Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - What would you do with half a rack of server space?

Christian Gainsbrugh writes: I work at a company that is currently transitioning all our servers into the cloud. In the interim we have half a rack of server space in a great datacenter that will soon be sitting completely idle for the next few months until our lease runs out.

Right now the space is occupied by around 8 HP g series servers, a watchguard xtm firewall, cisco switch and some various other equipment. All in all there are probably around 20 or so physical XEON processors, and probably close to 10 tb of storage among all the machines. We have a dedicated 10 mbs connection that is burstable to 100mbs.

I'm curious what slashdot readers would do if they were in a similar situation. Is there anything productive that could be done with these resources? Obviously something revenue generating is great, but even if there is something novel that could be done with these servers we would be interested in putting them to good use.

Christian Gainsbrugh
Lead Developer
LearningCart
www.LearningCart.com

Feed Google News Sci Tech: NASA Needs $460 Million to Start New Rocket System by 2017 - Auto World News (google.com)


Auto World News

NASA Needs $460 Million to Start New Rocket System by 2017
Auto World News
Tourists take pictures of a NASA sign at the Kennedy Space Center visitors complex in Cape Canaveral, Florida. (Photo : Reuters). There is a good chance that NASA's Space Launch System will miss its planned December test flight, according to a report...
NASA Short of Money for Big RocketsUncover California
Beancounters tell NASA it's too poor to fly planned mega-rocketRegister

all 160 news articles

Feed Google News Sci Tech: Beancounters tell NASA it's too poor to fly planned mega-rocket - Register (google.com)


Beancounters tell NASA it's too poor to fly planned mega-rocket
Register
The US Government Accounting Office (GAO) has told NASA it has a massive funding shortfall for its ambitious Space Launch System (SLS) rocket if the spacecraft has any chance of blasting off on schedule. "The agency's current funding plan for SLS may be...

and more

Submission + - Dear museums: uploading your content to Wikimedia Commons just got easier (wikipedia.org)

The ed17 writes: Galleries, libraries, archives, and museums (GLAMs) are now facing fewer barriers to uploading their content to Wikimedia Commons—the website that stores most of Wikipedia's images and videos. Previously, these institutions had to build customized scripts or be lucky enough to find a Wikimedia volunteer to do the work for them. According to the toolset's coordinator Liam Wyatt, "this is a giant leap forward in giving GLAMs the agency to share with Commons on their own terms."

Submission + - Bad "Buss Duct" causes week-long closure of 5,000 employee Federal Complex (ajc.com)

McGruber writes: In Atlanta, an electrical problem in a "Buss Duct" has caused the Sam Nunn Atlanta Federal Center to be closed for at least a week (http://www.ajc.com/news/news/nunn-federal-building-expected-to-reopen-monday/ngnSZ/). 5,000 federal employees work at the center.

While many might view this as another example of The Infrastructure Crisis (http://www.asce.org/Content.aspx?id=25562) in the USA, it might actually be another example of mismanagement at the complex's landord, the General Service Administration (GSA). The GSA has had many scandals [http://www.federaltimes.com/article/20120416/DEPARTMENTS07/204160301/GSA-scandal-Heavy-fallout-expected] and has been the subject of several Congresssional Hearings, including an August 1, 2012 hearing titled "GSA: A Review of Agency Mismanagement and Wasteful Spending — Part 2" (http://www.gpo.gov/fdsys/pkg/CHRG-112hhrg75419/html/CHRG-112hhrg75419.htm). That hearing followed an $823,000 GSA employee conference in Las Vegas and a one-day-long $250,000 GSA employee conference in Crystal City, Virginia (http://www.washingtontimes.com/news/2012/aug/1/gsa-scandal-widens-dozens-conferences-investigated/?page=all)

The closed Atlanta complex is named for Samuel Augustus "Sam" Nunn, Jr., who served for 24 years as a United States Senator from Georgia (http://en.wikipedia.org/wiki/Sam_Nunn). His daughter is the current Democratic Party nominee (http://en.wikipedia.org/wiki/Sam_Nunn) for a Georgia Senate seat.

Submission + - Apple Acqui-Hires "Pandora for Books" Booklamp for $15 million (the-digital-reader.com)

Nate the greatest writes: Apple stunned the tech world Friday night when news broke that the gadget maker had acquired a little known ebook company called Booklamp, a small Idaho-based ebook startup which is best known for the Book Genome Project. First shown off to the world in 2008, this project was conceived by Booklamp founder and CEO Aaron Stanton as a way of analyzing a book's pacing, dialog, perspective, genre, and other details in order to identify a book's unique DNA. Booklamp has been using the tech to sell various services to publishers, tech companies, and the like, but Booklamps's existing contracts were apparently cancelled earlier this year.

According to one industry insider the deal happened in April, but Apple managed to keep the news under wraps until just last night. No one knows for sure how Apple will use booklamp but there is speculation that Apple could launch an ebook subscription service similar to the week-old Kindle Unlimited, or they could just use Booklamp to drive ebook recommendations in what some are speculating is the world's second largest ebookstore.

