Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: Anthem is a publicly traded company (Score 3, Interesting) 48

by hamjudo (#49193105) Attached to: Anthem Blocking Federal Auditor From Doing Vulnerability Scans
Anthem is traded on the NYSE under the symbol WLP.

They should be required to file an 8K form to legally inform all of their stock holders that they have material news that may adversely affect their future stock price, or even company viability.

After having been informed of extreme security issues on our network, Anthem Inc has elected to ignore the situation. Furthermore, Anthem Inc's network is so embarrassing, that Anthem Inc has decided to risk significant fines and legal expenses, rather than allow adults to see just how bad it is.

Translation, shareholder lawsuits may be addressed to Joseph R. Swedish, et al.

Comment: There is science here (Score 4, Interesting) 21

by hamjudo (#49176945) Attached to: Rosetta Photographs Its Own Shadow On Comet 67P/C-G
This is more than just a selfie, the shadow cast by a known object adds depth, scale, and many other scientifically interesting details about the comet, and about the space craft itself.

And for those who like science fiction... If any aliens are riding the Rosetta probe, they will have to duck while the picture is being taken.

+ - How Google avoids downtime->

Submitted by Brandon Butler
Brandon Butler (2829853) writes "Google has an innovative way of attempting to keep its services — like its cloud platform and apps — up and running as much as possible. The man in charge of it is Ben Trenyor, who runs Google's Site Reliability Engineer (SRE) team.

Each Google product has a service level agreement (SLA) that dictates how much downtime the product can have in a given month or year. Take 99.9% uptime, for example: That allows for 43 minutes of downtime per month, or about 8 hours and 40 minutes per year. That 8 hours and 40 minutes is what is referred to at Google as an “error budget.”

Google product managers don’t have to be perfect — they just have to be better than their SLA guarantee. So each product team at Google has a “budget” of errors it can make.
If the product adheres to the SLA’s uptime promise, then the product team is allowed to launch new features. If the product is outside of its SLA, then no new features are allowed to be rolled out until the reliability improves.

In a traditional site reliability model there is a fundamental disconnect between site reliability engineers (SREs) and the product managers. Product managers want to keep adding services to their offerings, but the SREs don’t like changes because that opens the door to more potential problems.

This “error budget” model addresses that issue by uniting the priorities of the SREs and product teams. The product developers want to add more features, so they architect reliable systems. It seems to work; according to tracking company CloudHamrony, Google had one of the most reliable IaaS clouds among the major vendors in 2014."

Link to Original Source

Comment: Test your security with false information (Score 4, Interesting) 89

by hamjudo (#49143043) Attached to: OPSEC For Activists, Because Encryption Is No Guarantee
In the days of brick and mortar spying, the people being spied on would send messages that included false meeting times and locations. For example, in a town with underground utilities, announce a meeting to take place in a rarely used manhole. If the manhole cover is disturbed, then you know that the communication channel has been compromised. No math is required.

The high tech equivalent would be to mention a network resource where access can be monitored. When the network resource is accessed, you know there is a problem.

Comment: Re:Who cares about rotational speed these days? (Score 1) 190

If your data is valuable, you will need to mirror the drives or use RAID. So one limitation is how quickly you can add a drive to your mirror system.

It would take 11 hours to fully mirror from one 6 TByte WD drive to another, if your system can actually manage to sustain 138Mbytes per second as shown on page 5 of the article. Obviously, the transfer will be slower, if the data is actually used for something.

If a disk dies, at best you are looking at half a day before the system is fully redundant again. Probably multiple days in the real world.

Comment: Chicken tissue is a stand in for human soft tissue (Score 3, Informative) 81

by hamjudo (#48483053) Attached to: Single Pixel Camera Takes Images Through Breast Tissue
They are working with 6 mm samples. They need to improve that by a factor of 5. Only a small percentage of women at risk for breast cancer can tolerate having their breasts compressed to 30 mm for imaging, but it is a large enough percentage to start doing human test trials. Assuming the image quality is high enough.

With existing xray based mammogram machines the more the breast is compressed, the better the image. There is abundant research on breast compression for imaging, just a google away.

Perhaps in a few years, this technique will be refined to the point where it can image through 3 cm of tissue in a reasonable amount of time, and produce a clinically useful image. Then we will hear about this technique again. Hopefully, it will be improved to the point where it is suitable for use on the entire population.

