Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Earth

Double-Dynamo Model Predicts 60% Fall In Solar Output In The 2030s 249

sycodon points out reports of a new model of solar dynamics from University of Northumbria professor Valentina Zharkova, predictions from which "suggest that solar activity will fall by 60 per cent during the 2030s to conditions last seen during the 'mini ice age' that began in 1645." Zharkova's model, based on observation of solar magnetism, "draws on dynamo effects in two layers of the Sun, one close to the surface and one deep within its convection zone." Zharkova’s and her colleages at three other universities believe that this two-layer model "could explain aspects of the solar cycle with much greater accuracy than before — possibly leading to enhanced predictions of future solar behaviour. “We found magnetic wave components appearing in pairs; originating in two different layers in the Sun’s interior. They both have a frequency of approximately 11 years, although this frequency is slightly different [for both] and they are offset in time.”
Social Networks

Ellen Pao Leaves Reddit; Site Founder Steve Huffman Makes a Triumphant Return 467

Deathspawner writes: To say that it's been a tumultuous month for reddit is an understatement. While multiple events have occurred in recent months that have caused an uproar, such as the banning of popular "hate" subreddits, nothing impacted the site quite like the out-of-nowhere firing of "Ask Me Anything" admin Victoria Taylor last week. Following that, other minor revelations surfaced, and finally, this past Monday, reddit CEO Ellen Pao came out from hiding to issue an apology. While her message instilled a bit more confidence in the future of the site, it wasn't enough. Today, it's been announced that Ellen Pao has left the company she joined last fall, and will be superseded by someone who knows what he's getting into: founder Steve Huffman.
Security

Rethinking Security Advisory Severities 30

An anonymous reader writes: The recent OpenSSL vulnerability got the internet all hyped up for a security issue that, in the end, turned out to have a very limited impact. This is good news of course, we don't need another Heartbleed. But it raises the question: should security advisories be more clear on the impact and possible ramifications of such a vulnerability, to avoid unnecessary panic? Developer Mattias Geniar says, "The Heartbleed vulnerability got the same severity as the one from last night. Heartbleed was a disaster, CVE-2015-1793 will probably go by unnoticed. ... Why? Because CVE-2015-1793, no matter how dangerous it was in theory, concerned code that only a very small portion of the OpenSSL users were using. But pretty much every major technology site jumped on the OpenSSL advisory. ... The OpenSSL team is in a particularly tricky situation, though. On the one hand, their advisories are meant to warn people without giving away the real vulnerability. It's a warning sign, so everyone can keep resources at hand for quick patching, should it be needed. At the same time, they need to warn their users of the actual severity.
The Courts

Time Warner Cable Owes $229,500 To Woman It Would Not Stop Calling 215

HughPickens.com writes: Reuters reports that a Manhattan federal judge has ruled Time Warner Cable must pay Araceli King $229,500 for placing 153 automated calls meant for someone else to her cellphone in less than a year, even after she told them to stop. King accused Time Warner Cable of harassing her by leaving messages for Luiz Perez, who once held her cellphone number, even after she made clear who she was in a seven-minute discussion with a company representative. Time Warner Cable countered that it was not liable to King under the federal Telephone Consumer Protection Act, a law meant to curb robocall and telemarketing abuses, because it believed it was calling Perez, who had consented to the calls. In awarding triple damages of $1,500 per call for willfully violating that law, U.S. District Judge Alvin Hellerstein said "a responsible business" would have tried harder to find Perez and address the problem. While Time Warner argued that they were unaware King ever asked to be on the company's "do not call list," Hellerstein determined, "there is no doubt King made this revocation." He wrote that the company "could not be bothered" to update King's information, even after she filed suit against TWC in March of 2014. The judge said 74 of the calls had been placed after King sued and that it was "incredible" to believe Time Warner Cable when it said it still did not know she objected. "Companies are using computers to dial phone numbers," says King's lawyer Sergei Lemberg. "They benefit from efficiency, but there is a cost when they make people's lives miserable. This was one such case."
Medicine

