posted about 7 hours ago on slashdot
Advocatus Diaboli sends word of a new release of documents made available by Edward Snowden. The documents show British intelligence agency GCHQ had a deep partnership with telecommunications company Cable & Wireless (acquired later by Vodafone). The company allowed GCHQ to tap submarine cables around the world, and was paid millions of British pounds as compensation. The relationship was so extensive that a GCHQ employee was assigned to work full time at Cable & Wireless (referred to by the code name “Gerontic” in NSA documents) to manage cable-tap projects in February of 2009. By July of 2009, Cable & Wireless provided access to 29 out of the 63 cables on the list, accounting for nearly 70 percent of the data capacity available to surveillance programs. ... As of July of 2009, relationships with three telecom companies provided access to 592 10-gigabit-per-second pipes on the cables collectively and 69 10-gbps “egress” pipes through which data could be pulled back. The July 2009 documents included a shopping list for additional cable access—GCHQ sought to more than triple its reach, upping access to 1,693 10-gigabit connections and increasing egress capacity to 390. The documents revealed a much shorter list of "cables we do not currently have good access [to]."

Read More...
posted about 9 hours ago on slashdot
An anonymous reader writes: NASA reports that the 3-D printer now installed on the International Space Station has finally finished its first creation. After it was installed on November 17th and calibrated over the next week, ground control sent it instructions yesterday to build a faceplate for the extruder's own casing. The process was mostly a success. "[Astronaut Butch Wilmore] Wilmore removed the part from the printer and inspected it. Part adhesion on the tray was stronger than anticipated, which could mean layer bonding is different in microgravity, a question the team will investigate as future parts are printed. Wilmore installed a new print tray, and the ground team sent a command to fine-tune the printer alignment and printed a third calibration coupon. When Wilmore removes the calibration coupon, the ground team will be able to command the printer to make a second object. The ground team makes precise adjustments before every print, and the results from this first print are contributing to a better understanding about the parameters to use when 3-D printing on the space station."

Read More...
posted about 11 hours ago on slashdot
storagedude writes: With LTO media sales down by 50% in the last six years, is the end near for tape? With such a large installed base, it may not be imminent, but the time is coming when vendors will find it increasingly difficult to justify continued investment in tape technology, writes Henry Newman at Enterprise Storage Forum. "If multiple vendors invest in a technology, it has a good chance of winning over the long haul," writes Newman, a long-time proponent of tape technology. "If multiple vendors have a technology they're not investing in, it will eventually lose over time. Of course, over time market requirements can change. It is these interactions that I fear that are playing out in the tape market."

Read More...
posted about 12 hours ago on slashdot
antdude points out a story at ZDNet about how the naming of security vulnerabilities and exploits has evolved into branding and awareness campaigns. Heartbleed set the trend early this year, having a distinct name and logo to represent a serious security problem. It seemed to work; the underlying bug got massive exposure, even in the mainstream media. This raises a new set of issues — should the response to the disclosure of a vulnerability be dependent on how catchy its name is? No, but it probably will be. Heartbleed charmed the public, and in a way, it was designed to do so. By comparison Shellshock, POODLE (aka clumsy "Poodlebleed"), Sandworm, the secretively named Rootpipe, Winshock, and other vulns seem like proverbial "red headed stepchildren" — despite the fact that each of these vulns are critical issues, some are worse than Heartbleed, and all of which needed fast responses. The next "big bug" after Heartbleed was Shellshock — real name CVE-2014-6271. Shellshock didn't have a company's pocketbook or marketing team behind it. So, despite the fact that many said Shellshock was worse than Heartbleed (rated high on severity but low on complexity, making it easy for attackers), creating a celebrity out of Shellshock faced an uphill climb.

Read More...
posted about 14 hours ago on slashdot
Samsung today announced a project among a group of its engineers to build an input device that allows people with limited mobility to operate a computer through eye movement alone. The EYECAN+ is a rectangular box that needs to be situated roughly 60-70cm away from a user's face. Once calibrated, it will superimpose a multifunction UI and track a user's eye movements to move the cursor where they want. Samsung says they won't be commercializing this device, but they'll soon be making the design open source for any company or organization who wants to start building them.

