We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!
An anonymous reader writes A German company has converted a 1960s nuclear bunker 100 miles from network hub Frankfurt into a state-of-the-art underground data center with very few operators and very little oxygen. IT Vision Technology (ITVT) CEO Jochen Klipfel says: 'We developed a solution that reduces the oxygen content in the air, so that even matches go outIt took us two years'. ITVT have the European Air Force among its customers, so security is an even higher priority than in the average DC build; the refurbished bunker has walls 11 feet thick and the central complex is buried twenty feet under the earth.
147 comments | 2 days ago
Thorfinn.au writes with this paper from four researchers (Jehan-François Pâris, Ahmed Amer, Darrell D. E. Long, and Thomas Schwarz, S. J.), with an interesting approach to long-term, fault-tolerant storage: As the prices of magnetic storage continue to decrease, the cost of replacing failed disks becomes increasingly dominated by the cost of the service call itself. We propose to eliminate these calls by building disk arrays that contain enough spare disks to operate without any human intervention during their whole lifetime. To evaluate the feasibility of this approach, we have simulated the behaviour of two-dimensional disk arrays with N parity disks and N(N – 1)/2 data disks under realistic failure and repair assumptions. Our conclusion is that having N(N + 1)/2 spare disks is more than enough to achieve a 99.999 percent probability of not losing data over four years. We observe that the same objectives cannot be reached with RAID level 6 organizations and would require RAID stripes that could tolerate triple disk failures.
253 comments | 2 days ago
An anonymous reader writes What would be the best media to store a backup of important files in a lockbox? Like a lot of people we have a lot of important information on our computers, and have a lot of files that we don't want backed up in the cloud, but want to preserve. Everything from our personally ripped media, family pictures, important documents, etc.. We are considering BluRay, HDD, and SSD but wanted to ask the Slashdot community what they would do. So, in 2015, what technology (or technologies!) would you employ to best ensure your data's long-term survival? Where would you put that lockbox?
250 comments | 3 days ago
An anonymous reader writes: There has been a furious effort over the past few years to bring the teaching of programming into the core academic curricula. Enthusiasts have been quick to take up the motto: "Coding is the new literacy!" But long-time developer Chris Granger argues that this is not the case: "When we say that coding is the new literacy, we're arguing that wielding a pencil and paper is the old one. Coding, like writing, is a mechanical act. All we've done is upgrade the storage medium. ... Reading and writing gave us external and distributable storage. Coding gives us external and distributable computation. It allows us to offload the thinking we have to do in order to execute some process. To achieve this, it seems like all we need is to show people how to give the computer instructions, but that's teaching people how to put words on the page. We need the equivalent of composition, the skill that allows us to think about how things are computed."
He further suggests that if anything, the "new" literacy should be modeling — the ability to create a representation of a system that can be explored or used. "Defining a system or process requires breaking it down into pieces and defining those, which can then be broken down further. It is a process that helps acknowledge and remove ambiguity and it is the most important aspect of teaching people to model. In breaking parts down we can take something overwhelmingly complex and frame it in terms that we understand and actions we know how to do."
211 comments | 4 days ago
dkatana writes: Overall, demand for encryption is growing. Cloud encryption services provider CipherCloud recently received a $50 million investment by Deutsche Telekom, which the company said positions it for "explosive growth" this year. The services are designed to allow corporations to benefit from the cost savings and elasticity of cloud-based data storage, while ensuring that sensitive information is protected.
Now, both Apple and Google are providing full encryption as a default option on their mobile operating systems with an encryption scheme they are not able to break themselves, since they don't hold the necessary keys.
Some corporations have gone as far as turning to "zero-knowledge" services, usually located in countries such as Switzerland. These services pledge that they have no means to unlock the information once the customer has entered the unique encryption keys. This zero-knowledge approach is welcomed by users, who are reassured that their information is impossible to retrieve — at least theoretically — without their knowledge and the keys.
83 comments | about a week ago
harrymcc writes In 1973, an obscure company which had been making electronic cash registers looked for a new business opportunity. It ended up inventing the game cartridge--an innovation which kickstarted a billion-dollar industry and helped establish videogames as a creative medium. The story has never been told until now, but over at Fast Company, Benj Edwards chronicles the fascinating tale, based on interviews with the engineers responsible for the feat back in the mid-1970s.
60 comments | about two weeks ago
slash-sa writes: A Polish software and hardware developer has created a prototype computer which is entirely housed within a mouse. Dubbed the Mouse-Box, it works like a conventional mouse, but contains a processor, flash storage, an HDMI connection, and Wi-Fi connectivity. It is connected to a monitor via the HDMI interface and connects to an Internet connection through standard Wi-Fi.
