Government

Senator Makes NASA Complete $350 Million Testing Tower That It Will Never Use 342

Hugh Pickens DOT Com writes "Phillip Swarts reports in the Washington Times that NASA is completing a $350 million rocket-engine testing tower at Stennis Space Center in Mississippi that it doesn't want and will never use. 'Because the Constellation Program was canceled in 2010, the A-3's unique testing capabilities will not be needed and the stand will be mothballed upon completion (PDF),, said NASA's inspector general. The A-3 testing tower will stand 300 feet and be able to withstand 1 million pounds of thrust (PDF). The massive steel structure is designed to test how rocket engines operate at altitudes of up to 100,000 feet by creating a vacuum within the testing chamber to simulate the upper reaches of the atmosphere. Although NASA does not expect to use the tower after construction, it's compelled by legislation from Sen. Roger F. Wicker (R-MS), who says the testing tower will help maintain the research center's place at the forefront of U.S. space exploration. 'Stennis Space Center is the nation's premier rocket engine testing facility,' says Wicker. 'It is a magnet for public and private research investment because of infrastructure projects like the A-3 test stand. In 2010, I authored an amendment to require the completion of that particular project, ensuring the Stennis facility is prepared for ever-changing technologies and demands.' Others disagree, calling the project the 'Tower of Pork' and noting that the unused structure will cost taxpayers $840,000 a year to maintain. 'Current federal spending trends are not sustainable, and if NASA can make a relatively painless contribution to deficit reduction by shutting down an unwanted program, why not let it happen?' says Pete Sepp, executive vice president of the National Taxpayers Union. 'It's not rocket science, at least fiscally.'"
Medicine

Animal Drug Investigation Reveals Pet Medication Often Doesn't Work 279

KentuckyFC writes: "Americans spent an estimated $14.2 billion on veterinary care for their pets in 2013 — and that doesn't even include proprietary health diets and food supplements. Put another way, pet owners pay about $850 annually in veterinary expenses per dog, and about $575 per cat. Factor in the emotional energy we invest in keeping our companion animals healthy, and you'd hope for high confidence in the end results. But when one journalist investigated the science behind the meds being used to treat his aging dog's osteoarthritis, he was in for a nasty surprise. Glucosamine and chondroitin food supplements? Next to useless. Tramadol to kill pain? It's probably just getting dogs high. The one treatment that's been proven to help, a non-steroidal anti-inflammatory drug called carprofen, is often left on the shelf because of fears — likely overblown — that it might damage dogs' kidneys. In part, you can blame this sorry state of affairs on a lack of financial incentives for drug companies to run clinical trials on animals. But often, vets aren't paying attention to the studies that have been done. If we want our dogs and cats to receive the best possible medical care, we need to ask our vets some tougher questions about why they think the drugs will work."
Technology

The Scent Rhythm Watch Tells Time By Releasing Fragrances 79

Zothecula writes "Glancing at a clock face in one form or another has been the de facto way to measure the passage of time. Aisen Caro Chacin though, is exploring a different perspective. She wants to give everyone the ability to tell time using their noses. Her chemical-based watch called the Scent Rhythm emits specially-designed fragrances in minute doses, in tune with circadian cycle of the human body. You get a fragrance of coffee in the morning, the smell of money in the afternoon, a relaxing whiskey scent in the evening, and a soothing chamomile fragrance at night. More than being merely pleasant, each chemically-supplemented scent aims to induce action appropriate to the time of day; the caffeine in the coffee scent for example, aims to trigger the person into being more active."
Chrome

Adware Vendors Buying Chrome Extensions, Injecting Ads 194

An anonymous reader writes "Ars reports that the developers of moderately popular Chrome extensions are being contacted and offered thousands of dollars to sell ownership of those extensions. The buyers are then adding adware and malware to the extensions and letting the auto-update roll it out to end users. The article says, 'When Tweet This Page started spewing ads and malware into my browser, the only initial sign was that ads on the Internet had suddenly become much more intrusive, and many auto-played sound. The extension only started injecting ads a few days after it was installed in an attempt to make it more difficult to detect. After a while, Google search became useless, because every link would redirect to some other webpage. My initial thought was to take an inventory of every program I had installed recently—I never suspected an update would bring in malware. I ran a ton of malware/virus scanners, and they all found nothing. I was only clued into the fact that Chrome was the culprit because the same thing started happening on my Chromebook—if I didn't notice that, the next step would have probably been a full wipe of my computer.'"
Google