Read More...
posted about 16 hours ago on slashdot
Dan Mcculley, the interviewee in this video, works for Intel and claims they have "about 140" projects going on inside their fabs and factories, of which the Smart Toolbox is but one, and it's one some technicians came up with because Intel workers lose something like $35,000 worth of tools every year. This project is based on the same Galileo boards Intel has used to support some high-altitude balloon launches -- except this is an extremely simple, practical application. Open source? You bet! And Dan says the sensors and other parts are all off-the-shelf items anyone can buy. (Alternate Video Link)

Read More...
posted about 18 hours ago on slashdot
rossgneumann writes: Terry Davis, a schizophrenic programmer, has spent 10 years building an operating system to talk to God. He's done this work because God told him to. According to the TempleOS charter, it is "God's official temple. Just like Solomon's temple, this is a community focal point where offerings are made and God's oracle is consulted." [The TempleOS V2.17 welcome screen] greets the user with a riot of 16-color, scrolling, blinking text; depending on your frame of reference, it might recall DESQview, the Commodore 64, or a host of early DOS-based graphical user interfaces. In style if not in specifics, it evokes a particular era, a time when the then-new concept of "personal computing" necessarily meant programming and tinkering and breaking things.

Read More...
posted about 19 hours ago on slashdot
reifman writes Upstart social networking startup Ello burst on the scene in September with promises of a utopian, post-Facebook platform that respected user's privacy. I was surprised to see so many public figures and media entities jump on board — mainly because of what Ello isn't. It isn't an open source, decentralized social networking technology. It's just another privately held, VC-funded silo. Remember Diaspora? In 2010, it raised $200,641 on Kickstarter to take on Facebook with "an open source personal web server to share all your stuff online." Two years later, they essentially gave up, leaving their code to the open source community to carry forward. In part one of "Revisiting Open Source Social Networking Alternatives," I revisit/review six open source social networking alternatives in search of a path forward beyond Facebook.

Read More...
posted about 19 hours ago on slashdot
An anonymous reader writes Counter-Strike: Global Offensive is one of the world's fastest growing eSports, but the community has been rocked by scandal in the last week, with several top players being banned by Valve for using various hacking tools to improve their performance. With the huge Dreamhack Winter tournament taking place this weekend, the purge could not have come at a worse time for the game, and fans are now poring over the archives for other signs of foul play in top tier games — be sure to look out for these tell tale signs while playing.

Read More...
posted about 20 hours ago on slashdot
_Sharp'r_ writes Two Standford PhDs, Ross Koningstein and David Fork, worked for Google on the RE

Read More...
posted about 22 hours ago on slashdot
HughPickens.com writes Jason Kane reports at PBS that emergency treatments delivered in ambulances that offer "Advanced Life Support" for cardiac arrest may be linked to more death, comas and brain damage than those providing "Basic Life Support." "They're taking a lot of time in the field to perform interventions that don't seem to be as effective in that environment," says Prachi Sanghavi. "Of course, these are treatments we know are good in the emergency room, but they've been pushed into the field without really being tested and the field is a much different environment." The study suggests that high-tech equipment and sophisticated treatment techniques may distract from what's most important during cardiac arrest — transporting a critically ill patient to the hospital quickly. Basic Life Support (BLS) ambulances stick to simpler techniques, like chest compressions, basic defibrillation and hand-pumped ventilation bags to assist with breathing with more emphasis placed on getting the patient to the hospital as soon as possible. Survival rates for out-of-hospital cardiac arrest patients are extremely low regardless of the ambulance type with roughly 90 percent of the 380,000 patients who experience cardiac arrest outside of a hospital each year not surviving to hospital discharge. But researchers found that 90 days after hospitalization, patients treated in BLS ambulances were 50 percent more likely to survive than their counterparts treated with ALS. Not everyone is convinced of the conclusions. "They've done as much as they possibly can with the existing data but I'm not sure that I'm convinced they have solved all of the selection biases," says Judith R. Lave. "I would say that it should be taken as more of an indication that there may be some very significant problems here."

