Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - SPAM: Soviet cover-up of nuclear fallout worse than Chernobyl

schwit1 writes: It was a nuclear disaster four times worse than Chernobyl in terms of the number of cases of acute radiation sickness, but Moscow’s complicity in covering up its effects on people’s health has remained secret until now.

We knew that in August 1956, fallout from a Soviet nuclear weapons test at Semipalatinsk in Kazakhstan engulfed the Kazakh industrial city of Ust-Kamenogorsk and put more than 600 people in hospital with radiation sickness, but the details have been sketchy.

After seeing a newly uncovered report, New Scientist can now reveal that a scientific expedition from Moscow in the aftermath of the hushed-up disaster uncovered widespread radioactive contamination and radiation sickness across the Kazakh steppes.

The scientists then tracked the consequences as nuclear bomb tests continued — without telling the people affected or the outside world.

The report by scientists from the Institute of Biophysics in Moscow was found in the archive of the Institute of Radiation Medicine and Ecology (IRME) in Semey, Kazakhstan. “For many years, this has been a secret,” says the institute’s director Kazbek Apsalikov, who found the report and passed it on to New Scientist.

More nuclear bomb tests were conducted at Semipalatinsk than anywhere else in the world during the 1950s and early 1960s. Western journalists have reported since the breakup of the Soviet Union on the apparent health effects on villagers downwind of the tests. And some recent studies have estimated radiation doses using proxies such as radioactivity in tooth enamel.

The newly revealed report, which outlines “the results of a radiological study of Semipalatinsk region” and is marked “top secret”, shows for the first time just how much Soviet scientists knew at the time about the human-health disaster and the extent of the cover-up.

Link to Original Source

Submission + - Japanese Company Develops a Solar Cell With Record-Breaking 26%+ Efficiency (

An anonymous reader writes: The silicon-based cells that make up a solar panel have a theoretical efficiency limit of 29 percent, but so far that number has proven elusive. Practical efficiency rates in the low-20-percent range have been considered very good for commercial solar panels. But researchers with Japanese chemical manufacturer Kaneka Corporation have built a solar cell with a photo conversion rate of 26.3 percent, breaking the previous record of 25.6 percent. Although it’s just a 2.7 percent increase in efficiency, improvements in commercially viable solar cell technology are increasingly hard-won. Not only that, but the researchers noted in their paper that after they submitted their article to Nature Energy, they were able to further optimize their solar cell to achieve 26.6 percent efficiency. That result has been recognized by the National Renewable Energy Lab (NREL). In the Nature Energy paper, the researchers described building a 180.4 cm2 cell using high-quality thin-film heterojunction (HJ)—that is, layering silicon within the cell to minimize band gaps where electron states can’t exist. Controlling heterojunctions is a known technique among solar cell builders—Panasonic uses it and will likely incorporate it into cells built for Tesla at the Solar City plant in Buffalo, and Kaneka has its own proprietary heterojunction techniques. For this record-breaking solar cell, the Kaneka researchers also placed low-resistance electrodes toward the rear of the cell, which maximized the number of photons that collected inside the cell from the front. And, as is common on many solar cells, they coated the front of the cell with a layer of amorphous silicon and an anti-reflective layer to protect the cell’s components and collect photons more efficiently.

Submission + - A 21st Century Version Of OS/2 Warp Appears To Be About To Be Released (

dryriver writes: A company named Arca Noae is working on a new release of the X86 OS/2 operating system code named "Blue Lion" and likely called ArcaOS 5 in its final release. Blue Lion wants to be a modern 21st Century OS/2 Warp, with support for the latest hardware and networking standards, a modern accelerated graphics driver, support for new cryptographic security standards, full backward compatibility with legacy OS/2, DOS and Windows 3.1 applications, suitability for use in mission-critical applications, and also, it appears, the ability to run "ported Linux applications". Blue Lion, which appears to be in closed Beta with March 31st 2017 cited as the target release date, will come with up to date Firefox browser and Thunderbird mail client, Apache OpenOffice, other productivity tools, a new package manager, and software update and support subscription to ensure system stability. It is unclear from the information provided whether Blue Lion will be able to run modern Windows applications.

Comment Alabama Redneck Identification System (Score 1) 54

Here in Alabama, we already have a spectacular biometric system called RIN - the Redneck Identification System.

At each door we have a spitoon. When you approach the door, you spit into the spittoon and say anything you want. The spit velocity and composition is analyzed and the drawl of the speech is measured. No "southern bio" match, no ID match.

Dave doesn't chew Skoal and is always dead center in the pan - IMPOSTER DETECTED. GIT 'EM BOYS!

