New submitter TheRealHocusLocus writes "The FCC is drafting rules to formalize the process of transition of 'last-mile' subscriber circuits to digital IP-based data streams. The move is lauded by AT&T Chairman Tom Wheeler who claims that significant resources are spent to maintain 'legacy' POTS service, though some 100 million still use it. POTS, or 'Plain Old Telephone Service,' is the analog standard that allows the use of simple unpowered phone devices on the wire, with the phone company supplying ring and talk voltage. I cannot fault progress, in fact I'm part of the problem: I gave up my dial tone a couple years ago because I needed cell and could not afford to keep both. But what concerns me is, are we poised to dismantle systems that are capable of standing alone to keep communities and regions 'in-touch' with each other, in favor of systems that rely on centralized (and distant) points of failure? Despite its analog limitations POTS switches have enforced the use of hard-coded local exchanges and equipment that will faithfully complete local calls even if its network connections are down. But do these IP phones deliver the same promise? For that matter, is any single local cell tower isolated from its parent network of use to anyone at all? I have had a difficult time finding answers to this question, and would love savvy Slashdot folks to weigh in: In a disaster that isolates the community from outside or partitions the country's connectivity — aside from local Plain Old Telephone Service, how many IP and cell phones would continue to function?"
An anonymous reader writes "HP has been the sole holdout on the Itanium, mostly because so much of the PA-RISC architecture lives on in that chip. However, the company recently began migration of Integrity Superdome servers from Itanium to Xeon, and now it has announced that the top of its server line, the NonStop series, will migrate to x86 as well, presumably the 15-core E7 V2 Intel will release next year. So while no one has said it, this likely seems the end of the Itanium experiment, one that went on a lot longer than it should have, given its failure out of the gate."
Hugh Pickens DOT Com writes "Dan Goodwin writes at Ars Technica about a rootkit that seems straight out of a science-fiction thriller. According to security consultant Dragos Ruiu one day his MacBook Air, on which he had just installed a fresh copy of OS X, spontaneously updated the firmware that helps it boot. Stranger still, when Ruiu then tried to boot the machine off a CD ROM, it refused and he also found that the machine could delete data and undo configuration changes with no prompting. Next a computer running the Open BSD operating system also began to modify its settings and delete its data without explanation or prompting and further investigation showed that multiple variants of Windows and Linux were also affected. But the story gets stranger still. Ruiu began observing encrypted data packets being sent to and from an infected laptop that had no obvious network connection with—but was in close proximity to—another badBIOS-infected computer. The packets were transmitted even when the laptop had its Wi-Fi and Bluetooth cards removed. Ruiu also disconnected the machine's power cord so it ran only on battery to rule out the possibility it was receiving signals over the electrical connection. Even then, forensic tools showed the packets continued to flow over the airgapped machine. Then, when Ruiu removed internal speaker and microphone connected to the airgapped machine, the packets suddenly stopped. With the speakers and mic intact, Ruiu said, the isolated computer seemed to be using the high-frequency connection to maintain the integrity of the badBIOS infection as he worked to dismantle software components the malware relied on. It's too early to say with confidence that what Ruiu has been observing is a USB-transmitted rootkit that can burrow into a computer's lowest levels and use it as a jumping off point to infect a variety of operating systems with malware that can't be detected. It's even harder to know for sure that infected systems are using high-frequency sounds to communicate with isolated machines. But after almost two weeks of online discussion, no one has been able to rule out these troubling scenarios, either. 'It looks like the state of the art in intrusion stuff is a lot more advanced than we assumed it was,' says Ruiu. 'The take-away from this is a lot of our forensic procedures are weak when faced with challenges like this. A lot of companies have to take a lot more care when they use forensic data if they're faced with sophisticated attackers.'"
MojoKid writes "Anyone who has tried to host their own website from home likely knows all-too-well the hassles that ISPs can cause. Simply put, ISPs generally don't want you to do that, preferring you to move up to a business package (aka: more expensive). Not surprisingly, the EFF doesn't like these rules, which seem to exist only to upsell you a product. The problem, though, is that all ISPs are deliberately vague about what qualifies as a 'server.' Admittedly, when I hear the word 'server,' I think of a Web server, one that delivers a webpage when accessed. The issue is that servers exist in many different forms, so to target specific servers 'just because' is ridiculous (and really, it is). Torrent clients, for example, act as servers (and clients), sometimes resulting in a hundred or more connections being established between you and available peers. With a large number of connections like that being allowed, why would a Web server be classified any different? Those who torrent a lot are very likely to be using more ISP resources than those running websites from their home — yet for some reason, ISPs force you into a bigger package when that's the kind of server you want to run. We'll have to wait and see if EFF's movement will cause any ISP to change. Of all of them, you'd think it would have been Google to finally shake things up."
