Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - Blue Waters Supercomputing Data Center Unveiled (datacenterknowledge.com)

1sockchuck writes: The Blue Waters Supercomputer was unveiled Wednesday at the University of Illinois, along with the new energy-efficient data center that will house it. Blue Waters, which will become operational in 2011, contains more than 300,000 cores, a petabyte of memory, 10 petabytes of storage, and half an exabyte of archive storage. The National Petascale Computing Facility features a six-foot raised floor to house over 81 miles of cabling. An interesting wrinkle: the facility will operate without generators or UPS systems.
Canada

Submission + - Canada's copyright debate turns ugly (www.cbc.ca)

Saint Aardvark writes: As reported by the CBC, the debate in Canada over the new copyright bill hit a new low. Minister of Heritage James Moore decried opponents of the bill as "radical extremists", with a "babyish" approach to copyright. As Professor Michael Geist points out, these "radical extremists" include a laundry list of educators, politicians and business leaders. The minister initially denied making any such remarks...until video surfaced showing the speech. Said one critic, "He has morphed from a personable, PR-savvy techno-nerd minister to a young Richard Nixon [with an enemies list]". As if that wasn't enough, Cory Doctorow waded into the debate with an article outlining his objections as a Canadian author, and a debate over Twitter with the minister himself. The thinly-veiled attack on Geist may backfire, though: "voters may ask if the bill's proponents are engaging in character assassination rather than rational policy debate because the proponents' actual arguments aren't that convincing."
Google

Submission + - Why the Disclosure Debate Doesn't Matter (threatpost.com)

Trailrunner7 writes: In recent discussions I've had with both attackers and the folks on enterprise security staffs who are charged with stopping them, the common theme that emerged was this: Even if every vulnerability was "responsibly" disclosed from here on out, attackers would still be owning enterprises and consumers at will. A determined attacker (whatever that term means to you) doesn't need an 0-day and a two-week window of exposure before a patch is ready to get into a target network. All he needs is one weak spot. A six-year-old flaw in Internet Explorer or a careless employee using an open Wi-Fi hotspot is just as good as a brand-spanking-new hole in an Oracle database.

Case in point: A researcher told me recently about a security assessment he was doing for a very large customer, whose network had undergone somewhere close to 1,000 such tests in recent years. Top-to-bottom penetration tests that looked for any weakness, any soft spot that could provide a way in. The researcher was having no luck with his usual exploits, but he eventually noticed a weakness in the way that the company's employee log-in page was protected. It turned out that the CAPTCHA system used to prevent automated log-in attempts had a small enough range of potential solutions that he was able to write a tool to get by the CAPTCHA. And that was that; he was inside the network and had complete access. Game over.

No disclosure policy in the world is going to prevent that from happening.

Comment OSS not the real reason (Score 5, Informative) 315

From TFA:

"When sold or distributed to End Users, the Integrated Product shall not [...] (c) incorporate any Publically Available Software, in whole or in part, in a manner that may subject SHOUTcast Radio or the SHOUTcast Radio Materials, in whole or in part, to all or part of the license obligations of any Publically Available Software. As used herein, the term "Publicly Available Software" means any software that contains, or is derived in any manner (in whole or in part) from, any software that is distributed as free software, open source software or similar licensing or distribution models; and that requires as a condition of use, modification or distribution that such software or other software incorporated into, derived from or distributed with such software: (1) be disclosed or distributed in source code form; (2) be licensed for the purpose of making derivative works; or (3) be redistributable at no charge." (Emphasis mine)

This is a standard provision that is part of any license agreement for commercial software, and all it says is that you can't distribute the software in a way that makes it subject to the GFDL or some other Free license.

I'm not sure what the real reason is, but the OSS provision isn't it.

Comment We'll know it's pretty good when it's outlawed (Score 4, Interesting) 150

We'll know it's at least OK if the FBI and CIA start lobbying congress to outlaw it.

We'll know it's pretty good if the NSA starts lobbying congress to outlaw it.

The government is absolutely convinced that law enforcement will come to a screeching halt if people can communicate casually without being subject to eavesdropping. This despite the courts' general distaste for such evidence (people rarely speak candidly in phone conversations regarding criminal enterprises and therefore establishing context and the meaning of codewords becomes a prosecutorial hurdle), and the paucity of successful prosecutions built primarily on the strength of intercepts.

So we've had cryptography treated as a munition. And clipper. And CALEA.

