Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Fedora 21 Alpha Released

timothy posted 7 hours ago | from the every-release-represents-years-of-work dept.

Red Hat Software 35

An anonymous reader writes Fedora 21 Alpha has been released. After encountering multiple delays, the first development version is out for the Fedora.NEXT and Fedora 21 products. Fedora 21 features improved Wayland support, GNOME 3.14, many updated packages, greater server and cloud support, and countless other improvements with Fedora 20 already being nearly one year old.

Outlining Thin Linux

Soulskill posted yesterday | from the tux-on-a-diet dept.

Operating Systems 201

snydeq writes: Deep End's Paul Venezia follows up his call for splitting Linux distros in two by arguing that the new shape of the Linux server is thin, light, and fine-tuned to a single purpose. "Those of us who build and maintain large-scale Linux infrastructures would be happy to see a highly specific, highly stable mainstream distro that had no desktop package or dependency support whatsoever, so was not beholden to architectural changes made due to desktop package requirements. When you're rolling out a few hundred Linux VMs locally, in the cloud, or both, you won't manually log into them, much less need any type of graphical support. Frankly, you could lose the framebuffer too; it wouldn't matter unless you were running certain tests," Venezia writes. "It's only a matter of time before a Linux distribution that caters solely to these considerations becomes mainstream and is offered alongside more traditional distributions."

The Raid-Proof Hosting Technology Behind 'The Pirate Bay'

timothy posted yesterday | from the pesky-vikings-and-their-lessons dept.

Piracy 141

HughPickens.com writes Ernesto reports at TorrentFreak that despite its massive presence the Pirate Bay doesn't have a giant server park but operates from the cloud, on virtual machines that can be quickly moved if needed. The site uses 21 "virtual machines" (VMs) hosted at different providers, up four machines from two years ago, in part due to the steady increase in traffic. Eight of the VMs are used for serving the web pages, searches take up another six machines, and the site's database currently runs on two VMs. The remaining five virtual machines are used for load balancing, statistics, the proxy site on port 80, torrent storage and for the controller. In total the VMs use 182 GB of RAM and 94 CPU cores. The total storage capacity is 620 GB. One interesting aspect of The Pirate Bay is that all virtual machines are hosted with commercial cloud hosting providers, who have no clue that The Pirate Bay is among their customers. "Moving to the cloud lets TPB move from country to country, crossing borders seamlessly without downtime. All the servers don't even have to be hosted with the same provider, or even on the same continent." All traffic goes through the load balancer, which masks what the other VMs are doing. This also means that none of the IP-addresses of the cloud hosting providers are publicly linked to TPB. For now, the most vulnerable spot appears to be the site's domain. Just last year TPB burnt through five separate domain names due to takedown threats from registrars. But then again, this doesn't appear to be much of a concern for TPB as the operators have dozens of alternative domain names standing by.

'Reactive' Development Turns 2.0

timothy posted 2 days ago | from the off-with-their-oh-wait-that's-reactionary dept.

Programming 101

electronic convict writes First there was "agile" development. Now there's a new software movement—called 'reactive' development—that sets out principles for building resilient and failure-tolerant applications for cloud, mobile, multicore and Web-scale systems. ReadWrite's Matt Asay sat down with Jonas Bonér, the author of the Reactive Manifesto (just released in version 2.0), for a discussion of what, exactly, the reactive movement aims to fix in software development and how we get there from here.

Microsoft Kills Off Its Trustworthy Computing Group

timothy posted 3 days ago | from the but-you-can-totally-trust-it dept.

Microsoft 99

An anonymous reader writes Microsoft's Trustworthy Computing Group is headed for the axe, and its responsibilities will be taken over either by the company's Cloud & Enterprise Division or its Legal & Corporate Affairs group. Microsoft's disbanding of the group represents a punctuation mark in the industry's decades-long conversation around trusted computing as a concept. The security center of gravity is moving away from enterprise desktops to cloud and mobile and 'things,' so it makes sense for this security leadership role to shift as well. According to a company spokesman, an unspecified number of jobs from the group will be cut. Also today, Microsoft has announced the closure of its Silicon Valley lab. Its research labs in Redmond, New York, and Cambridge (in Massachusetts) will pick up some of the closed lab's operations.

