Tech
Are we producing too few or too many science and technology grads?
Earlier this week, the New York Academy of Sciences released a new report that focuses on what it terms the STEM paradox. STEM stands for science, technology, engineering, and math, and it's generally used to describe high-tech and research-oriented education and careers. If you talk to people looking for jobs in academia, you'll typically hear that we produce too many STEM graduates, leaving many struggling to find jobs. If you talk to people who represent companies like Google and Microsoft, we produce too few, and need to relax visa restrictions in order to bring in more from overseas.
This strange situation—a simultaneous glut and shortage—is what the NYAS report calls the "STEM paradox." Both problems are real, and they're the result of mismatched priorities. As Jeanne Dunn, vice president of Learning@Cisco put it when the report was introduced, when it comes to STEM graduates, "there's a huge imbalance of talent—where they are and the types of things they are skilled in."
So, even though our graduate schools may be producing highly qualified researchers, the research they're prepared for is often only appropriate in an academic setting; commercial entities end up looking for a different set of skills. Industry also ends up looking for more people at early stages of their careers—the bachelors and masters levels—but only if they have a relevant skill set. For the most part, undergraduate educations don't provide those. The result of these is part of the imbalance that Dunn mentioned.
Read 3 remaining paragraphs | Comments
Should I follow the normal path or fail early?
This Q&A is part of a weekly series of posts highlighting common questions encountered by technophiles and answered by users at Stack Exchange, a free, community-powered network of 100+ Q&A sites.
jao asks:
From the Code Complete book comes the following quote:
Read 21 remaining paragraphs | Comments
New docs show drone landed on Lincoln head at Mount Rushmore in 2013
Of all of the drone incidents reported at national parks across the United States over the last year, one stands out: a small aircraft spotted over the Mount Rushmore site in South Dakota in September 2013. Within hours, in the shadow of the famous four busts of American presidents, National Park Service (NPS) employees confronted a group of six individuals at a park ice cream shop and seized their passports, memory cards, and mobile phones.
Drones have become something of a scourge at various national parks. In June 2014, the NPS banned the use of drones in all of its parks, following an initial ban in Yosemite National Park in California the previous month. Since then, rangers have taken notable steps to enforce the ban.
Earlier this week, a German man was sentenced to a one year ban from Yellowstone and was ordered to pay a $1,600 fine after he crashed a drone into Yellowstone lake. A Dutch tourist was ordered to pay over $3,200 after he crashed his drone into the Grand Prismatic Hot Spring. One more case against an Oregon man remains pending in federal court in Wyoming.
Read 22 remaining paragraphs | Comments
Can’t upgrade to iOS 8? Beware bugs in the system
Despite Apple's recent missteps in patching iOS 8, iPhone and iPad users may want to upgrade to the Apple's latest available mobile operating system to fix some serious security issues.
Among the most critical is a vulnerability — CVE-2014-4377 — in how iOS processes PDF files as images. An attacker who exploits the flaw could use a malicious Web page viewed by the user in Safari to run code on the victim's device, according to a description of the problem posted this week by Argentinian security consultancy Binamuse.
A proof-of-concept attack is "a complete 100% reliable and portable exploit for MobileSafari on IOS7.1.x," Felipe Andres Manzano, principal consultant at Binamuse, stated in the company's analysis.
Read 7 remaining paragraphs | Comments
VIDEO: Volcano erupts in central Japan
Still more vulnerabilities in bash? Shellshock becomes whack-a-mole
Remember when we said that a new patch had fixed the problems with the last patch to fix the rated-highly-dangerous “Shellshock” bug in the GNU Bourne Again Shell (bash)? You know, that bug that could allow an attacker to remotely execute code on a Linux or Unix system running some configurations of Apache, or perhaps the Git software version control system, DHCP network configuration or any number of other pieces of software that use bash to interact with the underlying operating system? Well, the new patch may not be a complete fix—and there may be vulnerabilities all the way down in the bash code.
Here's how the Shellshock vulnerability works, in a nutshell: an attacker sends a request to a Web server (or Git, a DHCP client, or anything else affected) that uses bash internally to interact with the operating system. This request includes data stored in an environmental variable. Environmental variables are like a clipboard for operating systems, storing information used to help it and software running on it know where to look for certain files or what configuration to start with. But in this case, the data is malformed so as to trick bash into treating it as a command, and that command is executed as part of what would normally be a benign set of script. This ability to trick bash is the shellshock bug. As a result, the attacker can run programs with the same level of access as the part of the system launching a bash shell. And in the case of a web server, that's practically the same level of access as an administrator, giving the attacker a way to gain full control of the targeted system.
