×
China

NIH, FBI Accuse Scientists In US of Sending IP To China, Running Shadow Labs (arstechnica.com) 115

An anonymous reader quotes a report from Ars Technica: MD Anderson Cancer Center in Houston, Texas has forced out three senior researchers with ties to China. The move comes amid nationwide investigations by federal officials into whether researchers are pilfering intellectual property from U.S. research institutions and running "shadow laboratories" abroad, according to a joint report by Science magazine and the Houston Chronicle. The National Institutes of Health began sending letters to the elite cancer center last August regarding the conduct of five researchers there. The letters discussed "serious violations" of NIH policies, including leaking confidential NIH grant proposals under peer review to individuals in China, failing to disclose financial ties in China, and other conflicts of interest. MD Anderson moved to terminate three of those researchers, two of whom resigned during the termination process. The center cleared the fourth and is still investigation the fifth. MD Anderson isn't the only institution dealing with this issue. The NIH sent similar letters to at least three other institutions, according to reporting by Science and the Houston Chronicle. Some advocates expressed concern over what they considered racial profiling while other researchers worried that such efforts to protect intellectual property would actually backfire.

"These are the top talents foreign countries have been trying to recruit unsuccessfully," said Steven Pei, a University of Houston professor critical of the actions by MD Anderson. "We are now pushing them out of the Texas Medical Center, out of Houston, out of Texas, and out of the U.S. It seems we're helping foreign countries to accomplish what they could not do by themselves. We are hurting the American competitiveness."
Linux

Linux 5.2 Will Introduce The Fieldbus Subsystem (phoronix.com) 59

"The new Fieldbus system has been deemed ready to be released into the staging area of the Linux kernel," writes jwhyche (Slashdot reader #6,192).

Phoronix reports: This newest subsystem for the Linux kernel benefits industrial systems. Fieldbus is a set of network protocols for real-time distributed control of automated industrial systems. Fieldbus is used for connecting different systems/components/instruments within industrial environments. Fieldbus is used for connecting facilities ranging from manufacturing plants up to nuclear energy facilities. The Fieldbus specification has been around for decades while now seeing a formal subsystem within the Linux kernel.

The subsystem allows for devices to exchange data over a Fieldbus whether it be Profinet, FLNet, or one of the other implementations. The subsystem provides a generic framework for exposing switches, lights, actuators, motors, and other hardware... The Linux kernel's Fieldbus subsystem has gone through over ten rounds of public revisions in recent months and has been deemed ready to premiere with Linux 5.2 [which] should debut in July.

Social Networks

Global Attention Span Is Narrowing and Trends Don't Last As Long, Study Reveals (theguardian.com) 113

An anonymous reader quotes a report from The Guardian: It's just as you suspected; the information age has changed the general attention span. A recently published study from researchers at the Technical University of Denmark suggests the collective global attention span is narrowing due to the amount of information that is presented to the public. Released on Monday in the scientific journal Nature Communications, the study shows people now have more things to focus on -- but often focus on things for short periods of time.

The researchers studied several modes of media attention, gathered from several different sources, including (but not limited to): the past 40 years in movie ticket sales; Google books for 100 years; and more modernly, 2013 to 2016 Twitter data; 2010 to 2018 Google Trends; 2010 to 2015 Reddit trends; and 2012 to 2017 Wikipedia attention time. The researchers then created a mathematical model to predict three factors: the "hotness" of the topic, its progression throughout time in the public sphere and the desire for a new topic, said Dr Philipp Hovel, an applied mathematics professor of University College Cork in Ireland. The empirical data found periods where topics would sharply capture widespread attention and promptly lose it just as quickly, except in the cases of publications like Wikipedia and scientific journals. For example, a 2013 Twitter global trend would last for an average of 17.5 hours, contrasted with a 2016 Twitter trend, which would last for only 11.9 hours.