Home Depot Says Breach Affected 56 Million Cards

Soulskill posted 4 days ago | from the going-for-the-high-score dept.

Security 77

wiredmikey writes: Home Depot said on Thursday that a data breach affecting its stores across the United States and Canada is estimated to have exposed 56 million customer payment cards between April and September 2014. While previous reports speculated that Home Depot had been hit by a variant of the BlackPOS malware that was used against Target Corp., the malware used in the attack against Home Depot had not been seen previously in other attacks. "Criminals used unique, custom-built malware to evade detection," the company said in a statement. The home improvement retail giant also that it has completed a "major payment security project" that provides enhanced encryption of payment card data at point of sale in its U.S. stores. According to a recent report from Trend Micro (PDF), six new pieces of point-of-sale malware have been identified so far in 2014.

Tim Cook Says Apple Can't Read Users' Emails, That iCloud Wasn't Hacked

timothy posted about a week ago | from the our-cooperation-was-strictly-reluctant dept.

Cloud 191

Apple CEO Tim Cook insists that Apple doesn't read -- in fact, says Cook, cannot read -- user's emails, and that the company's iCloud service wasn't hacked. ZDNet presents highlights from Cook's lengthy, two-part interview with Charlie Rose. One selection of particular interest: Apple previously said that even it can't access iMessage and FaceTime communications, stating that such messages and calls are not held in an "identifiable form." [Cook] claimed if the government "laid a subpoena," then Apple "can't provide it." He said, bluntly: "We don't have a key... the door is closed." He reiterated previous comments, whereby Apple has said it is not in the business of collecting people's data. He said: "When we design a new service, we try not to collect data. We're not reading your email." Cook went on to talk about PRISM in more detail, following the lead from every other technology company implicated by those now-infamous PowerPoint slides.

New Data Center Protects Against Solar Storm and Nuclear EMPs

samzenpus posted about a week ago | from the playing-it-safe dept.

Cloud 59

dcblogs writes "In Boyers, Pa., a recently opened 2,000-sq.-ft. data center has been purpose-built to protect against an electromagnetic pulse (EMP), either generated by a solar storm or a nuclear event. The company that built the facility isn't disclosing exactly how the data center was constructed or what materials were used. But broadly, it did say that the structure has an inner skin and an outer skin that use a combination of thicknesses and metals to provide EMP protection. Betting against an EMP event is a gamble. In 1859, the so-called Carrington solar storm lit the night skies and disrupted the only telegraph communications. William Murtagh, program coordinator at U.S. Space Weather Prediction Center, said there is ongoing concern that the earth may see an solar storm that could impact electronics on the ground. "We're concerned that can happen," A 2012 solar storm, that missed the earth, "was very powerful, and some have suggested it would have been on par with a Carrington-level event." One researcher put the odds of a catastrophic solar storm by 2020 as one in eight.

Apple Outrages Users By Automatically Installing U2's Album On Their Devices

samzenpus posted about a week ago | from the do-not-want dept.

Music 609

Zanadou writes "Apple may have succeeded at breaking two records at once with the free release of U2's latest album, titled Songs of Innocence, via iTunes. But now, it looks like it's also on track to become one of the worst music publicity stunts of all time. Users who have opted to download new purchases to their iPhones automatically have found the new U2 album sitting on their phones. But even if iTunes users hadn't chosen automatic downloads, Songs of Innocence will still be displayed as an "iTunes in the Cloud" purchase. That means it will still be shown as part of your music library, even if you delete all the tracks. The only way to make the U2 album go away is to go to your Mac or PC and hide all of your "iTunes in the Cloud" purchases, or to use iTunes to manually hide each track from your purchased items list. Other reactions include rapper Tyler, The Creator saying that having the new U2 album automatically downloaded on his iPhone was like waking up with an STD. Update: 09/16 15:06 GMT by T : Note: Apple has released a fix.

HP Buys Cloud Provider, Gets Marten Mickos To Head Its Cloud Division

Soulskill posted about two weeks ago | from the if-at-first-you-don't-succeed dept.

HP 35

jfruh writes: In 2010, HP tried to buy its way into the analytics game by shelling out billions for Autonomy, a deal that was a famous disaster. But that isn't stopping the company from making big buys: it will be buying Eucalyptus, a cloud provider headed by ex-MySQL AB CEO Marten Mickos, and bringing Mickos in to head the new HP Cloud division.

Turning the Tables On "Phone Tech Support" Scammers

timothy posted about two weeks ago | from the mouthwatering-shadenfreude dept.

Crime 210

mask.of.sanity writes A security pro has released a Metasploit module that can take over computers running the Ammyy Admin remote control software popular among "Hi this is Microsoft, there's a problem with your computer" tech support scammers. The hack detailed in Matthew Weeks' technical post works from the end-user, meaning victims can send scammers the hijacking exploit when they request access to their machines. Victims should provide scammers with their external IP addresses rather than their Ammyy identity numbers as the exploit was not yet built to run over the Ammyy cloud, according to the exploit readme. This is much more efficient than just playing along but "accidentally" being unable to follow their instructions.

X-Class Solar Flare Coming Friday

samzenpus posted about two weeks ago | from the wear-your-shades dept.

Space 145

First time accepted submitter kit_triforce writes Satellites have just detected a powerful X1.6-class solar flare. The source was active sunspot AR2158, which is directly facing Earth. NASA's Solar Dynamics Observatory recorded the extreme ultraviolet flash. Ionizing radiation from the flare could cause HF radio blackouts and other communications disturbances, especially on the day-lit side of Earth. In the next few hours, when coronagraph data from SOHO and STEREO become available, we will see if a coronal mass ejection (CME) emerges from the blast site. If so, the cloud would likely be aimed directly at Earth and could reach our planet in 2 to 3 days.

Nonprofit Builds Salesforce Cloud For the Blind

samzenpus posted about two weeks ago | from the build-it-better dept.

Cloud 13

Gamoid writes When we talk about "accessibility" in tech, we're usually talking about things like mobile apps and API compatibility. But for the sizable percentage of the world's population with vision impairment or full blindness, "accessibility" means they can use a computer, phone, tablet, or whatever, in a way that's comfortable for them. There have been great strides in that area, but it's still a tremendous challenge. So it's worth pausing to appreciate the work that the 99-year-old Bosma Enterprises, an Indiana-based nonprofit with the mission of reducing the 70 percent unemployment rate among the visually impaired and blind, has put into building out an enterprise cloud -- based primarily on Salesforce, with a handful of other applications built in -- that can be used by people with any level of sightedness across any line of business.

Book Review: Architecting the Cloud

samzenpus posted about two weeks ago | from the read-all-about-it dept.

Books 75

benrothke writes Most books about cloud computing are either extremely high-level quasi-marketing tomes about the myriad benefits of the cloud without any understanding of how to practically implement the technology under discussion. The other type of cloud books are highly technical references guides, that provide technical details, but for a limited audience. In Architecting the Cloud: Design Decisions for Cloud Computing Service Models, author Michael Kavis has written perhaps the most honest book about the cloud. Make no doubt about it; Kavis is a huge fan of the cloud. But more importantly, he knows what the limits of the cloud are, and how cloud computing is not a panacea. That type of candor makes this book an invaluable guide to anyone looking to understand how to effective deploy cloud technologies. Keep reading below for the rest of Ben's review.

CenturyLink Looks At Buying Rackspace

samzenpus posted about two weeks ago | from the under-new-management dept.

Businesses 44

Rambo Tribble writes Telecom player CenturyLink is reported to be considering the acquisition of server and cloud provider Rackspace. From the article: "The deal would add more Internet and cloud services to CenturyLink's roster of phone and data communications packages, helping it better compete against Amazon.com in Web-based services. Microsoft Corp. and Google are also vying for business as companies transition from owning and operating servers to renting space in the cloud."

L.A. Times National Security Reporter Cleared Stories With CIA Before Publishing

timothy posted about two weeks ago | from the bet-the-changes-were-mostly-in-one-direction dept.

United States 188

New submitter Prune (557140) writes with a link to a story at The Intercept which might influence the way you look at media coverage of the kind of government activity that deserves rigorous press scrutiny. According to the story, "Email exchanges between CIA public affairs officers and Ken Dilanian, now an Associated Press intelligence reporter who previously covered the CIA for the Times, show that Dilanian enjoyed a closely collaborative relationship with the agency, explicitly promising positive news coverage and sometimes sending the press office entire story drafts for review prior to publication. In at least one instance, the CIA’s reaction appears to have led to significant changes in the story that was eventually published in the Times." Another telling excerpt: On Friday April 27, 2012, he emailed the press office a draft story that he and a colleague, David Cloud, were preparing. The subject line was “this is where we are headed,” and he asked if “you guys want to push back on any of this.” It appears the agency did push back. On May 2, 2012, he emailed the CIA a new opening to the story with a subject line that asked, “does this look better?” The piece ran on May 16, and while it bore similarities to the earlier versions, it had been significantly softened.

Should Docker Move To a Non-Profit Foundation?

timothy posted about two weeks ago | from the ask-a-silly-question dept.

Cloud 47

darthcamaro writes "Docker has become the new hotness in virtualization technology — but it is still a project that is led by the backing of a single vendor — Docker Inc. Is that a problem? Should there be an open-source Foundation to manage the governance and operation of the Docker project? In a video interview — Docker founder and Benevolent Dictator for Life Solomon Hykes says — No."

Slashdot Talks with David Nalley About Apache CloudStack (Video)

Roblimo posted about three weeks ago | from the my-cloud-is-cloudier-than-your-cloud dept.

Open Source 13

This Citrix Web page at buildacloud.org says, "David is a PMC (Project Management Commitee) member of the Apache CloudStack project, jClouds committer, Fedora contributor and an Open Source Evangelist for the Open Source Business Office at Citrix." CloudStack has been an Apache Top Level Project since March 2013, with David on board all the way. He's obviously the right person to turn to for an Apache CloudStack update, including some commentary on the differences between Apache CloudStack and OpenStack, two projects often viewed as competitors. (Alternate Video Link)

Bringing New Security Features To Docker

timothy posted about three weeks ago | from the password-is-stevedore dept.

Cloud 29

Czech37 writes SELinux lead Dan Walsh wrote last month that Docker "containers do not contain" and that the host system isn't completely protected. Today, Walsh details the steps that Docker, Red Hat, and the open source community are taking to make Docker more secure: "Basically, we want to put in as many security barriers to break out as possible. If a privileged process can break out of one containment tool, we want to block them with the next. With Docker, we are want to take advantage of as many security components of Linux as possible. If "Docker" isn't a familiar word, the project's website is informative; the very short version is that it's a Linux-based "open platform for developers and sysadmins to build, ship, and run distributed applications"; Wikipedia has a good explanation, too.

Microsoft Defies Court Order, Will Not Give Emails To US Government

Soulskill posted about three weeks ago | from the you-didn't-say-pretty-please dept.

Microsoft 419

schwit1 sends this excerpt from a report about Microsoft: Despite a federal court order directing Microsoft to turn overseas-held email data to federal authorities, the software giant said Friday it will continue to withhold that information as it waits for the case to wind through the appeals process. The judge has now ordered both Microsoft and federal prosecutors to advise her how to proceed by next Friday, September 5.

Let there be no doubt that Microsoft's actions in this controversial case are customer-centric. The firm isn't just standing up to the US government on moral principles. It's now defying a federal court order. "Microsoft will not be turning over the email and plans to appeal," a Microsoft statement notes. "Everyone agrees this case can and will proceed to the appeals court. This is simply about finding the appropriate procedure for that to happen."

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>