Forgot your password?
typodupeerror

Submission Summary: 0 pending, 31 declined, 17 accepted (48 total, 35.42% accepted)

NASA

+ - Space Shuttle Endeavour's Final Journey

Submitted by
daveschroeder
daveschroeder writes "After over 296 days in space, nearly 123 million miles traveled, Space Shuttle Endeavour (OV-105) is making its final journey — on the streets of Los Angeles. The last Space Shuttle to be built, the contract for Endeavour was awarded on July 31, 1987. Endeavour first launched on May 7, 1992, launched for the last time on May 16, 2011, and landed for the final time on June 1, 2011. Endeavour then took to the skies aboard the Shuttle Carrier Aircraft (SCA), completing the final ferry flight and the final flight of any kind in the Space Shuttle Program era with an aerial grand tour of southern California escorted by two NASA Dryden Flight Research Center F/A-18 aircraft on September 21, 2012. This morning around 1:30AM Pacific Time, Endeavour began another journey, this one on the ground. All Space Shuttles have traveled via road from Air Force Plant 42 in Palmdale, CA, to Edwards Air Force Base, but this time a Space Shuttle is taking to the streets of Los Angeles for the journey from Los Angeles International Airport to its final home at the California Science Center. Getting the shuttle through LA surface streets is a mammoth logistical challenge as it lumbers along at 2 mph to the cheers of onlookers. Watching Endeavour make the journey is a sight to be seen! Thank you, Endeavour!"

+ - Pandemic bird flu research published-> 1

Submitted by
daveschroeder
daveschroeder writes "After a marathon debate over a pair of studies that show how the avian H5N1 influenza virus could become transmissible in mammals, and an unprecedented recommendation by the National Science Advisory Board for Biosecurity (NSABB) to block publication, and its subsequent reversal, a study by Yoshihiro Kawaoka at the University of Wisconsin–Madison was finally and fully published today in the journal Nature. The full journal article: Experimental adaptation of an influenza H5 HA confers respiratory droplet transmission to a reassortant H5 HA/H1N1 virus in ferrets."
Link to Original Source

+ - Stratfor Is a Joke, and So Is Wikileaks for Taking It Seriously->

Submitted by daveschroeder
daveschroeder (516195) writes "Max Fisher writes in The Atlantic: "The corporate research firm has branded itself as a CIA-like "global intelligence" firm, but only Julian Assange and some over-paying clients are fooled. [...] The group's reputation among foreign policy writers, analysts, and practitioners is poor; they are considered a punchline more often than a source of valuable information or insight. [...] So why do Wikileaks and their hacker source Anonymous seem to consider Stratfor, which appears to do little more than combine banal corporate research with media-style freelance researcher arrangements, to be a cross between CIA and Illuminati? The answer is probably a combination of naivete and desperation."
Link to Original Source
Apple

+ - India mobile handset backdoor memo (probably) a fa->

Submitted by daveschroeder
daveschroeder (516195) writes "In the wake of previous coverage alleging that Apple, Nokia, RIM, and others have provided Indian government with backdoors into their mobile handsets — which itself spawned a US investigation and questions about handset security — it turns out the memo which ignited the controversy is probably a fake designed to draw attention to the "Lords of Dharmaraja." According to Reuters, "Military and cyber-security experts in India say the hackers may have created the purported military intelligence memo simply to draw attention to their work, or to taint relations between close allies India and the United States." Apple has already denied providing access to the Indian government."
Link to Original Source
NASA

+ - Supreme Court unanimously upholds NASA JPL backgro-> 1

Submitted by daveschroeder
daveschroeder (516195) writes "Scientists at NASA's Jet Propulsion Laboratory have been fighting background check requirements mandated under Homeland Security Presidential Directive 12 (HSPD-12) since 2007. HSPD-12 is designed to implement a "common identification standard for federal employees and contractors." A standard federal background check is a part of this process. This process is standardized by the federal Office of Personnel Management (OPM), even for employees who have no access to classified information. The Ninth Circuit Court of Appeals provisionally agreed with the employees, and the case worked its way to the US Supreme Court. Now the justices have unanimously ruled that JPL scientists must submit to background checks if they want to keep their jobs. Justice Antonin Scalia wrote in his concurrence that, "The contention that a right deeply rooted in our history and tradition bars the government from ensuring that the Hubble telescope is not used by recovering drug addicts farcical," and continued that "that there is no constitutional right to 'informational privacy'.""
Link to Original Source

