Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Don't build where there isn't adequate water (Score 1) 678

Except that Phoenix is literally under 3 cubic miles of water from the reservoirs in the mountains. Arizona has a 100 year water plan that they have to keep up to date so that it doesn't turn into California, not to mention various water recycling systems throughout the valley. There's plenty of reason to have a city where Phoenix is, mainly in that water runs downhill. There's a lot of dumber places to build a city, like say in hurricane/tornado areas, flood plains, below sea level next to the ocean, a swamp next to the ocean, Texas(kidding), some place where for months on end the roads don't work, etc. California wouldn't have a problem if it was just the city. Instead, they decided to build and industry that depends on one thing that they don't have a lot of - water. It takes incredibly huge balls to look at a giant swath of dry nothing and go, "We should totally farm here and make our economy dependent on it. Nothing native though. We should grow expensive stuff that can't exist in this environment without a lot of work."

Submission + - Large scale hack hits French TV Network (wsj.com) 1

Taco Cowboy writes: TV5 Monde, a TV Network in France, has been hit by a 'very powerful' cyber attack, purported to be by a self-proclaimed group of "Islamic State Militant" resulting in the company’s channels being knocked off the air globally

According to the spokeperson of TV5 Monde, their firewall has recently been checked but still that did not prevent the hackers from penetrating their system

The broadcaster, which airs French-language content on 11 channels in more than 200 countries worldwide and is indirectly owned by the governments of France and other French-speaking countries, said hackers penetrated the computer systems at its Paris headquarters late Wednesday evening, shutting down everything from company email and production facilities to the computer servers TV5Monde uses to send its television signals

At the same time, the hackers took control of the broadcaster’s social media accounts on platforms including Facebook Inc. and Twitter Inc., posting terrorist propaganda in support of Islamic State, including some alleged personal details about French military personnel, a spokeswoman for the channel said

France's Foreign Minister Laurent Fabius said: "“Those terrorists, as they are certainly terrorists—we are checking on the claim—are using the most advanced technologies, Everything is being done to find those who carried this out, punish them, re-establish the programmes and prevent cyberterrorists threatening freedom of expression in the future"

The hacking, which is now being investigated by French intelligence, offers potential evidence of the militant group’s growing capacity to conduct technological warfare. While hackers claiming allegiance to the group have been active in recent months in posting propaganda to websites and high-profile social media accounts—including one belonging to the U.S.—this appears to be the first successful takedown of a high-profile TV channel, experts said

Now that a French TV network has fallen prey to cyber-hacking, how long before CNN, or BBC or even PBS will be hacked?

Comment Re:A lot of that stuff actually worked (Score 1) 370

You're spot on. A lot of these grants set the goal and let the researchers figure out how to get there. They know there are fundamental problems, and that's what they are paying for solving. Actually making the device is a small part of solving all of the fundamental problems. If it went the other way, with small grants to solve small problems, we'd have a serious problem. How do you manage a decent research group if you only get small grants for small problems? Sure, with the system as it is you have many different groups working on one large problem, and there is a lot of redundancy, but you also gets different attempts and solutions, with everyone working on the final project and not just the tiny pieces. It's significantly better this way. If you've ever been to a DARPA conference you can really appreciate how everyone is working on the same thing and how many different solutions there are... and how angry people get at each other or thinking differently.

Comment Re:But But But It's the Handouts That Are Bankrupt (Score 1) 370

The problem is that they have the system rigged so that you can't just cut defense spending. Defense spending isn't just boots on the ground, it's a lot of research jobs and grants. Those are the programs that would get cut long before you starved the contractors. Not to mention entire towns that depend on whatever military base is nearby or the Boeing/Lockheed plant. Cutting back on military spending has been made to be near completely impossible. You can't just cut the funding and hope they spend the rest responsibly.

Comment Re:Get over it ! (Score 1) 370

If it's wasn't for these grants there would be no fundamental research done. You get work on a very big problem, and yes you generally fail, but in the process countless publications and fundamental problems are solved. Those problems would never get funding on their own. Hell, without DARPA and the like half of our college research groups wouldn't exist.

Comment Hacking (Score 1) 460

I still think that well trained people are harder to hack than software, currently. The main issue is that if you manage to hack a person into wrecking a plane, that just works on the one person. If you hack the software for a plane you can hack all of the planes. That's really my only concern about self driving cars. If a car or two here and there freak out and crash it's still safer than people, but if you can somehow manage to freak them all out...

Submission + - Creating a news reader based on your face (dailydot.com)

erier2003 writes: Fickle News activates your webcam and displays a group of articles that match your perceived mood. Anastasis Germanidis, the developer behind Fickle News, said that the idea for the site grew out of his interest in affective computing, an area of programming that tries to translate emotional clues into data points so that computers can better help people.

Submission + - Ask Slashdot: Did Apple Comply with the Chinese rules on encryption? (nytimes.com)

An anonymous reader writes: It seems that there was very little written about it, so I wonder. Did Apple comply with the Chinese and provide them with the key they needed to be able to unlock encrypted iPhones? And if they did, doesn't that very likely mean they have/will comply with the NSA and giveit a key? They seem to claim they can't provide such a thing, but they way the Chinese have allowed Apple sales to explode if pretty much proof positive that they supplied a backdoor to the iPhones sold in China.

Slashdot Top Deals

If you want to put yourself on the map, publish your own map.

Working...