for a few days, anyway), Epic Games decided to bypass Google Play and host APK downloads on its own servers. But this isn't going to stop people looking for Fortnite in the Play Store. Google is well aware of this, and that there is the potential for fake, scam apps to appear, tricking users into downloading something malicious. As such, the company is taking action, and is showing a warning to anyone who searches for Fortnite in Google Play. Conduct a search for Fortnite in Google's app store and you'll be greeted by a message that reads "Fortnite Battle Royale by Epic Games, Inc is not available on Google Play." Searchers are also advised that Fortnite rival PlayerUnknown's Battlegrounds (PUBG) is available to download.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  592. &lt;a class="slashpop" href="http://twitter.com/home?status=Google+Play+Shows+Warning+To+Anyone+Searching+For+Fortnite+APKs%3A+http%3A%2F%2Fbit.ly%2F2vCNH3w"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  593. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fgames.slashdot.org%2Fstory%2F18%2F08%2F12%2F1854203%2Fgoogle-play-shows-warning-to-anyone-searching-for-fortnite-apks%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  594.  
  595. &lt;a class="nobg" href="http://plus.google.com/share?url=https://games.slashdot.org/story/18/08/12/1854203/google-play-shows-warning-to-anyone-searching-for-fortnite-apks?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  596.  
  597.  
  598.  
  599. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://games.slashdot.org/story/18/08/12/1854203/google-play-shows-warning-to-anyone-searching-for-fortnite-apks?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12469316&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/D7HBoiR5vzo" height="1" width="1" alt=""/&gt;</description>
  600.            <pubDate>Mon, 13 Aug 2018 09:11:00 +0100</pubDate>
  601.        </item>
  602.        <item>
  603.            <title>11-Year-Old Changes Election Results On Florida's Website: Defcon 2018</title>
  604.            <link>https://politics.slashdot.org/story/18/08/13/052217/11-year-old-changes-election-results-on-floridas-website-defcon-2018?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  605.            <description>UnknowingFool writes: At this year's DEFCON, a group of 50 children aged 8 to 16 participated in a hack of 13 imitation election websites. One 11-year-old boy changed the voting results in 10 minutes. A 11 year-old-girl was also able to change the voting results in 30 minutes. Overall, more than 30 of the 50 children were able to hack the websites in some form. The so-called "DEFCON Voting Machine Hacking Village" allowed kids the chance to manipulate vote tallies, party names, candidate names and vote count totals. The 11-year-old girl was able to triple the number of votes found on the website in under 15 minutes.
  606.  
  607. The National Association of Secretaries of State said in a statement that it is "ready to work with civic-minded members of the DEFCON community wanting to become part of a proactive team effort to secure our elections." But the organization expressed skepticism over the hackers' abilities to access the actual state websites. "It would be extremely difficult to replicate these systems since many states utilize unique networks and custom-built databases with new and updated security protocols," it read. "While it is undeniable websites are vulnerable to hackers, election night reporting websites are only used to publish preliminary, unofficial results for the public and the media. The sites are not connected to vote counting equipment and could never change actual election results."&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  608. &lt;a class="slashpop" href="http://twitter.com/home?status=11-Year-Old+Changes+Election+Results+On+Florida's+Website%3A+Defcon+2018%3A+http%3A%2F%2Fbit.ly%2F2vGzJNP"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  609. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fpolitics.slashdot.org%2Fstory%2F18%2F08%2F13%2F052217%2F11-year-old-changes-election-results-on-floridas-website-defcon-2018%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  610.  
  611. &lt;a class="nobg" href="http://plus.google.com/share?url=https://politics.slashdot.org/story/18/08/13/052217/11-year-old-changes-election-results-on-floridas-website-defcon-2018?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  612.  
  613.  
  614.  
