Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Slashdot Deals: Deal of the Day - Pay What You Want for the Learn to Code Bundle, includes AngularJS, Python, HTML5, Ruby, and more. ×

Submission + - ULA concedes GPS competition to SpaceX

schwit1 writes: ULA has decided against bidding on a military GPS launch contract, leaving the field clear for SpaceX.

ULA, which for the past decade has launched nearly every U.S. national security satellite, said Nov. 16 it did not submit a bid to launch a GPS 3 satellite for the Air Force in 2018 in part because it does not expect to have an Atlas 5 rocket available for the mission. ULA has been pushing for relief from legislation Congress passed roughly a year ago requiring the Air Force to phase out its use of the Russian-made RD-180 engine that powers ULA’s workhorse Atlas 5 rocket.

This decision might be a lobbying effort by ULA to force Congress to give them additional waivers on using the Atlas 5 engine. Or it could be that they realize that they wouldn’t be able to match SpaceX’s price, and decided it was pointless wasting time and money putting together a bid. Either way, the decision suggests that ULA is definitely challenged in its competition with SpaceX, and until it gets a new lower cost rocket that is not dependent on Russian engines, its ability to compete in the launch market will be seriously hampered.

Comment Re:That's (Score 1) 113

Apple has claimed it's not vulnerable to e.g. sending IP packets directly to IP addresses if those IP packets are SIP packets, with no substantiation. SIP applications can use TLS as well, making packet inspection difficult.

Most carriers use NAT's to reduce down the number of IP addresses needed for servicing mobile phones. That NAT usage will also block most unsolicited incoming IP level traffic. I.E. Traffic originating on mobile teleco's VoIP network will get through and no one else., so this becomes a non-issue.

Comment Re: And you call the Americans anti-science (Score 1) 330

Half of All Children Will Be Autistic by 2025, Warns Senior Research Scientist at MIT seams to be somewhat serious problem. for a product that was invented as a descaling agent to clean out calcium and other mineral deposits in pipes and boilers

GMO/roundup exposed crops grown are deficient in minerals necessary for a healthy metabolism. While our bodies aren't directly affected by roundup residues. It kills off gut bacteria which symbiotically aids in our digestion.

Submission + - Scientists Invent a New Steel as Strong as Titanium (popularmechanics.com) 1

schwit1 writes: South Korean researchers have solved a longstanding problem that stopped them from creating ultra-strong, lightweight aluminum-steel alloys.

Today a team of material scientists at Pohang University of Science and Technology in South Korea announced what they're calling one of the biggest steel breakthroughs of the last few decades: an altogether new type of flexible, ultra-strong, lightweight steel. This new metal has a strength-to-weight ratio that matches even our best titanium alloys, but at one tenth the cost, and can be created on a small scale with machinery already used to make automotive-grade steel. The study appears in Nature.

Submission + - Poll: What electronics do you want in your car 1

sleepypsycho writes: What electronics do you want in you car?
- Self driving car
- Collision avoidance
- Integrated electronics system: gps, audio,tire pressure warnings
- Completed isolate systems: gps, fuel injection
- Nothing with a computer chip
- I don't want any kind of car
- Roof mounted death ray

Comment Re:Not surprising (Score 1) 303

I've dealt with dozens of lightning strikes here in lightning prone South Florida.
Direct lightning strikes usually take out a Enet port on the switch and whatever is connected to the other end PC/laptop enet port.

Lost my laptop PCI cardbus bus devices, 1Gb enet, Wifi, memory card reader and a switch port on the other end.
Usually extra grounding, and multiple layers of surge suppressors/chokes protects my electronics.

Note: The ethernet spec, includes isolation requirements in the several Kilo Volt range. Thus something like this won't do much damage. You'll need something more like a HV stun weapon to do some real damage.

Submission + - Was Carly a failure at HP? 7

MouseTheLuckyDog writes: With Carly Fiorina, now running for President, her tenure at HP is once again under a microscope. A recent article claims that her stay wasn't as bad as it seemed. The main argument is a graph of HP, IBM,, Dell and Sun's stock performance.

My own take is the graph is "cooked". Sun, for the most part, never generic desktops or laptops. Furthermore Sun mostly depended on Sparc chips which were on their last legs at the time. The end result is that the graph looks like one you would expect of three French vintners and one California vintner. Sun's 200% peak ( due to java ) makes variations in the other 3 companies performances look small.

Furthermore, Apple is glaringly missing. If Apple were included, the graph would be a flatline clearly showing the graph was cooked. With Apple in, they would have to cut the graph off at 2007 showing a more realistic view of Carly's performance.

So what do you think. Was the article correct? What do you think of Fiorina's job at HP? ( From what I remember "worst CEO ever" about sums it up. ) Links from that period of time would be appreciated, since I think it is going to be a long election season and the issue will not go away anytime soon.

Comment Re:Brian Krebs rocks (Score 1) 44

He got lucky, that these criminals aren't a bit smarter and invested a bit more effort into their hack. I.E.Adding a BT stealth mode.

