Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Earth

Oklahoma Moves To Discourage Solar and Wind Power 504

Hugh Pickens DOT Com (2995471) writes "Paul Monies reports at NewsOK that Oklahoma's legislature has passed a bill that allows regulated utilities to apply to the Oklahoma Corporation Commission to charge a higher base rate to customers who generate solar and wind energy and send their excess power back into the grid reversing a 1977 law that forbade utilities to charge extra to solar users. 'Renewable energy fed back into the grid is ultimately doing utility companies a service,' says John Aziz. 'Solar generates in the daytime, when demand for electricity is highest, thereby alleviating pressure during peak demand.'

The state's major electric utilities backed the bill but couldn't provide figures on how much customers already using distributed generation are getting subsidized by other customers. Oklahoma Gas and Electric Co. and Public Service Co. of Oklahoma have about 1.3 million electric customers in the state. They have about 500 customers using distributed generation. Kathleen O'Shea, OG&E spokeswoman, said few distributed generation customers want to sever their ties to the grid. 'If there's something wrong with their panel or it's really cloudy, they need our electricity, and it's going to be there for them,' O'Shea said. 'We just want to make sure they're paying their fair amount of that maintenance cost.' The prospect of widespread adoption of rooftop solar worries many utilities. A report last year by the industry's research group, the Edison Electric Institute, warns of the risks posed by rooftop solar (PDF). 'When customers have the opportunity to reduce their use of a product or find another provider of such service, utility earnings growth is threatened," the report said. "As this threat to growth becomes more evident, investors will become less attracted to investments in the utility sector.''"
Education

L.A. Science Teacher Suspended Over Student Science Fair Projects 253

An anonymous reader writes "A high school science teacher at Grand Arts High School in Los Angeles was suspended from the classroom in February, after two of his science fair students turned in projects deemed dangerous by the administrators. "One project was a marshmallow shooter — which uses air pressure to launch projectiles. The other was an AA battery-powered coil gun — which uses electromagnetism to launch small objects. Similar projects have been honored in past LA County Science Fairs and even demonstrated at the White House."
Advertising

Google Aids Scientology-Linked Group CCHR With Pay-Per-Click Ads 186

An anonymous reader writes "The Citizens Commission on Human Rights (CCHR), a Scientology front group, has received a 'grant from Google in the amount of $10,000 per month worth of Pay Per Click Advertising to be used in our Orange County anti-psych campaigns.' CCHR believes that ALL psychiatrists are evil. They believe that psychiatrists were behind the holocaust, and these shadow men were never brought to justice. CCHR also believes that psychiatrists were behind the 911 attacks. Scientologists believe that psychiatrists have always been evil, and their treachery goes back 75 million years when the psychiatrists assisted XENU in killing countless alien life forms. Thanks Google! We may be able to stop these evil Psychs once and for all!"
Education

Ask Slashdot: Hungry Students, How Common? 390

Gud (78635) points to this story in the Washington Post about students having trouble with paying for both food and school. "I recall a number of these experiences from my time as grad student. I remember choosing between eating, living in bad neighborhoods, putting gas in the car, etc. Me and my fellow students still refer to ourselves as the 'starving grad students.' Today we laugh about these experiences because we all got good jobs that lifted us out of poverty, but not everyone is that fortunate. I wonder how many students are having hard time concentrating on their studies due to worrying where the next meal comes from. In the article I found the attitude of collage admins to the idea of meal plan point sharing, telling as how little they care about anything else but soak students & parents for fees and pester them later on with requests for donations. Last year I did the college tour for my first child, after reading the article, some of the comments I heard on that tour started making more sense. Like 'During exams you go to the dining hall in the morning, eat and study all day for one swipe' or 'One student is doing study on what happens when you live only on Ramen noodles!'

How common is 'food insecurity in college or high school'? What tricks can you share with current students?"

Comment Re:So - who's in love with the government again? (Score 2, Informative) 397

They didn't have the science to know it was asbestos causing health problems 4400 years ago. We have the science now. We figured out that it was a bad thing. Using modern science, we would know if feeding beer waste to cattle is bad. Perhaps in a thousand years to they might have new science that shows eat steaks from beer waste fed cattle increases the likelihood of cancer by .00001%.

Comment Re:So I was all "Social contract, move to Somalia" (Score 4, Insightful) 397

And how many people will consider beer waste handling as an important enough issue to vote out someone? None. They're going to be more interested in big ticket items like gay rights or abortion. This is how the government stealthes in an array of regulations that eventually consume our every moment.

Security

Heartbleed Used To Bypass 2-Factor Authentication, Hijack User Sessions 59

wiredmikey (1824622) writes "Security nightmares sparked by the Heartbleed OpenSSL vulnerability continue. According to Mandiant, now a unit of FireEye, an attacker was able to leverage the Heartbleed vulnerability against the VPN appliance of a customer and hijack multiple active user sessions. The attack bypassed both the organization's multifactor authentication and the VPN client software used to validate that systems connecting to the VPN were owned by the organization and running specific security software.

"Specifically, the attacker repeatedly sent malformed heartbeat requests to the HTTPS web server running on the VPN device, which was compiled with a vulnerable version of OpenSSL, to obtain active session tokens for currently authenticated users," Mandiant's Christopher Glyer explained. "With an active session token, the attacker successfully hijacked multiple active user sessions and convinced the VPN concentrator that he/she was legitimately authenticated."

After connecting to the VPN, the attacker attempted to move laterally and escalate his/her privileges within the victim organization, Mandiant said."