Programming

The Source Code For All Infocom Text Adventure Classics Has Been Released (arstechnica.com) 106

You can now download the source code of every Infocom text adventure game, thanks to archivist Jason Scott who uploaded the code to GitHub. "There are numerous repositories under the name historicalsource, each for a different game," reports Ars Technica. "Titles include, but are not limited to, The Hitchhiker's Guide to the Galaxy, Planetfall, Shogun, and several Zork games -- plus some more unusual inclusions like an incomplete version of Hitchhiker's sequel The Restaurant at the End of the Universe, Infocom samplers, and an unreleased adaptation of James Cameron's The Abyss." From the report: The code was uploaded by Jason Scott, an archivist who is the proprietor of textfiles.com. His website describes itself as "a glimpse into the history of writers and artists bound by the 128 characters that the American Standard Code for Information Interchange (ASCII) allowed them" -- in particular those of the 1980s. He announced the GitHub uploads on Twitter earlier this week. The games were written in the LISP-esque "Zork Implementation Language," or ZIL, which you could be forgiven for not being intimately familiar with already. Fortunately, Scott also tweeted a link to a helpful manual for the language on archive.org. Gamasutra, which first reported the news, notes that Activision still owns the rights to Infocom games and could request a takedown if it wanted.
Bug

New York City Has a Y2K-Like Problem, and It Doesn't Want You To Know About It (nytimes.com) 119

On April 6, something known as the GPS rollover, a cousin to the dreaded Y2K bug, mostly came and went, as businesses and government agencies around the world heeded warnings and made software or hardware updates in advance. But in New York, something went wrong -- and city officials seem to not want anyone to know. [Editor's note: the link may be paywalled; alternative source] New submitter RAYinNYC shares a report: At 7:59 p.m. E.D.T. on Saturday, the New York City Wireless Network, or NYCWiN, went dark, waylaying numerous city tasks and functions, including the collection and transmission of information from some Police Department license plate readers. The shutdown also interrupted the ability of the Department of Transportation to program traffic lights, and prevented agencies such as the sanitation and parks departments from staying connected with far-flung offices and work sites. The culprit was a long-anticipated calendar reset of the centralized Global Positioning System, which connects to devices and computer networks around the world. There has been no public disclosure that NYCWiN, a $500 million network built for the city by Northrop Grumman, was offline and remains so, even as workers are trying to restore it.

City officials tried to play down the shutdown when first asked about it on Monday, speaking of it as if it were a routine maintenance issue. "The city is in the process of upgrading some components of our private wireless network," Stephanie Raphael, a spokeswoman for the Department of Information Technology and Telecommunications, said in an email on Monday. She referred to the glitch as a "brief software installation period." By Tuesday, the agency acknowledged the network shutdown, but said in an emailed statement that "no critical public safety systems are affected." Ms. Raphael admitted that technicians have been unable to get the network back up and running, adding, "We're working overtime to update the network and bring all of it back online." The problem has raised questions about whether the city had taken appropriate measures to prepare the network for the GPS rollover.

NASA

Final Results of NASA Twins Study Show How Scott Kelly Changed After a Year In Space (gizmodo.com) 43

The final findings of the NASA Twins Study, which compared 50-year-old astronaut Scott Kelly, who spent a year aboard the International Space Station in 2015, and his identical twin brother, who stayed on Earth, were published in Science. Gizmodo reports: NASA found that Scott Kelly was about as mentally, physically, and genetically healthy as his brother during his trip to space, and that the vast majority of small changes spotted in Scott (relative to himself before the mission) went back to normal within six months time. But the differences seen in Scott while up in space and after his return home could provide NASA important leads on how to keep astronauts safe during longer missions to Mars and beyond.

