Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Technology

Physicists May Be One Step Closer To Explaining High-Temp Superconductivity 58

sciencehabit writes For years some physicists have been hoping to crack the mystery of high-temperature superconductivity—the ability of some complex materials to carry electricity without resistance at temperatures high above absolute zero—by simulating crystals with patterns of laser light and individual atoms. Now, a team has taken—almost—the next-to-last step in such 'optical lattice' simulation by reproducing the pattern of magnetism seen in high-temperature superconductors from which the resistance-free flow of electricity emerges.
GUI

Xfce 4.12 Released 91

motang writes: After two years of hard work (and much to the dismay of naysayers who worried the project has been abandoned), the Xfce team has announced the release of Xfce 4.12. Highlights include improvements to the window switcher dialog, intelligent hiding of the panel, new wallpaper settings, better multi-monitor support, improved power settings, additions to the file manager, and a revamped task manager. Here is a quick tour, the full changelog, and the download page. I have been running it since Xubuntu 15.04 beta 1 was released two days ago. It is much improved over 4.10, and the new additions are great.
Data Storage

Ask Slashdot: How Does One Verify Hard Drive Firmware? 324

An anonymous reader writes: In light of recent revelations from Kaspersky Labs about the Equation Group and persistent hard drive malware, I was curious about how easy it might be to verify my own system's drives to see if they were infected. I have no real reason to think they would be, but I was dismayed by the total lack of tools to independently verify such a thing. For instance, Seagate's firmware download pages provide files with no external hash, something Linux distributions do for all of their packages. Neither do they seem to provide a utility to read off the current firmware from a drive and verify its integrity.

Are there any utilities to do such a thing? Why don't these companies provide verification software to users? Has anyone compiled and posted a public list of known-good firmware hashes for the major hard drive vendors and models? This seems to be a critical hole in PC security. I did contact Seagate support asking for hashes of their latest firmware; I got a response stating, "...If you download the firmware directly from our website there is no risk on the file be tampered with." (Their phrasing, not mine.) Methinks somebody hasn't been keeping up with world events lately.
Music

Genetic Data Analysis Tools Reveal How US Pop Music Evolved 57

KentuckyFC writes: The history of pop music is rich in anecdotes, folklore and controversy. But despite the keen interest, there is little in the form of hard evidence to back up most claims about the evolution of music. Now a group of researchers have used data analysis tools developed for genomic number crunching to study the evolution of U.S. pop music. The team studied 30-second segments of more than 17,000 songs that appeared on the U.S. Billboard Hot 100 between 1960 and 2010. Their tools categorized the songs according to harmonic features such as chord changes as well as the quality of timbre such as whether guitar-based, piano-based orchestra-based and so on. They then used a standard algorithm for discovering clusters within networks of data to group the songs into 13 different types, which turned out to correspond with well known genres such as rap, rock, country and so on. Finally, they plotted the change in popularity of these musical types over time.

The results show a clear decline in the popularity of jazz and blues since 1960. During the same period, rock-related music has ebbed and flowed in popularity. By contrast, rap was rare before 1980 before becoming the dominant musical style for 30 years until declining in the late 2000s. The work answers several important question about the evolution of pop music, such as whether music industry practices have led to a decline in the cultural variety of new music, and whether British bands such as The Beatles and The Rolling Stones triggered the 1964 American music revolution [spoiler: no in both cases].
Security

Uber Discloses Database Breach, Targets GitHub With Subpoena 47

New submitter SwampApe tips news that Uber has revealed a database breach from 2014. The company says the database contained names and diver's license numbers of their drivers, about 50,000 of which were accessed by an unauthorized third party. As part of their investigation into who was behind the breach, Uber has filed a lawsuit which includes a subpoena request for GitHub. "Uber's security team knows the public IP address used by the database invader, and wants to link that number against the IP addresses and usernames of anyone who looked at the GitHub-hosted gist in question – ID 9556255 – which we note today no longer exists. It's possible the gist contained a leaked login key, or internal source code that contained a key that should not have been made public."
Oracle

Oracle Sues 5 Oregon Officials For 'Improper Influence' 83

SpzToid writes: Following up on an earlier Slashdot story, the Oracle Corporation has filed a rather timely suit against five of former governor John Kitzhaber's staff for their "improper influence" in the decision to shutter the Cover Oregon healthcare website, while blaming Oracle to defuse the political consequences. Oracle argues the website was ready to go before the state decided to switch to the federal exchange in April.

