Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Canada

Ontario Government Wants To Regulate the Internet 184

An anonymous reader writes This afternoon, the Ontario government appeared before the CRTC as part of its future of television hearing. Michael Geist reports that it issued a clear call for new regulation of so-called new media companies such as Netflix and Google. The government states: "In order to create a more level playing field, the ministry recommends decreasing this regulatory imbalance. The ministry believes the best way to accomplish this is to expand the regulation of new media TV, rather than by lightening the current regulation of traditional TV." What does the expansion of regulation involve? For the Ontario government, it includes regulating foreign online video services such as Google and Netflix, but exempting Canadian services.
Verizon

AT&T Says 10Mbps Is Too Fast For "Broadband," 4Mbps Is Enough 533

An anonymous reader writes AT&T and Verizon have asked the FCC not to change the definition of broadband from 4Mbps to 10Mbps, contending that "10Mbps service exceeds what many Americans need today to enable basic, high-quality transmissions." From the article: "Individual cable companies did not submit comments to the FCC, but their representative, the National Cable & Telecommunications Association (NCTA), agrees with AT&T and Verizon. 'The Commission should not change the baseline broadband speed threshold from 4Mbps downstream and 1Mbps upstream because a 4/1 Mbps connection is still sufficient to perform the primary functions identified in section 706 [of the Telecommunications Act]—high-quality voice, video, and data,' the NCTA wrote."
Programming

Is It Time To Split Linux Distros In Two? 282

snydeq writes Desktop workloads and server workloads have different needs, and it's high time Linux consider a split to more adequately address them, writes Deep End's Paul Venezia. You can take a Linux installation of nearly any distribution and turn it into a server, then back into a workstation by installing and uninstalling various packages. The OS core remains the same, and the stability and performance will be roughly the same, assuming you tune they system along the way. Those two workloads are very different, however, and as computing power continues to increase, the workloads are diverging even more. Maybe it's time Linux is split in two. I suggested this possibility last week when discussing systemd (or that FreeBSD could see higher server adoption), but it's more than systemd coming into play here. It's from the bootloader all the way up. The more we see Linux distributions trying to offer chimera-like operating systems that can be a server or a desktop at a whim, the more we tend to see the dilution of both. You can run stock Debian Jessie on your laptop or on a 64-way server. Does it not make sense to concentrate all efforts on one or the other?"

Submission + - AT&T says 10Mbps is too fast for "Broadband," 4Mbps is enough 2

An anonymous reader writes: AT&T and Verizon have asked the FCC not to change the definition of broadband from 4Mbps to 10Mbps, contending that "10Mbps service exceeds what many Americans need today to enable basic, high-quality transmissions." From the article: "Individual cable companies did not submit comments to the FCC, but their representative, the National Cable & Telecommunications Association (NCTA), agrees with AT&T and Verizon. 'The Commission should not change the baseline broadband speed threshold from 4Mbps downstream and 1Mbps upstream because a 4/1 Mbps connection is still sufficient to perform the primary functions identified in section 706 [of the Telecommunications Act]—high-quality voice, video, and data,' the NCTA wrote."
Intel

Intel Launches Xeon E5 V3 Series Server CPUs With Up To 18 Cores 105

MojoKid writes Intel took the wraps off its Xeon E5 v3 server line-up today and the chip, based on Intel's Haswell-EP architecture, is looking impressive. Intel's previous generation Xeon E5 V2 chips, which were based on Ivy Bridge, topped out at 12 cores per socket. The new Xeon E5 v3 processors, in contrast, are going to push as high as 18 cores per socket — a 50% improvement. The TDP range is pushing slightly outwards in both directions; the E5 V2 family ranged from 50W to 150W, whereas the E5 V3 family will span 55W — 160W in a single workstation configuration. The core technologies Intel is introducing to the E5 V3 family pull from the Haswell architecture, including increased cache bandwidth, improved overall IPC, and new features like AVX2, which offers a theoretical near-doubling of floating point performance over the original AVX instructions. Full support for DDR4 DRAM memory is now included as well.
Education