Where the hacked modules shut down BT transmission, until they received certain mac id's. Which would make them completely undetectable except by close visual inspection. :-(

A somewhat reliable counter measure would be to,
1st, Separate the money loading into a different compartment that doesn't give access to the electronics.
2nd, Restrict down (people wise) and log all access to electronics section.
3rd, The moment the electronics bay is opened, the ATM is disabled. (Except for testing), until turned back on by head quarters.
4th, When the tech is done servicing the electronics sections he/she sends a time stamped photos of electronics+visible serial number+selfie (in front of locked up ATM still in diag mode) to HQ and then calls in to re-activate ATM

Submission + - Intel Kills a Top-of-the-Line Processor (itworld.com)

itwbennett writes: In June of this year, Intel announced a processor branded as Broadwell-C. Now, the company has confirmed that the part was cancelled but would not give an official reason. Why did Intel kill the Broadwell-C? ITworld's Andy Patrizio speculates that it's a 'combination of increased cost, lower yield and potential product cannibalization' — cannibalization of the company's newly-launched Skylake processor, which the Broadwell-C outperformed.

Submission + - WSJ: We Need the Right to Repair Our Gadgets (wsj.com)

An anonymous reader writes: An editorial in the Wall Street Journal rings a bell we've been ringing for years: "Who owns the knowledge required to take apart and repair TVs, phones and other electronics? Manufacturers stop us by controlling repair plans and limiting access to parts. Some even employ digital software locks to keep us from making changes or repairs. This may not always be planned obsolescence, but it’s certainly intentional obfuscation." The article shows that awareness of and frustration with this consumer-hostile behavior is going mainstream. The author links to several DIY repair sites like iFixit, and concludes, "Repairing stuff isn’t as complicated as they want you to think. Skilled gadget owners and independent repair pros deserve access to the information they need to do the best job they can."

Comment Re: Should be another entry... (Score 1) 159

Superstorm Katrina even as a CAT-3 was more powerful than your typical CAT-5. Katrina had an Eye wall over 60 miles in diameter, thus breaking all storm surge records. Even for the area that was hit by Cat-5 Hurricane Camile (1969, 11-12 miles) or Andrew (1992, 8 miles).

2005 spawned two more Cat-5 Superstorms, Rita, and Wilma.. Wilma later took aim at South Florida, even as weakened Cat-3 it did a lot of damage.

My area got hit by both Katrina(as a Cat-1), and by CAT-3 Wilma's eastern and southern eye walls. I lost power for a total of 15 days, for others it was much longer.

My observation, If any of these Super-storms had retained Cat-5 status while coming ashore. The resulting outcomes would have been far worse.

Submission + - Ashley Madison CEO Steps Down // Reporter Finds Clues To Hacker's Identity

Dave Knott writes: Following the recent hacks on the infidelity website Ashley Madison, Noel Biderman has stepped down as CEO of both AshleyMadison.com and its parent company. Avid Life Media Inc., the company that owns the site and many others, announced Biderman's move in a short press release on Friday: "Noel Biderman, in mutual agreement with the company, is stepping down as chief executive officer of Avid Life Media Inc. (ALM) and is no longer with the company. Until the appointment of a new CEO, the company will be led by the existing senior management team." Before the data hack, the company was planning an IPO in London that would have taken in as much as $200 million US from investors. According to regulatory filings, the company had $115 million in revenue last year, more than four times the amount it obtained in 2009.

Meanwhile, in related news, Brian Krebs (the reporter who first uncovered the hack) says that he has uncovered clues to the possible identity of the hacker. Krebs says that he noticed that the Twitter account operated by a known hacker recently posted a link to Ashley Madison's stolen proprietary source code before it was made public. Intrigued by the poster's apparent access, he examined the account's posting history and noticed a predilection for the music of Australian hard rock band AC/DC. This jibes with the behaviour of the hacker(s), who had displayed threatening messages on the computers of Ashley Madison employees, accompanied by AC/DC song Thunderstruck. In a series of tweets, the owner of the account, one Thadeus Zu, appears to deny that he was behind the hack, and indeed makes several suggestions that the account itself isn't even run by one person, but is instead an amalgam of like-minded digital vigilantes.

Submission + - Google May Try to Recruit You for a Job Depending on What You Search For

HughPickens.com writes: If Google sees that you're searching for specific programming terms, they may ask you to apply for a job as Max Rossett writes that three months ago while working on a project, he Googled “python lambda function list comprehension.” The familiar blue links appeared on the search page, and he started to look for the most relevant one. But then something unusual happened. The search results split and folded back to reveal a box that said “You’re speaking our language. Up for a challenge?” Clicking on the link took Rossett to a page called "foo.bar" that outlined a programming challenge and gave instructions on how to submit his solution. "I had 48 hours to solve it, and the timer was ticking," writes Rossett. "I had the option to code in Python or Java. I set to work and solved the first problem in a couple hours. Each time I submitted a solution, foo.bar tested my code against five hidden test cases."

After solving another five problems the page gave Rossett the option to submit his contact information and much to his surprise, a recruiter emailed him a couple days later asking for a copy of his resume. Three months after the mysterious invitation appeared, Rossett started at Google. Apparently Google has been using this recruiting tactic for some time. "Foo.bar is a brilliant recruiting tactic," concludes Rossett. "Overall, I enjoyed the puzzles that they gave me to solve, and I’m excited for my first day as a Googler."

The shortest distance between two points is under construction. -- Noelie Alito