+ - Why WikiLeaks Is Unlike the Pentagon Papers->

Submitted by daveschroeder
daveschroeder (516195) writes "The recent release of classified State Department cables has often been compared to the Pentagon Papers. Daniel Ellsberg, the US military analyst who leaked the Pentagon Papers, has said he supports WikiLeaks, and sees the issues as similar. Floyd Abrams is the prominent First Amendment attorney and Constitutional law expert who represented the New York Times in the landmark New York Times Co. v. United States (403 U.S. 713 (1971)) Supreme Court case, which allowed the media to publish the Pentagon Papers without fear of government censure. Today, Abrams explains why WikiLeaks is unlike the Pentagon Papers, and how WikiLeaks is negatively impacting journalism protections: "Mr. Ellsberg himself has recently denounced the 'myth' of the 'good' Pentagon Papers as opposed to the 'bad' WikiLeaks. But the real myth is that the two disclosures are the same.""
Link to Original Source
Education

+ - Woman gets Ubuntu, drops out of school

Submitted by
das
das writes "A Wisconsin student recently ordered a new Dell laptop, planning to enroll in online courses at a local community college. However, she ordered her laptop with the Ubuntu Linux option. When she realized that it wouldn't ship with Windows, she called back Dell, which said there was still time to change her order. But she claims that Dell discouraged her, saying that "Ubuntu was great, college students loved it, it was compatible with everything I needed." So her computer arrived with Ubuntu. Then she realized that her Windows-only "Verizon High-Speed Internet CD" wouldn't load (no software needs to be loaded to use Verizon DSL), and unable to install Microsoft Office, a requirement for her online courses (the laptop shops with OpenOffice, fully compatible with Microsoft Office), she dropped out of the fall and spring semesters. This article — which prompted a firestorm of criticism — may be humorous, but it raises a bigger question about the acceptance of Linux. This computer, with Ubuntu, would handle everything she needs easily — email, web, and Microsoft Office-compatible documents. But when the perception is that Windows and its trappings are mandatory, how can that be reasonably countered?"
Government

+ - New report on NSA released today

Submitted by
daveschroeder
daveschroeder writes "George Washington University has today released a three volume history of its activities during the Cold War. Written by agency historian Thomas R. Johnson, the 1000-page report, "Cryptology during the Cold War, 1945-1989", details some of the agency's successes and failures, its conflict with other intelligence agencies, and the questionable legal ground on which early American cryptologists worked. The report remained classified for years, until Johnson mentioned it to Matthew Aid, an intelligence historian, at an intelligence conference. Aid and the George Washington University's National Security Archive joined forces to obtain the report — intended for internal agency consumption only — from the NSA. Two years later, an abstract and the three current volumes of the report are now available via the George Washington University National Security Archive in PDF format. Aid, a National Security Archive visiting fellow Matthew and author of the forthcoming history "The Secret Sentry: The Top Secret History of the National Security Agency", says Johnson's study shows "refreshing openness and honesty, acknowledging both the NSA's impressive successes and abject failures during the Cold War." A fourth volume remains classified."
United States

+ - Insurrection Act back to the way it was in 1807 1

Submitted by
daveschroeder
daveschroeder writes "Back in 2006, there was much controversy about changes to the Insurrection Act of 1807 in the wake of Hurricane Katrina, giving the President additional specific abilities to deploy federal or state national guard troops within the United States during major public emergency situations. Some interpreted this as discarding the Posse Comitatus Act of 1878, when the text of Posse Comitatus always contained an explicit exemption for "Act[s] of Congress", and the Insurrection Act had allowed the deployment of troops within the US by the President in certain exigent circumstances for two centuries. Nevertheless, the changes were met with criticism and misunderstanding. In any event, the changes have been repealed in their entirety several months ago, in Section 1068 of the National Defense Authorization Act for Fiscal Year 2008. This brings the text of all sections back to their original 1807 wording. There was a great deal of coverage about these changes when they occurred. Why is there not a similar level of coverage of the repeal, even months later?"
Networking