Most Doctors Work While Sick, Despite Knowing It's Bad For Patients 191

An anonymous reader writes: A new survey published in JAMA Pediatrics found that 95% of doctors believe patients are put at risk when doctors work while sick. Despite that, 83% of respondents said they had "come to work with symptoms like diarrhea, fever and respiratory complaints during the previous year." The researchers doing the survey dug into the reasons for this: first of all, given the heavy workload of most doctors, it's very difficult to find others who can take up the slack when one is recovering from an illness. Beyond that, the profession is pervaded by a culture of working through the discomfort and pain of minor maladies. According to a commentary on the research, hospital policies don't help matters — they often incentivize long hours and don't encourage ill workers to leave the premises.
Star Wars Prequels

Han Solo To Get His Own Star Wars Movie Prequel 227

New submitter alaskana writes: According to Starwars.com, Han Solo will be getting his own movie prequel. The film will purportedly tell the story of a young Han Solo and how he came to be the wily smuggler that shows up in Star Wars: Episode IV A New Hope. The film is set to be directed by Christopher Miller and Phil Lord (of The Lego Movie fame) and written by Lawrence and Jon Kasdan. Get your popcorn and tickets ready, as the movie is set to debut May 25, 2018.
Portables

Two-Pounder From Lenovo Might Be Too Light For Comfort 134

MojoKid writes: With the advent of solid state storage and faster, lower-powered processors that require less complex cooling solutions, the average mainstream notebook is rather svelte. Recently, however, Lenovo announced their LaVie Z and LaVie Z 360 ultrabooks and at 1.87 and 2.04 pounds respectively, they're almost ridiculously light. Further, with Core i7 mobile processors and fast SSDs on board, these machines perform impressively well in the benchmarks and real world usage. If you actually pick one up though, both models are so light they feel almost empty, like there's nothing inside. Lenovo achieved this in part by utilizing a magnesium--lithium composite material for the casing of the machines. Though they're incredibly light, the feeling is almost too light, such that they tend to feel a little cheap or flimsy. With a tablet, you come to expect a super thin and light experience and when holding them in one hand, the light weight is an advantage. However, banging on a full-up notebook keyboard deck is a different ball of wax.
Earth

Philips Is Revolutionizing Urban Farming With New GrowWise Indoor Farm 279

Kristine Lofgren writes: With arable land dwindling and the cost — both economically and environmentally — of growing and transporting food increasing, it's time to redefine farming. So Philips is creating a revolution with their new GrowWise indoor farm, which uses customized 'light recipes' in high-tech cells to grow plants that don't need pesticides or chlorine washes, and use a fraction of the water that traditional farming requires. The system can churn out 900 pots of basil a year in just one square meter of floor space, and bees keep things humming year-round for farming that is truly local, even in the middle of a city.
Bitcoin

Bitcoin Snafu Causes Miners To Generate Invalid Blocks 179

An anonymous reader writes: A notice at bitcoin.org warns users of the cryptocurrency that many miners are currently generating invalid blocks. The cause seems to be out-of-date software, and software that assumed blocks were valid instead of checking them. They explain further "For several months, an increasing amount of mining hash rate has been signaling its intent to begin enforcing BIP66 strict DER signatures. As part of the BIP66 rules, once 950 of the last 1,000 blocks were version 3 (v3) blocks, all upgraded miners would reject version 2 (v2) blocks. Early morning UTC on 4 July 2015, the 950/1000 (95%) threshold was reached. Shortly thereafter, a small miner (part of the non-upgraded 5%) mined an invalid block--as was an expected occurrence. Unfortunately, it turned out that roughly half the network hash rate was mining without fully validating blocks (called SPV mining), and built new blocks on top of that invalid block. Note that the roughly 50% of the network that was SPV mining had explicitly indicated that they would enforce the BIP66 rules. By not doing so, several large miners have lost over $50,000 dollars worth of mining income so far."
Security

Researcher Who Reported E-voting Vulnerability Targeted By Police Raid in Argentina 116

TrixX writes: Police have raided the home of an Argentinian security professional who discovered and reported several vulnerabilities in the electronic ballot system (Google translation of Spanish original) to be used next week for elections in the city of Buenos Aires. The vulnerabilities (exposed SSL keys and ways to forge ballots with multiple votes) had been reported to the manufacturer of the voting machines, the media, and the public about a week ago. There has been no arrest, but his computers and electronics devices have been impounded (Spanish original). Meanwhile, the information security community in Argentina is trying to get the media to report this notorious attempt to "kill the messenger." Another source (Spanish original).
Programming

Clang Plays Tetris -- Tetris As a C++ Template Metaprogram 68

New submitter mjvzb writes: Ever wish compiling was more fun? Well, I recently implemented Tetris as a C++ template metaprogram (code at Github). The game is played by recompiling its source, taking player input by compiler flag. The runtime program is only needed to print the game screen to the console and save the game state across compiler runs.

