For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×
Firefox

Firefox 39 Released, Bringing Security Improvements and Social Sharing 147 147

An anonymous reader writes: Today Mozilla announced the release of Firefox 39.0, which brings an number of minor improvements to the open source browser. (Full release notes.) They've integrated Firefox Share with Firefox Hello, which means that users will be able to open video calls through links sent over social media. Internally, the browser dropped support for the insecure SSLv3 and disabled use of RC4 except where explicitly whitelisted. The SafeBrowsing malware detection now works for downloads on OS X and Linux. (Full list of security changes.) The Mac OS X version of Firefox is now running Project Silk, which makes animations and scrolling noticeably smoother. Developers now have access to the powerful Fetch API, which should provide a better interface for grabbing things over a network.
Crime

San Francisco Fiber Optic Cable Cutter Strikes Again 197 197

HughPickens.com writes: USA Today reports that the FBI is investigating at least 11 physical attacks on high-capacity Internet cables in California's San Francisco Bay Area dating back to at least July 6, 2014, including one early this week. "When it affects multiple companies and cities, it does become disturbing," says Special Agent Greg Wuthrich. "We definitely need the public's assistance." The pattern of attacks raises serious questions about the glaring vulnerability of critical Internet infrastructure, says JJ Thompson. "When it's situations that are scattered all in one geography, that raises the possibility that they are testing out capabilities, response times and impact," says Thompson. "That is a security person's nightmare."

Mark Peterson, a spokesman for Internet provider Wave Broadband, says an unspecified number of Sacramento-area customers were knocked offline by the latest attack. Peterson characterized the Tuesday attack as "coordinated" and said the company was working with Level 3 and Zayo to restore service. It's possible the vandals were dressed as telecommunications workers to avoid arousing suspicion, say FBI officials. Backup systems help cushion consumers from the worst of the attacks, meaning people may notice slower email or videos not playing, but may not have service completely disrupted. But repairs are costly and penalties are not stiff enough to deter would-be vandals. "There are flags and signs indicating to somebody who wants to do damage: This is where it is folks," says Richard Doherty. "It's a terrible social crime that affects thousands and millions of people."
Businesses

Exploring the Relationships Between Tech Skills (Visualization) 64 64

Nerval's Lobster writes: Simon Hughes, Dice's Chief Data Scientist, has put together an experimental visualization that explores how tech skills relate to one another. In the visualization, every circle or node represents a particular skill; colors designate communities that coalesce around skills. Try clicking "Java", for example, and notice how many other skills accompany it (a high-degree node, as graph theory would call it). As a popular skill, it appears to be present in many communities: Big Data, Oracle Database, System Administration, Automation/Testing, and (of course) Web and Software Development. You may or may not agree with some relationships, but keep in mind, it was all generated in an automatic way by computer code, untouched by a human. Building it started with Gephi, an open-source network analysis and visualization software package, by importing a pair-wise comma-separated list of skills and their similarity scores (as Simon describes in his article) and running a number of analyses: Force Atlas layout to draw a force-directed graph, Avg. Path Length to calculate the Betweenness Centrality that determines the size of a node, and finally Modularity to detect communities of skills (again, color-coded in the visualization). The graph was then exported as an XML graph file (GEXF) and converted to JSON format with two sets of elements: Nodes and Links. "We would love to hear your feedback and questions," Simon says.
Data Storage

Where Facebook Stores 900 Million New Photos Per Day 120 120

1sockchuck writes: Facebook faces unique storage challenges. Its users upload 900 million new images daily, most of which are only viewed for a couple of days. The social network has built specialized cold storage facilities to manage these rarely-accessed photos. Data Center Frontier goes inside this facility, providing a closer look at Facebook's newest strategy: Using thousands of Blu-Ray disks to store images, complete with a robotic retrieval system (see video demo). Others are interested as well. Sony recently acquired a Blu-Ray storage startup founded by Open Compute chairman Frank Frankovsky, which hopes to drive enterprise adoption of optical data storage.
Encryption

MIT's Bitcoin-Inspired 'Enigma' Lets Computers Mine Encrypted Data 46 46

Guy Zyskind, Oz Nathan, and the MIT Media Lab have developed a system to encrypt data in a way that it can still be shared and used without being decrypted. "To keep track of who owns what data—and where any given data’s pieces have been distributed—Enigma stores that metadata in the bitcoin blockchain, the unforgeable record of messages copied to thousands of computers to prevent counterfeit and fraud in the bitcoin economy." Enigma needs a fairly large base of users to operate securely, so its creators have proposed requiring a fee for anyone who wants data processed in this way. That fee would then be split among the users doing the processing. Those with encrypted datasets on the Enigma network could also sell access to datamining operations without letting the miners see the unencrypted data.
Security