The 5D mk 2 has a 'green box' mode, and it seriously constrains your options in nearly all the menus.
Typical absolute max storage temps are from -65 to 150 C (-85 to 302 F). 130 degrees F is only 55 degrees C, which even commercial chips are fine to operate at (they typically go to 70 C (158 F). I don't think a cop sitting in -20F temperature is giong to try to operate a laptop. Obviously, rotating drives is a different issue - I'd use SSD in my car for vibration sake.
New kalalau_kane writes with this tidbit from Extreme Tech: "A group of European researchers has proposed the largest quantum network yet: Between Earth and the International Space Station. Such a network would see entangled photons transmitted over a distance of 250 miles — two or three times greater than previous quantum communication experiments. Not only will this be the first quantum experiment in space, but it will allow the scientists to see if entanglement really is instantaneous over long distances, and whether it's affected by gravity." The proposal (licensed CC BY).
An anonymous reader writes "A small U.S. university has come up with a novel solution to reduce the possibility of using a dead person's hand to get past a fingerprint scanner through the use of hemoglobin detection. The device quickly checks the fingerprint and hemoglobin 'non-intrusively' to verify the identity and whether the individual is alive. This field of research is called Biocryptology and seeks to ensure that biometric security devices can't be easily bypassed."
One very useful definition of a supercomputer is "any computer with performance within an order of magnitude of the fastest computer on the TOP500 list".
Reducing various items to a fine powder in one of his blenders earned Blendtec CEO Tom Dickson a cult following. One of, if not the greatest viral marketing campaigns of all time, the "Will It Blend?" series has been watched almost 221,000,000 times on YouTube. In addition to receiving many marketing awards, Tom and his blenders have been featured on The Tonight Show and the History Channel series Modern Marvels. He has agreed to take a break from pureeing household objects and answer your questions. As usual, you're invited to ask as many questions as you'd like, but please divide them, one question per post.
10.x.x.x was DEC's class A address block in the days before the great renaming.
An anonymous reader writes "I am tasked with developing a service project to teach students in a Bangladeshi village how to type. The school has about 500 students, 12 computers donated to them in 2006, and a limited electricity supply. The students will be given job placement opportunities at a local firm in the city once they reach a certain proficiency. Therefore, we are trying to teach as many of them typing skills as possible. The problem: limited electricity, limited computers, many kids. I have some additional funding collected through donations. Instead of buying more computers, I am looking for a cost effective way that does not need a steady flow of electricity. I realize that to teach typing, I do not need a computer. I could achieve the same using a keyboard connected to a display. A solar powered calculator is a perfect example of a cheap device which has a numpad for input and an LCD for display. But so far I have not come across a device that has a qwerty keyboard and an LCD to display what's typed. I know there are some gaming keyboards that have LCDs built in but they are quite expensive. I am aiming to build a device that cost below USD 50. I considered using typewriters but they are in limited supply on the market. I also considered OLPC but it is double my anticipated budget. Do you have other suggestions?" Considering that (at least in China) sub-$50 Android tablets with capacitive screens are already here, I wish the Alphasmart line was cheaper, but apparently it currently starts at $169.
"Never debug standing up" -- Gerald Weinberg
MrSeb writes "Neuroengineers at MIT have created an implantable fuel cell that generates electricity from the glucose present in the cerebrospinal fluid that flows around your brain and spinal cord. The glucose-powered fuel cell is crafted out of silicon and platinum, using standard semiconductor fabrication processes. The platinum acts as a catalyst, stripping electrons from glucose molecules, similar to how aerobic animal cells (such as our own) strip electrons from glucose with enzymes and oxygen. The glucose fuel cell produces hundreds of microwatts (i.e. tenths of a milliwatt), which is a surprisingly large amount — it comparable to the solar cell on a calculator, for example. This should be more than enough power to drive complex computers — or perhaps more interestingly, trigger clusters of neurons in the brain. In theory, this glucose fuel cell will actually deprive your brain of some energy, though in practice you probably won't notice (or you might find yourself growing hungry sooner)."
Trailrunner7 writes "Yahoo on Wednesday launched a new browser called Axis and researchers immediately discovered that the company had mistakenly included its private signing key in the source file, a serious error that would allow an attacker to create a malicious, signed extension for a browser that the browser will then treat as authentic. The mistake was discovered on Wednesday, soon after Yahoo had launched Axis, which is both a standalone browser for mobile devices as well as an extension for Firefox, Chrome, Safari and Internet Explorer. ... Within hours of the Axis launch, a writer and hacker named Nik Cubrilovic had noticed that the source file for the Axis Chrome extension included the private PGP key that Yahoo used to sign the file. That key is what the Chrome browser would look for in order to ensure that the extension is legitimate and authentic, and so it should never be disclosed publicly."