David A. Wheeler, a computer scientist who is an acknowledged expert in developing secure open-source code, posted a message to the Open Source Software Security (oss-sec) list this evening urging more changes to the bash code. And other developers have found that the current patch still has vulnerabilities similar to the original one, where an attacker could store malicious data in a variable named the same thing as frequently run commands.
Read 6 remaining paragraphs | Comments
Yahoo killing off Yahoo after 20 years of hierarchical organization
As part of an ongoing effort to streamline and focus its business, Yahoo today announced that it was retiring its namesake product.
In January 1994, Jerry Yang and David Filo, graduate students at Stanford University, created a hierarchical directory of websites, "Jerry and David's Guide to the World Wide Web." In March of that year, they gave it the name "Yahoo!," for "Yet Another Hierarchical Officious Oracle."
In the early days of the Web, these categorized, human-curated Web listings were all the rage. Search engines existed, but rapidly became notorious for their poor result quality. On a Web that was substantially smaller than the one we enjoy today, directories were a useful alternative way of finding sites of interest.
Read 2 remaining paragraphs | Comments
Firmware Update to Fix the Samsung SSD 840 EVO Read Performance Bug Coming on October 15th
A week ago Samsung acknowledged the existence of the read performance bug in the SSD 840 EVO and I just received a note that the fixed firmware is in validation process and is expected to be released to the public on October 15th. Unfortunately I don't have any further details about the bug or the fix at this point, or whether the update is coming to the 'vanilla' SSD 840 and OEM models, but I hope to get more details as the public release gets closer, so stay tuned.
Using new Corvette’s valet-recording tech could be a felony in some states
Over the past few months, General Motors and its Chevrolet dealerships have been selling the 2015 Corvette with an interesting feature called Valet Mode. Valet Mode records audio, video, and driving statistics of the person in the driver's seat when the driver isn't around, thus keeping low-life valets from being too loose with their filthy mitts while inside a Corvette owner's fancy car.
Trouble is that in a handful of states, using Valet Mode might be considered a felony.
Federal wiretapping laws generally require only one party to consent to a recording of an interaction. But in California, Connecticut, Delaware, Florida, Hawaii, Illinois, Louisiana, Maryland, Massachusetts, Montana, Nevada, New Hampshire, Oregon, Pennsylvania, and Washington, all parties involved in the recording must either consent to a recording or at least be aware that the recording is happening, depending on the state. So if a Corvette owner turns on Valet Mode in California and turns the car over to the unknowing attendant, that Corvette owner could be committing a felony.
Read 6 remaining paragraphs | Comments
Comcast seeks to fix awful customer service, admits “it may take a few years”
After months of getting bashed for treating customers poorly, Comcast today said it's going to make improving customer service its "number one priority." But the company admitted that "it may take a few years before we can honestly say that a great customer experience is something we’re known for."
Neil Smit, CEO of Comcast's cable division, wrote today that Comcast's customer service hasn't kept up with Comcast's focus on "product innovation," technology, and content. "But this is only one half of the customer experience equation. The other half is operational excellence in how we deliver service," he wrote. "The way we interact with our customers—on the phone, online, in their homes—is as important to our success as the technology we provide. Put simply, customer service should be our best product."
A longtime Comcast executive is being called upon to fulfill that goal. Smit announced the promotion of 15-year Comcast veteran Charlie Herrin to a new role as senior VP of customer experience. Herrin previously was senior VP of product development and led design of X1, Comcast's new TV user interface.
Read 5 remaining paragraphs | Comments
New “Shellshock” patch rushed out to resolve gaps in first fix [Updated]
Update, 9/26 11:00 PM ET: The most recent patches issued for the "Shellshock" bug have apparently still left avenues of attack, based on the analysis of several open source developers. See the latest report for further information.
After the discovery that a patch designed to repair the “Shellshock” vulnerability in the GNU Bourne Again Shell (bash) still allowed for an attacker to execute commands on a remote system, Red Hat, Ubuntu, and other Linux distribution providers have pushed out a second fix to the vulnerability. At the same time, security researchers and service providers have detected a surge in scans for systems with the vulnerability, as would-be attackers seek to take advantage of the bug.
“Shellshock” has been compared to the Heartbleed bug discovered in the OpenSSL cryptography library in April because of its potential severity and its widespread nature. Like Heartbleed, the Shellshock vulnerabilities were introduced by errors in coding years ago—errors made by an unpaid volunteer writing code that would end up in millions of computer systems.