  615. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://politics.slashdot.org/story/18/08/13/052217/11-year-old-changes-election-results-on-floridas-website-defcon-2018?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12469990&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/XfykJWqJyqw" height="1" width="1" alt=""/&gt;</description>
  616.            <pubDate>Mon, 13 Aug 2018 05:17:00 +0100</pubDate>
  617.        </item>
  618.        <item>
  619.            <title>Intel's 9th Gen Processors Rumored To Launch In October With 8 Cores</title>
  620.            <link>https://hardware.slashdot.org/story/18/08/12/1858246/intels-9th-gen-processors-rumored-to-launch-in-october-with-8-cores?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  621.            <description>According to a new report from Wccftech, Intel will introduce new Core i9, i7, and i5 chips on October 1st that will be branded as 9th generation processors. The Verge reports: The mainstream flagship processor, Intel's Core i9-9900K, is expected to ship with 8 cores and 16 threads. Leaked documents show that this will be the first mainstream Core i9 desktop processor, and will include 16 MB of L3 cache and Intel's UHD 620 graphics chip. Even Intel's 9th gen Core i7 processor is expected to ship with 8 cores and 8 threads (up from the current 6 cores), with the Core i5 shipping with 6 cores and 6 threads. Intel is reportedly launching its unlocked overclockable processors first, followed by more 9th generation processors early next year.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  622. &lt;a class="slashpop" href="http://twitter.com/home?status=Intel's+9th+Gen+Processors+Rumored+To+Launch+In+October+With+8+Cores%3A+http%3A%2F%2Fbit.ly%2F2vCFFYg"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  623. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fhardware.slashdot.org%2Fstory%2F18%2F08%2F12%2F1858246%2Fintels-9th-gen-processors-rumored-to-launch-in-october-with-8-cores%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  624.  
  625. &lt;a class="nobg" href="http://plus.google.com/share?url=https://hardware.slashdot.org/story/18/08/12/1858246/intels-9th-gen-processors-rumored-to-launch-in-october-with-8-cores?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  626.  
  627.  
  628.  
  629. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://hardware.slashdot.org/story/18/08/12/1858246/intels-9th-gen-processors-rumored-to-launch-in-october-with-8-cores?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12469324&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/LuBrRWFPRqg" height="1" width="1" alt=""/&gt;</description>
  630.            <pubDate>Mon, 13 Aug 2018 02:30:00 +0100</pubDate>
  631.        </item>
  632.        <item>
  633.            <title>Should the US Air Force Bomb Forest Fires?</title>
  634.            <link>https://news.slashdot.org/story/18/08/12/1848246/should-the-us-air-force-bomb-forest-fires?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  635.            <description>An anonymous reader quotes a report from Popular Mechanics: Earlier this summer, the Swedish Air Force dropped a laser-guided bomb on a forest fire to help suppress the flames. Now there's a proposal for the United States to do the same, using the might of the U.S. Air Force to fight America's raging forest fires via bombs and sonic booms. F-15 Strike Eagle Weapon System Officer Mike Benitez, writing in War on the Rocks, proposes using B-1 bombers stuffed to the gills with bombs to battle wildfires on the American homefront. The idea here is to snuff out fires the way you'd blow out birthday candles at the base. In Sweden, the shockwave from a single bomb snuffed out flames within a 100-yard radius of the impact point. So, Benitez reasons, why not load up a heavy strategic bomber with up to 84 bombs and do some serious firefighting?
  636. Benitez chose the B-1 for his hypothetical scenario not only because of its bomb-carrying capability, but for the same reason the heavy bomber became a close air support platform of choice in Afghanistan: its long range translated into persistence over the battlefield, enabling the big bomber to hang around above friendly forces and bomb the Taliban for hours. The B-1 could do donuts in the skies over a wildfire as firefighters on the ground work out the best way to tackle it. The B-1 wouldn't carry just any bomb, either, but ordinance that was designed for firefighting. Most bombs use a steel casing that fragments into deadly shrapnel, but this would be unnecessary (and dangerous) when fighting fires. A firefighting bomb would use a combustible casing that would disintegrate on impact. Ideally the bomb would use a thermobaric warhead, one that kills via overpressure, as it generates even more powerful blast waves than traditional high-explosive bombs.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  637. &lt;a class="slashpop" href="http://twitter.com/home?status=Should+the+US+Air+Force+Bomb+Forest+Fires%3F%3A+http%3A%2F%2Fbit.ly%2F2vEtxpx"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  638. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fnews.slashdot.org%2Fstory%2F18%2F08%2F12%2F1848246%2Fshould-the-us-air-force-bomb-forest-fires%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  639.  
  640. &lt;a class="nobg" href="http://plus.google.com/share?url=https://news.slashdot.org/story/18/08/12/1848246/should-the-us-air-force-bomb-forest-fires?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  641.  
  642.  
  643.  