Comment: Re: your car analogy is umm close. (Score 2) 51

by hamjudo (#48475381) Attached to: Riecoin Breaks World Record For Largest Prime Sextuplet, Twice

It's like there is this long, infinite road and along this road are mile markers and every so often one of these mile markers has a rest stop at it. Mile marker 3, 5, 9, and so on. The farther your drive however the more you notice how spread out these rest stops are, eventually having thousands upon thousands of miles between them. Then, as in this article, you discover a pack of six rest stops very close to each other when all the other ones were thousands of mile markers apart. Thats probably the closest I can get this to a car analogy.

There are rest stops at 2, 3, 5, 7, 11, 13, and so on, but 9 is not a rest stop. The first two overlapping sets of six rest stops aren't spaced the same as the rest, and thus don't have the same mathematical properties. The Riecoin compliant prime sextuplets, err, I mean rest stops on the infinite highway are {7, 11, 13, 17, 19, 23} and {97, 101, 103, 107, 109, 113}, except they are too small for cryptography.

+ - Scientists Study Frequency Distribution of Paraphilia

Submitted by HughPickens.com
HughPickens.com (3830033) writes "Antonia Molloy reports at The Independent that scientists at the University of Montreal have completed a study of what exactly constitutes an atypical sexual fantasy or paraphilia. They set out to define sexual deviation by grouping sexual fantasies according to how widespread they are. For example, dreaming about sleeping with two women is common, while fantasizing about having sex with an animal is not. “Clinically, we know what pathological sexual fantasies are: they involve non-consenting partners, they induce pain, or they are absolutely necessary in deriving satisfaction. But apart from that, what exactly are abnormal or atypical fantasies?” The scientists asked 1,517 Quebec adults (799 men and 718 women) to rank 55 different sexual fantasies, as well as to describe their own favorite fantasy in detail. Of this sample, 85.1 per cent were heterosexual, 3.6 per cent were homosexual and the remainder identified as neither of these. Overall, it was found that men had more fantasies than women and they also described these more vividly.

One theory of sexual fantasies is that our fantasies are psychological mechanisms for coping with anxiety but the number and taxonomy of paraphilias is under debate; One source lists as many as 549 types of paraphilias. The Canadian study found that thirty sexual fantasies were common for one or both genders. A significant proportion of women (30 per cent to 60 per cent) had fantasies involving elements of submission – but many also specified that they never wanted these to come true. By contrast, the majority of men did want their fantasies to become reality. "Our main objective was to specify norms in sexual fantasies, an essential step in defining pathologies," says Christian Joyal, lead author of the study. "And as we suspected, there are a lot more common fantasies than atypical fantasies.""

Comment: Home Depot is getting off cheap (Score 5, Interesting) 99

by hamjudo (#48330589) Attached to: Home Depot Says Hackers Grabbed 53 Million Email Addresses
TFA says that Home Depot expects to pay "$62 million this year to recover from the incident", referring to exposing the details on 56 million credit cards. That's only $1.11 per exposed card. I used a credit card there during the period, so my Credit Union sent me a new card, plus two other physical letters about the incident. That had to cost them more than $1.11 per affected customer.

Comment: Is it legal to make code compatible alternatives? (Score 1) 700

by hamjudo (#48206101) Attached to: FTDI Reportedly Bricking Devices Using Competitors' Chips.
The fake chips that have FTDI stamped on the outside of the package are clearly misusing the FTDI trademark. On the other hand, those that don't cheat with the labels, and only use the string "FTDI" so they will inter-operate with existing software should be legal. I am not a lawyer. My opinion of what should be legal may not match what the courts rule as legal.

+ - FTDI is intentionally bricking devices using competitors' chips. ->

Submitted by janoc
janoc (699997) writes "It seems that FTDI has started an outright war on cloners of their popular USB bridge chips. At first the clones stopped working with the official drivers and now they are being intentionally bricked, rendering the device useless. The problem? These chips are incredibly popular and used in many consumer products. Are you sure yours doesn't contain a counterfeit one before you plug it in? What are you going to do if your device gets trashed?

The article is on Hackaday: http://hackaday.com/2014/10/22..."

Link to Original Source

+ - Smallest possible diamonds form ultra-thin nanothread->

Submitted by drcosquared
drcosquared (1720540) writes "Researchers in the Badding Lab at Penn State University have made diamond nanothreads through the compression of benzene molecules."These nanothreads promise extraordinary properties such as strength and stiffness higher than that of sp2 carbon nanotubes or conven tional high-strength polymers15. They may be the first member of a new class of ordered sp3 nanomaterials synthesized by kinetic control of high-pressure solid-state reactions." Nature Materials"
Link to Original Source

"I'm not afraid of dying, I just don't want to be there when it happens." -- Woody Allen

Working...