Questioning his belief in relational database dogma, new submitter Travis Brown happened to evaluate Amazon's Dynamo DB and MonogDB. His situation was the opposite of Jeff Cogswell's: he started off wanting to prefer Dynamo DB, but came to the conclusion that the benefits of Amazon managing the database for him didn't outweigh the features Mongo offers. From the article: "DynamoDB technically isn't a database, it's a database service. Amazon is responsible for the availability, durability, performance, configuration, optimization and all other manner of minutia that I didn't want occupying my mind. I've never been a big fan of managing the day-to-day operations of a database, so I liked the idea of taking that task off my plate. ... DynamoDB only allows you to query against the primary key, or the primary key and range. There are ways to periodically index your data using a separate service like CloudSearch, but we are quickly losing the initial simplicity of it being a database service. ... However, it turns out MongoDB isn't quite as difficult as the nerds had me believe, at least not at our scale. MongoDB works as advertised and auto-shards and provides a very simple way to get up and running with replica sets." His weblog entry has a few code snippets illustrating how he came to his conclusions.
Nerval's Lobster writes "Software developer Jeff Cogswell, who matched up Java and C# and peeked under the hood of Facebook's Graph Search, is back with a new tale: why his team decided to go with Amazon's DynamoDB over MongoDB when it came to building a highly customized content system, even though his team specialized in MongoDB. While DynamoDB did offer certain advantages, it also came with some significant headaches, including issues with embedded data structures and Amazon's sometimes-confusing billing structure. He offers a walkthrough of his team's tips and tricks, with some helpful advice on avoiding pitfalls for anyone interested in considering DynamoDB. 'Although I'm not thrilled about the additional work we had to do (at times it felt like going back two decades in technology by writing indexes ourselves),' he writes, 'we did end up with some nice reusable code to help us with the serialization and indexes and such, which will make future projects easier.'"
Jeremiah Cornelius writes "Researchers with the European Food Safety Authority discovered variants of the Cauliflower mosaic virus 35S in the most widely harvested varieties of genetically-modified crops, including Monsanto's RoundupReady Soy and Maze. According to the researchers, Podevin and du Jardin, the particular 'Gene VI' is responsible for a number of possible consequences that could affect human health, including inhibition of RNA silencing and production of proteins with known toxicity. The EFSA is endorsing 'retrospective risk assessment' of CaMV promoter and its Gene VI sequences — in an attempt to give it a clean bill of health. It is unknown if the presence of the hidden viral genes were the result of laboratory contamination or a possible recombinant product of the resultant organism. There are serious implications for the production of GMO for foodstuffs, given either possibility."
An anonymous reader writes "Despite billions of dollars in advanced electronics, radar, and sonar it seems the Navy needs to install backup cameras on their boats. 'The Pentagon said late Saturday that it is investigating why a Navy submarine collided with an Aegis cruiser during routine operations at an undisclosed location.' According to ABC, 'the two ships were participating in a “group sail” along with another vessel. The three ships were participating in an anti-submarine exercise in preparation for an upcoming deployment as part of the strike group for the aircraft carrier USS Harry S Truman."
hypnosec writes "A new report by an open source internet measurement platform, Measurement Lab, sheds light onto throttling of and restriction on BitTorrent traffic by ISPs (Internet Service Providers) across the globe. The report by Measurement Lab reveals that hundreds of ISPs across the globe are involved in the throttling of peer-to-peer traffic, and specifically BitTorrent traffic. The Glasnost application run by the platform helps in detecting whether ISPs shape traffic. Tests can be carried out to check whether the throttling or blocking is carried out 'on email, HTTP or SSH transfer, Flash video, and P2P apps including BitTorrent, eMule and Gnutella.' Going by country, United States has actually seen a drop in throttling compared to what it was back in 2010. Throttling in the U.S. is worst for Cox at 6 per cent and best for Comcast, Verizon, AT&T and others at around 3 per cent. The United Kingdom is seeing a rise in traffic shaping and BT is the worst at 65 per cent. Virgin Media throttles around 22 per cent of the traffic while the least is O2 at 2 per cent. More figures can be found here."
An anonymous reader writes "A U.S. government report released on Tuesday says the Federal Communications Commission needs to update its guidelines for limiting cell phone radio-frequency exposure. The limit was set in 1996 to an exposure rate of 1.6 watts per kilogram, and has not been updated since. The report does not advocate in favor of any particular research, and actually points out that the limit could possibly be raised, but says the FCC's rules have not kept pace with recent studies on the subject one way or the other. An executive for The Wireless Association said, 'The FCC has been vigilant in its oversight in this area and has set safety standards to make sure that radio frequency fields from wireless phones remain at what it has determined are safe levels. The FCC's safety standards include a 50-fold safety factor and, as the FCC has noted, are the most conservative in the world.'"
Nerval's Lobster writes "For the past 40-some years, relational databases have ruled the data world. Relational models first appeared in the early 1970s thanks to the research of computer science pioneers such as E.F. Codd. Early versions of SQL-like languages were also developed in the early 70s, with modern SQL appearing in the late 1970s, and becoming popular by the mid-1980s. For the past couple of years, the Internets have been filled with heated arguments regarding SQL vs NoSQL. But is the fight even legitimate? NoSQL databases have grown up a bit (and some, such as Google's BigTable, are now mature) and prove themselves worthy. And yet the fight continues. Tech writer (and programmer) Jeff Cogswell examines both sides from a programming perspective."
bs0d3 writes "In regards to the new 'voluntary' graduated response deal (where no one really knows how ISPs will track and accuse customers of copyright infringement), according to CNN, it may be the ISP directly spying on their customers. 'But now that they're free from individual blame, there's also the strong possibility that the ISPs will be doing the data monitoring directly. That's a much bigger deal. So instead of reaching out to the Internet to track down illegally flowing bits of their movies, the studios will sit back while ISP's "sniff" the packets of data coming to and from their customers' computers.' This could be a problem for people who use U.S.-based internet services. If the U.S. wants to be an internet savvy country, they still need the competition in the marketplace that's always been missing, and a digital bill of rights that isn't a sneaky anti-piracy measure."
