Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Sand-Based Anode Triples Lithium-Ion Battery Performance

timothy posted 2 hours ago | from the but-where-will-it-comes-from? dept.

Power 11

Zothecula (1870348) writes "Conventional lithium-ion batteries rely on anodes made of graphite, but it is widely believed that the performance of this material has reached its zenith, prompting researchers to look at possible replacements. Much of the focus has been on nanoscale silicon, but it remains difficult to produce in large quantities and usually degrades quickly. Researchers at the University of California, Riverside have overcome these problems by developing a lithium-ion battery anode using sand."

Chinese Hackers Infiltrate Firms Using Malware-Laden Handheld Scanners

timothy posted 5 hours ago | from the location-location-location dept.

China 37

wiredmikey (1824622) writes "China-based threat actors are using sophisticated malware installed on handheld scanners to target shipping and logistics organizations from all over the world. According to security firm TrapX, the attack begins at a Chinese company that provides hardware and software for handheld scanners used by shipping and logistics firms worldwide to inventory the items they're handling. The Chinese manufacturer installs the malware on the Windows XP operating systems embedded in the devices.

Experts determined that the threat group targets servers storing corporate financial data, customer data and other sensitive information. A second payload downloaded by the malware then establishes a sophisticated C&C on the company's finance servers, enabling the attackers to exfiltrate the information they're after. The malware used by the Zombie Zero attackers is highly sophisticated and polymorphic, the researchers said. In one attack they observed, 16 of the 48 scanners used by the victim were infected, and the malware managed to penetrate the targeted organization's defenses and gain access to servers on the corporate network. Interestingly, the C&C is located at the Lanxiang Vocational School, an educational institution said to be involved in the Operation Aurora attacks against Google, and which is physically located only one block away from the scanner manufacturer, TrapX said."

Mars (One) Needs Payloads

timothy posted 8 hours ago | from the ok-but-nothing-too-heavy dept.

Mars 52

mbone (558574) writes Mars One has announced that their first, unmanned, lander, targeted for 2018, needs payloads. Along with their 4 experiments, and a University experiment, they have two payloads for hire: "Mars One offers two payload opportunities for paying mission contributors. Proposals can take the form of scientific experiments, technology demonstrations, marketing and publicity campaigns, or any other suggested payload. 'Previously, the only payloads that have landed on Mars are those which NASA has selected,' said Bas Lansdorp, 'We want to open up the opportunity to the entire world to participate in our mission to Mars by sending a certain payload to the surface of Mars.'" The formal Request for Proposals for all of this is out now as well.

O3b Launches Four More Satellites To Bring Internet To 'Other 3 Billion'

timothy posted 11 hours ago | from the from-above dept.

Space 53

An anonymous reader writes "O3b Networks is aiming to provide internet access through satellite, to the "other three billion" people in under-served equatorial regions (Africa, the Pacific, South America). O3b launched four more satellites [Thursday], to add to the four they already have in orbit. This is a very international effort; a Russian Soyuz rocket went up from South America, carrying satellites built in France. There's a video of the rocket and payloads coming together and a video of the rocket launch. There's also an academic paper describing using the O3b system from the Cook Islands in the Pacific, giving an idea of what it does and those all-important ping times."

Lyft's New York Launch Halted By Restraining Order

timothy posted 12 hours ago | from the restraining-competition-is-more-like-it dept.

Transportation 57

Forbes reports that Lyft's planned expansion into the New York market has been delayed by a restraining order. The article explains that State officials had asked Lyft to delay its launch. When Lyft refused, New York Attorney General Eric Schneiderman's office filed a temporary restraining order against the startup Friday morning to prevent its launch. Other statements said that the restraining order had been granted, though Simpson said that was untrue. Lyft and officials will reconvene in court Monday for a hearing. Lyft will not launch until it has reached an agreement with the city, Simpson said. Since Monday, when Lyft announced it was planning to launch in the two boroughs [of Queens and Brooklyn], the app has faced criticism from city officials. The taxi and limousine commission declared the app 'unauthorized' and said its riders were at risk and its drivers could be cited and fined if they were caught using it. Lyft seems to to have left riders mostly unscathed in Boston, where it's been operating since early last year, and in numerous other cities. Also at Ars Technica.

"Internet's Own Boy" Briefly Knocked Off YouTube With Bogus DMCA Claim

timothy posted 13 hours ago | from the until-proven-innocent dept.

