Become a fan of Slashdot on Facebook


Forgot your password?
Slashdot Deals: Cyber Monday Sale Extended! Courses ranging from coding to project management - all eLearning deals 20% off with coupon code "CYBERMONDAY20". ×

Submission + - USPS discriminates against "Athiest" merchandise ( 3

fish waffle writes: Suspecting that their strongly branded "Athiest" products may be treated differently by more religiously-oriented postal regions, Kickstarter success Athiest Shoes conducted an experiment. They sent 178 envelopes to 89 people in different parts of the US, each person receiving one envelope prominently branded as "Athiest" merchandise, and one not. The results: packages with the athiest label were nearly 10 times more likely to never be received, and took on average 3 days longer to show up when they did. Control experiments were also done in Europe and Germany---it's definitely a USPS problem.

Submission + - Where is the safest place to host a website? 2

aztracker1 writes: Given the number of intrusions in terms of U.S. (and its' allies) based hosting providers turning over data without a warrant, and rulings that consider "cloud" data to not be private, I have to ask. Where is the safest place to host a web server these days?

I've been thinking of putting some data services up, and have no problem with responding to limited court orders, or even paying income taxes on any profits made. I do have a problem with client data potentially being seized without due process.

Submission + - Caltech and UVic set 339Gbps internet speed record ( 1

MrSeb writes: "Engineers at Caltech and the University of Victoria in Canada have smashed their own internet speed records, achieving a memory-to-memory transfer rate of 339 gigabits per second (5.3GB/s), 187Gbps (2.9GB/s) over a single duplex 100-gigabit connection, and a max disk-to-disk transfer speed of 96Gbps (1.5GB/s). At a sustained rate of 339Gbps, such a network could transfer four million gigabytes (4PB) of data per day — or around 200,000 Blu-ray movie rips. These speed records are all very impressive, but what’s the point? Put simply, the scientific world deals with vasts amount of data — and that data needs to be moved around the world quickly. The most obvious example of this is CERN’s Large Hadron Collider; in the past year, the high-speed academic networks connecting CERN to the outside world have transferred more than 100 petabytes of data. It is because of these networks that we can discover new particles, such as the Higgs boson. In essence, Caltech and the University of Victoria have taken it upon themselves to ride the bleeding edge of high-speed networks so that science can continue to prosper."
The Internet

Submission + - EU Telecom Companies Favouring UN Internet Takeover Bid (

hypnosec writes: The European Telecommunications Network Operators Association (ENTO) put forwards its points supporting the controversial proposal of handing over the control of the Internet to UN’s regulatory body – the International Telecommunications Union (ITU). A decision will be taken regarding changes to the International Telecommunications Regulations (ITR) treaty, which has not been revised since 1998, during the World Conference on International Telecommunications (WCIT) to be held in Dubai from December 3 to 14, 2012. Only national governments are allowed to vote on the treaty but, as ENTO pays more than $70k annually to the ITU, it too has the right to participate in the WCIT and vote on the treaty. ENTO has proposed measures that would effectively change the settlement-free peering arrangements [PDF] between major Internet backbones, which to date is the most common type of interconnection between major networks. The proposal put forward by the ENTO seeks 193 signatory countries to establish a new "sending party network pays" (SPNP) model for interconnection whereby high-volume (non-EU) Internet content providers will have to pay to EU companies as they will be responding to information requests from ENTO's local customers.

Submission + - Cross-cultural Variation in Male Homosexuality (

dinoalexit writes: "Comparisons of different primate species suggest that male homosexuality evolved along with male cooperation which passed through distinct stages of 1) marking territories, 2) marking submissive males via mechanisms previously used for territorial markings, 3) marking alliances via mutual gestures of dominance and submission. Among humans, exclusive male homosexuals are at the extreme submissive end of a dominant/submissive personality continuum. Individuals at the two extremes of this continuum do not reproduce — extreme dominants because they die in fights, and extreme submissives because they do not attempt reproduction. However, due to the selective advantage of individuals with genes for both dominance and submission, individuals at the extremes of the continuum continue to appear in accordance with Mendelian laws. Psychological research on the the characteristics of male homosexuals and on general attitudes toward homosexuals agrees with the predictions from this theory."
The Internet

Submission + - Remembering John Postel (

KDan writes: "John Postel made significant contributions many of the key protocols and RFCs that power the internet (IP, TCP, etc). Of particular relevance today was his stance against US government control of the top-level domains: John Postel transfered the DNS root authority to non-governmental servers, but was overruled by Ira Magaziner, Clinton's science adviser, and forced to reverse the change.

In the current circumstances, this blog post is particularly relevant."


Submission + - TrueCrypt developers complain about MS secret API.

Futurepower(R) writes: "TrueCrypt developers have complained to a Microsoft representative about Microsoft's secret disk encryption API. They say that, if they don't get satisfaction, they will file a complaint with the European Commission. These are the relevant paragraphs:

"As Microsoft does not provide any API for handling hibernation, all non-Microsoft developers of disk encryption software are forced to modify undocumented components of Windows in order to allow users to encrypt hibernation files. Therefore, no disk encryption software (except for Microsoft's BitLocker) can guarantee that hibernation files will always be encrypted. At anytime, Microsoft can arbitrarily modify components of Windows (using the auto-update feature of Windows) that are not publicly documented or accessible via a public API. Any such change, or the use of an untypical or custom storage device driver, may cause any non-Microsoft disk encryption software to fail to encrypt the hibernation file. We plan to file a complaint with Microsoft (and if rejected, with the European Commission) about this issue, also due to the fact that Microsoft's disk encryption software, BitLocker, is not disadvantaged by this."

"[Update 2008-04-02: Although we have not filed any complaint with Microsoft yet, we were contacted (on March 27) by Scott Field, a lead Architect in the Windows Client Operating System Division at Microsoft, who stated that he would like to investigate our requirements and look at possible solutions. We responded on March 31 providing details of the issues and suggested solutions.]"

Truecrypt is free and open source. Many people think that encryption software must be open source because of the need to guard against hidden behavior. Truecrypt provides file encryption, full partition encryption, including encrypting boot partitions, and even hidden encryption."

A rock store eventually closed down; they were taking too much for granite.