coondoggie writes "Many images from deep space are so cool, weird and unusual it is hard to believe they are real sometimes. This is one of them. Astronomers looking deep into the asteroid belt through NASA's Hubble Space Telescope say they have spotted an asteroid, designated P/2013 P5, with six comet-like tails of dust radiating from it like spokes on a wheel or a spinning garden sprinkler."
sciencehabit writes "Science Magazine has posted the 12 finalist videos from its annual Dance Your PhD contest. The contest asks scientists from around the world to send in videos of themselves interpreting their research in dance form. As usual, this year's finalists have gone all out with some wacky, fun, and just plain bizarre videos. You can vote for your favorite, with the winner and reader's choice announced on November 21."
Hugh Pickens DOT Com writes "Calum Marsh writes in The Atlantic that when Paul Verhoeven's Starship Troopers hit theaters 16 years ago today, American critics slammed it as a 'crazed, lurid spectacle' featuring 'raunchiness tailor-made for teen-age boys' and 'a nonstop splatterfest so devoid of taste and logic that it makes even the most brainless summer blockbuster look intelligent.' But now the reputation of the movie based on Robert Heinlein's Hugo award winning novel is beginning to improve as critics begin to recognize the film as a critique of the military-industrial complex, the jingoism of American foreign policy, and a culture that privileges reactionary violence over sensitivity and reason. 'Starship Troopers is satire, a ruthlessly funny and keenly self-aware sendup of right-wing militarism,' writes Marsh. 'The fact that it was and continues to be taken at face value speaks to the very vapidity the movie skewers.' The movie has rightfully come to be appreciated by some as an unsung masterpiece. Coming in at number 20 on Slant Magazine's list of the 100 best films of the 1990s last year, the site's Phil Coldiron described it as 'one of the greatest of all anti-imperialist films,' a parody of Hollywood form whose superficial 'badness' is central to its critique. 'That concept is stiob, which I'll crudely define as a form of parody requiring such a degree of over-identification with the subject being parodied that it becomes impossible to tell where the love for that subject ends and the parody begins,' writes Coldiron. 'If you're prepared for the rigor and intensity of Verhoeven's approach—you'll get the joke Starship Troopers is telling,' says Marsh. 'And you'll laugh.'"
cartechboy writes "In early October, a Tesla caught on fire in Washington state — and that created a little bit of a stir. Then just before Halloween a second Tesla caught fire. Yesterday, a third Model S caught fire in Tennessee. With the third fire in the books, all happening in similar fashion, today federal investigators are saying they are going to take a look at the situation more closely. As electric car maker's stock shares continue to tumble, some are saying the fires aren't a big deal."
An anonymous reader writes "According to the official announcement, Slackware 14.1 includes the following: 'Slackware 14.1 brings many updates and enhancements, among which you'll find two of the most advanced desktop environments available today: Xfce 4.10.1, a fast and lightweight but visually appealing and easy to use desktop environment, and KDE 4.10.5, a recent stable release of the 4.10.x series of the award-winning KDE desktop environment.' Installation ISOs can be found here."
Dangerous_Minds writes "GIMP, a free and open source alternative to image manipulation software like Photoshop, recently announced that it will no longer be distributing their program through SourceForge. Citing some of the ads as reasons, they say that the tipping point was 'the introduction of their own SourceForge Installer software, which bundles third-party offers with Free Software packages. We do not want to support this kind of behavior, and have thus decided to abandon SourceForge.' The policy changes were reported back in August by Gluster. GIMP is now distributing their software via their own FTP page instead." Note: SourceForge and Slashdot share a corporate parent.
An anonymous reader writes "After all the revelations about NSA's spying efforts, and especially after the disclosure of details about its Bullrun program aimed at subverting encryption standards and efforts around the world, the question has been raised of whether any encryption software can be trusted. Security experts have repeatedly said that it you want to trust this type of software, your best bet is to choose software that is open source. But, in order to be entirely sure, a security audit of the code by independent experts sounds like a definitive answer to that issue. And that it exactly what Matthew Green, cryptographer and research professor at Johns Hopkins University, and Kenneth White, co-founder of hosted healthcare services provider BAO Systems, have set out to do. The software that will be audited is the famous file and disk encryption software package TrueCrypt. Green and White have started fundraising at FundFill and IndieGoGo, and have so far raised over $50,000 in total." (Mentioned earlier on Slashdot; the now-funded endeavor is also covered at Slash DataCenter.)
