Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Submission + - Creating a supply chain for Open Souoce hardware

Presto Vivace writes: Open Compute Project acclaims moves by HP and others that should make it easier to adopt

The Open Compute Project, which wants to open up hardware the same way Linux opened up software, is starting to tackle its forklift problem. ... ... The idea is that if a lot of vendors build hardware to OCP specifications, IT departments will have more suppliers to choose from offering gear they can easily bring into their data centers. Standard hardware can also provide more platforms for innovative software, Frankovsky said.

Now HP and other vendors are starting to deliver OCP systems in a way the average IT department understands. At the same time, the organization is taking steps to make sure new projects are commercially viable rather than just exercises in technology.

Submission + - Jebbie on net neutrality

Presto Vivace writes: Jeb Bush thinks net neutrality is crazy

Bush has some thoughts on net neutrality. Speaking at the Cedar Rapids Pizza Ranch in Iowa this weekend, Bush criticized President Obama's stance on internet regulation, saying it would "stifle competition, stifle innovation."

"The idea of regulating access to the internet with a 1934 law is one of the craziest ideas I’ve ever heard," he said.

Submission + - Gigaom to close shop

Presto Vivace writes: A brief note on our company

Gigaom recently became unable to pay its creditors in full at this time. As a result, the company is working with its creditors that have rights to all of the company’s assets as their collateral. All operations have ceased. We do not know at this time what the lenders intend to do with the assets or if there will be any future operations using those assets. The company does not currently intend to file bankruptcy. We would like to take a moment and thank our readers and our community for supporting us all along.

— Gigaom management

What a loss for the tech community.

Submission + - Obama administration says there are 545,000 IT job openings (computerworld.com)

dcblogs writes: The White House has established a $100 million program that endorses fast-track, boot camp IT training efforts and other four-year degree alternatives. But this plan is drawing criticism because of the underlying message it sends in the H-1B battle. The federal program, called TechHire, will get its money from H-1B visa fees, and the major users of this visa are IT services firms that outsource jobs. Another source of controversy will be the White House's assertion that there are 545,000 unfilled IT jobs. It has not explained how it arrived at this number, but the estimate will likely be used as a talking point by lawmakers seeking to raise the H-1B cap.

Submission + - Scotland Yard Chief: Put CCTV in every home (dailymail.co.uk)

schwit1 writes: Homeowners should consider fitting CCTV to trap burglars, the country's most senior police officer declared yesterday. Sir Bernard Hogan-Howe said police forces needed more crime scene footage to match against their 12million images of suspects and offenders. And he called on families and businesses to install cameras at eye level – to exploit advances in facial recognition technology.

Submission + - Google, ICANN, and the .dev TLD

Presto Vivace writes: It seems that ICANN decided to auction off TLDs in 2008, enabling the buyers to create closed domains. Closed TLDs

Let’s talk about a domain that’s near and dear to my heart, .dev. Wouldn’t it be great to have a domain for content targeted at software developers? So that you could actually get a domain name for www.[your-side-project].dev? Instead abusing the .io domain which is officially for the British Indian Ocean Territory. Alas, Google does not think much of that plan. Under their shell company “Charleston Road Registry Inc.” (whose “CEO” is merely Google’s in-house counsel), they have applied for control of the .dev domain, which they intend to be:

completely closed for the sole use of Google.

In case you thought that was a typo, they elaborate:

Second-level domain names within the proposed gTLD are intended for registration and use by Google only, and domain names under the new gTLD will not be available to the general public for purchase, sale, or registration. As such, Charleston Road Registry intends to apply for an exemption to the ICANN Registry Operator Code of Conduct as Google is intended to be the sole registrar and registrant.

In case you believe Google is drunk and they meant to apply for some other, more Google-specific string, instead of claiming some kind of monopoly over software development in its entitreity, they helpfully clarify that no, they know exactly what they are doing:

The proposed gTLD will provide Google with direct association to the term dev, which is an abbreviation of the word, development. The mission of this gTLD, .dev, is to provide a dedicated domain space in which Google can enact second-level domains specific to its projects in development. Specifically, the new gTLD will provide Google with greater ability to create a custom portal for employees to manage products and services in development.

Push back is coming from SEO shops and the government of Australia.

Submission + - FTC Announces $50k in Prizes for Robocaller Trap Software (ftc.gov)

crazyhorse44 writes: The Federal Trade Commission announced today that it is launching two new robocall contests challenging the public to develop a crowd-source honeypot and better analyze data from an existing honeypot. A honeypot is an information system that may be used by government, private and academic partners to lure and analyze robocalls. The challenges are part of the FTC’s long-term multi-pronged effort to combat illegal robocallers and contestants of one of the challenges will compete for $25,000 in a top prize.