Comment Re:However.... (Score 1) 235

To prevent double-use like this, a company should say that you don't get paid until they've fixed the bug and issued a patch for it in their software, all without the exploit ever being spotted in the wild.

One problem with this is that there's already a documented history of companies rejecting bug reports and not paying the bounty, and then some time later include a fix for it in their periodic updates. It's basically the same process that causes a company's "app store" to reject a submitted tool to do a particular job, and then a few months later releasing their own app that does the same thing.

I know a good number of people who've been bitten by the latter, from both MS and Apple. In the case of a bug, it's a lot harder to document that this has happened, but various software guys I know express a strong suspicion that it has been done to them.

It's widely believed that corporations don't have ethics at all, only costs and income, which would easily explain this sort of fraudulent "offers" of rewards with no intent to pay. We've heard here often from lots of people who think that this is right and proper, and that corporations should only be motivated by the bottom line.

When combined with the growing penchant for treating someone who reports a security bug as a criminal "security hacker" and prosecuting people who report bugs in software products, this should reasonably make a sensible developer reluctant to take rewards programs seriously. Given an offer which could get you thanks and some money, or could land you in jail for your efforts, and no way to know beforehand which the company will do, why would you even consider letting them know your name?

(Actually, my name has appeared in numerous companies' lists of honored contributors thanks to my bug reports and patches. But I haven't sent in security-related bug reports to many companies, only to the ones I have reasons to believe I can trust.)

Comment Re:Eyeballs did not find bug ... (Score 1) 582

A second and more important fact is that the bug was not discovered by eyeballs on source code. The techniques used seem to be the same applied to proprietary closed source code. "âoeWe developed a product called Safeguard, which automatically tests things like encryption and authentication,â Chartier said. âoeWe started testing the product on our own infrastructure, which uses Open SSL. And thatâ(TM)s how we found the bug.â"

So you're say that when I, as a (professional ;-) programmer, create a chunk of code that tests for something, you don't think I should get any credit for what it discovers, because it's the code that discovered it, not me. This pretty much shoots down the value of nearly everything I do, because like most programmers, I spend most of my time writing and running my test suites; the actual product itself usually takes only a small percent of my work time.

Maybe I'm overly arrogant, but I disagree with this. I think that whatever a chunk of code does, the credit (or blame ;-) should go to the programmer, not the code or the cpu.

By similar reasoning, we might argue that the "many eyes" never actually discover any bugs at all, because the real work is done by the brain behind the eyes, not the eyes themselves. And with computer bugs, the human brain almost never figures out the bugs; it merely writes code that does appropriate testing, providing the brain with information that it could never have figured out by itself.

This is sorta the inverse of the old saw that guns don't kill people; it's saying that the human that pulled the trigger should get no blame for a killing, because it was the bullet (or maybe the trigger mechanism) that actually did the job.

Education

Student Records Kids Who Bully Him, Then Gets Threatened With Wiretapping Charge 798

An anonymous reader tips news of an incident in a Pennsylvania high school in which a student, Christian Stanfield, was being bullied on a regular basis. He used a tablet to make an audio recording of the bullies for the purpose of showing his mother how bad it was. She was shocked, and she called school officials to tell them what was going on. The officials brought in a police lieutenant — but not to deal with the bullies. Instead, the officer interrogated Stanfield and made him delete the recording. The officer then threatened to charge him with felony wiretapping. The charges were later reduced to disorderly conduct, and Stanfield was forced to testify before a magistrate, who found him guilty. Stanfield's mother said, "Christian's willingness to advocate in a non-violent manner should be championed as a turning point. If Mr. Milburn and the South Fayette school district really want to do the right thing, they would recognized that their zero-tolerance policies and overemphasis on academics and athletics have practically eliminated social and emotional functioning from school culture."

Update: 04/17 04:36 GMT by T : The attention this case has gotten may have something to do with the later-announced decision by the Allegheny County District Attorney's office to withdraw the charges against Stanfield.

Comment Re:Wat? (Score 5, Insightful) 582

No, just no. No one with any sort of a clue ever argued these issues cannot happen with Free Software.

No, they haven't made that claim in so many words. But they've sure as hell implied it for years now. That's the whole line of thought that Raymond's statement (quoted in TFS) is based on.

Huh? The quote is "given enough eyeballs, all bugs are shallow." That's a clear admission that open software, like all other software, contains bugs; that's why you want the many eyeballs. Any claim otherwise is a symptom of not understanding plain English. Eric's whole point was that the bugs in open software will be found and fixed faster than the bugs in other software, due to the population of interested people who will study it, looking for the bugs. Nothing in that quote implies (to anyone with reasonable understanding of English and basic logic) that open software doesn't have bugs. I expect Eric would just chuckle at the very idea of software without bugs.

(Actually, someone near him should ask him. Tell us whether he chuckles, or snickers, or just gets a sad look on his face. Or maybe he'll say "Well, there is a conjecture that bug-free software exists, but in has never been observed in the field by reliable observers." ;-)

A much more useful conclusion from this story (if you're serious about computer security) is that this bug has been found and fixed in OpenSSL, but with its proprietary competitors, we have no way of knowing what horrible exploits they may be hiding. And you'd be a dummy to think they don't have exploits; every chunk of security-related software has exploits. The meaningful question is whether they can be found and fixed by the people using the software. If not, you'd be a fool to use that software.

Slashdot Top Deals

"I've seen it. It's rubbish." -- Marvin the Paranoid Android

Working...