  644. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://news.slashdot.org/story/18/08/12/1848246/should-the-us-air-force-bomb-forest-fires?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12469308&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/0c3EQDf7aXI" height="1" width="1" alt=""/&gt;</description>
  645.            <pubDate>Mon, 13 Aug 2018 00:22:00 +0100</pubDate>
  646.        </item>
  647.        <item>
  648.            <title>Bethesda Blocks Resale of a Secondhand Game</title>
  649.            <link>https://games.slashdot.org/story/18/08/12/1810248/bethesda-blocks-resale-of-a-secondhand-game?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  650.            <description>theshowmecanuck writes: Bethesda just pulled a cease and desist on an Amazon Marketplace sale of one of their games. This, despite the fact that the resale of used games is legal in the USA. Bethesda is saying that because it isn't being offered with a warranty, it is not protected through the First Sale Doctrine. UPDATE: The game in question was sealed and unopened, technically not "used," but being sold secondhand. In a letter sent to the seller by Bethesda's legal firm, they made the argument that the sale was not "by an authorized reseller," and was therefore "unlawful." Bethesda also took issue with the seller's use of the word "new" in selling the unwrapped game, claiming that this constituted "false advertising."
  651. Bethesda offered the following statement: "Bethesda does not and will not block the sale of pre-owned games. The issue in this case is that the seller offered a pre-owned game as 'new' on the Amazon Marketplace. We do not allow non-authorized resellers to represent what they sell as 'new' because we can't verify that the game hasn't been opened and repackaged. This is how we help protect buyers from fraud and ensure our customers always receive authentic new product, with all enclosed materials and warranty intact. In this case, if the game had been listed as 'Pre-Owned,' this would not have been an issue."&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  652. &lt;a class="slashpop" href="http://twitter.com/home?status=Bethesda+Blocks+Resale+of+a+Secondhand+Game%3A+http%3A%2F%2Fbit.ly%2F2vH2Gcs"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  653. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fgames.slashdot.org%2Fstory%2F18%2F08%2F12%2F1810248%2Fbethesda-blocks-resale-of-a-secondhand-game%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  654.  
  655. &lt;a class="nobg" href="http://plus.google.com/share?url=https://games.slashdot.org/story/18/08/12/1810248/bethesda-blocks-resale-of-a-secondhand-game?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  656.  
  657.  
  658.  
  659. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://games.slashdot.org/story/18/08/12/1810248/bethesda-blocks-resale-of-a-secondhand-game?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12469254&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/qcDXodJEEE8" height="1" width="1" alt=""/&gt;</description>
  660.            <pubDate>Sun, 12 Aug 2018 21:23:00 +0100</pubDate>
  661.        </item>
  662.        <item>
  663.            <title>Chromebooks May Get Apple Boot Camp-Like Windows 10 Dual Boot With 'Campfire'</title>
  664.            <link>https://apple.slashdot.org/story/18/08/12/1823212/chromebooks-may-get-apple-boot-camp-like-windows-10-dual-boot-with-campfire?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  665.            <description>Google is reportedly working on a secret project to get Windows 10 running on Chromebooks. XDA Developers' Kieran Miyamoto reports on the latest developments surrounding "Campfire" -- the Chromebook equivalent of Apple's Boot Camp. From the report: Earlier this year, a mysterious project appeared on the Chromium Git. The Chrome OS developers had created a new firmware branch of the Google Pixelbook called eve-campfire and were working on a new "Alt OS mode" for this branch. We have since confirmed this Alt OS refers to Microsoft Windows 10 and found evidence that it wasn't just an internal project but intended for public release.
  666. The developers have reworked the way in which they distribute updates to a rarely-used section of ROM on Chromebooks called RW_LEGACY. The RW_LEGACY section on a Chromebook's ROM traditionally gives users the ability to dual-boot into an alternative OS, but it is something of an afterthought during production and the section is rarely updated after a device leaves the factory. Now, with Campfire, Google will push signed updates to RW_LEGACY via the regular auto-update process, so firmware flashing won't be a concern for Joe Public. A recent commit for enabling Alt OS through crosh with a simple [alt_os enable] command indicates that it will be a fairly easy setup process from the user's end too. We may expect to see the first demo of "Campfire" at Google's upcoming Pixel 3 launch event in October. Also, the report notes that the Google Pixelbook won't be the only Chromebook with Campfire support, citing "mentions of multiple 'campfire variants.'"&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  667. &lt;a class="slashpop" href="http://twitter.com/home?status=Chromebooks+May+Get+Apple+Boot+Camp-Like+Windows+10+Dual+Boot+With+'Campfire'%3A+http%3A%2F%2Fbit.ly%2F2vDEhVp"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  668. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fapple.slashdot.org%2Fstory%2F18%2F08%2F12%2F1823212%2Fchromebooks-may-get-apple-boot-camp-like-windows-10-dual-boot-with-campfire%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  669.  
  670. &lt;a class="nobg" href="http://plus.google.com/share?url=https://apple.slashdot.org/story/18/08/12/1823212/chromebooks-may-get-apple-boot-camp-like-windows-10-dual-boot-with-campfire?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  671.  
