What's the story with these ads on Slashdot? Check out our new blog post to find out. ×
Software

MIT Simplifies Design Process For 3D Printing 27

An anonymous reader writes: New software out of MIT and the Interdisciplinary Center Herzliya in Israel takes CAD files and automatically builds visual models that users can alter with simple, visual sliders. It works by computing myriad design variations before a user asks for them. When the CAD file is loaded, the software runs through a host of size variations on various properties of the object, evaluating whether the changes would work in a 3D printer, and doing the necessary math to plan tool routes. When a user moves one of the sliders, it switches the design along these pre-computer values. "The system automatically weeds out all the parameter values that lead to unprintable or unstable designs, so the sliders are restricted to valid designs. Moving one of the sliders — changing the height of the shoe's heel, say, or the width of the mug's base — sweeps through visual depictions of the associated geometries."

There are two big drawbacks: first, it requires a lot of up-front processing power to compute the variations on an object. Second, resolution for changes is fixed if you want quick results — changing the design for a pair of 3D-printed shoes from size 8 to size 9 might be instantaneous, but asking for a shoe that's a quarter of a millimeter longer than a size 8 would take several minutes to process. But for scrolling through the pre-computed design changes, the software can present "in real time what would take hours to calculate with a CAD program," and without the requisite experience with CAD.
Programming

An Idea For Software's Industrial Revolution 238

An anonymous reader writes: Tech company Code Valley makes the bold claim that a software industrial revolution may be imminent (PDF). They propose shifting developers from the coding domain (current software development practice) to a "design-domain," where the emphasis is no longer on writing code, but on decentralized design – code becomes simply a by-product of this collaboration. In this design-domain, software programs are designed (and built) by a peer-to-peer supply chain of software vendors, each owned and managed by a software engineer. They envisage a global supply-chain of these software experts capable of reliably delivering immensely complex software.
Programming

Survey: More Women Are Going Into Programming 266

itwbennett writes: We've previously discussed the dearth of women in computing. Indeed, according to U.S. Bureau and Labor Statistics estimates, in 2014 four out of five programmers and software developers in the U.S. were men. But according to a survey conducted this spring by the Application Developers Alliance and IDC, that may be changing. The survey of 855 developers worldwide found that women make up 42% of developers with less than 1 year of experience and 30% of those with between 1 and 5 years of experience. Of course, getting women into programming is one thing; keeping them is the next big challenge.
Communications

The Speakularity, Where Everything You Say Is Transcribed and Searchable 73

An anonymous reader sends an article from Nautilus about the possible future of speech recognition software. Today, hundreds of millions of people are walking around with devices that can not only record sound, but also do a decent job of turning spoken word into searchable text. The article makes the case that the recording and transcription of normal conversation will become commonplace, sooner or later. Not only would this potentially make a lot more interesting discussion available beyond earshot, but it could also facilitate information retrieval on a personal level.

The article makes an analogy with email — right now, if you communicated with somebody through email a decade ago, you don't have to remember the specifics — as long as you didn't delete it or switch email providers, you can just search and look at exactly what was said. Of course, the power of such technology comes with trade-offs — not only would we be worried about the obvious privacy issues, but many people may feel restricted by always "performing" for the microphones. Some researchers also worry that if we have technology to remember for us, we'll put much less effort into remembering things ourselves.
Security

Check Point Introduces New CPU-Level Threat Prevention 129

An anonymous reader writes: After buying Israeli startup company Hyperwise earlier this year, Check Point Software Technologies (Nasdaq: CHKP) now unveils its newest solution for defeating malware. Their new offering called SandBlast includes CPU-Level Threat Emulation that was developed in Hyperwise which is able to defeat exploits faster and more accurately than any other solution by leveraging CPU deubgging instruction set in Intel Haswell, unlike known anti-exploitation solutions like kBouncer or ROPecker which use older instruction sets and are therefore bypassable. SandBlast also features Threat Extraction — the ability to extract susceptible parts from incoming documents.
Security

"Extremely Critical" OS X Keychain Vulnerability Steals Passwords Via SMS 118

Mark Wilson writes: Two security researchers have discovered a serious vulnerability in OS X that could allow an attacker to steal passwords and other credentials in an almost invisible way. Antoine Vincent Jebara and Raja Rahbani — two of the team behind the myki identity management security software — found that a series of terminal commands can be used to extract a range of stored credentials. What is particularly worrying about the vulnerability is that it requires virtually no interaction from the victim; simulated mouse clicks can be used to click on hidden buttons to grant permission to access the keychain. Apple has been informed of the issue, but a fix is yet to be issued. The attack, known as brokenchain, is disturbingly easy to execute. Ars reports that this weakness has been exploited for four years.
Businesses