Ask Slashdot: Robotics or Electronic Kits For Wounded Veterans? 115

An anonymous reader writes I am currently a combat veteran in the care of the VA Hospital. A lot of veterans here suffer from PTSD and other injuries related to combat and trauma. As part of the healing process, the VA finds it good that we take up hobbies such as art or music, and they supply us kits and stuff to put together and paint. This is great, but many of us younger veterans have an interest in robotics and electronics. Do you know of some good and basic robotic and electronic kits that can be ordered or donated to Veterans out there? Any information would be appreciated.
Books

Book Review: Architecting the Cloud 75

benrothke writes Most books about cloud computing are either extremely high-level quasi-marketing tomes about the myriad benefits of the cloud without any understanding of how to practically implement the technology under discussion. The other type of cloud books are highly technical references guides, that provide technical details, but for a limited audience. In Architecting the Cloud: Design Decisions for Cloud Computing Service Models, author Michael Kavis has written perhaps the most honest book about the cloud. Make no doubt about it; Kavis is a huge fan of the cloud. But more importantly, he knows what the limits of the cloud are, and how cloud computing is not a panacea. That type of candor makes this book an invaluable guide to anyone looking to understand how to effective deploy cloud technologies. Keep reading below for the rest of Ben's review.
Crime

Private Police Intelligence Network Shares Data and Targets Cash 142

Advocatus Diaboli writes Operating in collaboration with the U.S. Drug Enforcement Administration, Immigration and Customs Enforcement and other federal entities, Black Asphalt members exchanged tens of thousands of reports about American motorists, many of whom had not been charged with any crimes, according to a company official and hundreds of internal documents obtained by The Post. For years, it received no oversight by government, even though its reports contained law enforcement sensitive information about traffic stops and seizures, along with hunches and personal data about drivers, including Social Security numbers and identifying tattoos. Black Asphalt also has served as a social hub for a new brand of highway interdictors, a group that one Desert Snow official has called 'a brotherhood.' Among other things, the site hosts an annual competition to honor police who seize the most contraband and cash on the highways. As part of the contest, Desert Snow encouraged state and local patrol officers to post seizure data along with photos of themselves with stacks of currency and drugs. Some of the photos appear in a rousing hard-rock video that the Guthrie, Okla.-based Desert Snow uses to promote its training courses.
Microsoft

Microsoft Takes Down Slideshow-Building Tool After Getty Images Lawsuit 81

jfruh writes Slideshows are an increasingly popular (and, for publishers, lucrative) web content genre. So why not automate their production? Microsoft had a beta tool that was part of Bing Image Search that did just that, but took it down in the face of a lawsuit from Getty Images. It turns out that, unlike a human web content producer, Bing couldn't distinguish between images publishers have the rights to use and images they didn't.

Submission + - Salesforce Users Hit With Malware-Based Targeted Attack

An anonymous reader writes: Global cloud-based CRM provider Salesforce has sent out a warning to its account administrators about its customers being targeted by the Dyreza malware. Dyreza is a whole new banking Trojan family, which was first spotted earlier this year targeting customers of US and UK banks. The code is designed to work similar to ZeuS and, as most online banking threats, it supports browser hooking for Internet Explorer, Chrome and Firefox and harvests data at any point an infected user connects to the targets specified in the malware.
Businesses

Tesla Plans To Power Its Gigafactory With Renewables Alone 260

AmiMoJo writes In his press conference, Elon Musk stated that the factory will produce all of its own energy using a combination of solar, wind, and geothermal. Engineering.com looks at the feasibility of the plans. Spoiler alert: it looks possible, though some storage will be required. Fortunately, if there is one thing the Gigafactory won't be short of it's batteries. From the article: "The numbers don’t lie. The site could realistically produce more than 2900 MWh of renewable electricity each day ... 20% more than it needs. These are conservative estimates on production and worst-case estimates on consumption, and it’s clear that there’s enough renewable energy to run the plant with some to spare."
Crime