Bennett Haselton: Google+ To Gmail Controversy Missing the Point 244

Bennett Haselton writes "Google created controversy by announcing that Google+ users will now be able to send email to Gmail users even without having those Gmail users' email addresses. I think this debate misses the point, because it's unlikely to create a deluge of unsolicited email to Gmail users, as long as Google can throttle outgoing messages from Google+ users and terminate abusive accounts. The real controversy should be over the fact that Google+ users can search a public database of the names of all Gmail users in the first place. And limiting the ability of Google+ users to write to those Gmail accounts, won't do anything to address that." Read below to see what Bennett has to say.
United States

The New York Times Pushes For Clemency For Snowden 354

Hugh Pickens DOT Com writes "The Editorial Board of the New York Times has weighed in on the criminal charges facing Edward Snowden and writes that 'Snowden deserves better than a life of permanent exile, fear and flight..' 'He may have committed a crime to do so, but he has done his country a great service. It is time for the United States to offer Mr. Snowden a plea bargain or some form of clemency that would allow him to return home, face at least substantially reduced punishment in light of his role as a whistle-blower, and have the hope of a life advocating for greater privacy and far stronger oversight of the runaway intelligence community.' The president said in August that Snowden should come home to face charges in court and suggested that if Snowden had wanted to avoid criminal charges he could have simply told his superiors about the abuses, acting, in other words, as a whistle-blower. In fact, notes the editorial board, the executive order regarding whistleblowers did not apply to contractors, only to intelligence employees, rendering its protections useless to Snowden. More important, Snowden told The Washington Post that he did report his misgivings to two superiors at the agency, showing them the volume of data collected by the NSA, and that they took no action. 'Snowden was clearly justified in believing that the only way to blow the whistle on this kind of intelligence-gathering was to expose it to the public and let the resulting furor do the work his superiors would not. ... When someone reveals that government officials have routinely and deliberately broken the law, that person should not face life in prison at the hands of the same government,' concludes the editorial. 'President Obama should tell his aides to begin finding a way to end Mr. Snowden's vilification and give him an incentive to return home.'"
Privacy

NSA Drowns In Useless Data, Impeding Work, Former Employee Claims 120

An anonymous reader writes in with this story of confusion at the NSA due to the flood of data they harvest. "Some of the documents released by Mr. Snowden detail concerns inside the NSA about drowning in information. An internal briefing document in 2012 about foreign cellphone-location tracking by the agency said the efforts were 'outpacing our ability to ingest, process and store' data. In March 2013, some NSA analysts asked for permission to collect less data through a program called Muscular because the 'relatively small intelligence value it contains does not justify the sheer volume of collection,' another document shows. In response to questions about Mr. Binney's claims, an NSA spokeswoman says the agency is 'not collecting everything, but we do need the tools to collect intelligence on foreign adversaries who wish to do harm to the nation and its allies.'"
Your Rights Online

Proposed California Law Would Mandate Smartphone Kill Switch 252

alphadogg writes "Kill-switch technology that can render a lost or stolen smartphone useless would become mandatory in California under a new bill that will be proposed to the state legislature in January. The bill will be introduced by Senator Mark Leno, a Democrat representing San Francisco and neighboring towns, and George Gascón, the district attorney for San Francisco. Gascón has been spearheading a push by major law-enforcement agencies across the U.S. for more to be done to prevent smartphone theft. The proposed law could reach well beyond the borders of California. Because of the difficulty and added cost of producing handsets solely for sale in California, it could serve to make kill-switch technology a standard feature on phones sold across the U.S."
The Almighty Buck