"The work on the exchange was complete by February 2014, but going live with the website and providing a means for all Oregonians to sign up for health insurance coverage didn't match the former-Governor's re-election strategy to 'go after' Oracle," Oracle spokeswoman Deborah Hellinger said in a statement.

Kitzhaber resigned last week amid criminal probes into an influence-peddling scandal involving allegations that his fiancée used her position in his office for personal gain.
The Internet

As Big As Net Neutrality? FCC Kills State-Imposed Internet Monopolies 234

tedlistens writes: On Thursday, before it voted in favor of "net neutrality," the Federal Communications Commission voted 3-2 to override state laws in Tennessee and North Carolina that have barred local governments and public utilities from offering broadband outside the areas where they have traditionally sold electricity. Christopher Mitchell of the Institute for Local Self-Reliance said the move was as important for internet competition as net neutrality: "Preventing big Internet Service Providers from unfairly discriminating against content online is a victory, but allowing communities to be the owners and stewards of their own broadband networks is a watershed moment that will serve as a check against the worst abuses of the cable monopoly for decades to come." The laws, like those in over a dozen other states, are often created under pressure from large private Internet providers like Comcast and Verizon, who consequently control monopolies or duopolies over high-speed internet in these places.
Businesses

Under US Pressure, PayPal Stops Working With Mega 136

New submitter seoras sends news that PayPal is now refusing to handle payments for Mega, Kim Dotcom's cloud storage service. A report (PDF) issued in September of last year claimed Mega and other "cyberlocker" sites made a great deal of illicit money off piracy. Mega disputes this, of course, and says the report caused U.S. Senator Patrick Leahy to pressure credit card companies to stop working with Mega. Those companies then pressured PayPal to stop as well. The hosting company claims, "MEGA provided extensive statistics and other evidence showing that MEGA’s business is legitimate and legally compliant. After discussions that appeared to satisfy PayPal’s queries, MEGA authorised PayPal to share that material with Visa and MasterCard. Eventually PayPal made a non-negotiable decision to immediately terminate services to MEGA."
Space

One Astronomer's Quest To Reinstate Pluto As a Planet 196

sarahnaomi writes: Most of us grew up believing that tiny, distant Pluto was the outermost planet in our solar system. Then, one day, the scientific powers that be decreed that it wasn't. But it seems the matter is far from settled. David Weintraub—who describes Pluto's exile as a stunt organized by a "very small clique of Pluto-haters"—would have the dwarf world rejoin the ranks of our Solar System's fully-fledged planets today. But solid evidence that Pluto deserves the title may come in July, when NASA's New Horizons spacecraft slingshots around the icy rock and sends us back a detailed picture of its composition. Pluto's planethood was revoked by majority vote on the final day of the 2006 IAU conference. Over 2,500 astronomers attended the meeting throughout the week, but only 394 votes ultimately decided Pluto's fate: 237 in favor of demoting the planet and 157 against.
Security

Blu-Ray Players Hackable Via Malicious Discs 107

An anonymous reader writes: Some Blu-Ray disc interactive features use a Java variant for UIs and applications. Stephen Tomkinson just posted a blog discussing how specially created Blu-Ray discs can be used to hack various players using exploits related to their Java usage. He hacked one Linux-based, network-connected player to get root access through vulnerabilities introduced by the vendor. He did the same thing against Windows Blu-Ray player software. Tomkinson was then able to combine both, along with detection techniques, into a single disc.

Slashdot Top Deals

Always draw your curves, then plot your reading.

Working...