alphadogg writes "As the use of cloud computing becomes more and more mainstream, serious operational 'meltdowns' could arise as end-users and vendors mix, match and bundle services for various means, a researcher argues in a new paper set for discussion next week at the USENIX HotCloud '12 conference in Boston. 'As diverse, independently developed cloud services share ever more fluidly and aggressively multiplexed hardware resource pools, unpredictable interactions between load-balancing and other reactive mechanisms could lead to dynamic instabilities or "meltdowns,"' Yale University researcher and assistant computer science professor Bryan Ford wrote in the paper. Ford compared this scenario to the intertwining, complex relationships and structures that helped contribute to the global financial crisis."
HappyDude writes "I've been asked to manage a department in our IT group. It's comprised of UNIX, VMWare, Citrix, EMC and HP SAN Admins, Technicians and Help Desk personnel. The group covers the spectrum in years of experience. I am a 20-year Admin veteran of Engineering and Health Care IT systems including UNIX, Oracle DBA, Apache HTTP/Tomcat, WebSphere, software design plus other sundry jack-of-all-trades kinds of stuff. Although I consider myself a hack at most of those trades, I'm reasonably good at any one of them when I'm submerged. I also have 10 years of Project Management experience in Engineering and Health Care related IT organizations. I do have formal PM training, but haven't bothered to seek credentialing. I'm being told that I'll be worth less to the organization as a supervisor than what I'm making now, but the earning potential is greater if I accept the management position. Out of the kindness of their hearts, they're offering to start me in the new position at the same wage I'm currently making. Does this make any sense, Slashdot? " Read on for further details.
jamstar7 writes "From an Associated Press report: 'China will launch three astronauts this month to dock with an orbiting experimental module, and the crew might include its first female space traveler, a government news agency said Saturday. A rocket carrying the Shenzhou 9 spacecraft was moved to a launch pad in China's desert northwest on Saturday for the mid-June flight, the Xinhua News Agency said, citing an space program spokesman. The three-member crew will dock with and live in the Tiangong 1 orbital module launched last year, Xinhua said. The government has not said how long the mission will last.' China, who is not an ISS partner, plans to see if its Shenzhou 9/Long March 2F system can get the job done like the Dragon/Falcon9 system can. They plan on two missions this year to dock with their Tiangong 1 module, which was launched in September 2011. Their eventual plans include building a complete space station by 2020, though one of only about 60 tons, compared to the ISS's 450-ish tons."
New submitter Tryfen writes "UK ISPs are being forced to block The Pirate Bay. One is using 'HTTP 403 Forbidden' to tell users that they cannot access the site. From the article: 'However, chief among my concerns is the technical way this censorship is implemented. At the moment, my ISP serves up an HTTP 403 error.' ... As far as I am concerned, this response is factually incorrect. According to the W3C Specifications: "The 4xx class of status code is intended for cases in which the client seems to have erred."' So, should there be a specific HTTP status code to tell a user they are being censored?"
An anonymous reader writes "JEDEC hasn't finalized the upcoming DDR4 standard yet, but it seems they left out licensing some crucial IP for (the already finalized and shipping) LRDIMMs (for use on data center servers). As a result they are only produced by one source which is facing some hurdles justifying their copying of IP. This article discusses how DDR4 is based on LRDIMMs and the future of memory. Quoting: 'JEDEC finalized the LRDIMM standard without securing licensing on load reduction and rank multiplication. Inphi, currently the only maker of LRDIMM buffer chipsets – others have backed off – lost a challenge of Netlist IP at the USPTO. As a result the Netlist patents have become stronger and are going to come back and bite Inphi in Netlist vs. Inphi, which was stayed pending these patent reexaminations – patents which survive re-examination can never again be challenged in court. NLST patents ’537 and ’274 survived with all claims intact, which is a powerful statement on the strength of their IP – Inphi has appealed to the BPAI, but the USPTO decision is telling.'"
colinneagle writes "Nokia and RIM, the two former leaders in the early smartphone market, are now basically at the end stage of their downward spirals. This is an opportunity for Microsoft, which wants to make some inroads in the smartphone market, assuming Microsoft it can play its cards right. The question is which firm is worth more. Both have their values, especially in the patent areas. In terms of just smartphones, Microsoft would probably gain more from RIM, because it could integrate BlackBerry Enterprise Server into its own server products. Nokia, though, is a much older player and probably has a lot more of a patent portfolio. The question then becomes which is an easier purchase. Nokia is a 150-year-old storied company. The Finns may not be too keen to let it go to an American firm. There is the distinct possibility Microsoft acquires both firms and keeps the best of both worlds for hardware. But where does that leave OEM partners like LG, HTC and ZTE?"
