Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - UK Firm Promises Cash From Your Batteries (datacenterdynamics.com)

judgecorp writes: Upside Energy of the UK promises you can get money from the battery power of your UPS (uninterruptible power supply). The National Grid suffers huge peaks, during which times old, expensive and polluting power stations have to be switched on. The Grid already offers a financial incentive for large organisations to use less power during these times; smaller firms have a UPS that can power the company for about 15 minutes. Run on the UPS during peak power load times, and the utility will pay you — and you test your UPS at the same time. Upside promises software which will manage the process, including claiming rebates from the electricity companies for going off-grid for short periods..
Space

How Do We Know the Timeline of the Universe? 153

StartsWithABang writes The history of the Universe happened in a well-known order: inflation ends, matter wins out over antimatter, the electroweak symmetry breaks, antimatter annihilates away, atomic nuclei form, then neutral atoms, stars, galaxies, and eventually us. But scientists and science magazines often publish timelines of the Universe with incredibly precise times describing when these various events occur. Here's how we arrive at those values, along with the rarely-publicized uncertainties.

Submission + - Google Explains Why WebView Vulnerability Will Go Unpatched On Android 4.3 (hothardware.com)

MojoKid writes: If you're running Android 4.3 or earlier, you're pretty much out of luck when it comes to a baked-in defense against a WebView vulnerability that was discovered earlier this month by security analyst Tod Beardsley. The vulnerability leaves millions of users open to attack from hackers that choose to exploit the security hole. WebView is a core component of the Android operating system that renders web pages. The good news is that the version of WebView included in Android 4.4 KitKat and Android 5.0 Lollipop is based on Chromium and is not affected by the vulnerability. The bad news is that those running Android 4.3 and earlier are wide open, which means that 60 percent of Android users (or nearly one billion customers) are affected. What's most interesting is that Google has no trouble tossing grenades at the feet of Microsoft and Apple courtesy of its Project Zero program, but doesn't seem to have the resources to fix a vulnerability that affects a substantial portion of the Android user base.
Google

Google Handed To FBI 3 Wikileaks Staffers' Emails, Digital Data 197

Ariastis writes Google took almost three years to disclose to the open information group WikiLeaks that it had handed over emails and other digital data belonging to three of its staffers to the FBI under a secret search warrant issued by a federal judge. WikiLeaks were told last month of warrants which were served in March 2012. The subjects of the warrants were the investigations editor of WikiLeaks, the British citizen Sarah Harrison; the spokesperson for the organisation, Kristinn Hrafnsson; and Joseph Farrell, one of its senior editors. When it notified the WikiLeaks employees last month, Google said it had been unable to say anything about the warrants earlier as a gag order had been imposed.

Submission + - Google gave FBI emails and digital data belonging to three wikileaks staffers (theguardian.com)

Ariastis writes: Google took almost three years to disclose to the open information group WikiLeaks that it had handed over emails and other digital data belonging to three of its staffers to the FBI under a secret search warrant issued by a federal judge. WikiLeaks were told last month of warrants which were served in March 2012. The subjects of the warrants were the investigations editor of WikiLeaks, the British citizen Sarah Harrison; the spokesperson for the organisation, Kristinn Hrafnsson; and Joseph Farrell, one of its senior editors. When it notified the WikiLeaks employees last month, Google said it had been unable to say anything about the warrants earlier as a gag order had been imposed.
Crime

Anonymous Asks Activists To Fight Pedophiles In 'Operation Deatheaters' 413

HughPickens.com writes The Independent reports that hacktivist group Anonymous, in a project named Operation DeathEaters, is calling for help in its fight against international pedophile networks, or what it calls the "paedosadist industry" and has issued a video instructing activists on how they can aid in the operation. The Anonymous project is intended to break what it says is a conspiracy of silence among sympathetic politicians, police and mainstream media to downplay the full extent of the online child sex industry. "The premise behind OpDeathEaters is to expose high level complicity, obstruction of justice and cover-up in the paedo-sadist industry in order to show the need for independent inquiries," says Heather Marsh, an online activist who is helping to co-ordinate the operation and describes herself as an "old friend" of Anonymous. The Anonymous database, which will be hosted on the GitHub online repository, promises to collate cases from all around the world, cross-referencing connections within sub-groups including the police, armed forces, schoolteachers, politicians, media, academics and religious organisations. The database's ultimate purpose has yet to be fully determined, but in the first instance the group says it wants to shut down the child-sex industry by "dismantling the power structure which held it there" and by "educating to create a cultural change".