Preliminary results from the study were released in 2017. But it was the second round of findings, released in January 2018, that really caught the attention of media outlets, some of which misrepresented what was found. In particular, outlets like Newsweek reported that a whopping "seven percent of [Scott Kelly's] genes did not return to normal after he landed." Others implied that Scott Kelly had become a different person from his twin brother. But the researchers were never talking about a seven percent difference between the twins' genes. They were saying that some of Scott Kelly's genes had changed in their expression -- the carrying out of instructions in a cell's genome -- during his time up in space. And that roughly 7 percent of this overall change in gene expression could still be seen six months after he returned home.
The remaining change in gene expression six months out was actually closer to 10 percent, but NASA clarified that this was still a relatively tiny change in his epigenetics. "Given that the majority of the biological and human health variables remained stable, or returned to baseline, these data suggest that human health can be mostly sustained over this duration of spaceflight," said NASA in a statement.
Businesses

Airbnb Guest Found Hidden Surveillance Camera By Scanning Wi-Fi Network (arstechnica.com) 99

An anonymous reader quotes a report from Ars Technica: A New Zealand family that booked an Airbnb in Ireland recently discovered an undisclosed camera in the living room, and the family says that Airbnb initially cleared the host of any wrongdoing before finally banning the offender from its platform. "Once the family had unpacked, Andrew Barker, who works in IT security, scanned the house's Wi-Fi network," CNN reported today. "The scan unearthed a camera and subsequently a live feed. From the angle of the video, the family tracked down the camera, concealed in what appeared to be a smoke alarm or carbon monoxide detector." Nealie Barker posted an image on Facebook showing the location of the camera in the living room and a shot of the family from the sneaky video feed.

Based on the photo, the video of the Barkers seems to have been taken on March 3 and was viewable on the local Wi-Fi network at 192.168.0.4/video/livemb.asp. The family relocated to a hotel and contacted both Airbnb and the property host. The host initially hung up but later called back and told them, "The camera in the living room was the only one in the house," CNN wrote. It's not clear whether the host was recording the video, whether he was capturing audio, whether he was monitoring it remotely in real time, or whether he was using it for anything more than monitoring guests. [...] Airbnb temporarily suspended the listing and promised to investigate, CNN wrote. But when Barker contacted Airbnb again two weeks later, "the company told her that the host had been 'exonerated,' and the listing reinstated." Airbnb finally banned the host after Nealie Barker posted about the disturbing incident on Facebook on Monday this week. Barker's Facebook post said that Airbnb's "investigation which didn't include any follow-up with us exonerated the host, no explanation provided," and that "the listing (with hidden camera not mentioned) is still on Airbnb."
Airbnb said in a statement to Ars Technica: "Our original handling of this incident did not meet the high standards we set for ourselves, and we have apologized to the family and fully refunded their stay."

Airbnb's policy states that hosts must disclose "any type of surveillance device" in listings, "even if it's not turned on or hooked up." Cameras are allowed in certain spaces if they are disclosed, but Airbnb "prohibit[s] any surveillance devices that are in or that observe the interior of certain private spaces (such as bedrooms and bathrooms) regardless of whether they've been disclosed. [...] If a host discloses the device after booking, Airbnb will allow the guest to cancel the reservation and receive a refund. Host cancellation penalties may apply."
Businesses

Blockbuster Video Now Has Just One Store Left On Earth (apnews.com) 129

Cutting_Crew writes: After the last remaining Blockbuster Video store closed in Australia on March 31st, there is only one remaining left on earth. That location is in Bend, Oregon and seems to be a thriving location, where they write out membership cards by hand and the system is rebooted using floppy disks, apparently only something one person, the general manager, knows how to do. If you are wondering how there could be still blockbuster videos open since they went bankrupt back in 2010, the remaining stores left open were independent franchises and were separate from most of the other corporate stores, thus not part of the bankruptcy. There was also an Onion video before they even went bankrupt that's pretty funny. I remember getting a membership way back in late 90s and new releases were $8 per night. Even then, that seemed way too expensive. What are your most memorable (good or bad) memories of your local blockbuster?
Privacy