Read 3 remaining paragraphs | Comments
Microsoft resurrects its WinHEC conference for hardware companies
Microsoft has announced the return of its WinHEC conferences. The first of the new conferences will be March 18 and 19 next year and is being held in Shenzhen, China.
The old WinHEC events, standing for Windows Hardware Engineering Conference, were held annually in the US. At them, Microsoft would outline its hardware plans and the direction that it saw the PC evolving, with the audience being hardware OEMs (Original Equipment Manufacturers), ODMs (Original Design Manufacturers), IHVs (Independent Hardware Vendors), and IDHs (Independent Design Houses).
The last old WinHEC was in 2008, held a few days after, and in the same location as, the PDC software developer conference. The focus then was Windows 7, which was given its first public preview at PDC. The last PDC was held in 2010. From 2011, Microsoft ran a conference that it named BUILD. Officially, this was supposed to appeal to both the traditional PDC audience of software developers and the WinHEC audience of hardware companies. In practice, however, BUILD has been heavily skewed toward software, so while it was a reasonable successor to PDC, it left the WinHEC community out in the cold.
Read 1 remaining paragraphs | Comments
BT testing 800Mbps broadband over fiber to the curb, copper to the home
BT has conducted field trials that show it can deliver broadband download speeds of nearly 800Mbps using fiber and copper, a company announcement said yesterday.
The technology delivers data over fiber from the British telecom's facilities to neighborhoods while using copper for the final meters. Deployments of this sort are less expensive than fiber-to-the-home because they reuse existing copper lines used for telephone service and DSL.
"Previously it was thought such speeds would require a dedicated business line or a fibre optic cable to be laid all the way from a telephone exchange to a premises, a relatively expensive, disruptive and time-consuming process," BT said.
Read 6 remaining paragraphs | Comments
Man who crashed drone into Yellowstone hot spring must pay over $3,200
After entering a guilty plea, a federal judge ordered a Dutch tourist to pay over $3,000 in fines after he crashed his drone into the Grand Prismatic Spring at Yellowstone National Park in Wyoming in August 2014.
According to Yellowstone officials, Theodorus Van Vliet was fined $1,000 and also must pay over $2,200 in restitution. His drone remains at the bottom of the iconic hot spring.
Van Vliet is the second person to be prosecuted since the National Park Service (NPS) banned drones in all parks as of June 2014.
Read 4 remaining paragraphs | Comments
Making a chemical with electrons that move at 80% the speed of light
Sometimes, getting exactly the result you predict is more exciting than it sounds. Last week, Science published a paper about creating chemical compounds with element 106, Seaborgium. A quick glance at the abstract showed that this chemical behaved similarly to the one made of Sg's lighter cousin, tungsten. That sounds a bit dull—in fact I skipped covering it last week for precisely this reason—until you find out that you wouldn't necessarily expect this result.
Admittedly, just getting the experiment done at all is pretty impressive. The isotope of seaborgium used, 265Sg, has a half-life of only 16 seconds. It has to be produced in a particle accelerator, which means it's normally rather energetic and part of a cloud of energetic debris. So, the technique involved slowing it down and separating it, letting it undergo a chemical reaction, and only then could they characterize something about the resulting chemical's behavior.
In this case, the researchers reacted it with carbon monoxide to form Sg(CO)6. The resulting chemical stuck to a silicon dioxide surface briefly before the Sg decayed, allowing a very basic characterization of its chemical behavior. And, as noted above, it behaved similarly to the tungsten version of the same compound.
Read 3 remaining paragraphs | Comments
SF, LA district attorneys threaten to sue Uber, Lyft, and Sidecar
The district attorneys of San Francisco and Los Angeles have sent a joint letter to Uber, Lyft, and Sidecar, threatening the popular quasi-taxi companies with a lawsuit if they do not make some modifications to their services.
Specifically, the letter, which was sent on Wednesday, says that the firms are in violation of state law that prohibits charging individual fares for drivers who pick up separate passengers traveling in the same direction at a lower price (essentially as a quasi-bus service), and for implying that their background checks of drivers extends beyond seven years in the past.
"Each of these measures can be implemented quickly, easily, and without impacting Sidecar's ability to operate," the district attorneys wrote, according to a copy of the letter Sidecar sent to Ars.
