sfcrazy writes "Apart from being involved in open source through software, Google promotes the open source model through its various media channels and participation in open source events across the globe. One such initiative has been their affiliation with the Open Invention Network patent pool (OIN). 'Linux now powers nearly all the world's supercomputers, runs the International Space Station, and forms the core of Android. But as open source has proliferated, so have the threats against it, particularly using patents. That's why we're expanding our participation in Open Invention Network, becoming the organization's first new full board member since 2007."
Become a fan of Slashdot on Facebook
Meshach writes "The FBI has caught the student who called in a bomb threat at Harvard University on December 16. The student used a temporary anonymous email account routed through Tor, but the FBI was able to trace it (PDF) because it originated from the Harvard wireless network. He could face as long as five years in prison, three years of supervised release and a $250,000 fine if convicted. He made the threat to get out of an exam."
Hugh Pickens DOT Com writes "The Washington Post reports that in Germany, Amazon's second-biggest market behind the United States, hundreds of Amazon.com workers went on strike just as pre-Christmas sales were set to peak, in a dispute over pay and conditions that has raged for months. Amazon, which employs 9,000 warehouse staff members in Germany plus 14,000 seasonal workers at nine distribution centers, says that 1,115 employees joined the strike at three sites. 'Amazon must realize it cannot export its anti-union labor model to European shores. We call on the company to come to the table and sign a global agreement that guarantees the rights of workers,' says Philip Jennings of the global trade union UNI. Verdi organized several short stoppages this year to try to force Amazon to accept collective-bargaining agreements ... The union says Amazon workers receive lower wages than others in retail and mail-order jobs and that other retailers pay overtime, but Amazon does not. 'What Amazon is doing is taking this American race-to-the-bottom roadshow to Germany and trying it out on our German brothers and sisters,' says David Freiboth. Amazon has defended its wage policies, saying that employees earn toward the upper end of the pay scale of logistics companies in Germany. Amazon also says it prefers to address employment issues with worker councils at individual sites rather than through negotiations with the union. Amazon says that there have been no delays to deliveries ... adding that Amazon uses its whole European logistics network during the Christmas period to ensure delivery times. A delegation of German workers was set to rally at Amazon's headquarters in Seattle along with U.S. unions. 'We're standing in solidarity with them. We are asking that Amazon respect the union there in Germany and negotiate in a way that is acceptable to Verdi,' says Kathy Cummings of the Washington State Labor Council, AFL-CIO, which was also attending the protest in Seattle."
alphadogg writes "Engineers are putting the final touches on a network capable of handling up to 54Tbps of traffic when the Winter Olympics opens on Feb. 7 in the Russian city of Sochi. The two locations where the Olympics will take place — the Olympic village in Sochi and a tight cluster of Alpine venues in the nearby Krasnaya Polyana Mountains — are completely new construction, so this project represents a greenfield environment for Avaya, the company heading up the project. In addition to investing in a telecom infrastructure, Russia is spending billions of dollars to upgrade Sochi's electric power grid, its transportation system and even its sewage treatment facilities."
An anonymous reader writes "Bitcoin creator Satoshi Nakamoto could be a group from Europe which has a strong footing in the financial sector. From the article: 'Josh Zerlan, the Chief Operating Officer of Butterfly Labs and a person familiar with the Bitcoin network, has said it is highly likely that Nakamoto could be a group of people working the financial sector. Speaking to IBTimes UK on the sidelines of a Global Bitcoin Conference in Bangalore, India, Zerlan said: "One of the prevailing theories, I think has credibility, is that it was some group of people from financial sector that created this. They released it and stepped back and let it go. So, Satoshi Nakamoto is a group of people, I think, is a reasonable possibility."'"
First time accepted submitter ClarkSchultz writes "Harris Interactive confirms that consumers streaming video content prefer the practice of binge viewing.The news isn't a big shocker to streaming concerns such as Netflix, Amazon, and Redbox Instant which have been mining viewer habits data, but it has an important read-through for broadcasters like CBS, NBC, Fox, and ABC. Though ad rates could fall if more viewers wait until series are available for streaming, the payoffs for quality content are proving lush: 1) CBS says it paid $700K per episode for streaming rights to Under the Dome 2) AMC Networks has pointed to Netflix as contributing to the success of Breaking Bad after initial ratings were soft. If streaming wins, who loses? Front and center is the Pay-TV industry. A wave of merger rumors (Charter/Cox/Time Warner Cable/Comcast/Dish Network) indicates the industry knows the trend of subscriber losses to the cord-cutting phenomenon will continue. An online TV initiative from a tech heavyweight like Sony, Apple, Google, or Intel could also disrupt the industry enough to put cable and satellite companies into an even bigger tailspin."