Tenants Outraged Over New York Landlord's Plan To Install Facial Recognition Technology (gothamist.com) 281

A Brooklyn landlord plans to install facial recognition technology at the entrance of a 700-unit building, according to Gothamist, "raising alarm among tenants and housing rights attorneys about what they say is a far-reaching and egregious form of digital surveillance." [Last] Sunday, several tenants told Gothamist that, unbeknownst to them, their landlord, Nelson Management, had sought state approval in July 2018 to install a facial recognition system known as StoneLock. Under state rules, landlords of rent-regulated apartments built before 1974 must seek permission from the state's Homes and Community Renewal (HCR) for any "modification in service." Tenants at the two buildings, located at 249 Thomas S. Boyland Street and 216 Rockaway Avenue, said they began receiving notices about the system in the fall. According to its website, Kansas-based company StoneLock offers a "frictionless" entry system that collects biometric data based on facial features. "We don't want to be tracked," said Icemae Downes, a longtime tenant. "We are not animals. This is like tagging us through our faces because they can't implant us with a chip."

It is not clear how many New York City apartments are using facial scanning software or how such technology is being regulated. But in a sign of the times, the city's Department of Housing Preservation and Development last June began marketing 107 affordable units at a new apartment complex in the South Bronx. Among the amenities listed was "State of the Art Facial Recognition Building Access...." Across the real estate industry, New York City landlords have increasingly been moving to keyless entry systems, citing convenience as well as a desire to offer enhanced security. Over the years, in response to appeals filed by tenants, HCR has ruled in favor of key fob and card entry systems, saying that such substitutions did not violate rent-stabilization and rent-control laws. But the latest technology has triggered even more concerns about the ethics of data collection....

Last month, the management company reached out to a group of tenants to assuage their concerns about StoneLock. But tenants said the presentation, if anything, only deepened their fears that they were being asked to submit to a technology that had very little research behind it.

"This was not something we asked for at any given time," one tenant complaint, while one of the attorneys representing the tenants said that, among other things, their landlord had "made no assurances to protect the data from being accessed by NYPD, ICE, or any other city, state, or federal agency."

"Citing concerns over the potential for privacy and civil liberties violations, tenants at Brownsville's Atlantic Plaza Towers filed an objection to the plan in January..."
Crime

French Gas Stations Robbed After Forgetting To Change Gas Pump PINs (zdnet.com) 102

An anonymous reader quotes a report from ZDNet: French authorities have arrested five men who stole over 120,000 liters (26,400 gallons) of fuel from gas stations around Paris by unlocking gas pumps using a special remote. The five-man team operated with the help of a special remote they bought online and which could unlock a particular brand of gas pumps installed at Total gas stations. The hack was possible because some gas station managers didn't change the gas pump's default lock code from the standard 0000. Hackers would use this simple PIN code to reset fuel prices and remove any fill-up limits.

Crooks would operate in small teams of two to three individuals who visited gas stations at night using two vehicles. A man in a first car would use the remote to unlock the gas station, and then a second car, usually a van, would come along seconds later to fill a giant tanker installed in the back of the vehicle with as much as 2,000 or 3,000 liters in one go. The group advertised the fuel they stole on social media, providing a time and place where customers could come and refuel their vehicles or pick up orders for gasoline and diesel at smaller prices.
Police uncovered the scheme in April 2018, when they arrested a suspect in possession of a remote used in the hack. "Five men, part of the same gang, were arrested on Monday, according to Le Parisien, who first reported the scheme last November," the report adds.
Programming

Which Programming Language Has The Most Security Vulnerabilities? (techrepublic.com) 330

A new report from the open source security company WhiteSource asks the question, "Is one programming language more secure than the rest?"

