alphadogg writes "U.S. Internet service providers should take new steps to protect subscribers against cyber attacks, including notifying customers when their computers are compromised, the chairman of the FCC said Wednesday. Julius Genachowski called on ISPs to notify subscribers whose computers are infected with malware and tied to a botnet and to develop a code of conduct to combat botnets. Genachowski also called on ISPs to adopt secure routing standards to protect against Internet Protocol hijacking and to implement DNSSEC, a suite of security tools for the Internet's Domain Name System."
#NetNeutrality is STILL in danger - Click here to help. DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Check out the new SourceForge HTML5 Internet speed test. ×
An anonymous reader writes "Biologists have previously predicted that that the male sex-determining Y chromosome, which once carried around 800 genes, like the X, has lost hundreds of them over the past 300 million years, will mutate itself out of existence, leading to the eventual extinction of men. However, researchers of a study published in the latest issue of Nature found evidence to suggest that the Y chromosome will not shed any more of the 19 ancestral genes that it is left with."
mdsolar writes "The Nuclear Regulatory Commission today released transcripts and audio recordings made at the NRC Operations Center during last year's meltdown at the Fukushima Daiichi Nuclear Power Plant in Japan. The release of these audio recordings comes at the request of the public radio program 'BURN: An Energy Journal,' and its host Alex Chadwick. The recordings show the inside workings of the U.S. government's highest level efforts to understand and deal with the unfolding nuclear crisis as the reactors meltdown. In the course of a week, the NRC is repeatedly alarmed that the situation may turn even more catastrophic. The NRC emergency staff discusses what to do — and what the consequences may be — as it learns that reactor containment safeguards are failing, and that spent fuel pools are boiling away their cooling water, and in one case perhaps catching fire."
redletterdave writes "Business networking site LinkedIn acquired Rapportive on Wednesday, which is a Gmail add-on that provides information about your social contacts as you e-mail them. The deal was reportedly already in place by Dec. 8, but Rapportive confirmed the acquisition on Wednesday in its company blog. Rapportive, which is still available over Gmail, adds an e-mailer's social networking accounts, including their Facebook, LinkedIn and Twitter accounts, and overlays the information over open messages and e-mail drafts. Neither Rapportive nor LinkedIn would release the financial details of the acquisition, but sources close to the situation say the deal closed in the 'low teens' of millions of dollars."
eldavojohn writes "As the presidential race heats up, the smear ads on TV are also increasing. But Microsoft isn't going to site idly by and let the politicians engage in all that song and dance — and Microsoft really does employ both song and dance. Their Youtube channel appears to be slowly transforming from trade show videos and launches into a marketing attack or propaganda campaign that only targets Google (both videos I've watched seemed to have nothing positive about Microsoft in them). Under a month ago, they launched a spoof called GMail man, a creepy guy that flips through all your GMail and serves up super personal ads that are wrong (although they never say if Hotmail engages in targeted marketing). And a few days ago Googlighting shows up to spread fear and uncertainty about Google Docs. Most amusing to this viewer was that I found no such trace of 'Googlighting' on Bing's video service."
First time accepted submitter El Fantasmo writes "I work in public education, K-12, for a small, economically shaky, low performing school district. What are some good or effective tactics for getting budget controllers to stop bypassing the IT boss/department? We sometimes we end up with LOW end MS Win 7 Home laptops, that basically can't get on our network (internet only) or be managed. The purchaser refuses to return them for proper setups. Unfortunately, IT is currently under the 'asst. superintendent of curriculum and instruction,' who has no useful understanding of maintaining and acquiring IT resources and lets others make poor IT purchasing decisions, by bypassing the IT department, and dips into IT funds when their pet project budgets run low. How can this be reversed when you get commands like 'make it work' and the budget is effectively $0?"
smolloy writes "It would appear that the hotly debated faster-than-light neutrino observation at CERN is the result of a fault in the connection between a GPS unit and a computer. This connection was used to correct for time delays in the neutrino flight, and after fixing the correction the researchers have found that the time discrepancy appears to have vanished."