An anonymous reader writes "London's Metropolitan Police have delivered an 'Extradition Notice' to Julian Assange, the Wikileaks founder, who sought refuge and political asylum in the Ecuadorian embassy in London last week. Scotland Yard have said in a brief statement that 'the notice requires Julian Assange to attend a police station of our choosing at a set time.' SY also said, 'This is standard procedure in extradition cases and is the first step in the removal process. He remains in breach of his bail conditions and failure to surrender would be a further breach of those conditions and he is liable to arrest.' However, under international diplomatic arrangements, the British Metropolitan Police cannot actually go into the Ecuadorian embassy to arrest Mr Assange. Assange would have to leave the embassy to be lawfully arrested. This raises the following question of course: Is this the 'endgame' for Julian Assange as far as extradition is concerned? If the Ecuadorians fail to grant Assange political asylum, which is a possibility, will he be arrested by Metropolitan Police, and sent to Sweden to stand trial for two alleged counts of 'rape?' Will Sweden then hand Assange over to the United States, where many well known and quite senior politicians have publicly stated that they think 'Assange should be punished severely' for publishing confidential U.S. diplomatic cables on Wikileaks?"
mikejuk writes "Two former Facebook developers have created a new database that they say is the world's fastest and it is MySQL compatible. According to Eric Frenkiel and Nikita Shamgunov, MemSQL, the database they have developed over the past year, is thirty times faster than conventional disk-based databases. MemSQL has put together a video showing MySQL versus MemSQL carrying out a sequence of queries, in which MySQL performs at around 3,500 queries per second, while MemSQL achieves around 80,000 queries per second. The documentation says that MemSQL writes back to disk/SSD as soon as the transaction is acknowledged in memory, and that using a combination of write-ahead logging and snapshotting ensures your data is secure. There is a free version but so far how much a full version will cost isn't given." (See also this article at SlashBI.)
Nerval's Lobster writes "NoSQL databases sometimes feature a concept called document storage, a way of storing data that differs in radical ways from the means available to traditional relational SQL databases. But what does 'document storage' actually mean, and what are its implications for developers and other IT pros? This SlashBI article focuses on MongoDB; the techniques utilized here are similar in other document-based databases."
eldavojohn writes "American news outlets like The New York Times seem to thrive on chemophobia — consumer fear of the ambiguous concept of 'chemicals.' As a result, Pulitzer-prize winning science writer Deborah Blum has decided to call out New York Times journalist Nicholas Kirstof for his secondary crusade (she notes he is an admirable journalist in other realms) against chemicals. She's quick to point out the absurdity of fearing chemicals like Hydrogen which could be a puzzler considering its integral role played in life-giving water as well as life-destroying hydrogen cyanide. Another example is O2 versus O3. Blum calls upon journalists to be more specific, to avoid the use of vague terms like 'toxin' let alone 'chemical' and instead inform the public with lengthy chemical names like perfluorooctanoic acid (PFOA) instead of omitting the actual culprit altogether. Kristof has, of course, resorted to calling makers of these specific compounds 'Big Chem' and Blum chastises his poorly researched reporting along with chemophobic lingo. Chemists of Slashdot, have you found reporting on 'chemicals' to be as poor as Blum alleges or is this no more erroneous than any scare tactic used to move newspapers and garner eyeballs?"
mr crypto writes with this quote from El Reg: "In 2010 the Washington DC election board announced it had set up an e-voting system for absentee ballots and was planning to use it in an election. However, to test the system, it invited the security community and members of the public to try and hack it three weeks before the election. 'It was too good an opportunity to pass up,' explained Professor Alex Halderman from the University of Michigan. 'How often do you get the chance to hack a government network without the possibility of going to jail?' With the help of two graduate students, Halderman started to examine the software. Despite it being a relatively clean Ruby on Rails build, they spotted a shell injection vulnerability within a few hours. They figured out a way of writing output to the images directory (PDF) on the compromised server, and of encrypting traffic so that the front-end intrusion detection system couldn't spot them. The team also managed to guess the login details for the terminal server used by the voting system. ... The team altered all the ballots on the system to vote for none of the nominated candidates. They then wrote in names of fictional IT systems as candidates, including Skynet and (Halderman's personal favorite) Bender for head of the DC school board."
Velcroman1 writes "Julian Assange's investors are in the process of purchasing a boat to move WikiLeaks servers offshore in an attempt to evade prosecution from U.S. law enforcement, FoxNews.com has learned. Multiple sources within the hacker community with knowledge of day-to-day WikiLeaks activities say Assange's financial backers have been working behind the scenes on the logistics of moving the servers to international waters. One possible location: the Principality of Sealand, a rusty, World War II-era, former anti-aircraft platform off the coast of England in the North Sea. Based on a 1968 British court ruling that the facility is outside the jurisdiction of the United Kingdom, Sealand's owner has declared the facility a sovereign state, or 'micro-nation.'"