165 comments | about two weeks ago
Saint Aardvark writes If, like me, you administer FreeBSD systems, you know that (like Linux) there is an embarrassment of riches when it comes to filesystems. GEOM, UFS, soft updates, encryption, disklabels — there is a *lot* going on here. And if, like me, you're coming from the Linux world your experience won't be directly applicable, and you'll be scaling Mount Learning Curve. Even if you *are* familiar with the BSDs, there is a lot to take in. Where do you start? You start here, with Michael W. Lucas' latest book, FreeBSD Mastery: Storage Essentials. You've heard his name before; he's written Sudo Mastery (which I reviewed previously), along with books on PGP/GnuPGP, Cisco Routers and OpenBSD. This book clocks in at 204 pages of goodness, and it's an excellent introduction to managing storage on FreeBSD. From filesystem choice to partition layout to disk encryption, with sidelong glances at ZFS along the way, he does his usual excellent job of laying out the details you need to know without every veering into dry or boring. Keep reading for the rest of Saint Aardvark's review.
75 comments | about two weeks ago
ckwu writes Materials scientists have constructed round, pom-pom-like graphene microparticles by spraying graphene oxide droplets into a hot solvent—a process akin to deep-frying. The technique could provide a simple, versatile means to make electrode materials for batteries and supercapacitors, possibly leading to devices with improved energy and power densities, the researchers say. The microparticles contain graphene nanosheets radiating out from their centers, which increases the exposed surface area of the graphene and creates open nanochannels that can enhance charge transfer. Electrodes made with the graphene microspheres had higher capacitance than those made with unassembled graphene sheets, demonstrating that the 3-D structure of the particles improved performance.
49 comments | about two weeks ago
HughPickens.com writes The death of the mainframe has been predicted many times over the years but it has prevailed because it has been overhauled time and again. Now Steve Lohr reports that IBM has just released the z13, a new mainframe engineered to cope with the huge volume of data and transactions generated by people using smartphones and tablets. "This is a mainframe for the mobile digital economy," says Tom Rosamilia. "It's a computer for the bow wave of mobile transactions coming our way." IBM claims the z13 mainframe is the first system able to process 2.5 billion transactions a day and has a host of technical improvements over its predecessor, including three times the memory, faster processing and greater data-handling capability. IBM spent $1 billion to develop the z13, and that research generated 500 new patents, including some for encryption intended to improve the security of mobile computing. Much of the new technology is designed for real-time analysis in business. For example, the mainframe system can allow automated fraud prevention while a purchase is being made on a smartphone. Another example would be providing shoppers with personalized offers while they are in a store, by tracking their locations and tapping data on their preferences, mainly from their previous buying patterns at that retailer.
IBM brings out a new mainframe about every three years, and the success of this one is critical to the company's business. Mainframes alone account for only about 3 percent of IBM's sales. But when mainframe-related software, services and storage are included, the business as a whole contributes 25 percent of IBM's revenue and 35 percent of its operating profit. Ronald J. Peri, chief executive of Radixx International was an early advocate in the 1980s of moving off mainframes and onto networks of personal computers. Today Peri is shifting the back-end computing engine in the Radixx data center from a cluster of industry-standard servers to a new IBM mainframe and estimates the total cost of ownership including hardware, software and labor will be 50 percent less with a mainframe. "We kind of rediscovered the mainframe," says Peri.
164 comments | about two weeks ago
puddingebola notes that Samsung's first smartphones powered by its Tizen operating system have gone on sale in India. "After plenty of speculation and an abort launch in Russia last year, Samsung has finally managed to release its first phone powered by the Tizen operating system. The Samsung Z1 is coming to India initially, where it is available to buy for 5,700 INR — that’s around $92 — from today. The Z1 is an affordable device, both in price and specs. It packs a four-inch WVGA PLS screen, and is powered by a 1.2 GHz dual-core processor and 768 MB RAM. There’s a 3.1-megapixel camera on the rear, and a limited VGA camera on the front. The phone runs version 2.3 of the Tizen operating system, and comes with 4GB of on-device storage which can be expanded by up to 64GB via a micro SD card. It supports dual SIMs, as is commonplace with devices in India."
35 comments | about two weeks ago
An anonymous reader writes: Bruce Schneier has codified another lesson from the Sony Pictures hack: companies should know what data they can safely delete. He says, "One of the social trends of the computerization of our business and social communications tools is the loss of the ephemeral. Things we used to say in person or on the phone we now say in e-mail, by text message, or on social networking platforms. ... Everything is now digital, and storage is cheap — why not save it all?
Sony illustrates the reason why not. The hackers published old e-mails from company executives that caused enormous public embarrassment to the company. They published old e-mails by employees that caused less-newsworthy personal embarrassment to those employees, and these messages are resulting in class-action lawsuits against the company. They published old documents. They published everything they got their hands on."
Schneier recommends organizations immediately prepare a retention/deletion policy so in the likely event their security is breached, they can at least reduce the amount of harm done. What kind of retention policy does your organization enforce? Do you have any personal limits on storing old data?
177 comments | about three weeks ago
Esther Schindler writes: In this article, Robin Harris predicts what storage will be like in 2025. And, he says, the next 10 years will be the most exciting and explosive in the history of data storage. For instance: "There are several forms of [Resistive RAM], but they all store data by changing the resistance of a memory site, instead of placing electrons in a quantum trap, as flash does. RRAM promises better scaling, fast byte-addressable writes, much greater power efficiency, and thousands of times flash's endurance. RRAM's properties should enable significant architectural leverage, even if it is more costly per bit than flash is today. For example, a fast and high endurance RRAM cache would simplify metadata management while reducing write latency."