The Five Nigerian Gangs Behind Most Craigslist Buyer Scams 160

itwbennett writes Five Nigerian criminal gangs are behind most scams targeting sellers on Craigslist, and they've taken new measures to make their swindles appear legitimate, according to a study by George Mason University researchers Damon McCoy and Jackie Jones. In a new innovation, they're using professional check-writing equipment plus U.S.-based accomplices to not raise suspicions among their victims. McCoy and Jones will present their paper on Sept. 24 at the IEEE eCrime Research Summit in Birmingham, Alabama.
Science

How Scientific Consensus Has Gotten a Bad Reputation 770

nerdyalien writes From the article: "Fiction author Michael Crichton probably started the backlash against the idea of consensus in science. Crichton was rather notable for doubting the conclusions of climate scientists—he wrote an entire book in which they were the villains—so it's fair to say he wasn't thrilled when the field reached a consensus. Still, it's worth looking at what he said, if only because it's so painfully misguided: 'Let's be clear: the work of science has nothing whatever to do with consensus. Consensus is the business of politics. Science, on the contrary, requires only one investigator who happens to be right, which means that he or she has results that are verifiable by reference to the real world. In science consensus is irrelevant. What is relevant is reproducible results.'" As a STEM major, I am somewhat biased toward "strong" evidence side of the argument. However, the more I read literature from other, somewhat-related fields (i.e. psychology, economics and climate science), the more I felt they have little opportunity to repeat experiments, similar to counterparts in traditional hard science fields. Their accepted theories are based on limited historical occurrences and consensus among the scholars. Given the situation, it's important to understand what "consensus" really means.
The Courts

Feds Say NSA "Bogeyman" Did Not Find Silk Road's Servers 142

An anonymous reader writes The secret of how the FBI pinpointed the servers allegedly used by the notorious Silk Road black market website has been revealed: repeated login attempts. In a legal rebuttal, the FBI claims that repeatedly attempting to login to the marketplace revealed its host location. From the article: "As they typed 'miscellaneous' strings of characters into the login page's entry fields, Tarbell writes that they noticed an IP address associated with some data returned by the site didn't match any known Tor 'nodes,' the computers that bounce information through Tor's anonymity network to obscure its true source. And when they entered that IP address directly into a browser, the Silk Road's CAPTCHA prompt appeared, the garbled-letter image designed to prevent spam bots from entering the site. 'This indicated that the Subject IP Address was the IP address of the SR Server,' writes Tarbell in his letter, 'and that it was "leaking" from the SR Server because the computer code underlying the login interface was not properly configured at the time to work on Tor.'"
Moon

How Astrophysicists Hope To Turn the Entire Moon Into a Cosmic Ray Detector 74

KentuckyFC writes One of the great mysteries in astrophysics surrounds the origin of ultra-high energy cosmic rays, which can have energies of 10^20 electron volts and beyond. To put that in context, that's a single proton with the same energy as a baseball flying at 100 kilometers per hour. Nobody knows where ultra-high energy cosmic rays come from or how they get their enormous energies. That's largely because they are so rare--physicists detect them on Earth at a rate of less than one particle per square kilometer per century. So astronomers have come up with a plan to see vastly more ultra high energy cosmic rays by using the Moon as a giant cosmic ray detector. When these particles hit the lunar surface, they generate brief bursts of radio waves that a highly sensitive radio telescope can pick up. No radio telescope on Earth is currently capable of this but astronomers are about to start work on a new one that will be able to pick up these signals for the first time. That should help them finally tease apart the origins of these most energetic particles in the Universe .

Slashdot Top Deals

Real Programmers don't eat quiche. They eat Twinkies and Szechwan food.

Working...