Read 10 remaining paragraphs | Comments
Radiohead’s Thom Yorke teams up with BitTorrent to sell new solo album
On Friday, Radiohead lead singer Thom Yorke delivered on a week of new-album teases and revealed to music fans what he'd been working on all along: his first solo album in six years (as opposed to releases from either Radiohead or his side project Atoms For Peace). The album, Tomorrow's Modern Boxes, also marked a long-awaited return for Yorke: his first release to debut as an online product since 2007's In Rainbows.
Instead of unleashing the album's eight songs in pay-what-you-want fashion like last time, however, Yorke has joined forces with BitTorrent to sell the songs as a "BitTorrent bundle." Six dollars gives you access to the album via a BitTorrent file download, which users can then load with their favorite BitTorrent client to download the full album.
"It's an experiment to see if the mechanics of the system are something that the general public can get its head around," Yorke wrote in a statement at BitTorrent's blog. Certainly, he has a vested interest in shaking up the music-distribution paradigm, having been a vocal opponent of sites like Spotify for some time. However, after reading the site's lengthy how-to guide for novices, complete with an apology for users wishing to download directly to their smartphones, we wonder how successful this experiment will turn out for the average Spotify lover.
Read 3 remaining paragraphs | Comments
European airlines can now let passengers use phones in flight
On Friday, the European Aviation Safety Agency allowed airlines flying in European skies to let passengers speak on mobile phones or use other Internet-connected gadgets.
The Cologne, Germany-based regulators said "portable electronic devices," or PEDs, may "stay switched on, without the need to be in 'Airplane Mode.' This is the latest regulatory step towards enabling the ability to offer 'gate-to-gate' telecommunication or WiFi services."
The agency also provided guidance to airlines on how they can take advantage of the new permissions:
Read 3 remaining paragraphs | Comments
Nintendo fans rage, profiteers rejoice over ultra-limited Hyrule Warriors edition
Nintendo collectors will go to ridiculous lengths to get their hands on the rarest of the company's games, as anyone who's followed the sky-high prices paid for Nintendo World Championship cartridges can attest. Today, those collectors have a new collectible to lust after: a limited-edition version of Hyrule Warriors given only to a few hundred patient customers at the Nintendo World Store in New York City this morning.
The limited-edition box, announced earlier this month for the US, is a Nintendo World Store exclusive that includes a copy of the Dynasty Warriors-inspired hack-and-slash game packaged with a blue and gold Zelda-themed scarf. Nintendo didn't allow pre-orders due to "limited" quantities, causing eager fans to start lining up late last night for the midtown Manhattan store's 8am opening.
That line stretched to over 600 people by opening, according to one person on the scene (others simply said it "goes on forever"), but many of those in the line went home without the collectible edition they wanted. Nintendo reportedly made somewhere between 300 and 500 copies available, meaning buyers had to be in line by somewhere between 3:30 and 4am to get a wristband entitling them to a copy, accordingly to tweeted reports from the store. All limited-edition copies were distributed within an hour of the opening, according to a report from fan site Zelda Universe.
Read 6 remaining paragraphs | Comments
You probably can’t buy Samsung’s curved Galaxy Note Edge
Ron Amadeo
The Galaxy Note Edge.
9 more images in gallery
.related-stories { display: none !important; }Earlier this month, Samsung held an event to show off the Galaxy Note 4, Note Edge, Gear VR, and Gear S. We've seen launch date announcements for the Note 4 and Gear S, and the Gear VR is still making the press rounds, but we haven't heard anything about the curved-screen Galaxy Note Edge.
ZDNet Korea (via PC World) has the scoop on what's going on with the product, and it looks like the Note Edge will be very hard to get. The device will be a "limited concept" that won't see Samsung's usual mass production, according to Samsung Electronics President DJ Lee. It sounds like the release will be similar to the Korea-only Galaxy Round, Samsung's curved-screen device from last year.
The Note Edge's claim to fame is the curved AMOLED display, which wraps around one side and runs little "ticker" apps that display information like sports scores, apps, or tweets. Though it sounds intriguing, we didn't immediately like several things about the Note Edge. The lopsided design leaves a lot to be desired, and the curved screen meets the back of the phone at a sharp edge which digs into your hand and makes the phablet-sized device uncomfortable to hold. The screen curve extends into the normal app area, too, which distorts the right side of apps. Also, crucially for Samsung, the device lacks little to differentiate it from the Note 4. The two devices are the same size, and both have a stylus, but only one looks like it was left out in the sun for too long.
Read 3 remaining paragraphs | Comments