Read More...
posted about 23 hours ago on slashdot
An anonymous reader writes It's the oldest rock on Earth--and it's from Mars. A 4.4-billion-year-old martian meteorite, found in a dozen pieces in the western Sahara, has ignited a frenzy among collectors and scientists; prices have reached $10,000 a gram, and museums and universities are vying for slivers of it. It is the only known martian meteorite made of sediment, a conglomerate of pebbles and other clumps of minerals from when the planet was warm, wet, and possibly habitable. The story of the discovery of the rock and its significance is fascinating, as well as the details presented about the economics of rare space materials. Apropos, this older story about missing moon rocks.

Read More...
posted about 23 hours ago on slashdot
Beeftopia sends this excerpt from an article at BusinessWeek: "There’s no evidence of any way, shape, or form that there’s a shortage in the conventional sense," says Hal Salzman, a professor of planning and public policy at Rutgers University. "They may not be able to find them at the price they want. But I’m not sure that qualifies as a shortage, any more than my not being able to find a half-priced TV." ... The real issue, say Salzman and others, is the industry’s desire for lower-wage, more-exploitable guest workers, not a lack of available American staff. "It seems pretty clear that the industry just wants lower-cost labor," Dean Baker, the co-director of the Center for Economic and Policy Research, wrote in an e-mail. A 2011 review (PDF) by the U.S. Government Accountability Office found that the H-1B visa program, which is what industry groups are lobbying to expand, had "fragmented and restricted" oversight that weakened its ostensible labor standards. "Many in the tech industry are using it for cheaper, indentured labor," says Rochester Institute of Technology public policy associate professor Ron Hira, an EPI research associate and co-author of the book Outsourcing America.

Read More...
posted 1 day ago on slashdot
MojoKid writes: It appears that Sony Pictures has become the victim of a massive ransomware hack, which has resulted in the company basically shutting down its IT infrastructure. According to an unnamed source, every computer in Sony's New York Office, and every Sony Pictures office across the nation, bears an image from the hacker with the headline "Hacked By #GOP" which is then followed by a warning. The hacker, or group, claims to have obtained corporate secrets and has threatened to reveal those secrets if Sony doesn't meet their demands.

Read More...
posted 1 day ago on slashdot
itwbennett writes: Chat app maker Slack is hoping to make inroads in the enterprise with a new paid plan that will include an optional feature called Compliance Exports that will let administrators access their team's communications, encompassing public and private messages. The tool is far-reaching, potentially including the edit history for workers' messages as well as messages workers have marked for deletion, if the supervisor so desires.

Read More...
posted 1 day ago on slashdot
Nerval's Lobster writes: If you took your cubicle, four wheels, powerful AI, and brought them all together in unholy matrimony, their offspring might look something like the self-driving future car created by design consultants IDEO. That's not to say that every car on the road in 2030 will look like a mobile office, but technology could take driving to a place where a car's convenience and onboard software (not to mention smaller size) matter more than, say, speed or handling, especially as urban areas become denser and people potentially look at "driving time" as a time to get things done or relax as the car handles the majority of driving tasks. Then again, if old science-fiction movies have proven anything, it's that visions of automobile design thirty or fifty years down the road (pun intended) tend to be far, far different than the eventual reality. (Blade Runner, for example, posited that the skies above Los Angeles would swarm with flying cars by 2019.) So it's anyone's guess what you'll be driving a couple decades from now.

Read More...
posted 1 day ago on slashdot
snydeq writes: The programming world is fast proliferating with one-letter programming languages, many of which tackle specific problems in ways worthy of a cult following, writes InfoWorld's Peter Wayner in this somewhat tongue-and-check roundup of the more interesting entrants among this trend. "They're all a bit out there, with the possible exception of C. ... Each offers compelling ideas that could do the trick in solving a particular problem you need fixed.'"

Read More...
posted 1 day ago on slashdot
An anonymous reader writes: A grand jury in Missouri has decided there is no probable cause to charge police officer Darren Wilson in the shooting death of Michael Brown. "A grand jury of nine whites and three blacks had been meeting weekly since Aug. 20 to consider evidence. At least nine votes would have been required to indict Wilson. The Justice Department is conducting an investigation into possible civil rights violations that could result in federal charges." Government officials and Brown's family are urging calm in Ferguson after the contentious protests that followed Brown's death.