How To Lose $172,222 a Second For 45 Minutes 327

An anonymous reader writes "Investment firm Knight Capital made headlines in 2012 for losing over $400 million on the New York Stock Exchange because of problems with their algorithmic trading software. Now, the owner of a Python programming blog noticed the release of a detailed SEC report into exactly what went wrong (PDF). It shows how a botched update rollout combined with useless or nonexistent process guidelines cost the company over $172,000 a second for over 45 minutes. From the report: 'When Knight used the Power Peg code previously, as child orders were executed, a cumulative quantity function counted the number of shares of the parent order that had been executed. This feature instructed the code to stop routing child orders after the parent order had been filled completely. In 2003, Knight ceased using the Power Peg functionality. In 2005, Knight moved the tracking of cumulative shares function in the Power Peg code to an earlier point in the SMARS code sequence. Knight did not retest the Power Peg code after moving the cumulative quantity function to determine whether Power Peg would still function correctly if called. ... During the deployment of the new code, however, one of Knight's technicians did not copy the new code to one of the eight SMARS computer servers. Knight did not have a second technician review this deployment and no one at Knight realized that the Power Peg code had not been removed from the eighth server, nor the new RLP code added. Knight had no written procedures that required such a review.'"
Books

Book Review: Getting Started With Drupal Commerce 37

Michael Ross writes "An online store is one of the most common use cases for a website nowadays. For those web developers and business owners who choose the current version of Drupal as a basis for such an e-commerce project, the canonical solution is Drupal Commerce. There are numerous online resources for learning Commerce, and yet for the longest time no printed book. Now we have Getting Started with Drupal Commerce, written by Richard Jones." Read below for the rest of Michael's review.
Intel

Intel Shows 14nm Broadwell Consuming 30% Less Power Than 22nm Haswell 88

MojoKid writes "Kirk Skaugen, Senior Vice President and General Manager of the PC Client Group at Intel, while on stage, at IDF this week snuck in some additional information about Broadwell, the 14nm follow up to Haswell that was mentioned during Brian Krzanich's opening day keynote. In a quick demo, Kirk showed a couple of systems running the Cinebench multi-threaded benchmark side-by-side. One of the systems featured a Haswell-Y processor, the other a Broadwell-Y. The benchmark results weren't revealed, but during the Cinebench run, power was being monitored on both systems and it showed the Broadwell-Y rig consuming roughly 30% less power than Haswell-Y and running fully loaded at under 5 watts. Without knowing clocks and performance levels, we can't draw many conclusion from the power numbers shown, but they do hint at Broadwell-Y's relative health, even at this early stage of the game."
Games

Mechwarrior Online Developer Redefines Community Warfare 189

New submitter MeatoBurrito writes "The latest iteration of Mechwarrior was crowdfunded (without Kickstarter) as a free-to-play first-person mech simulator. However, despite promises to the founders, the game has been shifted to a third-person arcade shooter and now the community is rioting. This followed a series of other unpopular decisions; the developers decided to sell an item for real money that had a significant impact on gameplay, crossing the line separating cosmetic/convenience items and 'pay-to-win.' Then they added a confusing game mechanic to limit its use, which had the unfortunate side effect of making some strategies completely useless. From the article: 'PGI’s community practices showcase a fundamental misunderstanding of both freemium development and community management. The developer has never had to deal with such a large player base before, and it has never had to deal with the strains of continuous development before. Rather, PGI seems to be handling Mechwarrior Online in much the same way they might a AAA game: by keeping quiet and only discussing its work in vague terms. ... Mechwarrior Online’s road to launch is a cautionary consumer tale, fraught with anger and betrayal. It shows how a company can take a fan base dedicated to an old IP and completely alienate it through lack of communication, unpopular features, and oathbreaking. It shows how players need to be cautious of supporting a project based solely on the IP backing it.'"
Privacy