UK Researchers Find IPv6-Related Data Leaks In 11 of 14 VPN Providers 65 65

jan_jes writes: According to researchers at Queen Mary University of London, services used by hundreds of thousands of people in the UK to protect their identity on the web are vulnerable to leaks. The study of 14 popular VPN providers found that 11 of them leaked information about the user because of a vulnerability known as 'IPv6 leakage'. The leakage occurs because network operators are increasingly deploying a new version of the protocol used to run the Internet called IPv6. The study also examined the security of various mobile platforms when using VPNs and found that they were much more secure when using Apple's iOS, but were still vulnerable to leakage when using Google's Android. Similarly Russian researchers have exposed the breakthrough U.S. spying program few months back. The VPNs they tested certainly aren't confined to the UK; thanks to an anonymous submitter, here's the list of services tested: Hide My Ass, IPVanish, Astrill, ExpressVPN, StrongVPN, PureVPN, TorGuard, AirVPN, PrivateInternetAccess, VyprVPN, Tunnelbear, proXPN, Mullvad, and Hotspot Shield Elite.
Communications

European Government Agrees On Net Neutrality Rules, With Exemptions 37 37

An anonymous reader writes: The European Union's three main legislative bodies, the European Council, the European Parliment, and the European Commision, have reached an agreement on "Open Internet" rules that establish principles similar to Net Neutrality in the EU. The rules require that all internet traffic and users be treated equally, forbidding paid-for prioritisation of traffic. However, exemptions are permitted for particular "specialised services" where the service is not possible under the open network's normal conditions, provided that the customer using the service pays for the privilege. (The examples given are IPTV, teleconferencing, and telepresence surgery.) Zero-rating — exempting particular data from traffic caps — is also permitted, but will be subject to oversight. Notably, this means (if all goes as promised) the elimination of cellphone roaming fees within the EU; however, that's been promised and delayed before.
Google

New Study Accuses Google of Anti-competitive Search Behavior 133 133

An anonymous reader writes: Columbia Law School professor Tim Wu — the man who coined the term "network neutrality" — has published a new study suggesting that Google's new method of putting answers to simple search queries at the top of the results page is anticompetitive and harmful to consumers. For subjective search queries — e.g. "What's the best [profession] in [city]?" — Google frequently figures out a best-guess answer to display first, favoring its own results to do so. The study did some A/B testing with a group of 2,690 internet users and found they were 45% more likely to click on merit-based results than on Google's listings. Wu writes, "Search engines are widely understood as key mediators of the web's speech environment, given that they have a powerful impact on who gets heard, what speech is neglected, and what information generally is reached. ... The more that Google directs users to its own content and its own properties, the more that speakers who write reviews, blogs and other materials become invisible to their desired audiences."
Networking

Scientists Overcome One of the Biggest Limits In Fiber Optic Networks 62 62

Mark.JUK writes: Researchers at the University of California in San Diego have demonstrated a way of boosting transmissions over long distance fiber optic cables and removing crosstalk interference, which would mean no more need for expensive electronic regenerators (repeaters) to keep the signal stable. The result could be faster and cheaper networks, especially on long-distance international subsea cables. The feat was achieved by employing a frequency comb, which acts a bit like a concert conductor; the person responsible for tuning multiple instruments in an orchestra to the same pitch at the beginning of a concert. The comb was used to synchronize the frequency variations of the different streams of optical information (optical carriers) and thus compensate in advance for the crosstalk interference, which could also then be removed.

As a result the team were able to boost the power of their transmission some 20 fold and push data over a "record-breaking" 12,000km (7,400 miles) long fiber optic cable. The data was still intact at the other end and all of this was achieved without using repeaters and by only needing standard amplifiers.
The Internet

Charter Hires Net Neutrality Activist To Make Policy 70 70

An anonymous reader writes: The Federal Communications Commission has been at loggerheads with many ISPs lately, after the agency pushed through net neutrality rules that have now gone into effect. The defeat of Comcast's attempted acquisition of Time Warner Cable was hailed by many net neutrality activists as a victory, but then came the news that Charter was looking to buy TWC instead — which brought the worries back. But now Charter has taken the unusual step of hiring one of those activists to help develop its policy: Marvin Ammori. He says, "Charter hired me—which, to be honest, took some humility on its part since I have helped lead public campaigns against cable companies like Charter—to advise it in crafting its commitment to network neutrality. After our negotiation, I can say Charter is offering the strongest network neutrality commitments ever offered—in any merger or, to my knowledge, in any nation. In fact, in the end, I personally wrote the commitments." Put briefly, Charter agreed to abide by the interconnection mandates and prohibition of paid prioritization — regardless of the outcome of pending litigation from the ISPs fighting it — for a minimum of three years. The company has also promised no data caps and no usage-based billing.
Software

Ask Slashdot: User-Friendly, Version-Preserving File Sharing For Linux? 210 210

petherfile writes: I've been a professional with Microsoft stuff for more than 10 years and I'm a bit sick of it to be honest. The one that's got me stuck is really not where I expected it to be. You can use a combination of DFS and VSS to create a file share where users can put whatever files they are working on that is both redundant and has "previous versions" of files they can recover. That is, users have a highly available network location where they can "go back" to how their file was an hour ago. How do you do that with Linux?