Movies 110

An anonymous reader writes "In a bitter irony, a documentary celebrating Aaron Swartz, the late Internet activist who helped create the Creative Commons, has been taken down from YouTube by a misguided copyright claim." From the article: [O]ne of the dark sides of how copyright is enforced on the Internet is that sites that don't actually infringe are sometimes mistakenly swept up in rightsholders' takedown notices, which are frequently automated. Visitors who tried to watch The Internet's Own Boy on YouTube Friday were greeted by the message, "This video is no longer available due to a copyright claim by Remove Your Media LLC," a reference to a company that specializes in sending copyright takedowns in accordance with the law that governs them, the Digital Millenium Copyright Act (DMCA). It's not clear who made the claim, but that's not the point—as activists are all too aware, false copyright claims can can knock legitimate content offline.

Chinese State Media Declares iPhone a Threat To National Security

Soulskill posted yesterday | from the fruit-ninja-must-have-cause-a-lot-of-traffic-deaths dept.

China 112

MojoKid writes: "When NSA whistleblower Edward Snowden came forth last year with U.S. government spying secrets, it didn't take long to realize that some of the information revealed could bring on serious repercussions — not just for the U.S. government, but also for U.S.-based companies. The latest to feel the hit? None other than Apple, and in a region the company has been working hard to increase market share: China. China, via state media, has today declared that Apple's iPhone is a threat to national security — all because of its thorough tracking capabilities. It has the ability to keep track of user locations, and to the country, this could potentially reveal "state secrets" somehow. It's being noted that the iPhone will continue to track the user to some extent even if the overall feature is disabled. China's iPhone ousting comes hot on the heels of Russia's industry and trade deeming AMD and Intel processors to be untrustworthy. The nation will instead be building its own ARM-based "Baikal" processor.

What Happens When Gaming Auteurs Try To Go It Alone?

Soulskill posted yesterday | from the no-one-is-an-island dept.

Games 64

An anonymous reader writes: As news that Cliff Bleszkinski, Epic Games' legendary former creative, sets off to found his own studio, a new article takes a look at how six other gaming auteurs have fared after leaving a major developer or publisher to go it alone. The results, surprisingly, are mixed: while some, such as Double Fine's Tim Schafer, have gone on to far greater success, it doesn't always work out that way: just look at John Romero's Daikatana. The article also makes a good point that Peter Molyneux is striking out with a start-up for the third in his career now, but it may not be third time the charm: Godus has been far less well received than Black & White or Fable. Can Cliffy B avoid making the same mistakes?

FCC Approves Plan To Spend $5B Over Next Five Years On School Wi-Fi

Soulskill posted yesterday | from the all-about-the-wireless-benjamins dept.

Wireless Networking 42

itwbennett writes: The Federal Communications Commission, in a 3-2 party-line vote Friday, approved a plan to revamp the 17-year-old E-Rate program, which pays for telecom services for schools and libraries, by phasing out funding for voice service, Web hosting and paging services, and redirecting money to Wi-Fi. FCC Chairman Tom Wheeler had proposed a $5 billion budget for Wi-Fi, but Republican commissioners and some lawmakers had questioned where the money would come from. Still, the E-Rate revamp (PDF) approved Friday contemplates a $1 billion-a-year target for Wi-Fi projects "year after year," Wheeler said.

First Release of LibreSSL Portable Is Available

Soulskill posted yesterday | from the cryptic-announcements dept.

Encryption 89

ConstantineM writes: It has finally happened. Bob Beck of The OpenBSD Foundation has just announced that the first release of LibreSSL portable is now available, and can be found in the LibreSSL directory of your favourite OpenBSD mirror. libressl-2.0.0.tar.gz has been tested to build on various versions of Linux, Solaris, Mac OS X and FreeBSD. This is intended to be an initial portable release of OpenBSD's libressl to allow the community to start using it and providing feedback, and has been done to address the issue of incorrect portable versions being attempted by third-parties. Support for additional platforms will be added as time and resources permit.

DARPA Successfully Demonstrates Self-Guiding Bullets

Soulskill posted yesterday | from the jerks-with-aim-bots dept.

The Military 145

Lucas123 writes: A DARPA-funded project has successfully developed a .50 caliber sniper round capable of maneuvering during flight in order to remain on target. The self-guiding EXACTO bullet, as it's being called, is optically guided by a laser that must remain on target for the bullet to track. The EXACTO round is capable of accurately tracking a target up to 1.2 miles away, DARPA stated. The technology, which is being developed by Teledyne Scientific and Imaging, is targeted at helping snipers remain at longer distances from targets as well as improving night shots. While DARPA's tracking bullet is the first to use a standard, small-arms caliber round, in 2012 Sandia National Laboratories (SNL) successfully demonstrated a prototype self-guided bullet that was more like like a four-inch dart.

A Peek Inside D-Wave's Quantum Computing Hardware

Soulskill posted yesterday | from the hamsters-are-neither-alive-nor-dead dept.