93 comments | about three weeks ago
Press2ToContinue writes "There is a new idea out there, proposed by Shawn Wilkinson, Tome Boshevski & Josh Brandof, that if you have unused disk space on your HD that you should rent it out. It is a great idea and the concept may have a whole range of implementations. The 3 guys describe their endeavor as: "Storj is a peer-to-peer cloud storage network implementing end-to-end encryption would allow users to transfer and share data without reliance on a third party data provider. The removal of central controls would eliminate most traditional data failures and outages, as well as significantly increasing security, privacy, and data control. A peer-to-peer network and basic encryption serve as a solution for most problems, but we must offer proper incentivisation for users to properly participate in this network."
331 comments | about three weeks ago
An anonymous reader writes Recent research has identified that only one in ten cloud apps are secure enough for enterprise use. According to a report from cloud experts Netskope, organizations are employing an average of over 600 business cloud apps, despite the majority of software posing a high risk of data leak. The company showed that 15% of logins for business apps used by organizations had been breached by hackers. Over 20% of businesses in the Netskope cloud actively used more than 1,000 cloud apps, and over 8% of files in corporate-sanctioned cloud storage apps were in violation of DLP policies, source code, and other policies surrounding confidential and sensitive data. Google Drive, Facebook, Youtube, Twitter and Gmail were among the apps investigated in the Netskope research.
72 comments | about three weeks ago
Deathspawner writes: Samsung's SM951 is an unassuming gumstick SSD — it has no skulls or other bling — but it's what's underneath that counts: PCIe 3.0 x4 support. With that support, Samsung is able to boast speeds of 2,150MB/s read and 1,550MB/s write. But with such speeds comes an all-too-common caveat: you'll probably have to upgrade your computer to take true advantage of it. For comparison, Samsung says a Gen 2 PCIe x4 slot will limit the SM951 to just 1,600MB/s and 1,350MB/s (or 130K/100K IOPS), respectively. Perhaps now is a bad time to point out a typical Z97 motherboard only has a PCIe 2nd Gen x2 (yes, x2) connection to its M.2 slot, meaning one would need to halve those figures again.
100 comments | about three weeks ago
An anonymous reader writes: The Walkman is one of the most recognizable pieces of technology from the 1980s. Unfortunately for Sony, it didn't survive the switch to digital, and they discontinued it in 2010. Last year, they quietly reintroduced the Walkman brand as a "high-resolution audio player," supporting lossless codecs and better audio-related hardware. At $300, it seemed a bit pricey. But now, at the Consumer Electronics Show, Sony has loudly introduced its high-end digital Walkman, and somehow decided to price it at an astronomical $1,200.
What will all that money get you? 128GB of onboard storage and a microSD slot to go with it. There's a large touchscreen, and the device runs Android — but it uses version 4.2 Jelly Bean, which came out in 2012. It also supports Bluetooth and NFC. Sony claims the device has 33 hours of battery life when playing FLAC files, and 60 hours when playing MP3s. They appear to be targeting audiophiles — their press release includes phrasing about how pedestrian MP3 encoding will "compromise the purity of the original signal."
391 comments | about three weeks ago
An anonymous reader writes An Indiana court has ruled that a hard drive that was sent to recycling was not destruction of evidence. The ruling stems from a BitTorrent file-sharing case filed by Malibu Media where a defendant claimed that his hard drive had failed thanks to heavy use. Malibu claimed that the act was destruction of evidence and filed a motion demanding a default judgement. The court denied this motion suggesting that because the hard drive failed, there was no evidence to destroy in the first place.
181 comments | about a month ago
schwit1 writes With the new year, a change in fiscal rules in the European Union is increasing the tax on many purchases of digital content like e-books and smartphone applications. Under the new rules, first approved in 2008, the tax rate on digital services like cloud storage and movie streaming will be determined by where consumers live, and not where the company selling the product has its European headquarters. Tax experts say Europe's revamped rules could add up to an extra $1 billion in annual tax revenue for European governments.
164 comments | about a month ago
An anonymous reader notes that Apple is being sued over claims that iOS 8 uses too much storage space on the company's devices. "Ever wonder why there never is enough space on your iPhone or iPad? A lawsuit filed this week against Apple Inc. alleges that upgrades to the iOS 8 operating system are to blame, and that the company has misled customers about it. In the legal complaint filed in California, Miami residents Paul Orshan and Christopher Endara accuse Apple of "storage capacity misrepresentations and omissions" relating to Apple's 8 GB and 16GB iPhones, iPads and iPods. Orshan has two iPhone 5 and two iPads while Endara had purchased an iPhone 6. They contend the upgrades to the operating system end up taking up as much as 23 percent of the storage space on their devices."
325 comments | about a month ago