Cookieless Web Tracking Using HTTP's ETag 212

An anonymous reader writes "There is a growing interest in who tracks us, and many folks are restricting the use of web cookies and Flash to cut down how advertisers (and others) can track them. Those things are fine as far as they go, but some sites are using the ETag header as an identifier: Attentive readers might have noticed already how you can use this to track people: the browser sends the information back to the server that it previously received (the ETag). That sounds an awful lot like cookies, doesn't it? The server can simply give each browser an unique ETag, and when they connect again it can look it up in its database. Neither JavaScript, nor any other plugin, has to be enabled for this to work either, and changing your IP is useless as well. The only usable workaround seems to be clearing one's cache, or using private browsing with HTTPS on sites where you don't want to be tracked. The Firefox add-on SecretAgent also does ETag overwriting."
Encryption

Math Advance Suggest RSA Encryption Could Fall Within 5 Years 282

holy_calamity writes "The two encryption systems used to secure the most important connections and digital files could become useless within years, reports MIT Technology Review, due to progress towards solving the discrete logarithm problem. Both RSA and Diffie-Hellman encryption rely on there being no efficient algorithm for that problem, but French math professor Antoine Joux has published two papers in the last six months that suggest one could soon be found. Security researchers that noticed Joux's work recommend companies large and small begin planning to move to elliptic curve cryptography, something the NSA has said is best practice for years. Unfortunately, key patents for implementing elliptic curve cryptography are controlled by BlackBerry."
Wikipedia

Interview: Jimmy Wales Answers Your Questions 146

A while ago you had a chance to ask Jimmy Wales about the amazing growth of Wikipedia, and his role advising the UK government in making academic research available online. Below you'll find his answers to your questions.
Encryption

Google Starts Upgrading Its SSL Certificates To 2048-bit Keys 118

An anonymous reader writes "Google today announced it has already started upgrading all of its SSL certificates to 2048-bit keys. The goal is to beef up the encryption on the connections made to its services. Google says the upgrade, which includes the root certificate that the company uses to sign all of its SSL certificates, will be completed 'in the next few months.' Previously, however, Google was more specific and said it was aiming to finish the process by the end of 2013."
Encryption

Anonymous Source Claims Feds Demand Private SSL Keys From Web Services 276

Lauren Weinstein writes "With further confirmation of the longstanding rumor that the U.S. government (and, we can safely assume, other governments around the world) have been pressuring major Internet firms to provide their 'master' SSL keys for government surveillance purposes, we are rapidly approaching a critical technological crossroad. It is now abundantly clear — as many of us have suspected all along — that governments and surveillance agencies of all stripes — Western, Eastern, democratic, and authoritarian, will pour essentially unlimited funds into efforts to monitor Internet communications." If this is true it means that SSL/TLS to any Internet service could be useless — the authorities could simply man-in-the-middle anyone. Without knowing who has given keys over, or if anyone has given keys over... The NSA does claim encryption poses a problem for them, but honesty isn't their best attribute. The source claims that major providers at least have resisted (assuming it is happening), but that smaller companies may have folded to the pressure.
The Military

The Little Bomb-Detecting Device That Couldn't 217

theodp writes "Widely deployed in Iraq and promoted by military leaders, BusinessWeek reports the ADE 651 bomb-detecting device had one little problem: it wouldn't detect explosives (earlier Slashdot story). 'The ADE 651,' reports Adam Higginbotham, 'was modeled on a novelty trinket conceived decades before by a former used-car salesman from South Carolina, which was purported to detect golf balls. It wasn't even good at that.' One thing the ADE 651 did excel at, however, was making money — estimates suggest that the authorities in Baghdad bought more than 6,000 useless bomb detectors, at a cost of at least $38 million. Even though ADE 651 manufacturer James McCormick was found guilty of three counts of fraud and sentenced to 10 years in prison in May, the ADE 651 is still being used at thousands of checkpoints across Baghdad. Elsewhere, authorities have never stopped believing in the detectors. Why? According to Sandia Labs' Dale Murray, the ideomotor effect is so persuasive that for anyone who wants or needs to believe in it, even conclusive scientific evidence undermining the technology it exploits has little power."

Slashdot Top Deals