Supercomputing 42

JeremyHsu writes: A one-second delay can still seem like an eternity for a quantum computing machine capable of running calculations in mere millionths of a second. That delay represents just one of the challenges D-Wave Systems overcame in building its second-generation quantum computing machine known as D-Wave Two — a system that has been leased to customers such as Google, NASA and Lockheed Martin. D-Wave's rapid-scaling approach to quantum computing has plenty of critics, but the company's experience in building large-scale quantum computing hardware could provide valuable lessons for everyone, regardless of whether the D-Wave machines live up to quantum computing's potential by proving they can outperform classical computers. (D-Wave recently detailed the hardware design changes between its first- and second-generation quantum computing machines in the the June 2014 issue of the journal IEEE Transactions on Applied Superconductivity.)

"We were nervous about going down this path," says Jeremy Hilton, vice president of processor development at D-Wave Systems. "This architecture requires the qubits and the quantum devices to be intermingled with all these big classical objects. The threat you worry about is noise and impact of all this stuff hanging around the qubits. Traditional experiments in quantum computing have qubits in almost perfect isolation. But if you want quantum computing to be scalable, it will have to be immersed in a sea of computing complexity.

The First Person Ever To Die In a Tesla Is a Guy Who Stole One

Soulskill posted yesterday | from the marketed-as-a-thief-termination-feature dept.

Transportation 369

mrspoonsi sends this news from The Verge: Elon Musk can no longer say that no one's ever died in a Tesla automobile crash. But few people will be pointing fingers at the electric car maker for this senseless tragedy. Earlier this month, 26-year-old Joshua Slot managed to successfully ride off with a Model S he'd stolen from a Tesla service center in Los Angeles, but police quickly spotted the luxury vehicle and gave chase. According to Park Labrea News, the high-speed pursuit was eventually called off after officers were involved in a fender bender of their own, leaving the police department strained for resources and without any feasible way of catching up to Slot. Reports claim he was traveling at speeds of "nearly 100 mph," but losing the police tail apparently didn't convince Slot to hit the brakes. Instead he sped on, eventually colliding with three other vehicles and a pair of street poles. The final impact was severe enough to "split the Tesla in half" and eject Slot from the car's remains. The Tesla's front section wound up in the middle of the road and caught fire. Its rear portion flew through the air with such force that it slammed into the side of a local Jewish community center and became wedged there.

William Binney: NSA Records and Stores 80% of All US Audio Calls

Soulskill posted yesterday | from the must-use-a-good-compression-algorithm dept.

Privacy 239

stephendavion sends a report at The Guardian about remarks from whistleblower William Binney, who left the NSA after its move toward overreaching surveillance following the September 11th attacks. Binney says, "At least 80% of all audio calls, not just metadata, are recorded and stored in the U.S. The NSA lies about what it stores." He added, "The ultimate goal of the NSA is total population control, but I’m a little optimistic with some recent Supreme Court decisions, such as law enforcement mostly now needing a warrant before searching a smartphone." One of Binney's biggest concerns about government-led surveillance is its lack of oversight: "The FISA court has only the government’s point of view. There are no other views for the judges to consider. There have been at least 15-20 trillion constitutional violations for U.S. domestic audiences and you can double that globally."

Gameover ZeuS Re-Emerges As Fast-Fluxing Botnet

Soulskill posted yesterday | from the game-not-quite-over-after-all dept.

Botnet 42

New submitter tylke (621801) writes: "Brian Krebs is reporting that the Gameover ZeuS botnet recently taken down by the U.S. Justice Department in June has re-emerged. The new variant of the Trojan is "stripped of the P2P code, and relies instead on an approach known as fast-flux hosting," a kind of round-robin technique that lets botnets hide phishing and malware delivery sites behind a network of compromised systems. Krebs says, "[T]his variant also includes a 'domain name generation algorithm' or DGA, which is a failsafe mechanism that can be invoked if the botnet’s normal communications system fails. The DGA creates a constantly-changing list of domain names each week (gibberish domains that are essentially long jumbles of letters). In the event that systems infected with the malware can’t reach the fast-flux servers for new updates, the code instructs the botted systems to seek out active domains from the list specified in the DGA. All the botmasters need to do in this case to regain control over his crime machine is register just one of those domains and place the update instructions there." (Disclosure: I work for Malcovery Security, the company credited with identifying the new variant.)

Arecibo Radio Telescope Confirms Extra-galactic Fast Radio Pulses

Soulskill posted yesterday | from the Romulan-morse-code dept.