Implementing Tetris in templates is not as horrific as you may imagine, and I've put together a post covering the details. Once you get over the syntax, C++ metaprogramming is just like functional programming.
Windows

Windows 10 Shares Your Wi-Fi Password With Contacts 487

gsslay writes: The Register reports that Windows 10 will include, defaulted on, "Wi-Fi Sense" which shares wifi passwords with Outlook.com contacts, Skype contacts and, with an opt-in, Facebook friends. This involves Microsoft storing the wifi passwords entered into your laptop which can then be used by any other person suitably connected to you. If you don't want someone's Windows 10 passing on your password, Microsoft has two solutions; only share passwords using their Wi-Fi Sense service, or by adding "_optout" to your SSID.
Windows

Ask Slashdot: Are Post-Install Windows Slowdowns Inevitable? 517

blackest_k writes: I recently reinstalled Windows 7 Home on a laptop. A factory restore (minus the shovelware), all the Windows updates, and it was reasonably snappy. Four weeks later it's running like a slug, and now 34 more updates to install. The system is clear of malware (there are very few additional programs other than chrome browser). It appears that Windows slows down Windows! Has anyone benchmarked Windows 7 as installed and then again as updated? Even better has anybody identified any Windows update that put the slug into sluggish? Related: an anonymous reader asks: Our organization's PCs are growing ever slower, with direct hard-drive encryption in place, and with anti-malware scans running ever more frequently. The security team says that SSDs are the only solution, but the org won't approve SSD purchases. It seems most disk scanning could take place after hours and/or under a lower CPU priority, but the security team doesn't care about optimization, summarily blaming sluggishness on lack of SSDs. Are they blowing smoke?
The Internet

Charter Hires Net Neutrality Activist To Make Policy 70

An anonymous reader writes: The Federal Communications Commission has been at loggerheads with many ISPs lately, after the agency pushed through net neutrality rules that have now gone into effect. The defeat of Comcast's attempted acquisition of Time Warner Cable was hailed by many net neutrality activists as a victory, but then came the news that Charter was looking to buy TWC instead — which brought the worries back. But now Charter has taken the unusual step of hiring one of those activists to help develop its policy: Marvin Ammori. He says, "Charter hired me—which, to be honest, took some humility on its part since I have helped lead public campaigns against cable companies like Charter—to advise it in crafting its commitment to network neutrality. After our negotiation, I can say Charter is offering the strongest network neutrality commitments ever offered—in any merger or, to my knowledge, in any nation. In fact, in the end, I personally wrote the commitments." Put briefly, Charter agreed to abide by the interconnection mandates and prohibition of paid prioritization — regardless of the outcome of pending litigation from the ISPs fighting it — for a minimum of three years. The company has also promised no data caps and no usage-based billing.
Encryption

Cisco Security Appliances Found To Have Default SSH Keys 112

Trailrunner7 writes: Many Cisco security appliances contain default, authorized SSH keys that can allow an attacker to connect to an appliance and take almost any action he chooses. The company said all of its Web Security Virtual Appliances, Email Security Virtual Appliances, and Content Security Management Virtual Appliances are affected by the vulnerability.

This bug is about as serious as they come for enterprises. An attacker who is able to discover the default SSH key would have virtually free reign on vulnerable boxes, which, given Cisco's market share and presence in the enterprise worldwide, is likely a high number. The default key apparently was inserted into the software for support reasons.

"The vulnerability is due to the presence of a default authorized SSH key that is shared across all the installations of WSAv, ESAv, and SMAv. An attacker could exploit this vulnerability by obtaining the SSH private key and using it to connect to any WSAv, ESAv, or SMAv. An exploit could allow the attacker to access the system with the privileges of the root user," Cisco said.

Slashdot Top Deals

Remember, UNIX spelled backwards is XINU. -- Mt.

Working...