Nerval's Lobster writes "NASA's Mars Reconnaissance Orbiter has sent 200 terabits of scientific data all the way back to Earth over the past seven years. That data largely comes from six instruments aboard the craft, and doesn't include the information used to manage the equipment's health. That 200-terabit milestone also surpasses the ten years' worth of data returned via NASA's Deep Space Network from all other missions managed by NASA's Jet Propulsion Laboratory in Pasadena, California. 'The sheer volume is impressive, but of course what's most important is what we are learning about our neighboring planet,' JPL's Rich Zurek, the project scientist for the Mars Reconnaissance Orbiter, wrote in a statement. It takes roughly two hours for the craft to orbit Mars, recording voluminous amounts of data on everything from the atmosphere to the subsurface. Thanks to its instruments, we know that Mars is a dynamic environment, once home to water. 'Mars Reconnaissance Orbiter has shown that Mars is still an active planet, with changes such as new craters, avalanches and dust storms,' Zurek added. 'Mars is a partially frozen world, but not frozen in time.' While the Orbiter's two-year 'primary science phase' ended in 2008, NASA has granted the hardware three additional extensions, each of which has resulted in additional insight into the Red Planet's secrets."
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×
An anonymous reader writes with an update on the fate of the GOCE satellite. From the article: "The mystery of GOCE's re-entry has now been solved — the one-ton satellite came down over the Falkland Islands, a British overseas territory 300 miles east of the Patagonian coast in the South Atlantic Ocean."
First time accepted submitter sqorbit writes "Netflix and Youtube are gaining ground not only on the competition, such as Amazon, but also over peer-to-peer file sharing. Netflix claims more than 30 million customers and believes it could double that number in the future. Traffic from Netflix and Youtube amounted to over 50% of Internet traffic in September. Meanwhile Bittorrent traffic is down slightly (7.4% from 10%) in Internet traffic compared to last year. Could more people be satisfied with current video offerings or are less people finding useful things to download via file sharing?"
First time accepted submitter VZ writes "The first new stable wxWidgets release in years and the first new major release since 1998 has just been announced. wxWidgets 3.0 now includes official support for Cocoa-based 32 and 64 bit applications under OS X, GTK+ 3 under Unix and has thousands of other improvements." Update: 11/12 01:00 GMT by U L : Clarification: it's been several years since the 2.8 release series, and fifteen years since wxWidgets 2.0.
First time accepted submitter MalachiK writes "A senior academic and former UK government drugs adviser reckons that pretty soon it'll be possible to enjoy the fun of being drunk without having to suffer the negative effects of alcohol. In a proposal reminiscent of Star Trek's synthehol, Professor David Nut has identified a number of molecules that he claims offer experiences that are subjectively indistinguishable from alcohol intoxication. Apparently a major advantage of using these more selectively psychoactive drugs is that the effects can be quickly reversed. It's not all good news though as Professor Nut seems to think that the drinks industry is using its financial and political clout to stop this sort of research being undertaken."
First time accepted submitter SlongNY writes in with a story that journalists may be banned from taking photos or videos with smartphones at the 2014 Olympics. "'Journalists using mobile phones to film athletes or spectators will be considered a serious violation and will result in cancellation of accreditation,' said Vasily Konov, head of the state-run R-Sport news agency, which controls accreditation at the games. According to Buzzfeed, Mr. Konov later denied that he had said the ban was in place. Radio Free Europe, however, also reported him as saying the same thing."
sfcrazy writes "Humble Bundle has opened an online store called Humble Store, an extension of the sales system developed for managing the Humble Bundles. That puts Humble Bundle in the same league of Valve's Steam which sells works online via Steam Store. Humble Store, will continue the organization’s legacy of supporting causes. 'The Humble Store is a permanent addition to our Humble site that will allow our customers to buy great games at great prices 24/7 and support charity with every purchase. Ten percent of all purchases will go to vital causes like American Red Cross, Child’s Play, Electronic Frontier Foundation, World Land Trust and charity:water.'"
An anonymous reader writes "A number of groups, including the MPAA, are pushing to educate elementary school kids about the dangers of piracy. From the article: 'A nonprofit group called the Center for Copyright Information, which is supported by the MPAA and other groups, has commissioned a school curriculum to teach elementary-age children about the value of copyrights. The proposed curriculum is still in draft stage, but it's already taking flak. Some critics say the curriculum promotes the biased agenda of Hollywood studios and music labels. Others contend it would use up valuable classroom time when U.S. public schools are already struggling to teach the basics.'"