An anonymous reader writes "This week CBS New's 60 Minutes program had a broadcast segment devoted to the NSA, and additional online features. It revealed that the first secret Snowden stole was the test and answers for a technical examination to get a job at NSA. When working at home, Snowden covered his head and screen with a hood so that his girlfriend couldn't see what he was doing. NSA considered the possibility that Snowden left malicious software behind and removed every computer and cable that Snowden had access to from its classified network, costing tens of millions of dollars. Snowden took approximately 1.7 million classified documents. Snowden never approached any of multiple Inspectors General, supervisors, or Congressional oversight committee members about his concerns. Snowden's activity caught the notice of other System Administrators. There were also other interesting details, such as the NSA has a highly competitive intern program for High School students that are given a Top Secret clearance and a chance to break codes that have resisted the efforts of NSA's analysts — some succeed. The NSA is only targeting the communications, as opposed to metadata, of less than 60 Americans. Targeting the actual communications of Americans, rather than metadata, requires a probable cause finding and a specific court order. NSA analysts working with metadata don't have access to the name, and can't listen to the call. The NSA's work is driven by requests for information by other parts of the government, and there are about 31,000 requests. Snowden apparently managed to steal a copy of that document, the 'crown jewels' of the intelligence world. With that information, foreign nations would know what the US does and doesn't know, and how to exploit it."
Freshly Exhumed writes "With the onslaught of graphene experimentation, especially in computing and RF, news from IEEE Spectrum comes that researchers at Georgia Tech have computer-modeled nanoantennas made from graphene that could provide wireless network communications between nanoscopic devices. "We are exploiting the peculiar propagation of electrons in graphene to make a very small antenna that can radiate at much lower frequencies than classical metallic antennas of the same size," said Ian Akyildiz, a professor at the Georgia Institute of Technology, in a press release. "We believe that this is just the beginning of a new networking and communications paradigm based on the use of graphene.""
China's Chang'e 3 moon probe made its intended landing earlier today, setting down softly in the moon's Sinus Iridum, as reported by Reuters. From the article: "The Chang'e 3, a probe named after a lunar goddess in traditional Chinese mythology, is carrying the solar-powered Yutu, or Jade Rabbit buggy, which will dig and conduct geological surveys. ... China Central Television (CCTV) broadcast images of the probe's location on Saturday and a computer generated image of the probe on the surface of the moon on its website. The probe and the rover are expected to photograph each other tomorrow. ... The Bay of Rainbows was selected because it has yet to be studied, has ample sunlight and is convenient for remote communications with Earth, Xinhua said. The rover will be remotely controlled by Chinese control centers with support from a network of tracking and transmission stations around the world operated by the European Space Agency (ESA)."
Daniel_Stuckey writes "Earlier this year, it was London. Most recently, it was a university in Germany. Wherever it is, [artist Aram] Bartholl is opening up his eight white, plainly printed binders full of the 4.7 million user passwords that were pilfered from the social network and made public by a hacker last year. He brings the books to his exhibits, called 'Forgot Your Password,' where you're free to see if he's got your data—and whether anyone else who wanders through is entirely capable of logging onto your account and making Connections with unsavory people. In fact, Bartholl insists: "These eight volumes contain 4.7 million LinkedIn clear text user passwords printed in alphabetical order," the description of his project reads. "Visitors are invited to look up their own password.""
An anonymous reader writes "'Snooping on the Internet is tricky. The network is diffuse, global, and packed with potential targets. There's no central system for identifying or locating individuals, so it's hard to keep track of who is online and what they're up to. What's a spy agency to do?' In a Slate op-ed, Ed Felten explains how consumer tracking makes the NSA's job much easier. Felten was the first-ever Chief Technologist at the Federal Trade Commission, serving as the agency's lead technical expert on privacy issues. Now back in academia, he argues that the NSA gets a 'free ride on the private sector,' from distinguishing users, to pinpointing geolocation, to slurping up network traffic."
RobHart writes "Following election promises to create a 'better, cheaper, sooner' National Broadband Network (NBN), the new Australian government has reneged, announcing instead the NBN will cost $12bn more and take four years longer. The critical change is that the new network is based on Telstra's aging and unreliable copper network rather than fiber to the home, as has already been delivered during the NBN roll out to date."
First time accepted submitter Austrian Anarchy writes with this story via Reason (and based on a report at Wired) about a maker of physical Bitcoin tokens. Quoting from Reason's take: "Mike Caldwell ran a business called Casascius that printed physical tokens with a bitcoin digital key on it, key hidden behind a tamper proof strip. He'd charge $50 worth of bitcoin to print a bitcoin key you sent him via computer on this token. Cool stuff--a good friend of mine found one sitting unnoticed in her tip jar from an event at which she sold her artisan lamps from 2011 and was naturally delighted given the nearly 1000x increase in value of a bitcoin since then. So, you're making something fun, useful, interesting, harmless--naturally the federal government is very concerned and wants to hobble you. 'Just before Thanksgiving, [Caldwell] received a letter from the Financial Crimes Enforcement Network, or FINCEN, the arm of the Treasury Department that dictates how the nation’s anti-money-laundering and financial crime regulations are interpreted. According to FINCEN, Caldwell needs to rethink his business. "They considered my activity to be money transmitting," Caldwell says. And if you want to transmit money, you must first jump through a lot of state and federal regulatory hoops Caldwell hasn't jumped through.'"
