Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Victims of technological change - why haters gotta hate.

BarbaraHudson (3785311) writes | about an hour ago

User Journal 0

Curiosity works for a lot of us. We're willing to turn aside from the tools that work for us for a bit, even build up some technical debt in our area of expertise, to explore some new technology that might in the long run prove beneficial, or at least interesting (and if you're a curious person, poking around stuff that's interesting is FUN).

The Raid-Proof Hosting Technology Behind 'The Pirate Bay'

HughPickens.com (3830033) writes | 1 hour ago

0

HughPickens.com (3830033) writes "Ernesto reports at TorrentFreak that despite its massive presence the Pirate Bay doesn't have a giant server park but operates from the cloud, on virtual machines that can be quickly moved if needed. The site uses 21 “virtual machines” (VMs) hosted at different providers, up four machines from two years ago, in part due to the steady increase in traffic. Eight of the VM's are used for serving the web pages, searches take up another six machines, and the site’s database currently runs on two VMs. The remaining five virtual machines are used for load balancing, statistics, the proxy site on port 80, torrent storage and for the controller. In total the VMs use 182 GB of RAM and 94 CPU cores. The total storage capacity is 620 GB. One interesting aspect of The Pirate Bay is that all virtual machines are hosted with commercial cloud hosting providers, who have no clue that The Pirate Bay is among their customers. "Moving to the cloud lets TPB move from country to country, crossing borders seamlessly without downtime. All the servers don’t even have to be hosted with the same provider, or even on the same continent." All traffic goes through the load balancer, which masks what the other VMs are doing. This also means that none of the IP-addresses of the cloud hosting providers are publicly linked to TPB. For now, the most vulnerable spot appears to be the site’s domain. Just last year TPB burnt through five separate domain names due to takedown threats from registrars. But then again, this doesn’t appear to be much of a concern for TPB as the operators have dozens of alternative domain names standing by."

Arctic ice cap in a 'death spiral' - The Australian

feedfeeder (1749978) writes | 2 hours ago

0


USA TODAY

Arctic ice cap in a 'death spiral'
The Australian
THE Arctic ice cap has melted so much that open water is now just 560km from the North Pole, the shortest distance recorded, according to scientists. Satellite observations last week from the US National Snow and Ice Data Centre coincide with a prediction...
While Antarctica's Seas Cool Down, The Arctic Ice DwindlesLatinos Health
NASA keeping close eye on Arctic climateFox News

all 85 news articles

Link to Original Source

Psychologist's study finds the old adage "Happy Wife, Happy Life" is true

tomhath (637240) writes | 2 hours ago

0

tomhath (637240) writes ""When men felt willing to express their anger or frustration, women took that as a sign that their partners were investing in the relationship, the study found. For most women studied, this translated into a sense of security or happiness for the women.

Men, by contrast, commonly expressed more fulfillment after their female partners expressed to them that they were fulfilled and satisfied in their relationships.

While the study, published in the Journal of Family Psychology, ultimately found that happiness stems from a willingness to try and understand whatever emotion one’s partner is feeling, men tend to disengage when negatively aroused, while women tend to engage and want to discuss the problem.""

Link to Original Source

SpaceX Launches Dragon Cargo Ship for NASA - Discovery News

feedfeeder (1749978) writes | 3 hours ago

0


Fox News

SpaceX Launches Dragon Cargo Ship for NASA
Discovery News
A SpaceX Falcon 9 rocket launches from the Cape Canaveral Air Force Station in Florida with a science-packed Dragon spacecraft on the fourth NASA-contracted resupply mission for the International Space Station, Sept. 21, 2014. NASA. Gallery.
Launch brings new technology that could change life in spaceCNN
SpaceX launches first 3-D printer and supplies to space stationCTV News
Launch brings new technology to spaceWMTW Portland
USA TODAY-Capital OTC
all 687 news articles

Link to Original Source

Fork Of systemd Leads To Lightweight Uselessd

Anonymous Coward writes | 4 hours ago

0

An anonymous reader writes "A boycott of systemd and other backlash around systemd's feature-creep has led to the creation of Uselessd, a new init daemon. Uselessd is a fork of systemd 208 that strips away functionality considered irrelevant to an init system like the systemd journal and udev. Uselessd also adds in functionality not accepted in upstream systemd like support for alternative C libraries (namely uClibc and musl) and it's even being ported to BSD."
Link to Original Source