Daniel_Stuckey writes "It only took a month for the Silk Road 2.0 to go live after the now infamous Silk Road marketplace shuttered. One month. Should the budding deep-web bazaar experience the same fate as its predecessor, and be knocked out by authorities still whack-a-moling their way through the online front of the war on drugs, the Silk Road 3.0 would be up and running in 15 minutes, tops. That's according to the Dread Pirate Roberts, the pseudonymous head of SR 2.0. In what are arguably his most breathy public remarks to date the 'new' DPR, who either cribbed his handle from the DPR of SR 1.0 fame or who is indeed the original DPR, opened up to Mike Power on his long-term vision for the site."
On Friday, Marvel released its latest superhero blockbuster, Thor: The Dark World. Chris Hemsworth, Natalie Portman, and Tom Hiddleston reprise their roles as Thor, Dr. Jane Foster, and Loki. Christopher Eccleston, best known for his role as the Ninth Doctor on BBC's Doctor Who, portrays Thor's nemesis in The Dark World: Malekith, ruler of the Dark Elves of Svartalfheim. Despite a strong opening weekend at the box office, critical reception has been lackluster. The movie averaged 66/100 on Rotten Tomatoes and 54/100 on Metacritic, but user reviews rated it higher, at 86/100 and 8/10 respectively. io9's review calls the plot "completely forgettable," but also said, "at a time when superhero films are gravitating towards Christopher Nolan-style darkness, it's really nice to see a movie go swinging into adventure with a song in its heart." Comic Book Resources also commented that the movie was a lot of fun, but added, "the film doesn't quite reach its true potential due to a villain who never truly feels like much more than an amorphous bad guy." Those of you who went to see it over the weekend: what did you think?
nk497 writes "Criminals are taking advantage of unpatched holes in Internet Explorer to launch 'diskless' attacks on PCs visiting malicious sites. Security company FireEye uncovered the zero-day flaw on at least one breached U.S. site, describing the exploit as a 'classic drive-by download attack'. But FireEye also noted the malware doesn't write to disk and disappears on reboot — provided it hasn't already taken over your PC — making it trickier to detect, though easier to purge. '[This is] a technique not typically used by advanced persistent threat (APT) actors,' the company said. 'This technique will further complicate network defenders' ability to triage compromised systems, using traditional forensics methods.'"
Velcroman1 writes "It has been a year since fallen software magnate John McAfee fled his adopted home and country — wanted by police for questioning in connection to the murder of his neighbor. In that year, the often eccentric programming pioneer led the media and the public on a wild ride with his outlandish behavior and off-the-wall statements during a catch-me-if you-can escape from the small Central American country. McAfee is a person of interest in the investigation surrounding the murder of his neighbor, American ex-pat Gregory Faull, near his compound in San Pedro Town on the island of Ambergris Caye. No headway has been made in the investigation — and authorities in Belize are still looking to speak with McAfee. 'Nothing has really changed. It's not a closed case,' police spokesman Raphael Martinez said. 'He is still a person of interest.'"
mdsolar writes in with news about a new wind-energy project off the coast of Fukushima. "A project to harness the power of the wind about 20 kilometers (12 miles) off the coast of Fukushima, site of the March 2011 nuclear disaster, began generating power on an operational basis today. The project, funded by the government and led by Marubeni Corp. (8002), is a symbol of Japan's ambition to commercialize the unproven technology of floating offshore wind power and its plan to turn quake-ravaged Fukushima into a clean energy hub. 'Fukushima is making a stride toward the future step by step,' Yuhei Sato, governor of Fukushima, said today at a ceremony in Fukushima marking the project's initiation. 'Floating offshore wind is a symbol of such a future.'"
rsmiller510 writes "It would seem on its face that simply asking your users what they need in an app would be the easiest way to build one, but it turns out it's not quite that simple. People often don't know what they want or need or they can't articulate it in a way that's useful to you. They may say I want Google or Dropbox for the enterprise, but they don't get that developers can be so much more creative than that. And the best way to understand those users' needs is to watch what they do, then use your own skills to build apps to make their working lives better or easier."
DavidGilbert99 writes "Nowhere is safe. Even in the cold expanse of space, computer malware manages to find a way. According to Russian security expert Eugene Kaspersky, the SCADA systems on board the International Space Station have been infected by malware which was carried into space on USB sticks by Russian astronauts."