Frequent contributor Bennett Haselton writes: "Google has fixed a vulnerability, first discovered by researcher Gergely Kalman, which let users search for credit card numbers by using hex number ranges. However, Google should have acknowledged or at least responded to the original bug finder (and possibly even paid him a bounty for it), and should have been more transparent about the process in general." Read on for the rest of the story.
Lemeowski writes "Honeybees are disappearing at an alarming rate, with a third of U.S. honeybees vanishing last year. Since bees pollinate many fruits and vegetables, the disappearance of honeybees could cause the United States to lose $15 billion worth of crops, and even change the American diet. The honey bee disappearance is called Colony Collapse Disorder, a serious problem of bees abruptly leaving their hives. A new open source effort called the Open Source Beehives project hopes to help by creating "a mesh network of data-generating honey bee colonies for local, national, and international study of the causes and effects of Colony Collapse Disorder." Collaborators have created two beehive designs that can be downloaded for free and milled using a CNC machine, then filled with sensors to track bee colony health."
AcidPenguin9873 writes "Earlier this year, Google announced that it would build its next fiber network in Austin, TX. Construction is slated to start in 2014, but there's a hitch: AT&T owns 20% of the utility poles in Austin. The City of Austin is considering a rules change that would allow Google to pay AT&T to use its utility poles, but AT&T isn't happy about it. The debate appears to hinge on a technicality that specifies what types of companies can attach to the utility poles that AT&T owns. From the news story: 'Google 'would be happy to pay for access (to utility poles) at reasonable rates, just as we did in our initial buildout in Kansas City,' she said, referring to Google Fiber's pilot project in Kansas City...Tracy King, AT&T's vice president for public affairs, said in a written statement that Google "appears to be demanding concessions never provided any other entity before. ... Google has the right to attach to our poles, under federal law, as long as it qualifies as a telecom or cable provider, as they themselves acknowledge. We will work with Google when they become qualified, as we do with all such qualified providers," she said.'"
New submitter fierman writes "In a work to be presented at the Network and Distributed System Security Symposium (ISOC NDSS'14), INRIA researchers show the privacy risks of Real-Time Bidding (PDF) and High-Frequency Trading for selling advertisement spaces. Combining Real-Time Bidding and Cookie Matching, advertisers can significantly improve their tracking and profiling capabilities. Both technologies are already prevalent on the Web. The research discusses the value of users' private data (browsing history) retrieved directly from the advertisers, leveraging an exposed information leak in RTB systems. Advertisers will pay about $0.0005 to display a targeted ad to a single user, while at the same time acquiring information about them. The research also shows evidence of price variation with users' profiles, physical location, time of day and content of visited sites."
Velcroman1 writes "Banking giant JPMorgan Chase has filed a patent application for an electronic commerce system that sounds remarkably like Bitcoin — but never mentions the controversial, Internet-only currency. The patent application was filed in early August but made publicly available only at the end of November; it describes a 'method and system for processing Internet payments using the electronic funds transfer network.' The system would allow people to pay bills anonymously over the Internet through an electronic transfer of funds — just like Bitcoin. It would allow for micropayments without processing fees — just like bitcoin. And it could kill off wire transfers through companies like Western Union — just like Bitcoin. There are 18,126 words in the patent application. 'Bitcoin' is not one of them."
mask.of.sanity writes "Google has revealed details on its Beyond Corp project to scrap the notion of a corporate network and move to a zero-trust model. The company perhaps unsurprisingly considers the traditional notion of perimeter defense and its respective gadgetry as a dead duck, and has moved to authenticate and authorize its 42,000 staff so they can access Google HQ from anywhere (video). Google also revealed it was perhaps the biggest Apple shop in the world, with 43,000 devices deployed and staff only allowed to use Windows with a supporting business case."
An anonymous reader writes "There is a lot of advice about backing up data, but it seems to boil down to distributing it to several places (other local or network drives, off-site drives, in the cloud, etc.). We have hundreds of thousands of family pictures and videos we're trying to save using this advice. But in some sparse searching of our archives, we're seeing bitrot destroying our memories. With the quantity of data (~2 TB at present), it's not really practical for us to examine every one of these periodically so we can manually restore them from a different copy. We'd love it if the filesystem could detect this and try correcting first, and if it couldn't correct the problem, it could trigger the restoration. But that only seems to be an option for RAID type systems, where the drives are colocated. Is there a combination of tools that can automatically detect these failures and restore the data from other remote copies without us having to manually examine each image/video and restore them by hand? (It might also be reasonable to ask for the ability to detect a backup drive with enough errors that it needs replacing altogether.)"