First time accepted submitter benrothke writes "It is said that the song Wipe Out launched a generation of drummers. In the world of information security, the classic Applied Cryptography: Protocols, Algorithms, and Source Code in C by Bruce Schneier may have been the book that launched a generation of new cryptographers. Schneier's latest work of art is Liars and Outliers: Enabling the Trust that Society Needs to Thrive. For those that are looking for a follow-up to Applied Cryptography, this it is not. In fact, it is hard to classify this as an information security title and in fact the book is marked for the current affairs/sociology section. Whatever section this book ultimately falls in, the reader will find that Schneier is one of the most original thinkers around." Keep reading for the rest of Ben's review.
tsu doh nimh writes "Millions of computers infected with the stealthy and tenacious DNSChanger Trojan may be spared a planned disconnection from the Internet early next month if a New York court approves a new request by the U.S. government. Meanwhile, six men accused of managing and profiting from the huge collection of hacked PCs are expected to soon be extradited from their native Estonia to face charges in the United States."
First time accepted submitter RenderSeven writes "Manufacturing.net reports that U.S. Food and Drug Administration officials plan to investigate whether inhalable caffeine sold in lipstick-sized canisters is safe for consumers and if its manufacturer was right to brand it as a dietary supplement. AeroShot went on the market late last month in Massachusetts and New York, and it's also available in France. Consumers put one end of the canister in their mouths and breathe in, releasing a fine powder that dissolves almost instantly."
YokimaSun writes "Sony has today released the PSVita in the U.S. and Europe. The console comes with features such as dual touch pads at the front and rear, dual cameras at the front and rear, dual analog sticks, a 5-inch OLED screen, GPS, six-axis motion sensors and a three-axis electronic compass. The PSVita is Sony's attempt at stealing the thunder away from the 3DS but also bringing back the gamers lost to the likes of Android and iOS Devices. The PSVita in Japan sold massively on its first release week but since has struggled and sold less than the PSP. With this in mind sites like Amazon have been offering many different deals to entice people to buy the console. Can Sony stop homebrewers from taking over this console?"
New submitter rescrv writes "Key-value stores (like Cassandra, Redis and DynamoDB) have been replacing traditional databases in many demanding web applications (e.g. Twitter, Google, Facebook, LinkedIn, and others). But for the most part, the differences between existing NoSQL systems come down to the choice of well-studied implementation techniques; in particular, they all provide a similar API that achieves high performance and scalability by limiting applications to simple operations like GET and PUT. HyperDex, a new key-value store developed at Cornell, stands out in the NoSQL spectrum with its unique design. HyperDex employs a unique multi-dimensional hash function to enable efficient search operations — that is, objects may be retrieved without using the key (PDF) under which they are stored. Other systems employ indexing techniques to enable search, or enumerate all objects in the system. In contrast, HyperDex's design enables applications to retrieve search results directly from servers in the system. The results are impressive. Preliminary benchmark results on the project website show that HyperDex provides significant performance improvements over Cassandra and MongoDB. With its unique design, and impressive performance, it seems fittng to ask: Is HyperDex the start of NoSQL 2.0?"
judgecorp writes "Microsoft has filed a complaint with the European Commission complaining that Motorola Mobility is charging too much for use of its patented technology in phones and tablets. The complaint follows a similar one by Apple last week, and will need to be resolved by Google as it takes charge of Motorola Mobility."
astroengine writes with an excerpt from an article at Discovery: "For the first time, 'buckyballs' have been discovered in the cosmos in a solid form. Until now, the only evidence in space for the bizarre little hollow balls of carbon atoms have been in interstellar gases, but with the help of NASA's Spitzer Space Telescope, astronomers have discovered buckyballs accumulating and stacking atop one another to form solid particles. 'These buckyballs are stacked together to form a solid, like oranges in a crate,' said Nye Evans of Keele University in England, lead author of a paper appearing in the Monthly Notices of the Royal Astronomical Society. 'The particles we detected are minuscule, far smaller than the width of a hair, but each one would contain stacks of millions of buckyballs.'"