Secret Service Critics Pounce After White House Breach

HughPickens.com (3830033) writes | yesterday

0

HughPickens.com (3830033) writes "On Friday evening, a man jumped the White House fence, sprinted across the North Lawn toward the residence, and was eventually tackled by agents, but not before he managed to actually enter the building. Now CBS reports that the security breach at the White House is prompting a new round of criticism for the Secret Service, with lawmakers and outside voices saying the incident highlights glaring deficiencies in the agency's protection of the president and the first family. "Because of corner-cutting and an ingrained cultural attitude by management of 'we make do with less,' the Secret Service is not protecting the White House with adequate agents and uniformed officers and is not keeping up to date with the latest devices for detecting intruders and weapons of mass destruction," says Ronald Kessler. "The fact that the Secret Service does not even provide a lock for the front door of the White House demonstrates its arrogance." But the Secret Service must also consider the consequences of overreaction says White House correspondent Major Garrett. "If you have a jumper and he is unarmed and has no bags or backpacks or briefcase, do you unleash a dog and risk having cell phone video shot from Pennsylvania Avenue of an unarmed, mentally ill person being bitten or menaced by an attack dog?" But Kessler says Julia Pierson, the first woman to head the Secret Service, has some explaining to do. "If the intruder were carrying chemical, biological or radiological weapons and President Obama and his family had been in, we would have had a dead president as well as a dead first family.""

NY Magistrate: Legal Papers Can Be Server Via Facebook

Wylde Stile (731120) writes | 2 days ago

0

Wylde Stile (731120) writes "A Staten Island, NY family court support magistrate allowed a man to serve his ex-wife via Facebook. The man tried to serve the woman in person and via mail, but the woman moved with no forwarding address. The children would not return his calls so he has no way to get the address. The magistrate decided that in-person and mail would not work

The ex-wife maintains an active Facebook account. She even liked some photos on the current wife Facebook page days before the ruling. The magistrate conclude that the ex-wife could be served through Facebook."

Link to Original Source

'Reactive' Development Turns 2.0

electronic convict (3600551) writes | 2 days ago

0

electronic convict (3600551) writes "First there was "agile" development. Now there's a new software movement—called 'reactive' development—that sets out principles for building resilient and failure-tolerant applications for cloud, mobile, multicore and Web-scale systems. ReadWrite's Matt Asay sat down with Jonas Bonér, the author of the Reactive Manifesto (just released in version 2.0), for a discussion of what, exactly, the reactive movement aims to fix in software development and how we get there from here."
Link to Original Source

DC Comics Superheroes, Nancy Reagan and Keebler Elves Won The War on Drugs

theodp (442580) writes | 13 hours ago

0

theodp (442580) writes ""On a recent trip to my childhood home in New Jersey," writes GOOD's Joshua Neuman in This Comic Book Made Me Say No to Drugs, "I discovered a stack of comic books in an old shoebox, one of which was DC Comics' The New Teen Titans (Drug Abuse Awareness) Issue #1, a promotional giveaway that was part of President Reagan’s Drug Awareness Campaign." While the cool kids in his class wearing rock t-shirts snickered at the corporate and government-sponsored comics (circa-1984 DC Marketing promo video), Neuman confesses the propaganda did the job on his naive, overprotected, 10-year-old in suburbia self. "Entering the fictitious, urban world of this comic book was like diving into a drugged-out version of Sesame Street where cute kids from a veritable rainbow of backgrounds played together, studied together, and took PCP together," Neuman recalls. "I can’t say that the comic book traumatized me, but looking back, something about not being in on the joke stayed with me. The experience taught me that drugs lay in the domain of the other, a kid who was much cooler than I was. However inadvertently, the collaborative effort of the Teen Titans, Nancy Reagan, and Keebler had achieved its intended effect.""

Is Alibaba comparable to a US company?

lpress (707742) writes | yesterday

0

lpress (707742) writes "Alibaba is this weeks hot news — they have had a lengthy PR campaign (preceded by a documentary film) followed by a record-setting stock offering. After a day of trading Alibaba's market capitalization was comparable to that of established tech giants.

But, there are cultural and structural differences between Alibaba and US companies. Alibaba is tightly woven into a complex fabric of personal, corporate and government organization relationships. The same can be said of information technology companies in Singapore. Is owning a share of, say, Apple, conceptually the same as owning a share of Alibaba?"

