Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Please think of the children! (Score 1) 126

I live in an area with a regional airport. It's not something you'd be likely to miss. Yet I recall a news story (from about 20 years ago) where someone moved into the neighborhood and THEN decided that the airport should be limited (no flights after 9pm or whatever) or shut down. It always astonishes me when folks do that.

Submission + - A new life for old AM broadcast towers

Esther Schindler writes: Video may have killed the radio star, but other media certainly make old AM radio towers superfluous. ...Maybe.

As once-loyal listeners tune away, most AM stations are barely holding onto life, slashing staff and budgets as deeply as they can while struggling to find a return to profitability. Once upon a time, having a broadcast license of any kind was like having a permit to print money. In today’s world, that's no longer true.

But, with 10,000 AM broadcast towers in the United States, stretching high into the sky, there may be an opportunity for wireless carriers who don't want to argue with community opposition from neighborhoods where residents don't want yet another cell tower. The amount of money an AM station owner can pocket by sharing its tower with a wireless partner varies widely, depending on the tower's location, height, and several other factors. But it's certainly more income — and a way to keep "old" technology from becoming obsolete.

Submission + - Remembering Yahoo... back when it was wonderful

Esther Schindler writes: "For one brief shining moment, Yahoo was the king of all it surveyed," writes Dan Tynan. In The Glory That Was Yahoo he explains why, such as innovations in cloud storage, Yahoo music, and Geocities. You may not agree with his assessment completely, but I think you'll have a nostalgic few minutes reading this.

Submission + - Coping with Spectre and Meltdown: What sysadmins are doing

Esther Schindler writes: In technical terms, Spectre and Meltdown are a security pain in the butt. In day-to-day terms, though, they're a serious distraction. Before you left on the holiday break, after all, you had a nice sensible To Do list for the projects you wanted to tackle after the new year.

Ha ha ha.

Instead, sysadmins have spent their time trying to keep up with the nature of the problem and its fixes (will it REALLY slow down computers that much? how can you tell that to the users?), and apply patches. Or, more specifically:

Ron, an IT admin, summarizes the situation succinctly: “More like applied, applied another, removed, I think re-applied, I give up, and have no clue where I am anymore.”

Feel like you're alone? Here's what other sysadmins have done so far, as well as their current plans and long-term strategy, not to mention how to communicate progress to management.

Submission + - Taking the plunge: Enterprise IT firsts over the decades

Esther Schindler writes: Technology trailblazers are everywhere these days, but early on, big corporations were reluctant to gamble on unproven startups. Which brave businesses were the first to put technology to use? Josh Fruhlinger enumerates a few early tech pioneers. Here’s the first business website, the first person given the title of CIO, and other things that’ll make you say Hmmm.

Submission + - Cloud database debased: Keyboard app leaks 31M users' sensitive data (techbeacon.com)

An anonymous reader writes: Once again, it’s time to play “spot the unsecured cloud data.” In this week’s episode...

A popular virtual keyboard app on iOS and Android, a.i.type, left a huge Mongo database just kinda lying around and exposed to the Internet. Not only that, but the leak revealed the amazing extent to which the app collected users’ personal, sensitive data.

Will stories like this ever stop?

Submission + - Data science and the search for MH370

Esther Schindler writes: How often are mathematicians heroes? Here's an example where scientists are... not exactly saving the day. But employing technology for good, certainly.

In the absence of physical evidence, scientists are employing powerful computational tools to attempt to solve the greatest aviation mystery of our time: the disappearance of flight MH370.

For example:

A DSTG team led by mathematician Dr. Neil Gordon set about developing a new technique to extract a path from a subset of the Inmarsat data called the Burst Timing Offset (BTO). This measured how quickly the aircraft responded each time the satellite pinged it, and was used to determine the distance between the satellite and the plane. Investigators used these calculations to draw a set of rings on the earth’s surface.

...The DSTG used its computers to generate a huge number of possible routes and then test them to see which best fit the observed data. Their endpoints were pooled to generate a probabilistic “heat map” of the plane’s most likely resting places using a technique called Bayesian analysis. These calculations allowed the DSTG team to draw a box 400 miles long and 70 miles across, which contained about 90 percent of the total probability distribution.

Cool stuff, even if we still don't know where the plane ended up.

Submission + - What If Kubernetes Is One Big Google Conspiracy?

mwagner writes: "Grab your tin foil hat and read on," says Craig Matsumoto at Enterprise Cloud News: "Kubernetes is winning hearts and minds around the container and platform-as-a-service (PaaS) worlds, but what if Google has a deeper master plan behind it? Boris Renski, co-founder and chief marketing officer of Mirantis Inc. , thinks he's lined up the clues. He's outlined the theory in a blog posting due to be published this week. 'I'd like to postulate that K8S [Kubernetes] was the first move in a longer chess game... one where the end goal is to destroy costs associated with moving workloads between clouds,' he writes. Specifically, it's about moving workloads away from Amazon Web Services (AWS), he thinks."