An anonymous reader writes "Since Google began collecting Street View data in Europe a few years ago, many countries have taken it the company to court in order to settle privacy concerns. The NY Times reports that the last challenge to Street View's basic legality has been resolved. Switzerland's top court accepted that Google could only guarantee they would blur out 99% of faces, license plates, and other identifying markers, but also imposed some additional restrictions. 'Those conditions would require Google to lower the height of its Street View cameras so they would not peer over garden walls and hedges, to completely blur out sensitive facilities like women's shelters, prisons, retirement homes and schools, and to advise communities in advance of scheduled tapings.'"
astroengine writes "Forget simply detecting a slight 'dip' in brightness as an exoplanet transits in front of its star; soon we'll be able to image the event. What's more, by doing this we'll see that exoplanetary transits look exactly like the historic Venus transit that wowed the world on Tuesday. This is according to astronomer Gerard van Belle, of Lowell Observatory near Flagstaff, Ariz., who hopes to use an interferometer to carry out the mind-blowing goal of capturing the silhouettes of exoplanets drifting in front of distant stars. But that's not all: this whole effort may help us track down the first bona fide Earth-like alien world." In case you missed it, NASA posted a bunch of great footage and pictures of the Venus transit, as did Boston.com's The Big Picture. Phil Plait pointed out a cool shot from Thierry Legault of a transit during a transit.
Hugh Pickens writes "Michael Crowley writes that using drones rather than soldiers to kill bad guys is appealing for many reasons, including cost, relative precision and reduction of risk to American troops. But there's plenty of evidence that drones antagonize local populations and create more enemies over the long term than we kill in the short term. The failed 2010 Times Square bomber, Faisal Shahzad, has said that about the U.S. drone campaign in Pakistan, and the Washington Post has described how drone strikes may be breeding sympathy for al-Qaeda in Yemen. 'It is the politically advantageous thing to do — low cost, no U.S. casualties, gives the appearance of toughness. It plays well domestically and it is unpopular only in other countries,' says Dennis Blair, director of national intelligence until May of 2010. 'Any damage it does to the national interest only shows up over the long term.' Now there's another component to the new warfare that threatens blowback: cyberwar. Like drones, cyberweapons are relatively cheap and do their work without putting American troops in harm's way. The blowback comes when those viruses get loose and inflict unintended damage or provide templates to terrorists or enemy nations that some experts think could lead to disaster and argue that cyberweapons are like bioweapons, demanding international treaties to govern their use. 'We may indeed be at a critical moment in history, when the planet's prospects could be markedly improved by an international treaty on cyberweapons, and the cultivation of an attendant norm against cyberwar,' writes Richard Wright. 'The ideal nation to lead the world toward this goal would be the most powerful nation on earth, especially if that nation had a pretty clean record on the cyberweapons front. A few years ago, America seemed to fit that description. But it doesn't now.'"
carmendrahl writes "The peacock mantis shrimp, a crustacean which is neither a mantis nor a shrimp, has hammer-like clubs for smashing the shells of its prey. They're so strong that regular glass aquariums can't hold them. But what's interested researchers for some time is how the clubs stand up to all that stress. Now, a team has figured out why: the mantis shrimp club's molecular structure is set up to resist fractures. That discovery could lead to stronger and lighter car frames or body armor."
An anonymous reader writes "In an end-run around slow Internet backbone providers, Netflix and Google (plus a dozen more large content giants) are in a bitter fight to deploy servers and dominate the consumer edge of the Internet. This Wired article provides some of the first graphics of this fight and how it is changing the underlying Internet infrastructure. The source of the article (DeepField blog post) also has some pretty interesting commentary."
ananyo writes "Scientists have reported the first tabletop source of ultra-short, laser-like pulses of low energy, or 'soft,' X-rays. The light, capable of probing the structure and dynamics of molecules (abstract), was previously available only at large, billion-dollar national facilities such as synchrotrons or free-electron lasers, where competition for use of the equipment is fierce. The new device, by husband-and-wife team Margaret Murnane and Henry Kapteyn based at JILA in Boulder, Colorado, might soon lie within the grasp of a university laboratory budget — perhaps allowing them to one day be as common in labs as electron microscopes are."
theodp writes "Microsoft recently extended 'It Just Works' compatibility for Visual Basic 6 applications through the full lifetime of Windows 8, so VB6 apps will have at least 24 years of supported lifetime (VB6 shipped in '98). So why has VB6, 'the un-killable cockroach' in the Windows ecosystem, managed to thrive? 'Cockroaches are successful because they're simple,' explains David S. Platt. 'They do what they need to do for their ecological niche and no more. Visual Basic 6 did what its creators intended for its market niche: enable very rapid development of limited programs by programmers of lesser experience.' But when Microsoft proudly trotted out VB.NET, the 'full-fledged language' designed to turn VB6 'bus drivers' into 'fighter pilots,' they got a surprise. 'Almost all Visual Basic 6 programmers were content with what Visual Basic 6 did,' explains Platt. 'They were happy to be bus drivers: to leave the office at 5 p.m. (or 4:30 p.m. on a really nice day) instead of working until midnight; to play with their families on weekends instead of trudging back to the office; to sleep with their spouses instead of pulling another coding all-nighter and eating cold pizza for breakfast. They didn't lament the lack of operator overloading or polymorphism in Visual Basic 6, so they didn't say much.'"
lightbox32 writes "The New York Civil Liberties Union released a free smartphone application on Wednesday that allows people to record videos of and report police 'stop and frisk' activity, a practice widely denounced by civil rights groups as mostly targeting minorities and almost never resulting in arrests. The app was thoroughly criticized by the New York Police Department, which said that the tool might prove useful for criminals."
UnderAttack writes "A common joke in infosec is that you can't hack a server that is turned off. You better make sure that the power cord is unplugged, too. Otherwise, you may be exposed via IPMI, a component present on many servers for remote management that can be used to flash firmware, get a remote console and power cycle the server even after the normal power button has been pressed to turn the server off."