An anonymous reader writes with this news from Reuters: A U.S. district judge on Friday ruled that the $324.5 million settlement negotiated by Apple, Google, Intel, and Adobe with the tech workers who brought an antitrust lawsuit against them was too low. The judge cited the settlement amount of a similar lawsuit brought against Disney and Intuit last year which resulted in plaintiffs obtaining proportionally more for lost wages. And yet, according to the judge, the current plaintiffs have "much more leverage". She cited evidence clearly showing Apple's Steve Jobs strong-arming the other companies in the suit into agreeing to a no-employee-poaching agreement, and in one instance, of Google failing to rope in Facebook into a similar agreement which resulted in a 10% increase of all Google employee salaries. In other words, clear evidence that the no-poaching agreement effectively suppressed the salaries of these companies' tech workers. Another hearing is scheduled for September 10.
An anonymous reader writes Facebook today revealed details about Autoscale, a system for power-efficient load balancing that has been rolled out to production clusters in its data centers. The company says it has "demonstrated significant energy savings." For those who don't know, load balancing refers to distributing workloads across multiple computing resources, in this case servers. The goal is to optimize resource use, which can mean different things depending on the task at hand.
astroengine writes The debate as to whether Pluto is a planet or a dwarf planet rumbles on, but in a new animation of the small world, one can't help but imagine another definition for Pluto. As NASA's New Horizons spacecraft continues its epic journey into the outer solar system, its Kuiper Belt target is becoming brighter and more defined. Seen through the mission's Long Range Reconnaissance Imager (LORRI) camera, this new set of observations clearly shows Pluto and its biggest moon Charon locked in a tight orbital dance separated by only 11,200 miles. (Compared with the Earth-moon orbital separation of around 240,000 miles, you can see how compact the Pluto-Charon system really is.) Both bodies are shown to be orbiting a common point — the "barycenter" is located well above Pluto's surface prompting a new debate on whether or not Pluto and Charon should be redefined as a "binary planet".
sciencehabit (1205606) writes "Researchers tracked the sleep patterns of 85 crew members aboard the International Space Station and space shuttle and found that despite an official flight schedule mandating 8.5 hours of sleep per night, they rarely got more than five. In fact, getting a full night's rest was so difficult that three-quarters of shuttle mission crew members used sleep medication, and sometimes entire teams were sedated on the same night. Given that sleep deprivation contributes to up to 80% of aviation accidents, it's important to better understand why sleep is so difficult in space, the authors say."
First time accepted submitter jarmund (2752233) writes "I first got a WRT54GL in 2007. Now, 7 years later, it's still churning along, despite only having one of its antennae left after an encounter with a toddler. As it is simply not up to date to today's standards (802.11N for example), what is a worthy successor? I enjoyed the freedom to choose the firmware myself (I've run Tomato on it since 2008), in addition to its robustness. A replacement will be considered second-rate unless it catered for the same freedom as its predecessor." Is there a canonical best household router nowadays?
An anonymous reader writes "Michael Jordan's infamous attempt at baseball aside, athletes have sometimes switched sports successfully in the past — and perhaps a sure a sign as any that eSports are coming of age is pro gaming's top players are now trying to do the same. A new feature looks at the top players who've tried to make the jump from one first person shooter to another, or even between genre — from StarCraft 2 to League of Legends — and finds that while some have thrived, others has shown that each title can require a very particular, and sadly non-transferrable, skill set."
Linking to a story at Reuters, reader WilliamGeorge writes "Russia is further constraining access to the internet and freedom of speech, with new laws regarding public use of WiFi. Nikolai Nikiforov, the Russian Communications Minister, tweeted that "Identification of users (via bank cards, cell phone numbers, etc.) with access to public Wifi is a worldwide practice." This comes on top of their actions recently to block websites of political opponents to Russian president Vladimir Putin, require registration of prominent bloggers, and more. The law was put into effect with little notice and without the input of Russian internet providers. Sergei Plugotarenko, head of the Russian Electronic Communications Association, said "It was unexpected, signed in such a short time and without consulting us." He added, "We will hope that this restrictive tendency stops at some point because soon won't there be anything left to ban." In addition to the ID requirement to use WiFi, the new law also requires companies to declare who is using their web networks and calls for Russian websites to store their data on servers located in Russia starting in 2016."
That's not the only crackdown in progress, though: former Slashdot code-wrestler Vlad Kulchitski notes that Russian users are being blocked from downloading Java with an error message that reads, in essence, "You are in a country on which there is embargo; you cannot download JAVA." Readers at Hacker News note the same, though comments there indicate that the block may rely on a " specific and narrow IP-block," rather than being widespread. If you're reading this from Russia, what do you find?
AbrasiveCat (999190) writes "In the continuing game of cat and mouse between offensive and defensive technologies of war, the technology of radar stealth may have been matched by new multiple frequency radar systems. U.S Naval Institute News reports the Chinese and Russians may be developing such systems. The present radar systems use high frequency waves for accurately locating an incoming target. Stealth aircraft are designed to adsorb or reflect these waves away from the receiver. It turns out longer wave radars can see the stealth aircraft. The longer wave radar lacks the precision of the high frequency radar, but when the two are combined, as the Russians, Chinese (and U.S.) are doing, you can produce accurate targeting radar. The F117 may have been in a golden age for stealth technology, it will be interesting to see if the F35 arrives too late to be effective against other countries with advanced radar systems."