An anonymous reader quotes TechRepublic: To answer this question, the report compiled information from WhiteSource's database, which aggregates information on open source vulnerabilities from sources including the National Vulnerability Database, security advisories, GitHub issue trackers, and popular open source projects issue trackers. Researchers focused in on open source security vulnerabilities in the seven most widely-used languages of the past 10 years to learn which are most secure, and which vulnerability types are most common in each...

The most common vulnerabilities across most of these languages are Cross-SiteScripting (XSS); Input Validation; Permissions, Privileges, and Access Control; and Information Leak / Disclosure, according to the report.

Across the seven most widely-used programming languages, here's how the vulnerabilities were distributed:
  • C (47%)
  • PHP (17%)
  • Java (11%)
  • JavaScript (10%)
  • Python (5%)
  • C++ (5%)
  • Ruby (4%)

But the results are full of disclaimers -- for example, that C tops the list because it's the oldest language with "the highest volume of written code" and "is also one of the languages behind major infrastructure like Open SSL and the Linux kernel."

The report also notes a "substantial rise" across all languages for known open source security vulnerabilities over the last two years, attributing this to more awareness about vulnerable components -- thanks to more research, automated security tools, and "the growing investment in bug bounty programs" -- as well as the increasing popularity of open source software. And it also reports a drop in the percentage of critical vulnerabilities for most languages -- except JavaScript and PHP.

The report then concludes that "the Winner Of Most Secure Programming Language is...no one and everyone...! It is not about the language itself that makes it any more or less secure, but how you use it. If you are mitigating your vulnerabilities throughout the software development lifecycle with the proper management approach, then you are far more likely to stay secure."

Coincidentally, WhiteSource sells software which monitors open source components throughout the software development lifecycle to provide alerts about security (and licensing) issues.


Software

LLVM 8.0 Released With Cascade Lake Support, Better Diagnostics, More OpenMP/OpenCL (phoronix.com) 36

After being delayed for the better part of one month, LLVM 8.0 officially is finally available. From a report: LLVM release manager Hans Wennborg announced the release a few minutes ago and summed up this half-year update to LLVM and its sub-project as: "speculative load hardening, concurrent compilation in the ORC JIT API, no longer experimental WebAssembly target, a Clang option to initialize automatic variables, improved pre-compiled header support in clang-cl, the /Zc:dllexportInlines- flag, RISC-V support in lld. And as usual, many bug fixes, optimization and diagnostics improvements, etc."
Security

Hacked Tornado Sirens Taken Offline In Two Texas Cities Ahead of Major Storm (zdnet.com) 195

An anonymous reader quotes a report from ZDNet: A hacker set off the tornado emergency sirens in the middle of the night last week across two North Texas towns. Following the unauthorized intrusion, city authorities had to shut down their emergency warning system a day before major storms and potential tornados were set to hit the area. The false alarm caused quite the panic in the two towns, as locals were already on the edge of their seats regarding incoming storms. The city had run tests of the tornado alarm sirens a week before, but the tests were set during the middle of the day and had long concluded. The two hacked systems were taken offline the next morning, and remained offline ever since.

Bad weather, including storms and potential tornadoes, was announced for all last week in the North Texas area. A severe thunderstorm hit the two cities the following night, on March 13. Thunderstorms are known to produce brief tornadoes, but luck had it that no tornado formed and hit the towns that day. Tornadoes are frequent in Texas, as the state is located in Tornado Alley, and tornado season, a period of the year between March and May when most tornadoes happen, had officially begun. Nevertheless, a tornado didn't form on March 13, and, luckily, the sirens weren't needed.