Why Do So Many Tech Workers Dislike Their Jobs? 468

Nerval's Lobster writes: So what if you work for a tech company that offers free lunch, in-house gym, and dry cleaning? A new survey suggests that a majority of software engineers, developers, and sysadmins are miserable. Granted, the survey in question only involved 5,000 respondents, so it shouldn't be viewed as comprehensive (it was also conducted by a company that deals in employee engagement), but it's nonetheless insightful into the reasons why a lot of tech pros apparently dislike their jobs. Apparently perks don't matter quite so much if your employees have no sense of mission, don't have a clear sense of how they can get promoted, and don't interact with their co-workers very well. While that should be glaringly obvious, a lot of companies are still fixated on the idea that minor perks will apparently translate into huge morale boosts; but free smoothies in the cafeteria only goes so far.
Networking

New FCC Rules Could Ban WiFi Router Firmware Modification 238

An anonymous reader writes: Hackaday reports that the FCC is introducing new rules which ban firmware modifications for the radio systems in WiFi routers and other wireless devices operating in the 5 GHz range. The vast majority of routers are manufactured as System on Chip devices, with the radio module and CPU integrated in a single package. The new rules have the potential to effectively ban the installation of proven Open Source firmware on any WiFi router.

ThinkPenguin, the EFF, FSF, Software Freedom Law Center, Software Freedom Conservancy, OpenWRT, LibreCMC, Qualcomm, and others have created the SaveWiFi campaign, providing instructions on how to submit a formal complaint to the FCC regarding this proposed rule. The comment period is closing on September 8, 2015. Leave a comment for the FCC.
Math

Machine Learning Could Solve Economists' Math Problem 153

An anonymous reader writes: Noah Smith argues that the field of economics frequently uses math in an unhealthy way. He says many economists don't use math as a tool to describe reality, but rather as an abstract foundation for whatever theory they've come up with. A possible solution to this, he says, is machine learning: "In other words, econ is now a rogue branch of applied math. Developed without access to good data, it evolved different scientific values and conventions. But this is changing fast, as information technology and the computer revolution have furnished economists with mountains of data. As a result, empirical analysis is coming to dominate econ. ... [Two economists pushing this change] stated that machine learning techniques emphasized causality less than traditional economic statistical techniques, or what's usually known as econometrics. In other words, machine learning is more about forecasting than about understanding the effects of policy. That would make the techniques less interesting to many economists, who are usually more concerned about giving policy recommendations than in making forecasts."
Transportation

How Autonomous Cars' Safety Features Clash With Normal Driving 437

An anonymous reader writes: Google's autonomous cars have a very good safety record so far — the accidents they've been involved in weren't the software's fault. But that doesn't mean the cars are blending seamlessly into traffic. A NY Times article explains how doing the safest thing sometimes means doing something entirely unexpected to real, human drivers — which itself can lead to dangerous situations. "One Google car, in a test in 2009, couldn't get through a four-way stop because its sensors kept waiting for other (human) drivers to stop completely and let it go. The human drivers kept inching forward, looking for the advantage — paralyzing Google's robot." There are also situations in which the software's behavior may be so incomprehensible to human passengers that they end up turning it off. "In one maneuver, it swerved sharply in a residential neighborhood to avoid a car that was poorly parked, so much so that the Google sensors couldn't tell if it might pull into traffic."
Encryption

Turkey Arrests Journalists For Using Encryption 145

An anonymous reader sends news that three employees of Vice News were arrested in Turkey because one of them used an encryption system on his personal computer. That particular type of encryption has been used by the terrorist organization known as the Islamic State, so the men were charged with "engaging in terrorist activity." The head of a local lawyers association said, "I find it ridiculous that they were taken into custody. I don't believe there is any accuracy to what they are charged for. To me, it seems like an attempt by the government to get international journalists away from the area of conflict." The Turkish government denied these claims: "This is an unpleasant incident, but the judiciary is moving forward with the investigation independently and, contrary to claims, the government has no role in the proceedings."
Piracy

More Popcorn Time Users Sued 146

An anonymous reader writes: The torrent-based video streaming software Popcorn Time has been in the news lately as multiple entities have initiated legal action over its use. Now, 16 Oregon-based Comcast subscribers have been targeted for their torrenting of the movie Survivor. The attorney who filed the lawsuit (PDF) says his client, Survivor Productions Inc., doesn't plan to seek any more than the minimum $750 fine, and that their goal is to "deter infringement." The lawsuit against these Popcorn Time users was accompanied by 12 other lawsuits targeting individuals who acquired copies of the movie using more typical torrenting practices.
Chrome

Chrome 45 Launches, Automatically Pauses Less Important Flash Content, Like Ads 87