This is a highly desirable situation for users. I know there are nice document management things out there that make sharepoint look silly, but I just want a simple file share, not a document management utility. I've found versioning file systems for Linux that do what Microsoft does with VSS so much better (for having previous version of files available.) I've found distributed file systems for Linux that make DFS look like a bad joke. Unfortunately, they seem to be mutually exclusive. Is there something simple I have missed?
Networking

Huawei, Proximus Demo 1Tb/sec Optical Network Transmission 40 40

Amanda Parker writes: Proximus and Huawei have demonstrated speeds of 1 Terabit per second (Tbps) in an optical trial. The speed, which equates to the transmission of 33 HD films in a second, is the first outcome of the partnership between the two companies which was formed in January. The trial was conducted over a 1,040 kilometre fibre link using an advanced 'Flexgrid' infrastructure with Huawei's Optical Switch Node OSN 9800 platform.
Space

OneWeb Secures "Largest Ever" Rocket Acquisition For Satellite Internet Launch 45 45

Mickeycaskill writes: Virgin, Airbus and Qualcomm-backed satellite Internet venture OneWeb has acquired 65 rockets and $500 million in funding to launch its satellites by 2019. OneWeb has partnered with Airbus to produce 900 microsatellites which will provide "affordable", fast, low-latency Internet to remote parts of the world and to ships, planes and oil rigs. It has also been suggested the network will be a cheaper way for mobile operators to expand coverage in rural areas. Other partners include Bharti Enterprises, Hughes Network Systems, Intelsat, Coca-Cola and Totalplay, all of whom have committed financial, technical or manufacturing support to the project.
Wireless Networking

WiFi Offloading is Skyrocketing 152 152

dkatana writes: WiFi Offloading is skyrocketing. This is the conclusion of a new report from Juniper Research, which points out that the amount of smartphone and tablet data traffic on WiFi networks will will increase to more than 115,000 petabytes by 2019, compared to under 30,000 petabytes this year, representing almost a four-fold increase. Most of this data is offloaded to consumer's WiFi by the carriers, offering the possibility to share your home internet connection in exchange for "free" hotspots. But this article on InformationWeek Network Computing also warns that "The capacity of the 2.4GHz band is reaching its limit. [...] the growing number of WiFi devices using unlicensed bands is seriously affecting network efficiency. Capacity is compromised by the number of simultaneously active devices, with transmission speeds dropping as much as 20% of the nominal value. With the number of IoT and M2M applications using WiFi continuously rising, that could become a serious problem soon."
Programming

Ask Slashdot: Is C++ the Right Tool For This Project? 296 296

ranton writes: I am about to start a personal project which I believe should be done in C/C++. The main reasons I have for this are the needs to manage memory usage and disk access at a very granular level and a desire to be cross-platform. Performance is also important but I am unlikely to spend enough time optimizing to be much faster than core libraries of higher level languages.

On the other hand, network access is also a critical part of the project and I am worried about the effort it takes to make cross platform code for both network and disk access. I have been working in the Java / C# world for the past decade and things like TCP/IP and SSL have just been done for me by core libraries. Do libraries like Boost or Asio do a good job of abstracting these aspects away? Or are there other options for doing granular memory and disk management with more high level languages that have better cross-platform library support? I am willing to brush up on my C/C++ skills if necessary but want to spend as much time as possible developing the unique and potentially innovative parts of my project. Thanks for any advice you can provide.
The Internet

Study: Major ISPs Slowing Traffic Across the US 181 181

An anonymous reader writes: A study based on test results from 300,000 internet users "found significant degradations on the networks of the five largest internet service providers" in the United States. This group includes Time Warner Cable, Verizon, and AT&T. "The study, supported by the technologists at Open Technology Institute's M-Lab, examines the comparative speeds of Content Delivery Networks (CDNs), which shoulder some of the data load for popular websites. ... In Atlanta, for example, Comcast provided hourly median download speeds over a CDN called GTT of 21.4 megabits per second at 7pm throughout the month of May. AT&T provided speeds over the same network of of a megabit per second." These findings arrive shortly after the FCC's new net neutrality rules took effect across the U.S.
Android

IT Pros Blast Google Over Android's Refusal To Play Nice With IPv6 287 287

alphadogg writes: The widespread popularity of Android devices and the general move to IPv6 has put some businesses in a tough position, thanks to Android's lack of support for a central component in the newer standard. DHCPv6 is an outgrowth of the DHCP protocol used in the older IPv4 standard – it's an acronym for 'dynamic host configuration protocol,' and is a key building block of network management. Nevertheless, Google's wildly popular Android devices – which accounted for 78% of all smartphones shipped worldwide in the first quarter of this year – don't support DHCPv6 for address assignment.
Encryption

Two Years After Snowden Leaks, Encryption Tools Are Gaining Users 69 69

Patrick O'Neill writes: It's not just DuckDuckGo — since the first Snowden articles were published in June 2013, the global public has increasingly adopted privacy tools that use technology like strong encryption to protect themselves from eavesdroppers as they surf the Web and use their phones. The Tor network has doubled in size, Tails has tripled in users, PGP has double the daily adoption rate, Off The Record messaging is more popular than ever before, and SecureDrop is used in some of the world's top newsrooms.