Math

Musician Creates a Million-Hour Song Based On the Number Pi (vice.com) 65

An anonymous reader quotes a report from Motherboard: Now, for Pi Day (March 14), music software programmer Canton Becker has crafted a million-hour song based on Pi that unfolds generatively on a virtual tape deck. Titled "Shepard's Pi," the song combines two of Becker's favorite infinities: Pi, and an auditory illusion called a Shepard tone, which he describes as an "unsettling sonic illusion of a pitch that climbs or descends forever, never reaching a top or a bottom." Found at PiSongs.com, users can tune into "Shepard's Pi" in real time with a custom virtual tape deck. The track itself evolves moment to moment, but the synthesized and sampled tones will be familiar to anyone who has ever listened to the electronic music of Kraftwerk, Tangerine Dream, Aphex Twin, and Global Communication. Far from being a mere gimmick, it is a highly evocative and transporting piece of electronic music, alternately ambient, glitchy, and interestingly rhythmic. The 58,999 GB MP3 file needed to be distributed via a webpage or app, so Becker "started hacking away at the basic algorithm in the programming languages PHP and Javascript," reports Motherboard. "In between coding marathons, Becker composed and recorded the loops and samples that would form the basis of the song. He experimented with sounds that would work well together regardless of being stacked one upon the other."

"When users hit 'play' on the virtual tape deck, the algorithm actually 'performs' the piece," the report says. "This way, the 114-year song can fit in just one gigabyte of space, which is mostly comprised of the digits of Pi. The virtual tape deck was also a solution to a built-in quirk of browsers such as Chrome, Safari, and Firefox -- users must click on a webpage to trigger a sound." From start to finish, the song lasts 999,999 hours, "a limitation imposed by only considering the first one billion digits of Pi."
Music

Scientists Have Discovered a Shape That Blocks All Sound (fastcompany.com) 179

Scientists have developed an "acoustic meta-material" that can catch certain frequencies passing through the air and reflect them back toward their source. When a loudspeaker was placed into one end of a PVC pipe with a 3D-printed ring of the metamaterial, the ring "cut 94% of the sound blasting from the speaker, enough to make it inaudible to the human ear," reports Fast Company. From the report: Typical acoustic paneling works differently, absorbing sound and turning the vibrations into heat. But what's particularly trippy is that this muffler is completely open. Air and light can travel through it -- just sound cannot. The implications for architecture and interior design are remarkable, because these metamaterials could be applied to the built environment in many different ways. For instance, they could be stacked to build soundproof yet transparent walls. Cubicles will never be the same.

The researchers also believe that HVAC systems could be fitted with these silencers, and drones could have their turbines muted with such rings. Even in MRI machines, which can be harrowingly loud for patients trapped in a small space, could be quieted. There's really no limit to the possibilities, but it does sound like these silencers will need to be tailored to circumstance. "The idea is that we can now mathematically design an object that can blocks the sounds of anything," says Boston University professor Xin Zhang, in a press release.
You can see a demo of the noise cancellation device here.
The Military

US Army Assures Public That Robot Tanks Adhere To AI Murder Policy (gizmodo.com) 118

Last month, the U.S. Army asked private companies for ideas about how to improve its planned semi-autonomous, AI-driven targeting system for tanks. "In its request, the Army asked for help enabling the Advanced Targeting and Lethality Automated System (ATLAS) to 'acquire, identify, and engage targets at least 3X faster than the current manual process,'" reports Gizmodo. "But that language apparently scared some people who are worried about the rise of AI-powered killing machines. And with good reason." Slashdot reader darth_borehd summarizes the U.S. Army's response: Robot (or more accurately, drone) tanks will always have a human "in the loop" just like the drone plane program, according to the U.S. Army. The new robot tanks, officially called the Multi Utility Tactical Transport (MUTT), will use the Advanced Targeting and Lethality Automated System (ATLAS). The Department of Defense assures everyone that they will adhere to "ethical standards." Here's the language the Defense Department used: "All development and use of autonomous and semi-autonomous functions in weapon systems, including manned and unmanned platforms, remain subject to the guidelines in the Department of Defense (DoD) Directive 3000.09, which was updated in 2017. Nothing in this notice should be understood to represent a change in DoD policy towards autonomy in weapon systems. All uses of machine learning and artificial intelligence in this program will be evaluated to ensure that they are consistent with DoD legal and ethical standards."