An anonymous reader writes: Google today launched Chrome 45 for Windows, Mac, Linux, and Android with some expected changes and new developer tools. First and foremost, Chrome now automatically pauses less important Flash content (rolling out gradually, so be patient). This has been a longtime coming from both Google and Adobe, with the goal to make Flash content more power-efficient in Chrome: In March, a setting was introduced to play less Flash content on the page, but it wasn't turned on by default, and in June, the option was enabled in the browser's beta channel. Now it's being turned on for everyone.
Cellphones

Smartphone Malware Planted In Popular Apps Pre-sale 42

An anonymous reader writes with news from The Stack that makes it a little harder to scoff at malware on phones as being largely the fruit of dodgy sideloaded software, game cracks, et cetera. They report that even phones marketed as brand new, from well-known brands like Lenovo and Xiaomi, have been tampered with and "infected prior to sale with intelligent malware disguised in popular apps such as Facebook." (To U.S. buyers, those makers may be slightly obscure as cellphone vendors; the scheme this article addresses involves handsets sold by vendors in Europe and Asia, involving more than 20 different handset types.)
Open Source

LILO Bootloader Development To End 134

An anonymous reader writes: For any longtime Linux users, you probably remember the LILO bootloader from Linux distributions of many years ago. This bootloader has been in development since the 90's but development is finally ending. A homepage message reads, "I plan to finish development of LILO at 12/2015 because of some limitations (e.g. with BTFS, GPT, RAID). If someone want to develop this nice software further, please let me know ..."
Education

NSF Makes It Rain: $722K Award To Evaluate Microsoft-Backed TEALS 64

theodp writes: Microsoft has $92 billion in cash parked offshore, so it's kind of surprising to see a $722K National Science Foundation award is going towards validating the efficacy of Microsoft TEALS, the pet program of CEO Satya Nadella that sends volunteer software engineers with no teaching experience into high schools to teach kids and their teachers computer science. Among its Program Changes for 2015, TEALS said it "explicitly commits to provide a core set of curriculum materials that are complete, organized, and adaptable," which should help improve the outcome of the Developing Computer Science Pedagogical Content Knowledge through On-the-Job Learning NSF study schools are being asked to participate in. Meanwhile, CSTUY, a volunteer organization led by experienced CS teachers (including Slashdot user zamansky), finds itself turning to Kickstarter for $25K to fund Saturday Hacking Sessions. So, as Microsoft-backed Code.org — which has also attracted NSF award money to validate its CS program — is fond of saying: What's wrong with this picture? (To be fair to TEALS: it may have Microsoft backing, but it's not strictly a Microsoft effort, and also started out as a pure volunteer effort, as founder Kevin Wang explained earlier this year.)
Open Source

Linux Kernel 4.2 Released 141

An anonymous reader writes: The Linux 4.2 kernel is now available. This kernel is one of the biggest kernel releases in recent times and introduces rewrites of some of the kernel's Intel Assembly x86 code, new ARM board support, Jitter RNG improvements, queue spinlocks, the new AMDGPU kernel driver, NCQ TRIM handling, F2FS per-file encryption, and many other changes to benefit most Linux users.
AMD

AMD's R9 Fury On Open-Source: Prepare for Disappointment, For Now 43

An anonymous reader writes: With Linux 4.3 AMD is adding the initial open-source driver for the R9 Fury graphics cards. Unfortunate for Linux gamers, the R9 Fury isn't yet in good shape on the open-source driver and it's not good with the Catalyst Linux driver either as previously discussed. With the initial code going into Linux 4.3, the $550 R9 Fury runs slower than graphics cards like the lower-cost and older R7 370 and HD 7950 GPUs, since AMD's open-source developers haven't yet found the time to implement power management / re-clocking support. The R9 Fury also only advertises OpenGL 3.0 support while the hardware is GL4.5-capable and the other open-source AMD GCN driver ships OpenGL 4.1. It doesn't look like AMD has any near-term R9 Fury Linux fix for either driver, but at least their older hardware is performing well with the open-source code.
GNOME

GNOME To Start Using Codenames 46

prisoninmate writes: A discussion between GNOME developers and users during the annual GUADEC conference lead to potential code names for the desktop environment, starting with the upcoming September release, GNOME 3.18, which might be dubbed Gothenburg. They decided to codename the September releases after the city where the GUADEC conference took place, as explained above, and the March releases after the city where the GNOME.Asia Summit will take place.
Transportation

Arro Taxi App Arrives In NYC As 'Best Hope' Against Uber 154

An anonymous reader writes with a report at The Stack that "New York City cabs have begun testing a new app-based taxi system in an attempt to win back customers lost to Uber and Lyft." The app is called Arro, and is being trialled in about 7,000 New York cabs. It sticks with metered prices, rather than the demand-based price increases that Uber institutes for times of peak demand. With so many cabs on the road already, the makers boast that Arro will outpace Uber soon. At least based on my limited experience with each, real competition with Uber or Lyft would require some seminars on good customer service.