Of course, if the keys are on a server somewhere they can always just subpoena them.

Privacy

Submission + - FTC Targets Copy Machine Privacy Concerns (itworld.com)

itwbennett writes: Forget Facebook and Google, you needn't look any further than your copy machine for privacy invasion. In a letter to U.S.Representative Ed Markey, FTC Chairman Jon Leibowitz said that the FTC has begun contacting copy machine makers, resellers and office-supply stores to inform them about privacy concerns over the images that can be stored on the machines' hard drives and trying to 'determine whether they are warning their customers about these risks ... and whether manufacturers and resellers are providing options for secure copying.'

Submission + - RIP newzbin.com (wordpress.com)

Rantastic writes: NewzBin is no more, leaving behind only the message "Regrettably the Newzbin website has to close as a result of the legal action against us." and a link to a blog post which speculates that they simply could not afford to go on in the face of the legal judgements against them, "Word is that they owe they MPA £230,000 just in interim costs, and that’s without a full costs ruling or a decision on damages. Apparently they also owe a software development house over £500k."

For those unfamiliar with the site, NewzBin was a British Usenet indexing website notable for its introduction of new technologies and search techniques that aid users by facilitating access to content on Usenet. Most notably, creation of the NZB format.

Space

Submission + - Air Force to Develop Autonomous, Reusable Rockets (discovery.com)

astroengine writes: "The U.S. Air Force has a vision of the future that includes rockets that are not only reusable, but also able to fly back to Earth and land autonomously on a runway. Currently, rocket boosters are expensive and wasteful, but the Air Force is asking for advanced concepts that could slash launch costs by 50%. The Air Force expects to award up to three $1.5-million contracts for studies then select one team for a $28.5-million contract to build the prototype. An industry briefing on the project met last week."

Submission + - Apple store refuses payment by cash 1

linuxwrangler writes: Diane Campbell, who is disabled, on a fixed income, and has no credit-cards saved enough to buy an iPad. But when she took her cash to the local Apple store they refused to sell one to her. It turns out that Apple policies prohibit cash purchases of iPads. Even the involvement of the media consumer advocates hasn't swayed Apple.

Comment Re:from the cry-them-a-river dept. (Score 5, Insightful) 383

I think most Slashdotters will agree that the Service is well within their rights to perform forensic analysis on any device that they obtain during a lawful search, whether conducted under a warrant, incidental to an arrest, or based on probable cause. I do not believe that the Service suffers a poor track record regarding extralegal searches as does INS and some other agencies.

On the other hand, the availability of an effective "remote wipe" of a personal device is a rightful means of exercising freedom.

It's about balance.

Comment Re:Hm (Score 1) 383

Although most of them aren't scientists or engineers, they're smarter than your average bear. Nearly all have four-year degrees, in addition to their law-enforcement training.

Don't conflate them with the donut-eating locals whose eyes glaze over when you try to explain the Doppler effect and what it has to do with their radar.

Submission + - Indie studios propose the Humble Bundle

ProfMobius writes: Ars Technica has an article on a promotion from a group of indie game studios.

A group of indie developers are selling a package of their games which includes some of the biggest independent games on the market. Gamers can name their own price from 1 to $1,000 for a pack of games that would go for around $80 if sold separately. Anyone who buys the package can feel better about themselves as well; customers can send any amount of their purchases to two major nonprofit groups.

The games are World of Goo, Gish, Lugaru, Aquaria, and Penumbra Overture. The two organisations are the EFF and Child's play. On the website of the offer, it is possible to chose how to split the cake to each group (between the devs, the EFF and Child's play).

Apple

Submission + - Apple May Rewrite iPhone OS Developer Agreement

An anonymous reader writes: Apple may rewrite the language contained in its developer agreement to avoid a potential government inquiry into its practices. Yesterday, The New York Post reported that either the Federal Trade Commission, the Department of Justice, or both, were considering opening an inquiry into Apple's iPhone OS 4 development restrictions, which prevent third-party APIs (like Adobe's Flash) from being called. Apple has also barred developers from using cross-platform development tools to create, for example, apps for Android and Flash as well as the iPhone OS. However reports are starting to surface that Apple might adjust its language to avoid an inquiry.

Comment Re:Thoughtcrime (Score 2, Insightful) 430

Which is exactly what judges and parole officers do today using guesswork and Kentucky windage. I think it's hard to maintain that making that process more objective and automated is a bad thing.

Of course, there's potential for abuse through its misapplication to other areas.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...