  672.  
  673.  
  674. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://apple.slashdot.org/story/18/08/12/1823212/chromebooks-may-get-apple-boot-camp-like-windows-10-dual-boot-with-campfire?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12469264&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/a1wIOoEuksc" height="1" width="1" alt=""/&gt;</description>
  675.            <pubDate>Sun, 12 Aug 2018 20:22:00 +0100</pubDate>
  676.        </item>
  677.        <item>
  678.            <title>Oracle Accused of Defrauding Investors On Cloud Sales Growth</title>
  679.            <link>https://developers.slashdot.org/story/18/08/12/0052236/oracle-accused-of-defrauding-investors-on-cloud-sales-growth?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  680.            <description>An anonymous reader quotes a report from Bloomberg: Oracle is named in a lawsuit alleging the company's executives lied to shareholders when they explained why cloud sales were growing. The investor leading the case, the City of Sunrise Firefighters' Pension Fund, claimed Oracle engaged in coercion and threats to sell its cloud-computing products, creating an unsustainable model that fell apart, according to the suit seeking class-action status and filed Friday in San Jose, California. The Florida-based firefighter pension fund and other investors lost money when Oracle's stock plummeted in March after reporting a disappointing earnings report and outlook, according to the lawsuit.
  681. The suit claimed that Oracle's executives lied in forward-looking statements, which are never guaranteed, during earnings calls and at investor conferences in 2017 when they said customers were rapidly adopting their cloud-based products and cloud sales would accelerate. The firefighter pension, which manages about $143 million for 235 participants, alleged that Oracle used software license audits and weakened existing maintenance programs to compel customers to buy the cloud products.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  682. &lt;a class="slashpop" href="http://twitter.com/home?status=Oracle+Accused+of+Defrauding+Investors+On+Cloud+Sales+Growth%3A+http%3A%2F%2Fbit.ly%2F2KRt1JS"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  683. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fdevelopers.slashdot.org%2Fstory%2F18%2F08%2F12%2F0052236%2Foracle-accused-of-defrauding-investors-on-cloud-sales-growth%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  684.  
  685. &lt;a class="nobg" href="http://plus.google.com/share?url=https://developers.slashdot.org/story/18/08/12/0052236/oracle-accused-of-defrauding-investors-on-cloud-sales-growth?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  686.  
  687.  
  688.  
  689. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://developers.slashdot.org/story/18/08/12/0052236/oracle-accused-of-defrauding-investors-on-cloud-sales-growth?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12468114&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/p6-1NIj-R0E" height="1" width="1" alt=""/&gt;</description>
  690.            <pubDate>Sun, 12 Aug 2018 19:21:00 +0100</pubDate>
  691.        </item>
  692.        <item>
  693.            <title>NASA Successfully Launches Parker Solar Probe</title>
  694.            <link>https://science.slashdot.org/story/18/08/12/1835238/nasa-successfully-launches-parker-solar-probe?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  695.            <description>NASA's Sun-chasing Parker Solar Probe successfully launched this morning at 3:31AM. A couple hours later, NASA confirmed that the vessel was healthy. The probe still has a ways to go before it's conducting scientific studies. "It'll spend its first week in space deploying its high-gain antenna, the first part of its electric field antennas and its magnetometer," reports Engadget. "In early September, the probe will start a roughly four-week instrument shakedown to be sure it's ready for science gathering." From the report:
  696. The trip to the Sun will take a while. NASA's probe will pass by Venus a total of seven times (starting in early October) as it uses the planet's gravity to whip itself ever closer to the star. The spacecraft will make its first close approach in early November, when it will travel 15 million miles from the Sun -- inside the Sun's corona (aka the solar atmosphere). Its closest approach will put it at just 3.8 million miles from the Sun, at which point it should be the fastest-ever human-made object with a speed of 430,000MPH. The first science data should return sometime in December. The New York Times has a neat video explaining how the Parker Solar Probe will touch the Sun. Meanwhile, Fox News has a dialogue-free clip of the actual launch.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  697. &lt;a class="slashpop" href="http://twitter.com/home?status=NASA+Successfully+Launches+Parker+Solar+Probe%3A+http%3A%2F%2Fbit.ly%2F2Oz3JT5"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  698. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fscience.slashdot.org%2Fstory%2F18%2F08%2F12%2F1835238%2Fnasa-successfully-launches-parker-solar-probe%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  699.  