Nerval's Lobster writes "The GCHQ agency, Britain's equivalent of the National Security Agency, reportedly used fake LinkedIn and Slashdot pages to load malware onto computers at Belgian telecommunications firm Belgacom. In an emailed statement to Slashdot, the GCHQ's Press and Media Affairs Office wrote: 'We have no comment to make on this particular story.' It added: 'All GCHQ's work is carried out in accordance with a strict legal and policy framework which ensure that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Intelligence and Security Committee.' Meanwhile, LinkedIn's representatives suggested they had no knowledge of the reported hack. 'We have read the same stories, and we want to clarify that we have never cooperated with any government agency,' a spokesperson from the social network wrote in an email to Slashdot, 'nor do we have any knowledge, with regard to these actions, and to date, we have not detected any of the spoofing activity that is being reported.' An IT security expert with extensive knowledge of government intelligence operations, but no direct insight into the GCHQ, hypothesized to Slashdot that carrying out a man-in-the-middle attack was well within the capabilities of British intelligence agencies, but that such a 'retail' operation also seemed somewhat out of character. 'Based on what we know they've done, they are doing industrialized, large scale traffic sweeping and net hacking,' he said. 'They operate a wholesale, with statistical techniques. By "statistical" I mean that they send something that may or may not work.' With that in mind, he added, it's plausible that the GCHQ has software that operates in a similar manner to the NSA's EGOTISTICAL GIRAFFE, and used it to redirect Belgacom employees to a fake download. 'However, the story has been slightly garbaged into it being fake [LinkedIn and Slashdot] accounts, as opposed to network spoofing.'" Update: You can read the official statement from Slashdot's parent company, Dice Holdings, here on our blog.
hackingbear writes "While the Cyber Monday after Thanksgiving is the busiest online shopping day in the U.S., it pales in comparison to China's Singles' Day on November 11, which started out in the 1990s as a protest to Valentine's Day. Sales on Singles' Day last year for Alibaba Group, China's biggest e-retailer, totaled more than $3.1 billion, doubling the $1.5 billion spent by U.S. consumers on Cyber Monday in 2012. This year, Alibaba's two ecommerce sites, Tmall and Taobao Marketplace, are expecting sales of at least $4.9 billion."
guttentag writes "The New York Times is reporting The USPS has struck a deal to deliver Amazon's packages on Sundays — a first for both. The Postal Service, which lost nearly $16 billion last year, often loses money on first-class mail delivery, but package delivery is profitable. The Postal Service said it expected to make more such deals with other merchants, seeking a larger role in the $186 billion e-commerce market. For this holiday shopping season, Sunday delivery of Amazon products will be limited to the Los Angeles and New York metropolitan areas. In 2014 it is expected to expand to other cities including Dallas, Houston, New Orleans and Phoenix."
Hugh Pickens DOT Com writes "As we come up on Veteran's Day, Barrie Barber reports for the Dayton Daily News that the last Doolittle Raiders symbolically said goodbye to a decades-old tradition and to a history that changed the course of the Pacific war in World War II. Gathering from across the country together one last time, three surviving Raiders sipped from silver goblets engraved with their names and filled with 1896 Hennessy cognac in a once-private ceremony webcast to the world at the National Museum of the U.S. Air Force. Robert E. Cole, 98, led the final toast to the 80 members of 'the Greatest Generation' who took off in 16 B-25 Mitchell bombers April 18, 1942, from the deck of the USS Hornet to bomb Japan four months after a Japanese surprise naval and air attack on Pearl Harbor. 'Gentleman, I propose a toast,' said Cole, as about 700 spectators watched one final time, 'to those we lost on the mission and those that passed away since. Thank you very much and may they rest in peace.' Acting Secretary of the Air Force Eric Fanning said the raid showed the courage and innovation of the World War II airmen flying from a carrier in a bomber that had never seen combat to attack a heavily defended nation and to attempt to land at unseen airfields in China in a country occupied by Japanese troops. More than 70 years after the attack, Edward J. Saylor, 93, remembered ditching at sea once he and his crew dropped their bombs and several close calls with being discovered by the Japanese Army while making his way through China. 'This may be the last time I see them together,' said the 92-year-old raider who has attended Raider reunions since 1962. 'It's a little sad for me because I've known them so long and know the story of what they did in 1942.'"
theodp writes "The U.S. tech giants' pledge to up their privacy game in the wake of reports that all-your-data-belong-to-the-NSA rings a little hollow to Abraham Newman, who reminds us that such protections run counter to the business model and public policy agenda that tech companies have pursued for decades. 'For years,' writes Newman, 'U.S. information technology (IT) firms have actively backed weak privacy rules that let them collect massive amounts of personal data. The strategy enabled the companies to work their way into every corner of consumers' lives and gave them a competitive edge internationally. Those same policies, however, have come back to haunt IT firms. Lax rules created fertile ground for NSA snooping. In the wake of the surveillance scandals, as consumer confidence plummets, technology companies' economic futures are threatened.'"
An anonymous reader writes "An Apple insider who asked not to be identified because the information is classified told Bloomberg that Apple's next iPhone models will come with curve displays and enhanced touchscreen sensors that can detect heavy and light touches. The two models -- 4.7-inches and 5.5-inches -- would be Apple's largest iPhones. Apple is still developing the two models and the person disclosed that Apple could launch the devices in the third quarter of next year."