The group is calling on volunteers to help with the ongoing work, which has been divided into three steps. The first is about collecting "all the factual information," second is to "share that information as widely as possible," and the third step is "to set up an independent, internationally linked, inquiry into all the areas which do not appear to have been investigated properly." Activists point to the muted media coverage given to a recent case in Washington DC in which Michael Centanni, a senior Republican fundraiser, was charged with child sex offences after investigators traced transmissions of child pornography to his computers in his basement. The case was not covered by The Washington Post or the New York Times, and was only picked up by a local NBC affiliate state and The Washington Examiner, a small conservative paper in the city. According to the court filings, Centanni was found in possession of 3,000 images, many apparently filmed in his own bedroom, including one showing a man raping a five-year-old girl who cries "no" and "mommy" while the man says "good baby" and "stop crying," according to one filing.
Security

Ed Felten: California Must Lead On Cybersecurity 80

An anonymous reader writes In a Sacramento Bee op-ed, (in)famous computer security researcher Ed Felten responds to the State of the Union cybersecurity proposal. He doesn't mince words: "The odds of clearing Congress: low. The odds of materially improving security: even lower. "What he suggests as an alternative, though, is a surprise. "California," he writes, "could blaze a trail for effective cybersecurity policy." He calls for the state government to protect critical infrastructure and sensitive data, relying on outside auditors and experts. It's an interesting idea. Even if it doesn't go anywhere, at least it's some fresh thinking in this area of backward policy. From Felten's essay: Critical infrastructure increasingly relies on industrial automation systems. And those systems are often vulnerable – they keep a default password, for instance, or are accessible from the public Internet. These are not subtle or sophisticated errors. Fixing them requires basic due diligence, not rocket science. Requiring the state’s critical infrastructure providers to undergo regular security audits would be straightforward and inexpensive – especially relative to the enormous risks. Areas of sensitive data are also low-hanging cyber fruit. In health care, education and finance, California already imposes security and privacy requirements that go beyond federal law. Those legal mandates, though, are mostly enforced through after-the-fact penalties. Much like critical infrastructure, sectors that rely upon sensitive data would benefit from periodic outside auditing. Of any state government's, California's policies also have the chance to help (or harm) the most people: nearly 39 million people, according to a 2014 U.S. Census estimate.

Submission + - Ed Felten: California Must Lead on Cybersecurity

An anonymous reader writes: In a Sacramento Bee op-ed, (in)famous computer security researcher Ed Felten responds to the State of the Union cybersecurity proposal. He doesn't mince words: 'The odds of clearing Congress: low. The odds of materially improving security: even lower.'

What he suggests as an alternative, though, is a surprise. 'California,' he writes, 'could blaze a trail for effective cybersecurity policy.' He calls for the state government to protect critical infrastructure and sensitive data, relying on outside auditors and experts.

It's an interesting idea. Even if it doesn't go anywhere, at least it's some fresh thinking in this area of backward policy.

Submission + - Verizon, Cable Lobby Oppose Higher Broadband Definition

WheezyJoe writes: Responding to the FCC's proposal to raise the definition of broadband from 4Mbps downstream and 1Mbps upstream to 25Mbps down and 3Mbps up, the lobby group known as the National Cable & Telecommunications Association (NCTA) wrote in an FCC filing Thursday that 25Mbps/3Mbps isn't necessary for ordinary people. The lobby alleges that hypothetical use cases offered for showing the need for 25Mbps/3Mbps "dramatically exaggerate the amount of bandwidth needed by the typical broadband user", referring to parties in favor of the increase like Netflix and Public Knowledge.

Verizon, for its part, is also lobbying against a faster broadband definition. Much of its territory is still stuck on DSL which is far less capable of 25Mbps/3Mbps speeds than cable technology.