Submission + - How the Federal Reserve Bank of New York is using open source

Esther Schindler writes: When you handle trillions of dollars a year in transactions and manage the largest known vault of gold in the world, security and efficiency are top priorities. Open source reusable software components are key to the New York Fed's successful operation, explains Colin Wynd, vice president and head of the bank's Common Service Organization.

The nearly 2,000 developers across the Federal Reserve System used to have a disparate set of developer tools. Now, they benefit from a standard toolset and architecture, which also places limits on which applications the bank will consider using. “We don’t want a third-party application that isn’t compatible with our common architecture,” said Wynd.

But the advantages are more than technical. Among them: "Developers can now take on projects or switch jobs more easily across Federal Reserve banks because the New York Fed uses a lot of common open source components and a standard tool set, meaning retraining is minimal if needed at all."

Submission + - The space station gets a new supercomputer

Esther Schindler writes: By NASA's rules, not just any computer can go into space. Their components must be radiation hardened, especially the CPUs. Otherwise, they tend to fail due to the effects of ionizing radiation. The customized processors undergo years of design work and then more years of testing before they are certified for spaceflight. As a result, the ISS runs the station using two sets of three Command and Control Multiplexer DeMultiplexer (C&C MDM) computers whose processors are 20MHz Intel 80386SX CPUs, right out of 1988.

The traditional way to radiation-harden a spacecraft computer is to add redundancy to its circuits or by using insulating substrates instead of the usual semiconductor wafers on chips. That’s expensive and time consuming. HPE scientists believe that simply slowing down a system in adverse conditions can avoid glitches and keep the computer running.

So, assuming the August 15 SpaceX Falcon 9 rocket launch goes well, there will be a supercomputer headed into space — using off-the-shelf hardware. Let's see if the idea pans out. "We may discover a set of parameters with which a supercomputer can successfully run for at least a year without errors," says Dr. Mark R. Fernandez, the mission’s co-principal investigator for software and SGI's HPC technology officer. "Alternately, one or more components of the system will fail, in which case we will then do the typical failure analysis on Earth. That will let us learn what to change to make the systems more reliable in the future."

Submission + - A Tech Bubble Killed Computer Science Once, Can It Do So Again? (ieeeusa.org)

dcblogs writes: Enrollments in Computer Science are on a hockey stick trajectory and show no signs of slowing down. Stanford University declared computer science enrollments, for instance, went from 87 in the 2007-08 academic year to 353 in the recently completed year. It’s similar at other schools. Boston University, for instance, had 110 declared undergraduate computer science majors. This fall it will have more than 550. Prof. Mehran Sahami, who is the associate chair for education in the computer science department at Stanford, believes the enrollment trend will continue. “As the numbers bear out, the interest in computer science has grown tremendously and shows no signs of crashing,” said Sahami. But after the 2000 dot-com bust computer science enrollments fell dramatically and students soured on the degree. Could something like it happen again? Although there is some speculation of a bubble in tech, the academics believe too much has changed since that dot-com era in the economy.

Submission + - The real story behind IoT security that none of us knows (osenetwork.com)

sfcrazy writes: When you hear about IoT there is a lot of misunderstanding. Those who claim 'IoT is going to kill us all' don't even understand the market and it's depth. They are fear-mongering populists who wants to exploit sentiments.

Swapnil Bhartiya says he spent the past two weeks talking to more than a dozen experts from the IoT world to get a better grip of the situation and understand how real these threats are, what are the causes, and what can be done to mitigate them, if it’s even possible to be mitigated.

Submission + - How to give compassionate feedback to applicants who didn't get the job (hpe.com)

Esther Schindler writes: It's bad enough when you don't get the job you wanted. But the aftereffects are worse. You wonder, "What did I do wrong?" and "What should I have done differently?" and "Was it because I gave the wrong answer on the manhole cover question?" Good luck finding out. You're lucky to receive a form letter that says, "We chose to move ahead with another candidate."

None of us really want to say, "It wasn't a good fit." Here's how to give compassionate feedback to job applicants didn't make the cut.

Submission + - Why you should care about SOA again (hpe.com)

Esther Schindler writes: Ten years ago, SOA was all-the-rage in enterprise development shops, particularly in companies that truly needed to create software to work across departmental silos. Perhaps the buzzword hype killed it as an IT fad. But, argues Mike Barlow, SOA’s principles apply to modern development and DevOps initiatives, including microservices, virtualization, business-oriented APIs, and open software architectures:

Like microservices, SOA is predicated on a distributed architecture that's more scalable and flexible than traditional monolithic architectures. Most important, perhaps, is that distributed architectures such as SOA are more hospitable to the kinds of modular applications that make life easier for agile developers.

SOA was a real thing, beyond the "they can never find a good way to define it" problem. Do you think it's coming back around, but with better buzzwords?

Slashdot Top Deals

All power corrupts, but we need electricity.

Working...