Copenhagen Suborbitals says their mission is "very simple. We are working towards launching a human being into space." That doesn't sound so simple, really, but they're approaching this gargantuan task with an intentionally simple approach: a small team, relatively unhampered by bureaucratic hassles, who are taking advantage of existing, off-the-shelf high-tech solutions when they make sense, and low-tech solutions when possible; if the parable of the Soviet space pencil hadn't worked its way into the mythology of space technology, it could have been based on the Copenhagen Suborbitals point of view. I talked with project co-founder Kristian von Bengston about the project's progress so far, as well as what the next steps are. Among those next steps: in summer 2014, the Suborbitals team plans to launch their HEAT2X lift vehicle loaded with the TDS-80 capsule; you can download the preliminary trajectory projections for both the launcher and the capsule.
v3rgEz writes "By September 14, 1960, Isaac Asimov had been a professor of biochemistry at Boston University for 11 years, and his acclaimed "I, Robot" collection of short stories was on its seventh reprint. This was also the day someone not-so-subtly accused him of communist sympathies in a letter to J. Edgar Hoover. They ominously concluded that "Asimov may be quite all right. On the other hand . . . . ." The "tip off" wasn't given much credit, but it didn't matter since Asimov's science fiction writing alone was enough to warrant FBI monitoring, particularly as the FBI hunted for the mysterious ROBPROF, a communist informant embedded in American academia. MuckRock has Isaac Asimov's FBI files in full, and a write up of the more interesting bits."
theshowmecanuck writes "A school in British Columbia (the province that now even California can call flakey) has just banned elementary school students from touching each other during recess. You know, one of those times for play and more importantly learning how to socialize (which itself includes touching). CTV News reports: 'A ban on touching during recess at a B.C. elementary school has shocked parents, who call the new no-touch policy "ridiculous." For most kids, recess is a chance to run around and goof-off with their friends, but a new ban on touching at a school in Aldergrove could put a damper on playtime. School administrators at Coghlan Fundamental Elementary School in B.C. have banned kindergarten students from touching each other during recess.'"
UnknowingFool writes "Citing growing health concerns about trans fat, the FDA today proposed measures to eliminate it from the U.S. food supply. While trans fat can still be used, the new measures now place the burden on food processors to justify the inclusion of it in a food product as experts have maintained that there is no safe level of consumption and no health benefits. Since 2006, the amount of trans fat eaten by the average American has declined from 4.5g per serving to less than 1g as restaurants and the food industry have reduced their use of it. There will be a 60-day public comment period for the new proposal."
An anonymous reader writes "Google today announced it will block local Chrome extensions starting in January, but only on the Windows platform. This means that next year, Windows users will only be able to install extensions for the company's browser from the Chrome Web Store. The changes will affect both Chrome's stable and beta channels on Windows. Google says it will continue to support local extension installs on its Dev and Canary channels, as well as installs via Enterprise policy. Chrome apps are not affected at all and will continue to be supported normally."
An anonymous reader writes "I've recently been charged with updating our existing serial console access tools. We have 12 racks of servers each with a console server in it (OpenGear, ACS, and a few others). Several of these systems host virtual machines which are also configured to have 'serial' management (KVM, virt serial). In total it comes to about 600 'systems.' All the systems also have remote power management (various vendors). Right now our team has a set of home grown scripts and a cobbled together database for keeping this all together. Today any admin can simply ssh into the master, run 'manage hostname console' and automatically get a serial console or run 'manage hostname power off' to cut the power to a system. I'd rather use some tools with more of a community than just the 4 of us. What tool(s) should I move my group onto for remote serial/power management?"
Dave Knott writes "Just over one week ahead of the launch of the Playstation 4, Wired has posted an article with a full teardown of Sony's new device. In an accompanying video Sony engineering director Yasuhiro Ootori dismantles the PS4 piece by piece, describing each component and showing just what is contained inside the sleek black box."
Virtucon writes "This one goes to the old adage 'closing the stable door after the horse bolted.' A French court on Wednesday ruled that Google must remove from its search results photos of a former Formula One racing chief, Max Mosley, participating in an Nazi-themed orgy. Google could be fined up to 1,000 Euros/day for not complying. What's strange here is that Mosley A) Sued in a French Court B) Didn't go after anybody else other than Google and C) has definitely strange tastes in extracurricular activities. In this day and age it's laughable to think that once your private photos/videos hit the Internet that you have any expectation of reining them in or filtering the embarrassing parts out. Google isn't the only game in town so to speak in terms of Internet search. I wonder if his lawyers checked out Yahoo or WebCrawler?"
Hugh Pickens DOT Com writes "Karla Cripps reports at CNN that a combination of overfishing, warming water, low oxygen and pollution are creating perfect conditions for jellyfish to multiply. "The jellyfish seem to be the ones that are flourishing in this while everything else is suffering," says Australian jellyfish researcher Lisa-ann Gershwin. In 2000, a bloom of sea tomato jellyfish in Australia was so enormous — it stretched for more than 1,000 miles from north to south — that it was even visible from space. While most blooms are not quite that big, Gershwin's survey of research on jellyfish from the last few decades indicate that populations are most likely on the rise, and that this boom is taking place in an ocean that is faced with overfishing, acid rain, nutrient pollution from fertilizers and climate change, among other problems. This past summer, southern Europe experienced one of its worst jellyfish infestations ever. Experts there have been reporting a steady increase in the number of jellyfish in the Mediterranean Sea for years. With more than 2,000 species of jellyfish swimming through the world's waters, most stings are completely harmless, some will leave you in excruciating pain, then there are the killers. There are several species of big box jellyfish that have caused many deaths — these include chironex fleckeri in Australia, known as the "most lethal jellyfish in the world whose sting can kill in three minutes. "Just the lightest brush — you don't even feel it — and then, whammo, you're in more pain than you ever could have imagined, and you are struggling to breathe and you can't move your limbs and you can't stop vomiting and your blood pressure just keeps going up and up," says Gershwin. "It is really surprising how many places they occur around the world — places you would never expect: Hawaii, Caribbean, Florida, Wales, New Caledonia, Thailand, Malaysia, Philippines, India ... as well as Australia.""