  700. &lt;a class="nobg" href="http://plus.google.com/share?url=https://science.slashdot.org/story/18/08/12/1835238/nasa-successfully-launches-parker-solar-probe?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  701.  
  702.  
  703.  
  704. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://science.slashdot.org/story/18/08/12/1835238/nasa-successfully-launches-parker-solar-probe?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12469286&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/BckhwUSkGDU" height="1" width="1" alt=""/&gt;</description>
  705.            <pubDate>Sun, 12 Aug 2018 18:20:00 +0100</pubDate>
  706.        </item>
  707.        <item>
  708.            <title>AWS Error Exposed GoDaddy Business Secrets</title>
  709.            <link>https://it.slashdot.org/story/18/08/12/0143234/aws-error-exposed-godaddy-business-secrets?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</link>
  710.            <description>Internal information belonging to hosting provider GoDaddy has been exposed via an error in Amazon's AWS bucket configuration. According to cybersecurity firm UpGuard, a set of documents were left in an Amazon S3 bucket which was available to the public. ZDNet reports: The information involved in the security breach appeared to describe GoDaddy's architecture, as well as "high-level configuration information for tens of thousands of systems and pricing options for running those systems in Amazon AWS, including the discounts offered under different scenarios," according to UpGuard. Configuration files for hostnames, operating systems, workloads, AWS regions, memory, CPU specifications, and more were included in the exposed cache, which described at least 24,000 systems.
  711. "Essentially, this data mapped a very large scale AWS cloud infrastructure deployment, with 41 different columns on individual systems, as well as summarized and modeled data on totals, averages, and other calculated fields," the cybersecurity firm said. The open bucket, called "abbottgodaddy," also included what the company believes to be business information relating to GoDaddy and Amazon AWS' relationship, including rate negotiations. This information should have been kept confidential. The open bucket, called "abbottgodaddy," also included what the company believes to be business information relating to GoDaddy and Amazon AWS' relationship, including rate negotiations. This information should have been kept confidential.&lt;p&gt;&lt;div class="share_submission" style="position:relative;"&gt;
  712. &lt;a class="slashpop" href="http://twitter.com/home?status=AWS+Error+Exposed+GoDaddy+Business+Secrets%3A+http%3A%2F%2Fbit.ly%2F2KOVrE3"&gt;&lt;img src="https://a.fsdn.com/sd/twitter_icon_large.png"&gt;&lt;/a&gt;
  713. &lt;a class="slashpop" href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fit.slashdot.org%2Fstory%2F18%2F08%2F12%2F0143234%2Faws-error-exposed-godaddy-business-secrets%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"&gt;&lt;img src="https://a.fsdn.com/sd/facebook_icon_large.png"&gt;&lt;/a&gt;
  714.  
  715. &lt;a class="nobg" href="http://plus.google.com/share?url=https://it.slashdot.org/story/18/08/12/0143234/aws-error-exposed-godaddy-business-secrets?utm_source=slashdot&amp;amp;utm_medium=googleplus" onclick="javascript:window.open(this.href,'', 'menubar=no,toolbar=no,resizable=yes,scrollbars=yes,height=600,width=600');return false;"&gt;&lt;img src="https://www.gstatic.com/images/icons/gplus-16.png" alt="Share on Google+"/&gt;&lt;/a&gt;
  716.  
  717.  
  718.  
  719. &lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://it.slashdot.org/story/18/08/12/0143234/aws-error-exposed-godaddy-business-secrets?utm_source=rss1.0moreanon&amp;amp;utm_medium=feed"&gt;Read more of this story&lt;/a&gt; at Slashdot.&lt;/p&gt;&lt;iframe src="https://slashdot.org/slashdot-it.pl?op=discuss&amp;amp;id=12468170&amp;amp;smallembed=1" style="height: 300px; width: 100%; border: none;"&gt;&lt;/iframe&gt;&lt;img src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/dlLR6U7zSvE" height="1" width="1" alt=""/&gt;</description>
  720.            <pubDate>Sun, 12 Aug 2018 17:19:00 +0100</pubDate>
  721.        </item>
  722.    </channel>
  723. </rss>
  724.  

If you would like to create a banner that links to this page (i.e. this validation result), do the following:

  1. Download the "valid RSS" banner.

  2. Upload the image to your own server. (This step is important. Please do not link directly to the image on this server.)

  3. Add this HTML to your page (change the image src attribute if necessary):

If you would like to create a text link instead, here is the URL you can use:

http://www.feedvalidator.org/check.cgi?url=http%3A//slashdot.headfucking.net/feed.xml

Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda