itwbennett writes "Speaking at a cloud panel discussion hosted by Reuters on Wednesday, Terry Wise, head of global partner ecosystem for Amazon Web Services, explained how the company handles government requests for data stored on Amazon's cloud: 'If a U.S. entity is serving us with a legally binding subpoena, we contact our customer and work with that customer to fight the subpoena.' But Wise's best advice to customers is to encrypt their data: 'If the data is encrypted, all we'd be handing over would be the cypher text,' he said."
gurps_npc writes "Two radical pro-Israel terrorists were caught in upstate NY when they tried to solicit money from various honorable Jewish organizations to build a truck based x-ray weapon. They intended to drive the truck around and then turn on the x-ray machine, focusing on enemies of Israel. But the Jewish organizations they tried to solicit money from refused to participate. Instead they called the FBI, who promptly set up a sting. The men were arrested before the machine was in working order."
sfcrazy writes "A top Monsanto executive has won the prestigious World Food Prize. Secretary of State John Kerry announced the award where Robert T. Fraley, the executive vice president and CTO of Monsanto, won the prize along with two other scientists from Belgium and the US. The award was given for devising a method to insert genes from another organism into plant cells, which could produce new genetic lines with highly favorable traits."
Trailrunner7 writes "After years of saying that the company didn't need a bug bounty program, Microsoft is starting one. The company today will announce the start of a new program that will pay security researchers up to $100,000 for serious vulnerabilities and as much as $50,000 for new defensive techniques that help protect against those flaws. Microsoft security officials say that the program has been a long time in development, and the factor that made this the right time to launch is the recent rise of vulnerability brokers. Up until quite recently, most of the researchers who found bugs in Microsoft products reported them directly to the company. That's no longer the case. The system that Microsoft is kicking off on June 26 will pay researchers $100,000 for a new exploit technique that is capable of bypassing the latest existing mitigations in the newest version of Windows."
malachiorion writes "Does George Lucas hate metal people? I know, sounds like standard click-bait, but I think I present a relatively troll-free argument in the piece I wrote for Slate. We stuck to the Star Wars canon, pointing out the relatively grim state of affairs for droid rights, and the lack of any real sympathy for their plight from the heroes, or, it would seem, George Lucas. C-3PO is more correct than he might realize, when the says that droids 'seem to be made to suffer.'"
Nerval's Lobster writes "Previously, developer Jeff Cogswell focused on the respective performances of C# and Java. Now he's looking at yet another aspect of the languages: the runtime libraries—what exactly the libraries are, how they are called, and what features the languages provide for calling into them. Examining the official Java API (now owned by Oracle) and the official .NET API owned by Microsoft, he finds both pretty complete and pretty much a 'tie' with regard to ease-of-use and functionality, especially since Java version 7 release 6 allows for automatic resource management. Read on and see if you agree."
MakerBot Industries, creators of the popular Thing-O-Matic and Replicator line of 3-D printers, is being acquired by Stratasys, a company that's been working on 3-D printing and production systems since 1989. '[Stratasys] facilitates the printing of prototypes, concepts, components, parts and more on an industrial scale and for commercial applications. ... Stratasys has demonstrated it’s going to be aggressive about owning the 3D printing space, and the MakerBot buy is the consumer-focused piece in that puzzle. For MakerBot, it gives the startup access to Stratasys’ wealth of industry experience.' According to the official news release, 'MakerBot will operate as a separate subsidiary of Stratasys, maintaining its own identity, products and go-to-market strategy.' MakerBot has sold 11,000 of its Replicator 2 devices in the past 9 months, accounting for half of all its 3-D printer sales since 2009.
One of the biggest criticisms of Microsoft's recently-announced Xbox One console was that it would require an internet connection once every 24 hours in order to keep playing games. Enough people complained about the DRM, and Microsoft listened. Today, they announced that they're removing the phone-home requirement. "After a one-time system set-up with a new Xbox One, you can play any disc based game without ever connecting online again. There is no 24 hour connection requirement and you can take your Xbox One anywhere you want and play your games, just like on Xbox 360." They've also scrapped the game trading and resale system they'd built, which allowed publishers to set their own rules with regard to used game sales. "There will be no limitations to using and sharing games, it will work just as it does today on Xbox 360." Unfortunately, that also means users won't be able to take advantage of the good parts of the original system, such as trading and gifting games without needing the disc, or sharing games with remote family members. "While we believe that the majority of people will play games online and access the cloud for both games and entertainment, we will give consumers the choice of both physical and digital content. We have listened and we have heard loud and clear from your feedback that you want the best of both worlds." Also noteworthy: they've dropped region-locks as well.
astroengine writes "If you were in any doubt as to Curiosity's photography prowess, this panorama of Gale Crater should allay your concerns. In this billion-pixel photo from Mars, NASA's Mars Science Laboratory snapped nearly 900 separate images that were then stitched together to create a wonderful high-definition view from the robot's mast-mounted cameras. 'It gives a sense of place and really shows off the cameras' capabilities,' said Bob Deen of the Multi-Mission Image Processing Laboratory at NASA's Jet Propulsion Laboratory, Pasadena, Calif., who assembled the scene. 'You can see the context and also zoom in to see very fine details.'"
The OIN (Open Invention Network) site's front page starts out by saying, "Open source software development has been one of the greatest sources of innovation. It has reduced costs, improved functionality and spurred new industries." After another few sentences it says, "Open Invention Network® is an intellectual property company that was formed to promote the Linux system by using patents to create a collaborative ecosystem." Go a little deeper, on the About page, and you learn that: "Patents owned by Open Invention Network® are available royalty-free to any company, institution or individual that agrees not to assert its patents against the Linux System. This enables companies to make significant corporate and capital expenditure investments in Linux — helping to fuel economic growth." Today's interviewee, Deb Nicholson, is the OIN's Community Outreach Director. We did a video interview with OIN CEO Keith Bergelt back in February. This one adds to what he had to say. And once again, we remind you: "...if you or your company is being victimized by any entity seeking to assert its patent portfolio against Linux, please contact [OIN] so that we can aid you in your battle with these dark forces." Make your first contact through Linux Defenders 911 -- and may the OIN be with you!
Contributor Tom Geller writes: "I recently wrote an article about Bitcoin and the law for Communications of the Association for Computing Machinery. In researching it I ran into plenty of wishful thinkers, ridiculous greedheads, and out-and-out nutbags promising a rosy future. I also found the expected blowback from vehement naysayers who think the best way to combat crazy is with more crazy. But despite that, I walked away believing that Bitcoin — or a decentralized cryptocurrency like it (let's call it "Coin") — is here to stay. As an interested outsider to the Coin economy, and a long-time technology commentator, here's what I think its future holds." Read on for Tom's predictions.
msm1267 writes "Business travelers who tether their iPhones as mobile hotspots beware. Researchers at the University of Erlanger-Nuremberg in Germany have discovered a weakness in the way iOS generates default passwords for such connections that can leave a user's device vulnerable to man-in-the-middle attacks, information leakage or abuse of the user's Internet connection. Andreas Kurtz, Felix Freiling and Daniel Metz published a paper (PDF) that describes the inner workings of how an attacker can exploit the PSK (pre-shared key) authentication iOS uses to establish a secure WPA2 connection when using the Apple smartphone as a hotspot. The researchers said that attackers would find the least resistance attacking the PSK setup rather than trying their hand at beating the operating system's complex programming layers."
MarkWhittington writes "Politico reports in a June 18, 2013 story that House Republicans have added a Mars base to its demands for a lunar base in the draft 2013 NASA Authorization bill. Both the Bush-era Constellation program and President Obama space plan envisioned eventual human expeditions to Mars. But if Politico is correct, the new bill will be the first time an official piece of legislation will call for permanent habitation of the Red Planet. The actual legislative language states, 'The [NASA] Administrator shall establish a program to develop a sustained human presence on the Moon and the surface of Mars.'"
An anonymous reader writes "At a hearing today before the Senate Judiciary Committee, FBI director Robert Mueller confirmed the agency is using unmanned drones for surveillance within the U.S. Senator Chuck Grassley asked, 'Does the FBI own or currently use drones and for what purpose?' Mueller replied, 'Yes, for surveillance.' Grassley then asked, 'Does the FBI use drones for surveillance on U.S. soil?' Mueller said, 'Yes, in a very, very minimal way, and seldom.' With regard to restricting the use of drones to protect citizens' privacy, Mueller said, 'It is still in nascent stages but it is worthy of debate and legislation down the road.' According to article, 'Dianne Feinstein, who is also chair of the Senate intelligence committee, said the issue of drones worried her far more than telephone and internet surveillance, which she believes are subject to sufficient legal oversight.'"
First time accepted submitter dougkfresh writes "Checkmarx's research lab identified that more than 20% of the 50 most popular WordPress plugins are vulnerable to common Web attacks, such as SQL Injection. Furthermore, a concentrated research into e-commerce plugins revealed that 7 out of the 10 most popular e-commerce plugins contain vulnerabilities. This is the first time that such a comprehensive survey was prepared to test the state of security of the leading plugins." It does seem that Wordpress continues to be a particularly perilous piece of software to run. When popularity and unsafe languages collide.
An anonymous reader writes "With the focus from Ubuntu on phones, seven carriers have signed onto their Ubuntu Carrier Advisory Group including Deutsche Telekom, Everything Everywhere, Telecom Italia, Korea Telecom, LG UPlus, Portugal Telecom, and SK Telecom. The group is designed for the carriers to let 'mobile operators shape Ubuntu's mobile strategy. Members receive advance confidential briefings and provide us with industry insight to ensure that Ubuntu meets their needs.'" Looks like Ubuntu Phone is getting serious. Mark Shuttleworth writes about their first meeting: "We mapped out our approach to the key question I’ve been asked by every carrier we’ve met so far: how can we accommodate differentiation, without fragmenting the platform for developers? We described the range of diversity we think we can support initially, received some initial feedback from carriers participating immediately, and I’m looking forward to the distilled feedback we’ll get on the topic in the next call. CAG members get a period of exclusivity in their markets."
alphadogg writes "Start-up Cumulus Networks this week has emerged with a Linux network operating system designed for programmable data centers like the ones Google and Facebook are building. The company's Cumulus Linux OS operating system includes IPv4 and IPv6 routing, plus data center and network orchestration hooks. Much like OpenFlow for independent, software-defined control of network forwarding, Cumulus Linux is intended to run on commodity network hardware and bring Open Source extensibility to high capacity data centers. The head of the company used to work for Cisco and Google." The distribution is based on Debian and ported to several router platforms. They claim to release most of their code Open Source, but there are at least a few proprietary bits for interfacing to the routing hardware itself.
An anonymous reader writes "As reported earlier on Slashdot it appeared the license covering the MySQL man pages was changed from the GPL to something less good. However, as speculated, this appears to be a bug." The build system was grabbing the wrong files, oops. The fix should be coming shortly: "Once the fixes have been made to the build system, we will rebuild the latest 5.1, 5.5, 5.6 releases plus the latest 5.7 milestone and make those available publicly asap."
judgecorp writes "BT chief Ian Livingston is leaving the British telecom provider to become a government minister. The executive has been appointed a seat in the House of Lords, which enables him to become Minister for Trade and Investment without having to be elected as a Member of the lower house of Parliament. Livingston has seen BT go from a £134 million loss in 2008 when he was appointed, to a profit of £2.5 billion in 2012. It still has a monopoly over certain sectors of the British telecom market, and has won all the contracts so far for rolling out broadband to rural areas."
Daniel_Stuckey writes with an article marking the one year anniversary of Julian Assange seeking asylum in the Ecuadorian Embassy. From the article: "Uninterested in facing U.S. justice, Assange said he's prepared to spend five years living there. If he goes out for a walk, he'll be extradited to Sweden to answer rape accusations —after which he has no promise from Sweden to deny further extradition efforts to America, where a grand jury investigation into WikiLeaks awaits. This also means that London's Metropolitan Police have been devoting their resources to keeping tabs on Assange for a year. Yesterday, a spokesperson explained the updated costs of guarding the embassy over the phone: 'From July 2012 through May 2013, the full cost has been £3.8 million ($5,963,340),' he said. '£700,000 ($1,099,560) of which are additional, or overtime costs.' Julian has a treadmill, a SAD lamp, and a connection to the Internet, through which he's been publishing small leaks and conducting interviews. The indoor lifestyle has taken its toll on Julian, and it led to his contracting a chronic lung condition last fall."
darthcamaro writes "Remember back in the day when we all used CVS? Then we moved to SVN (subversion) but in the last three yrs or so everyone and their brother seems to have moved to Git, right? Well truth is Subversion is still going strong and just released version 1.8. While Git is still faster for some things, Greg Stein, the former chair of the Apache Software Foundation, figures SVN is better than Git at lots of things. From the article: '"With Subversion, you can have a 1T repository and check out just a small portion of it, The developers don't need full copies," Stein explained. "Git shops typically have many, smaller repositories, while svn shops typically have a single repository, which eases administration, backup, etc."'" Major new features of 1.8 include switching to a new metadata storage engine by default instead of using Berkeley DB, first-class renames (instead of the CVS-era holdover of deleting and recreating with a new name) which will make merges involving renamed files saner, and a slightly simplified branch merging interface.
theodp writes "GeekWire reports that Google has patented an image-capturing walking stick, which can boldly go where no Google Street View Car can. The walking stick has embedded cameras and location sensors, and a switch at the bottom that causes the device to snap pictures whenever the stick hits the ground. The patent also covers using canes and crutches in a similar fashion."
Taco Cowboy writes "Most of the younger /. readers never heard of the PDP-11, while we geezers have to retrieve bits and pieces of our affairs with PDP-11 from the vast warehouse inside our memory lanes." From the article: "HP might have nuked OpenVMS, but its parent, PDP-11, is still spry and powering GE nuclear power-plant robots and will do for another 37 years. That's right: PDP-11 assembler programmers are hard to find, but the nuclear industry is planning on keeping them until 2050 — long enough for a couple of generations of programmers to come and go." Not sure about the OpenVMS vs PDP comparison, but it's still amusing that a PDP might outlast all of the VAX machines.
Rick Zeman writes "'Confidentiality is critical to national security.' So wrote the Justice Department in concealing the NSA's role in two wiretap cases. However, now that the NSA is under the gun, it's apparently not so critical, according to New York attorney Joshua Dratel: 'National security is about keeping illegal conduct concealed from the American public until you're forced to justify it because someone ratted you out.' The first he heard of the NSA's role in his client's case was 'when [FBI deputy director Sean] Joyce disclosed it on CSPAN to argue for the effectiveness of the NSA's spying.' Dratel challenged the legality of the spying in 2011, and asked a federal judge to order the government to produce the wiretap application the FBI gave the secretive Foreign Intelligence Surveillance Court to justify the surveillance. 'Disclosure of the FISA applications to defense counsel – who possess the requisite security clearance – is also necessary to an accurate determination of the legality of the FISA surveillance, as otherwise the defense will be completely in the dark with respect to the basis for the FISA surveillance,' wrote Dratel. According to Wired, 'The government fought the request in a 60-page reply brief (PDF), much of it redacted as classified in the public docket. The Justice Department argued that the defendants had no right to see any of the filings from the secret court, and instead the judge could review the filings alone in chambers."
curtwoodward writes "Driverless cars. Balloon-based wireless networks. Face-mounted computers. Gigabit broadband networks. In recent months, Google has been unveiling a series of transformative side projects that paint a picture of the search pioneer expanding far beyond an online advertising company. At the same time, Google has been trying to convince enterprise software buyers that it's finally, really, truly serious about competing with Microsoft for their business. Which version of Google's future should you believe?"
DeviceGuru writes "Researchers at the Biorob lab at Switzerland's École Polytechnique Fédérale de Lausanne (EPFL), have announced a cat-like robot that is claimed to be the fastest quadruped robot under 30 kilograms. The Cheetah-cub Robot, which runs real-time Xenomai Linux on an x86-based RoBoard robot control board, mimics the biomechanics of a cat to increase the speed and stability of it quadroped legs, helping it achieve speeds of 1.42m/s. The goal of the still-early-stage project is to encourage research in biomechanics, with an aim toward building faster robots for search and rescue, or ground exploration. More info is available on EPFL's Cheetah page."
An anonymous reader writes "A German computer scientist is taking a fresh look at the 46-year old Amdahl's law, which took a first look at limitations in parallel computing with respect to serial computing. The fresh look considers software development models as a way to overcome parallel computing limitations. 'DEEP keeps the code parts of a simulation that can only be parallelized up to a concurrency of p = L on a Cluster Computer equipped with fast general purpose processors. The highly parallelizable parts of the simulation are run on a massively parallel Booster-system with a concurrency of p = H, H >> L. The booster is equipped with many-core Xeon Phi processors and connected by a 3D-torus network of sub-microsecond latency based on EXTOLL technology. The DEEP system software allows to dynamically distribute the tasks to the most appropriate parts of the hardware in order to achieve highest computational efficiency.' Amdahl's law has been revisited many times, most notably by John Gustafson."
wwphx writes "According to Wired, 'German researchers have created a new DRM feature that changes the text and punctuation of an e-book ever so slightly. Called SiDiM, which Google translates to 'secure documents by individual marking,' the changes are unique to each e-book sold. These alterations serve as a digital watermark that can be used to track books that have had any other DRM layers stripped out of them before being shared online. The researchers are hoping the new DRM feature will curb digital piracy by simply making consumers paranoid that they'll be caught if they share an e-book illicitly.' I seem to recall reading about this in Tom Clancy's Patriot Games, when Jack Ryan used this technique to identify someone who was leaking secret documents. It would be so very difficult for someone to write a little program that, when stripping the DRM, randomized a couple of pieces of punctuation to break the hash that the vendor is storing along with the sales record of the individual book."