Nerval's Lobster writes "A government official who helped oversee the bug-riddled Healthcare.gov Website has resigned his post. Tony Trenkle, Chief Information Officer (CIO) for Medicare and Medicaid Services, which oversees Healthcare.gov, will reportedly join the private sector after he departs on November 15. A spokesperson for the Medicare agency refused to say whether he had been forced out, telling reporters: 'Tony made a decision that he was going to move to the private sector and that is what our COO announced yesterday.' Because of his supervisory role, Trenkle is considered a significant player in the Website's development; The New York Times indicated that he was one of two federal officials who signed an internal memo suggesting that security protocols for the Website weren't in place as recently as late September, a few days before Healthcare.gov's launch.Following Trenkle's resignation, Health and Human Services secretary Kathleen Sebelius admitted to the Senate Finance Committee that Healthcare.gov would require hundreds of fixes. 'We're not where we need to be,' she said. 'It's a pretty aggressive schedule to get to the entire punch list by the end of November.' Sebelius added that she was ultimately accountable for what she termed the 'excruciatingly awful' rollout. Healthcare.gov has experienced massive problems since its Oct. 1 debut. In addition to repeated crashes and slow performance, the Website's software often prevents people from setting up accounts. President Obama has expressed intense frustration with the situation, but insists the Affordable Care Act (ACA) backing the Website remains strong. 'The essence of the law, the health insurance that's available to people is working just fine,' he told reporters in October. 'The problem has been that the website that's supposed to make it easy to apply for insurance hasn't been working.' While the federal government won't release 'official' enrollment numbers until the end of November, it's clear that the Website's backers are losing the battle of public perception."
jfruh writes "Like Windows, Android has built a dominant market share because any hardware manufacturer can license it — and as they did with Windows, those manufacturers are loading up Android devices with their own proprietary crapware. Although the process is a bit convoluted, you can get this crapware off your phone — and in doing so you'll actually make the device more secure."
New submitter BitVulture writes "The hardcore Bitcoin community is abuzz with news of the closure of Inputs.io, a supposedly secure online Bitcoin wallet, after an attack resulted in the loss of 4100 Bitcoins. A PGP-signed message at the home page of the now mostly non-operational site briefly explains the situation: 'Two hacks totalling about 4100 BTC have left Inputs.io unable to pay all user balances. The attacker compromised the hosting account through compromising email accounts (some very old, and without phone numbers attached, so it was easy to reset). The attacker was able to bypass 2FA due to a flaw on the server host side.' There's no word yet whether Inputs.io will eventually resume operations or whether the security breach will force the Bitcoin bank out of business."
itwbennett writes "Google's latest proposals aimed at avoiding an antitrust fine from European authorities have been leaked amid growing anger over the secrecy surrounding the case. The documents, which have been verified by sources in possession of the originals, revealed the full remedies put forward by Google, the questionnaire that rivals have been asked to fill in giving their response to the remedies and a comparison document showing the changes in Google's remedies since the last proposals. Unlike the first round of so-called 'market testing,' Google's revised proposals have not been made public and were only sent to 125 interested parties who were warned that they were not to be made public."
An anonymous reader writes "Microsoft and Facebook today jointly launched a new initiative called the Internet Bug Bounty program. In short, the two companies are looking to secure the Internet stack by rewarding anyone and everyone who hacks it, and responsibly discloses vulnerabilities they find. The minimum bounty for hacking any component of the Internet is $5,000."
An anonymous reader writes "Paedophiles may escape detection because highly-classified material about Britain's surveillance capabilities have been published by the Guardian newspaper, the UK government has claimed. A senior Whitehall official said data stolen by Edward Snowden, a former contractor to the US National Security Agency, could be exploited by child abusers and other cyber criminals. It could also put lives at risk by disclosing secrets to terrorists, insurgents and hostile foreign governments, he said."
An anonymous reader writes "The Sydney Morning Herald reports, 'North Korea is using Russian technology to develop electromagnetic pulse weapons aimed at paralyzing military electronic equipment south of the border, according to South Korea's spy agency. The National Intelligence Service (NIS) said in a report to parliament that the North had purchased Russian electromagnetic pulse (EMP) weaponry to develop its own versions. EMP weapons are used to damage electronic equipment. At higher energy levels, an EMP can cause more widespread damage including to aircraft structures and other objects. The spy agency also said the North's leader Kim Jong-Un sees cyber attacks as an all-purpose weapon along with nuclear weapons and missiles, according to legislators briefed by the NIS.'" Let's not forget that North Korea has also achieved nuclear fusion, developed a super drink that can cure aging and disease, and found a "unicorn lair" last year.