Researchers Report Largest DNA Origami To Date

MTorrice (2611475) writes | 2 days ago

0

MTorrice (2611475) writes "Bioengineers can harness DNA’s remarkable ability to self-assemble to build two- and three-dimensional nanostructures through DNA origami. Until now, researchers using this approach have been limited to building structures that are tens of square nanometers in size. Now a team reports the largest individual DNA origami structures to date, which reach sizes of hundreds of square nanometers. What’s more, they have developed a less expensive way to synthesize the DNA strands needed, overcoming a tremendous obstacle to scaling up the technology."
Link to Original Source

The disaster and ensuing coverup of the Obamacare website

Anonymous Coward writes | 2 days ago

0

An anonymous reader writes "New reports reveal significant corruption in the Obama administration’s botched effort to create the Obamacare website.

The Government Office of Accountability released a report earlier this week detailing the security flaws in the site, but a report from the House Committee on Oversight and Government Reform released yesterday is even more damning. Titled, “Behind the Curtain of the HealthCare.gov Rollout,” the report fingers the Centers for Medicare and Medicaid Services, which oversaw the development of the site, and its parent Department of Health and Human Services.

“Officials at CMS and HHS refused to admit to the public that the website was not on track to launch without significant functionality problems and substantial security risks,” the report says. “There is also evidence that the Administration, to this day, is continuing its efforts to shield ongoing problems with the website from public view.”

The evidence includes emails that show Obamacare officials more interested in keeping their problems from leaking to the press than working to fix them. This is both both a coverup and incompetence."

Washington DC to return to automatic metro trains

Bruce66423 (1678196) writes | yesterday

0

Bruce66423 (1678196) writes "http://www.washingtonpost.com/... After a crash some five years ago, automatic operation was abandoned. Now however replacement of 'faulty' modules means that moving the whole system on to automatic operation can happen.

One quote is depressing: 'And because trains regularly lurch to a halt a few feet short of where they should be at platforms, Metrorail riders have grown accustomed to hearing an announcement while they’re waiting to board: “Stand clear. Train moving forward.” WTF. That never happens on the London underground with human operators? What's wrong with American drivers?"

Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying

wabrandsma (2551008) writes | yesterday

0

wabrandsma (2551008) writes "from Wired:

The National Security Agency has some of the brightest minds working on its sophisticated surveillance programs, including its metadata collection efforts. But a new chat program designed by a middle-school dropout in his spare time may turn out to be one of the best solutions to thwart those efforts.

John Brooks, who is just 22 and a self-taught coder who dropped out of school at 13, was always concerned about privacy and civil liberties. Four years ago he began work on a program for encrypted instant messaging that uses Tor hidden services for the protected transmission of communications. The program, which he dubbed Ricochet, began as a hobby. But by the time he finished, he had a full-fledged desktop client that was easy to use, offered anonymity and encryption, and even resolved the issue of metadata—the “to” and “from” headers and IP addresses spy agencies use to identify and track communications—long before the public was aware that the NSA was routinely collecting metadata in bulk for its spy programs. The only problem Brooks had with the program was that few people were interested in using it. Although he’d made Ricochet’s code open source, Brooks never had it formally audited for security and did nothing to promote it, so few people even knew about it.

Then the Snowden leaks happened and metadata made headlines. Brooks realized he already had a solution that resolved a problem everyone else was suddenly scrambling to fix. Though ordinary encrypted email and instant messaging protect the contents of communications, metadata allows authorities to map relationships between communicants and subpoena service providers for subscriber information that can help unmask whistleblowers, journalists’s sources and others."

Link to Original Source

First Hands-on with the Incredible New Oculus Rift VR Headset

muterobert (2927951) writes | yesterday

0

muterobert (2927951) writes "One of the stand-out demos put me in front of an alien on some sort of Moon-like world. The alien was looking at me and speaking in an unfamiliar tongue. When I moved my head, its gaze followed me. Its big and detailed eyes, combined with reaction to me as I moved, imbued it with a sense of living that was really cool. Spaceships flew over head and drew my gaze behind me, leading me to look at some incredibly detailed scenery."
Link to Original Source

Online communications platform for political dissent?

Anonymous Coward writes | yesterday

1

An anonymous reader writes "Now that most of the major tech players (Apple, Google, MS) are compromised, what online communications platforms are available for those who would like to initiate change in the US political system? Consider that the current state of encrypting email is not trivial and additionally that using encryption or Tor is considered grounds for enhanced surveillance. Technical proficiency should not be a prerequisite to initiate political change. So when the common man who considers "the blue E" as the internet asks how he can communicate with me about initiating changes in the US political system, what solutions can I provide to him? Should we restrict ourselves to the post office with 2-3 days' latency in communications and face-to-face meetings? One can see that those restrictions puts us at quite the disadvantage."

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>