Directive 3000.09 requires that humans be able to "exercise appropriate levels of human judgement over the use of force," which is sometimes called being "in the loop," as mentioned by above.
Operating Systems

Linux 5.1 Continues The Years-Long Effort Preparing For Year 2038 (phoronix.com) 118

Linux 5.1 continues the massive undertaking in preparing the kernel for the Year 2038 problem. Phoronix: The Linux kernel has been seeing "Y2038" work for years and the effort is far from over. Thomas Gleixner (a Linux kernel developer who serves as a member of the technical advisory board at The Linux Foundation) sent in the latest Y2038 work for the Linux 5.1 kernel, which after a lot of ground work in previous kernels has introduced the first set of syscalls that are Year 2038 safe.
Open Source

Linux 5.0 Released (phoronix.com) 107

An anonymous reader writes: Linus Torvalds has released Linux 5.0 in kicking off the kernel's 28th year of development. Linux 5.0 features include AMD FreeSync support, open-source NVIDIA Turing GPU support, Intel Icelake graphics, Intel VT-d scalable mode, NXP PowerPC processors are now mitigated for Spectre Variant Two, and countless other additions. eWeek adds: Among the new features that have landed in Linux 5.0 is support for the Adiantum encryption system, developed by Google for low power devices. Google's Android mobile operating system and ChromeOS desktop operating system both rely on the Linux kernel. "Storage encryption protects your data if your phone falls into someone else's hands," Paul Crowley and Eric Biggers, Android Security and Privacy Team at Google wrote in a blog post. "Adiantum is an innovation in cryptography designed to make storage encryption more efficient for devices without cryptographic acceleration, to ensure that all devices can be encrypted. Memory management in Linux also gets a boost in the 5.0 kernel with a series of improvements designed to help prevent memory fragmentation, which can reduce performance.
Science

Does Listening to Music Have a Negative Impact on Creativity? (slashgear.com) 79

We've all heard the studies. AmiMoJo quotes the health and science editor of Slashgear: A new study has found that listening to music may have a negative impact on creativity. This is contrary to the popular idea that music and creativity often go hand in hand. According to the researchers, the negative impact was found even in cases where the music had a positive impact on mood and was liked by the person listening to it. However, background noise didn't have the same effect...

Unlike music, the noise in a library provided a "steady state" environment, which had less of a disruptive effect on participants. Though studying with background music may not completely obliterate someone's ability to think creatively, the research indicates that you may do your best work without it.

But what do Slashdot's readers think? Do you listen to music when you're working -- or do you prefer the steady sounds of silence? Share your own experiences in the comments.

Does listening to music have a negative impact on creativity?
News

Tristan O'Tierney, Square Co-Founder, Dies at Age 35 (sfchronicle.com) 160

An anonymous reader quotes the San Francisco Chronicle: Tristan O'Tierney, a co-founder of San Francisco payments company Square, died Feb. 23 in Ocala, Fla., of causes related to addiction, his family said. He was 35...

His family is awaiting an official cause of death from officials. "I do know that it was in relation to his addiction," [his mother] Pamela Tierney said. "I know he got to the hospital, he couldn't breathe and they couldn't revive him." O'Tierney was in a three-month rehabilitation program in Ocala and had been battling addiction for three years, Tierney said. O'Tierney openly discussed his struggles with addiction on social media. "As some of you may know, I've been battling with addiction for these past few years," he wrote in September in a now-deleted Instagram post that he also shared on Twitter. "With some success. A lot of failure too though."

Bloomberg remembers him as a former engineer at Yahoo and Apple who was hired to develop Square's original mobile payment app in 2009, then stayed on until 2013.

"In addition to his parents, O'Tierney is survived by his three-old-year daughter, according to an obituary on the website for the funeral home."

Slashdot Top Deals