Read More...
posted 1 day ago on slashdot
rossgneumann writes: Pentagon officials are worried that the U.S. military is losing its edge compared to competitors like China, and are willing to explore almost anything to stay on top—including creating robots capable of becoming fighting machines. A 72-page document throws detailed light on the far-reaching implications of the Pentagon's plan to monopolize imminent "transformational advances" in biotechnology, robotics and artificial intelligence, information technology, nanotechnology, and energy.

Read More...
posted 1 day ago on slashdot
alphadogg writes: Word that the Federal Aviation Administration might take a very hard line on commercial drone use has those with designs on such activity nervous. But as for big enterprise IT vendors, it's really hard to tell what they think because they're keeping any plans in this field very hush-hush. More consumer oriented companies like Amazon, Facebook, and Google are active, but companies like IBM and HP are quiet, while Microsoft affirms it has nothing doing. A former FAA lawyer says sitting on the sidelines even during this unsure regulatory period is probably not a great idea. "I have a hard time believing they don't have some sort of programs in place," attorney Mark Dombroff says.

Read More...
posted 1 day ago on slashdot
schwit1 sends word that The Department of Homeland Security plans on disposing of all the records from a 3-year-long surveillance program without letting the public have access to them. The Department of Homeland Security is poised to ditch all records from a controversial network monitoring system called "Einstein" that are at least three years old, but not for security reasons. DHS reasons the files — which include data about traffic to government websites, agency network intrusions and general vulnerabilities — have no research significance. But some security experts say, to the contrary, DHS would be deleting a treasure chest of historical threat data. And privacy experts, who wish the metadata wasn't collected at all, say destroying it could eliminate evidence that the government wide surveillance system does not perform as intended. The National Archives and Records Administration has tentatively approved the disposal plan, pending a public comment period.

Read More...
posted 1 day ago on slashdot
sciencehabit writes The universe may be a lonelier place than previously thought. Of the estimated 100 billion galaxies in the observable universe, only one in 10 can support complex life like that on Earth, a pair of astrophysicists argues. Everywhere else, stellar explosions known as gamma ray bursts would regularly wipe out any life forms more elaborate than microbes. The detonations also kept the universe lifeless for billions of years after the big bang, the researchers say.

Read More...
posted 1 day ago on slashdot
benrothke writes If SSL is the emperor's new clothes, then Ivan Ristic in Bulletproof SSL and TLS has shown that perhaps the emperor isn't wearing anything at all. There is a perception that if a web site is SSL secured, then it's indeed secure. Read a few pages in this important book, and the SSL = security myth is dispelled. For the first 8 of the 16 chapters, Ristic, one of the greatest practical SSL./TLS experts around, spends 230 pages showing countless weaknesses, vulnerabilities, attacks and other SSL weaknesses. He then spends the next 8 chapters showing how SSL can, if done correctly, be deployed to provide adequate security. Keep reading for the rest of Ben's review.

Read More...
posted 2 days ago on slashdot
Zothecula writes "Nuclear weapons are a paradox. No one in their right mind wants to use one, but if they're to act as a deterrent, they need to be accessible. The trick is to make sure that access is only available to those with the proper authority. To prevent a real life General Jack D Ripper from starting World War III, Livermore National Laboratory's (LLNL) Defense Technologies Division is developing a system that uses a nuclear weapon's own radiation to protect itself from tampering.

Read More...
posted 2 days ago on slashdot
An anonymous reader writes "Two private companies, Deep Space Industries and Planetary Resources, have received contracts from NASA to study asteroid redirection and will pursue their plans of asteroid mining. From the article: "Deep Space Industries is planning to build a number of dense spacecrafts called FireFlies, and they plan on sending the satellites on one way missions to gather information about the density, shape, composition and size of an asteroid. They also have plans to build a spacecraft called Dragonfly, which has the purpose of catching asteroids. The asteroid material will be collected and returned to Earth by 'Harvesters'. Planetary Resources, on the other hand, plans to build a number of middle sized and small telescopes that will be capable of examining asteroids near the planet Earth for economic potential. They already have the telescopes Arkyd 300, Arkyd 200 and the Arkyd 100, each having its own specific systems."

Read More...