Submission + - AP Computer Science Test Takers Up 8,000, Pass Rate Down 6.8%

theodp writes: Code.org reports that preliminary data on students who took the Advanced Placement (AP) Computer Science Exam in 2014 show an increase of 8,276 students over 2013 and represent what the College Board called "the first real indication of progress in AP CS enrollment for women and underserved minorities in years." Girls made up 20% of the 39,393 total test takers, compared to 18.7% of the 31,117 test takers in 2013. Black or African American students saw their share increase by 0.19%, from 3.56% to 3.75% (low, but good enough to crush Twitter). Code.org credits the increased enrollment to its celebrity-studded CS promo film starring Bill Gates and Mark Zuckerberg ("I even made a personal bet (reflected in my contractual commitment to Code.org donors) that our video could help improve the seemingly immovable diversity numbers in computer science," Code.org founder Hadi Partovi notes). However, some of the increase is likely attributable to the other efforts of Code.org's donors. Microsoft ramped up its TEALS AP CS program in 2013-2014, and — more significantly — Google helped boost AP CS study not only through its CS4HS program, but also by funding the College Board's AP STEM Access program, which offered $5 million to schools and teachers to encourage minority and female students to enroll in AP STEM courses. This summer, explains the College Board, "All AP STEM teachers in the participating schools (not just the new AP STEM teachers), who increase diversity in their class, receive a [$100] DonorsChoose.org gift card for each student in the course who receives a 3, 4, or 5 on the AP Exam." The bad news for AP CS teachers anticipating Google "Excellence Funding" bounties (for increasing course enrollment and completion "by at least five underrepresented students") is that AP CS pass rates decreased to 60.8% in 2014 (from 67.6% in 2013), according to Total Registration. Using these figures and a back-of-the-envelope calculation, while enrollment saw a 26.6% increase over last year, the total number of students passing increased by 13.9%.

Submission + - Pi Power - the power supply the Raspberry Pi *should* have come with (geppettoelectronics.com)

nsayer writes: The Raspberry Pi is awesome. There's only one thing I dislike about it — how you're meant to power it. Crappy USB power supplies are ubiquitous, and the power more or less goes straight onto the +5 rail. Not only that, but the micro USB connector is SMT, and USB cables are much thicker and heavier than their 2.1mm barrel connector cable counterparts. No, it's just not the best tool for the job.

So I made Pi Power. It's a small board that sits on the GPIO pins (it comes with a stacking header so you can piggyback onto it) and has a 2.1mm barrel connector that will accept any DC voltage from 6-15 volts and output up to 2A of well regulated 5V power.

I sell them on Tindie for $15 ( https://www.tindie.com/product... ) and am running an IndieGoGo campaign to fund building 1000 of them at http://igg.me/at/PiPower .

Submission + - Ask Slashdot: After TrueCrypt (slashdot.org)

TechForensics writes: (Resubmitted because was not identified as "Ask Slashdot"

We all know the TrueCrypt story-- a fine, effective encryption program beginning to achieve wide use. When you see how the national security agency modified this tool so they could easily overcome it, you'll probably understand why they don't complain about PGP anymore. The slip that showed what was happening was the information that NSA "were really ticked about TrueCrypt" either because they couldn't circumvent it or found it too difficult. From the standpoint of privacy advocates, NSA's dislike for TrueCrypt was evidence it was effective.

Next, NSA directly wrapped up the makers of TrueCrypt in legal webs that made them insert an NSA backdoor and forbade them from revealing it was there. It's only because of the cleverness of the TrueCrypt makers the world was able to determine for itself that TrueCrypt was now compromised. (Among other things, though formerly staunch privacy advocates, the makers discontinued development of TrueCrypt and recommended something like Microsoft Bitlocker, which no one with any sense believes could be NSA – hostile. It then became logically defensible, since NSA was not complaining about PGP or other encryption programs, to posit they had already been compromised.

This is the situation we have: all of the main are important encryption programs are compromised at least in use against the federal government. Whether NSA tools are made available to local law enforcement is not known. This all begs the question:

Does the public now have *any* encryption that works? Even if we can see the source code of the encryption algorithm the source code of the program employing that algorithm must be considered false. (TrueCrypt was the only program NSA complained about.) In the case of other software, it becomes believable the NSA has allowed to be published only source code that hides their changes, and the only way around that may be to check and compile the published code yourself. Half the public probably doesn't bother.

Okay, Slashdot, what do you think? Where do we stand? And what ought we to do about it?We all know the TrueCrypt story-- a fine, effective encryption program beginning to achieve wide use. When you see how the national security agency modified this tool so they could easily overcome it, you'll probably understand why they don't complain about PGP anymore. The slip that showed what was happening was the information that NSA "were really ticked about TrueCrypt" either because they couldn't circumvent it or found it too difficult. From the standpoint of privacy advocates, NSA's dislike for TrueCrypt was evidence it was effective.