As part of Robocalls: Humanity Strikes Back, the FTC is asking contestants to create a technical solution for consumers that will identify unwanted robocalls received on landlines or mobile phones, and block and forward those calls to a honeypot. A qualifying phase launches today and runs through June 15, 2015 at 10:00 p.m. ET; and a second and final phase concludes at DEF CON 23 on Aug. 9, 2015.

Submission + - In 10 years, every human connected to the Internet will have a timeline

Presto Vivace writes: In the next decade, Year Zero will be how big data reaches everyone and will fundamentally change how we live.

In 10 years, every human connected to the Internet will have a timeline. It will contain everything we’ve done since we started recording, and it will be the primary tool with which we administer our lives. This will fundamentally change how we live, love, work, and play. And we’ll look back at the time before our feed started — before Year Zero — as a huge, unknowable black hole.

I hope this is wrong.

Submission + - FTC targets group that made billions of robocalls (networkworld.com)

coondoggie writes: Given the amount of time the FTC and others have put into curing the robocall problem, it is disheartening to hear that a group of companies for almost a year have been making billions of illegal robocalls. The Federal Trade Commission and 10 state attorneys general today said they have settled charges against a Florida-based cruise line company and seven other companies that averaged 12 million to 15 million illegal sales calls a day between October 2011 through July 2012, according to the joint complaint filed by the FTC and the states

Submission + - Chicago, Argonne Lab deploy Internet of super sensors

Presto Vivace writes: Government Computer News reports:

Federal, state and local agencies are just now beginning to explore applications of the Internet of Things (IoT), which, despite its build-up as “the next big thing,” actually seems destined to live up to the billing.

The IoT comprises networks of remote sensors capable of detecting everything from traffic to air quality, to buildings' energy consumption, to the direction of gunshots on city streets. And governments see plenty of opportunities to exploit the technology’s efficiency, energy and cost saving advantages.

I do not have a good feeling about this.

Submission + - New Zealand spied on nearly two dozen Pacific countries (zdnet.com)

An anonymous reader writes: New documents from Edward Snowden indicate New Zealand undertook "full take" interception of communications from Pacific nations and forwarded the data to the NSA.

The data, collected by New Zealand's Government Communications Security Bureau, was then fed into the NSA's XKeyscore search engine to allow analysts to trawl for intelligence.

The New Zealand link helped flesh out the NSA's ambitions to intercept communications globally.

Submission + - 3 open source projects that transformed Hadoop (opensource.com)

An anonymous reader writes: Hadoop, an open source software framework with the funny sounding name, has been a game-changer for organizations by allowing them to store, manage, and analyze massive amounts of data for actionable insights and competitive advantage.

But this wasn't always the case.

Initially, Hadoop implementation required skilled teams of engineers and data scientists, making Hadoop too costly and cumbersome for many organizations. Now, thanks to a number of open source projects, big data analytics with Hadoop has become much more affordable and mainstream.

Submission + - Former MLB Pitcher Doxes Internet Trolls, Delivers Real-World Consequences

An anonymous reader writes: When Twitter trolls began posting obscene, sexually explicit comments about his teenage daughter, former MLB pitcher Curt Schilling responded by recording their comments and gathering personal information readily available to the public. He then doxxed two of them on his blog, resulting in one being suspended from his community college and the other being fired from his part-time job as a ticket seller for the New York Yankees. There were seven others in Curt's crosshairs, all college athletes, but although he hasn't publicly doxxed those individuals he hints, 'I found it rather funny at how quickly tone changed when I heard via email from a few athletes who’d been suspended by their coaches. Gone was the tough guy tweeter, replaced by the "I’m so sorry apology used by those only sorry because they got caught.'

Submission + - Either everyone is cyber-secure or no one is

Presto Vivace writes: Bruce Schneier on The Democratization of Cyberattack

When I was working with the Guardian on the Snowden documents, the one top-secret program the NSA desperately did not want us to expose was QUANTUM. This is the NSA's program for what is called packet injection--basically, a technology that allows the agency to hack into computers.

Turns out, though, that the NSA was not alone in its use of this technology. The Chinese government uses packet injection to attack computers. The cyberweapons manufacturer Hacking Team sells packet injection technology to any government willing to pay for it. Criminals use it. And there are hacker tools that give the capability to individuals as well.

All of these existed before I wrote about QUANTUM. By using its knowledge to attack others rather than to build up the internet's defenses, the NSA has worked to ensure that anyone can use packet injection to hack into computers.

Slashdot Top Deals

How can you do 'New Math' problems with an 'Old Math' mind? -- Charles Schulz

Working...