Nicola Hahn (1482985) writes Kim Zetter of Wired Magazine has recently covered Dan Greer's keynote speech at Black Hat USA. In his lengthy address Greer, representing the CIA's venture funding arm, suggested that one way that the United States government could improve cyber security would be to use its unparalleled budget to buy up all the underground's zero-day vulnerabilities.
While this would no doubt make zero-day vendors like VUPEN and middlemen like the Grugq very wealthy, is this strategy really a good idea? Can the public really trust the NSA to do the right thing with all those zero-day exploits? Furthermore, recall the financial meltdown of 2008 where the public paid the bill for Wall Street's greed. If the government pays for information on all these unpatched bugs would society simply be socializing the cost of hi-tech's sloppy engineering? Whose interests does this "corner-the-market" approach actually serve?
snydeq (1272828) writes Java core has stagnated, Java EE is dead, and Spring is over, but the JVM marches on. C'mon Oracle, where are the big ideas? asks Andrew C. Oliver. 'I don't think Oracle knows how to create markets. It knows how to destroy them and create a product out of them, but it somehow failed to do that with Java. I think Java will have a long, long tail, but the days are numbered for it being anything more than a runtime and a language with a huge install base. I don't see Oracle stepping up to the plate to offer the kind of leadership that is needed. It just isn't who Oracle is. Instead, Oracle will sue some more people, do some more shortsighted and self-defeating things, then quietly fade into runtime maintainer before IBM, Red Hat, et al. pick up the slack independently. That's started to happen anyhow.'
KentuckyFC (1144503) writes One curious property of massless particles like photons is that their energy or momentum can take any value across many orders of magnitude, a property that physicists call scale invariance. By contrast, massive particles like electrons always have the same mass regardless of their energy or momentum. So massive particles are not scale invariant. The concept of unparticles is the idea that some "stuff" may have mass, energy and momentum and yet also be scale invariant. This stuff must be profoundly different from ordinary particles, hence the name: unparticles. Nobody has ever seen an unparticle but now physicists are suggesting that unparticles may hold the key to understanding unconventional superconductivity. Their thinking is that at very low temperatures, ordinary particles can sometimes behave like unparticles. In other words, their properties become independent of the scale at which they're observed. So if an unparticle moves without resistance on a tiny scale, then it must also move without resistance at every scale, hence the phenomenon of superconductivity. That could provide some important insights into unconventional superconductivity which has puzzled physicists since it was discovered in the 1980s.
Bismillah (993337) writes Yahoo is working on an easy to use PGP interface for webmail, the company's chief information security officer Alex Stamos said at Black Hat 2014. This could lead to some interesting standoffs with governments and law enforcement wanting to read people's messages. From the article: "'We are working to design a key server architecture that allows for automatic discovery of public keys within Yahoo.com and other participating mail providers and to integrate encryption into the normal mail flow,' Stamos said."
An anonymous reader writes In a paper published Thursday in Science, IBM describes its creation of a brain-like chip called TrueNorth. It has "4,096 processor cores, and it mimics one million human neurons and 256 million synapses, two of the fundamental biological building blocks that make up the human brain." What's the difference between TrueNorth and traditional processing units? Apparently, TrueNorth encodes data "as patterns of pulses". Already, TrueNorth has a proven 80% accuracy in image recognition with a power consumption efficiency rate beating traditional processing units. Don't look for brain-like chips in the open market any time soon, though. TrueNorth is part of a DARPA research effort that may or may not translate into significant changes in commercial chip architecture and function.
jfruh writes Not everyone has a job like Homer Simpson, who's been replaced at various times by a brick tied to a lever and a chicken named Queenie. But many IT workers have come up against mind-numbing, repetitive tasks that probably could be automated. So: what do you do about it? Well, the answer depends on how much power you have in an organization and how much your bosses respect your opinion.
Lucas123 writes An AMD website in China has leaked information about the upcoming release of a line of SSDs aimed at gamers and professionals that will offer top sequential read/write speeds of 550MB/s and 530MB/s, respectively. AMD confirmed the upcoming news, but no pricing was available yet. The SSDs will come in 120GB, 240GB and 480GB capacities and will use Toshiba's 19-nanometer flash lithography technology. According to IHS, AMD is likely entering the gaming SSD market because desktop SSD shipments are expected to experience a 39% CAGR between now and 2018.
Daniel_Stuckey writes You've maybe heard a bit about Stingray. Over the past couple of years, it has emerged that police forces in the US have been using the powerful surveillance tool, which tricks phones into connecting to a dragnet, to track mobile devices, and intercept calls and text messages. Meanwhile, the London Metropolitan Police Service (MPS) continue to remain tight lipped about their use of the technology, leaving citizens in the dark on what privacy protections, if any, are in place for those who may get swept up by the broad surveillance techniques.
An anonymous reader writes After January 12, 2016, only the most recent version of Internet Explorer available for a supported operating system will receive technical support and security updates. For example, customers using Internet Explorer 8, 9, or 10 on Windows 7 SP1 should migrate to Internet Explorer 11 to continue receiving security updates and technical support. From the blog post: "Microsoft recommends enabling automatic updates to ensure an up-to-date computing experience—including the latest version of Internet Explorer—and most consumers use automatic updates today. Commercial customers are encouraged to test and accept updates quickly, especially security updates. Regular updates provide significant benefits, such as decreased security risk and increased reliability, and Windows Update can automatically install updates for Internet Explorer and Windows."