The FCC presently defines broadband as 4Mbps down and 1Mbps up, a definition that hasn't changed since 2010. By comparison, people in Sweden can pay about $40 a month for 100/100 mbps, choosing between more than a dozen competing providers. The FCC is under mandate to determine whether broadband is being deployed to Americans in a reasonable and timely way, and the commission must take action to accelerate deployment if the answer is negative. Raising the definition's speeds provides more impetus to take actions that promote competition and remove barriers to investment, such as a potential move to preempt state laws that restrict municipal broadband projects.
Government

SpaceX, US Air Force Settle Spy Sat Dispute 80

hypnosec writes The US Air Force and private space flight company SpaceX have settled their dispute involving the military's expendable rocket program, thereby paving the way for SpaceX to join the spy satellite launch program known as Evolved Expendable Launch Vehicle (EELV). The settlement opens doors for SpaceX to compete with United Launch Alliance (ULA) for launch of spy satellites. ULA is a joint Boeing-Lockheed venture – the only private player to have received clearance for launching black ops satellites.
Graphics

DirectX 12 Lies Dormant Within Microsoft's Recent Windows 10 Update 135

MojoKid writes After last Wednesday's Windows 10 event, early adopters and IT types were probably anxious for Microsoft to release the next preview build. Fortunately, it didn't take long as it came out on Friday, and it's safe to say that it introduced even more than many were anticipating (but still no Spartan browser). However, in case you missed it, DirectX 12 is actually enabled in this Windows 10 release, though unfortunately we'll need to wait for graphics drivers and apps that support it, to take advantage of DX 12 features and performance enhancements.
Communications

A Call That Made History, 100 Years Ago Today 51

alphadogg writes These days, making a call across the U.S. is so easy that people often don't even know they're talking coast to coast. But 100 years ago Sunday, it took a hackathon, a new technology and an international exposition to make it happen. The first commercial transcontinental phone line opened on Jan. 25, 1915, with a call from New York to the site of San Francisco's Panama-Pacific International Exposition. Alexander Graham Bell made the call to his assistant, Thomas Watson. Just 39 years earlier, Bell had talked to Watson on the first ever phone call, in Boston, just after Bell had patented the telephone.

Submission + - DirectX 12 Lies Dormant Within Microsoft's Recent Windows 10 Update (hothardware.com)

MojoKid writes: After last Wednesday's Windows 10 event, early adopters and IT types were probably anxious for Microsoft to release the next preview build. Fortunately, it didn't take long as it came out on Friday, and it's safe to say that it introduced even more than many were anticipating (but still no Spartan browser). However, in case you missed it, DirectX 12 is actually enabled in this Windows 10 release, though unfortunately we'll need to wait for graphics drivers and apps that support it, to take advantage of DX 12 features and performance enhancements.

Submission + - Conference calls a waste of time? In 1915, this one made history (networkworld.com)

alphadogg writes: These days, making a call across the U.S. is so easy that people often don’t even know they’re talking coast to coast. But 100 years ago Sunday, it took a hackathon, a new technology and an international exposition to make it happen.
The first commercial transcontinental phone line opened on Jan. 25, 1915, with a call from New York to the site of San Francisco’s Panama-Pacific International Exposition. Alexander Graham Bell made the call to his assistant, Thomas Watson. Just 39 years earlier, Bell had talked to Watson on the first ever phone call, in Boston, just after Bell had patented the telephone.

Earth

Fish Found Living Half a Mile Under Antarctic Ice 79

BarbaraHudson (3785311) writes "Researchers were startled to find fish, crustaceans and jellyfish investigating a submersible camera after drilling through nearly 2,500 feet (740 meters) of Antarctic ice. The swimmers are in one of the world's most extreme ecosystems, hidden beneath the Ross Ice Shelf, roughly 530 miles (850 kilometers) from the open ocean. "This is the closest we can get to something like Europa," said Slawek Tulaczyk, a glaciologist at the University of California, Santa Cruz and a chief scientist on the drilling project. More pictures here."

Slashdot Top Deals

What the gods would destroy they first submit to an IEEE standards committee.

Working...