Next, NSA directly wrapped up the makers of TrueCrypt in legal webs that made them insert an NSA backdoor and forbade them from revealing it was there. It's only because of the cleverness of the TrueCrypt makers the world was able to determine for itself that TrueCrypt was now compromised. (Among other things, though formerly staunch privacy advocates, the makers discontinued development of TrueCrypt and recommended something like Microsoft Bitlocker, which no one with any sense believes could be NSA–hostile. It then became logically defensible, since NSA was not complaining about PGP or other encryption programs, to posit they had already been vitiated.

This is the situation we have: all of the main or important encryption programs are compromised at least in use against the federal government. Whether NSA tools are made available to local law enforcement is not known. This all begs the question:

Does the public now have *any* encryption that works? Even if we can see the source code of the encryption algorithm the source code of the program employing that algorithm must be considered tainted. (TrueCrypt was the only program NSA complained about.) In the case of other software, it becomes believable the NSA has allowed to be published only source code that hides their changes, and the only way around that may be to check and compile the published code yourself. Half the public probably doesn't bother. (Would it not be possible for the NSA to create a second TrueCrypt that has the same hash value as the original?)

Okay, Slashdot, what do you think? Where do we stand? And what ought we to do about it?

Submission + - Nuclear Plants Should Focus on Risks Posed by External Events (nytimes.com) 1

mdsolar writes: "Engineers at American nuclear plants have been much better at calculating the risk of an internal problem that would lead to an accident than they have at figuring the probability and consequences of accidents caused by events outside a plant, a report released Thursday by the National Academy of Science said.

Accidents that American reactors are designed to withstand, like a major pipe break, are “stylized” and do not reflect the bigger source of risk, which is external, according to the study. That conclusion is one of the major lessons from the Fukushima Daiichi nuclear accident in Japan in 2011, which began after an earthquake at sea caused a tsunami."

NAS Report: http://www.nap.edu/catalog.php...

Submission + - Jibo, the friendly helpful robot, nets over $1 million on Indiegogo (i-programmer.info)

mikejuk writes: After seven days the Jibo project has over $1.1 million. What is surprising is that Jibo isn't a complex piece of hardware that will do the dishes and pick up clothes. It doesn't move around at all. It just sits and interacts with the family using a camera, microphones and a voice. It is a social robot, the speciality of the founder, MIT's, Cynthia Breazeal. The idea is that this robot will be your friend, take photos, remind you of appointments, order takeaway and tell the kids a story. If you watch the promo video then you can't help but think that this is all too polished and the real thing will fall flat on its face when delivered. If it does work then worry about the hundreds of kids needing psychiatric counselling — shades of Robbie in I, Robot. Even if it is hopelessly hyped — there is a development system and I want one. It is the early days of the home computer all over again.
Science

Submission + - Soccer Superstar Plays With Very Low Brain Activity

jones_supa writes: Brazilian superstar Neymar's (Neymar da Silva Santos Júnior) brain activity while dancing past opponents is less than 10 per cent the level of amateur players, suggesting he plays as if on "auto-pilot", according to Japanese neurologists Eiichi Naito and Satoshi Hirose. The findings were published in the Swiss journal Frontiers in Human Neuroscience following a series of motor skills tests carried out on the 22-year-old Neymar and several other athletes in Barcelona in February this year. Three Spanish second-division footballers and two top-level swimmers were also subjected to the same tests. Researcher Naito told Japan's Mainichi Shimbun newspaper: "Reduced brain activity means less burden which allows [the player] to perform many complex movements at once. We believe this gives him the ability to execute his various shimmies." In the research paper Naito concluded that the test results "provide valuable evidence that the football brain of Neymar recruits very limited neural resources in the motor-cortical foot regions during foot movements".

Submission + - Private Data On iOS Devices, Not So Private (reuters.com)

theshowmecanuck writes: Personal data including text messages, contact lists and photos can be extracted from iPhones through previously unpublicized techniques by Apple Inc employees, the company acknowledged this week.

The same techniques to circumvent backup encryption could be used by law enforcement or others with access to the "trusted" computers to which the devices have been connected, according to the security expert who prompted Apple's admission.

Users are not notified that the services are running and cannot disable them, Zdziarski said. There is no way for iPhone users to know what computers have previously been granted trusted status via the backup process or block future connections.

Submission + - The Gene "STAR TREK" Roddenberry Project (kickstarter.com)

An anonymous reader writes: The Gene Roddenberry Project, based on found interview footage of Gene Roddenberry, is a half hour documentary exploring the genesis of Star Trek through the personal insight of its creator. A Kickstarter campaign is raising the funds needed to gather interviews from surviving cast members, Gene Roddenberry's family, and to license footage. Any additional funds will go into financing the biggest cost in a documentary of this nature; additional footage and music licensing.

https://www.kickstarter.com/pr...

Slashdot Top Deals

To do nothing is to be nothing.

Working...