Space 89

schwit1 writes: "The Arecibo radio telescope has confirmed the existence of fast radio pulses. "Fast radio bursts (FRBs) are bright flashes of radio waves that last only a few thousandths of a second. Scientists using the Parkes Observatory in Australia recorded such events for the first time, but the lack of any similar findings by other facilities led to speculation that the Australian instrument might have been picking up signals originating from sources on or near Earth. The discovery at Arecibo is the first detection of a fast radio burst using an instrument other than the Parkes radio telescope. The position of the radio burst is in the direction of the constellation Auriga in the Northern sky.

"Our result is important because it eliminates any doubt that these radio bursts are truly of cosmic origin," continues Victoria Kaspi, an astrophysics professor at McGill University in Montreal and Principal Investigator for the pulsar-survey project that detected this fast radio burst. "The radio waves show every sign of having come from far outside our galaxy – a really exciting prospect." Exactly what may be causing such radio bursts represents a major new enigma for astrophysicists. Possibilities include a range of exotic astrophysical objects, such as evaporating black holes, mergers of neutron stars, or flares from magnetars — a type of neutron star with extremely powerful magnetic fields." Be warned: All of the above theories could also be wrong. These fast radio flashes could just as easily turn out to be something entirely unpredicted.

Ask Slashdot: Unattended Maintenance Windows?

Soulskill posted yesterday | from the wake-me-if-there's-fire dept.

IT 240

grahamsaa writes: Like many others in IT, I sometimes have to do server maintenance at unfortunate times. 6AM is the norm for us, but in some cases we're expected to do it as early as 2AM, which isn't exactly optimal. I understand that critical services can't be taken down during business hours, and most of our products are used 24 hours a day, but for some things it seems like it would be possible to automate maintenance (and downtime).

I have a maintenance window at about 5AM tomorrow. It's fairly simple — upgrade CentOS, remove a package, install a package, reboot. Downtime shouldn't be more than 5 minutes. While I don't think it would be wise to automate this window, I think with sufficient testing we might be able to automate future maintenance windows so I or someone else can sleep in. Aside from the benefit of getting a bit more sleep, automating this kind of thing means that it can be written, reviewed and tested well in advance. Of course, if something goes horribly wrong having a live body keeping watch is probably helpful. That said, we do have people on call 24/7 and they could probably respond capably in an emergency. Have any of you tried to do something like this? What's your experience been like?

Amazon Seeks US Exemption To Test Delivery Drones

Soulskill posted yesterday | from the i-thought-asking-forgiveness-was-better dept.

Government 145

angry tapir writes: Amazon.com has asked the U.S. Federal Aviation Administration for permission to test drones outdoors for use in its Prime Air package delivery service. In the run up to launching the service, which aims to deliver packages in 30 minutes or less, the online retailer is developing aerial vehicles that travel over 50 miles (80 kilometers) per hour, and will carry 5pound (2.3 kilogram) payloads, which account for 86 percent of the products sold on Amazon. They need to ask permission because the FAA specifically banned such behavior last month.

Insurance Claims Reveal Hidden Electronic Damage From Geomagnetic Storms

Soulskill posted yesterday | from the new-bofh-excuse dept.

Technology 74

KentuckyFC writes: On 13 March 1989, a powerful geomagnetic storm severely disrupted the Hydro-Québec high-voltage grid triggering numerous circuit breakers and blacking out much of eastern Canada and the northeastern U.S. Since then, Earth has been hit by numerous solar maelstroms without such large-scale disruption. But the smaller-scale effect of these storms on low voltage transmissions lines, and the equipment connected to them, has been unknown. Until now. Researchers from the Lockheed Martin Solar and Astrophysics Laboratory have analyzed insurance claims for damage to industrial electrical equipment between 2000 and 2010 and found a clear correlation with geomagnetic activity. They say that the number of claims increases by up to 20 per cent on the days of highest geomagnetic activity. On this basis, they calculate that the economic impact of geomagnetic damage must amount to several billion dollars per year. That raises the question of the impact these storms have on household electronic equipment, such as computers, smartphones and tablets, and whether domestic insurance claims might throw some light on the issue.

Child Thought To Be Cured of HIV Relapses, Tests Positive Again

Soulskill posted yesterday | from the poor-kid dept.

Biotech 119

An anonymous reader writes: The Mississippi child, who was born with HIV passed from her mother, received HIV treatment for 18 months after her birth. In the course of over two years after the treatment, her blood indicated no trace of the virus or of HIV-specific antibodies, leading many to hope that she may have been cured completely. Earlier this month, however, the virus was detected again. Nearly 4 years old, the child is once more being given HIV treatment, and scientists are trying to figure out how she could have gone so long before relapsing.

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...