+ - Iran may shut down internet during election-> 1

Submitted by
daveschroeder
daveschroeder writes "The Iranian government might block private access to the Internet for the general legislative election on March 14, two Iranian news outlets reported Monday. In 2006, the authorities banned download speeds on private computers faster than 128 kilobytes per second. The government also uses sophisticated filtering equipment to block hundreds of Web sites and blogs that it considers religiously or politically inappropriate. Many bloggers have been jailed in the past years, and dozens of Web sites have been shut down. It would appear that Iran's own government is more a threat to the nation's internet connectivity than the fragility of the undersea cable network. (Slashdot readers may recall assertions, dismissed by undersea cable experts, that the cable cuts were a deliberate attempt to sever Iran's connectivity, which, contrary to popular belief, also never happened.)"
Link to Original Source
Hardware Hacking

+ - Apple issues warning on iPhone unlocking

Submitted by
daveschroeder
daveschroeder writes "Today Apple issued a statement which says, "Apple has discovered that many of the unauthorized iPhone unlocking programs available on the Internet cause irreparable damage to the iPhone's software, which will likely result in the modified iPhone becoming permanently inoperable when a future Apple-supplied iPhone software update is installed." This does not include "hacking" the phone to install third party applications or ringtones, only unlocking the phone. This is because unlocking changes the baseband radio firmware, which is expected to be updated along with the next iPhone update to address other issues. Apple adds, "This has nothing to do with proactively disabling a phone that is unlocked or hacked. It's unfortunate that some of these programs have caused damage to the iPhone software, but Apple cannot be responsible for...those consequences." While unlocking a phone is legal for an end user under a current DMCA exemption, the vendor is under no obligation to guarantee the phone will remain as such when official software updates are applied; many users of unlocked handsets simply never update the phone, but the iPhone is in a different category. It is likely that since the current unlocking mechanisms use a broader buffer overflow condition, this will also be fixed in the next software update.

Note to editors: the already-submitted story in the firehose is remarkably incorrect (has NOTHING to do with "hacking", just unlocking), so please don't accept it."
Networking (Apple)

+ - iPhones not flooding wireless LAN at Duke

Submitted by
Dave Schroeder
Dave Schroeder writes "On the heels of the recent story about iPhones flooding the wireless LAN at Duke, it has been determined that it wasn't iPhones at all. Duke has issued a statement explaining that the issue was a Cisco-based network issue, for which Cisco has provided a fix. MacDailyNews has more coverage and commentary, asking, "So, does Duke University owe Apple recompense for hundreds of damaging articles that blamed Apple's iPhone for Duke's Cisco problem?""
Technology (Apple)

+ - Apple and AT&T announce iPhone service plans

Submitted by
daveschroeder
daveschroeder writes "Apple and AT&T today announced service plans for iPhone, 4 days before its release in the US at 6pm local time on Friday, June 29. The plans are $59.99/mo for 450 minutes, $79.99 for 900 minutes, and $99.99 for 1350 minutes, and all include unlimited data, 200 SMS messages, rollover minutes, and unlimited mobile-to-mobile calling. Any other standard AT&T service plan may also be used. A two year service plan is required, with a $175 cancellation fee if terminated early. In addition, activations are done via iTunes, so only the hardware is purchased in the store. Interestingly, activation of a contract via iTunes is required to enable the iPod/syncing functionality of the phone as well. (It will remain to be seen whether there are workarounds for this for those who only want the iPod functionality of iPhone, and whether the iPhone is easily unlockable for those who wish to try it on alternate carriers, and so on.)"
Media (Apple)

+ - Steve Jobs on DRM

Submitted by
das
das writes "Apple CEO Steve Jobs has posted his thoughts on music, DRM, and online media distribution as a whole. Jobs provides a brief history of the iTunes Music Store, some breakdowns of the origins of music on iPods, and some arguments why Apple had to deploy iTunes Music Store commercial content with DRM. Jobs then goes on to offer some alternatives for going forward. The option he seems to support is abolishing DRM entirely, saying, "Imagine a world where every online store sells DRM-free music encoded in open licensable formats. In such a world, any player can play music purchased from any store, and any store can sell music which is playable on all players. This is clearly the best alternative for consumers, and Apple would embrace it in a heartbeat. [...] Why would the big four music companies agree to let Apple and others distribute their music without using DRM systems to protect it? The simplest answer is because DRMs haven't worked, and may never work, to halt music piracy. [...] [W]hat benefits do [music companies] get from selling [online] music encumbered with a DRM system? There appear to be none. [...] Convincing [a major music label] to to license their music to Apple and others DRM-free will create a truly interoperable music marketplace. Apple will embrace this wholeheartedly." It appears that Apple isn't interested in iTunes Music Store lock-in after all."

Life's the same, except for the shoes. - The Cars

Working...