Submission + - US Dept of Veterans Affairs to dump freely-available electronic health record sy

dmr001 writes: US Department of Veterans Affairs Secretary David Shulkin, MD announced to Ongress plans to transition from VistA to a commercial EHR. Despite the fact that physicians typically find VistA sensible and relatively easy to use, Shulkin feels the VA should get out of the software business and buy a "commercially tested" product. The US Department of Defense recently contracted with Cerner though that transition is already beset with delays. There's no word yet how the VA might ensure any new system will be compatible with DOD's solution. Recent attempts to upgrade VistA (originally developed in house) using outside contractors have not been clearly successful.

Submission + - SPAM: Lenovo Yoga 900 - Specification And New Price 2017

An anonymous reader writes: Either laptop or tablet Lenovo Yoga series is quite popular with inovatinf and attractive design. This time, Lenovo introduced a laptop design other inovatin named Lenovo Yoga 900. Lenovo's latest laptop is supported by four usage modes, namely the use of a standard, stand (or more bendable screen), a tablet, and a tent (inverted to form a bendable screen like a tent).

The fourth mode, of course, makes a variety of activities you become more exciting as watching videos, reading e-books, nor do the typing. Not to forget as the latest device Lenovo Yoga 900 is also equipped with the latest operating system from Microsoft Windows 10 as well as the Acer Aspire R14.

To display the picture, the Lenovo Yoga 900 using a 13.3-inch touch screen with a ratio of 9: 16. The screen is also carrying IPS LCD technology and super high resolution, ie 3200 x 1800 pixels which makes its density reached 276 ppi. Amazingly, Lenovo made flagship laptop screen can display up to 300 nits of brightness that makes remains clearly visible even in sunlight.

In terms of performance, there is no reason to doubt the Lenovo Yoga 900 because it has brought the CPU Intel Core i7 sixth generation. Not only that, the capacity of the RAM embedded on Lenovo Yoga 900 is also very spacious, which is 16 GB which makes a variety of activities multitasking becomes more smoothly. Meanwhile, as the storage media, Lenovo Yoga 900 using manifold memory of the Samsung SSD 512 GB.
Connectivity in Lenovo Yoga 900 feels quite as complete as Wi-Fi 802.11 a / c, Bluetooth 4.0, 2x USB 3.0, 1x USB Type C, and a card reader. For other features it has is 1 MP camera, JBL Speakers with Dolby DS 1.0, as well as 4 cell battery 66 Watt type Li-Po.

Regarding the price, the Lenovo Yoga 900 in the $ 1,197 price tag of the entry will be enough for the size of a laptop tough with a variety of usage modes and thus has segudan advanced features and complete specifications.

Link to Original Source

Submission + - Strong FBI Ties for Next Generation Quantum Computer (

kipperstem77 writes: It is a good time to be the maker of a machine that excels in large-scale optimization problems for cybersecurity and defense. And it is even better to be the only maker of such a machine at a time when the need for a post-Moore’s Law system is in high demand.

We have already described the U.S. Department of Energy’s drive to place a novel architecture at the heart of one of the future exascale supercomputers, and we have also explored the range of options that might fall under that novel processing umbrella. From neuromorphic chips, deep learning PIM-based architectures, ultra-hybrid machines with a combination of FPGA, GPU and non-X86 elements, and of course, quantum computers, there are a rich set of options. While these are important possibilities for the world’s top supercomputing sites, the defense and intelligence space is watching keenly as well—and with an eye on systems that can target their exact workloads.

Submission + - Physicists Find That as Clocks Get More Precise, Time Gets More Fuzzy (

An anonymous reader writes: Time is weird – in spite of what we think, the Universe doesn't have a master clock to run by, making it possible for us to experience time differently depending on how we're moving or how much gravity is pulling on us.

Now physicists have combined two grand theories of physics to conclude not only is time not universally consistent, any clock we use to measure it will blur the flow of time in its surrounding space.

Submission + - Attack Traffic Against Apache Servers Dropping Off (

msm1267 writes: Malicious traffic stemming from exploits against the Apache Struts 2 vulnerability disclosed and patched this week has tapered off since Wednesday.

Researchers at Rapid7 published an analysis of data collected from its honeypots situated on five major cloud providers and a number of private networks that shows a couple of dozen sources have targeted this vulnerability, but only two, originating in China, have actually sent malicious commands.

Cisco Talos said on Thursday that attacks had risen sharply since word leaked of publicly available exploits and a Metasploit module. But it conceded that it was difficult to ascertain whether probes for vulnerable Apache servers could be carried out benignly.

Rapid7 said that in a 72-hour period starting Tuesday, a handful of events cropped up peaking at fewer than 50 between 11 a.m. and 6 p.m. Wednesday.

“We are really seeing limited attempts to exploit the vulnerability,” said Tom Sellers, threat analyst and security researcher at Rapid7.

Submission + - These Failed Apps Discovered a Hidden Rule of the Web (

mirandakatz writes: Anonymous apps like Secret and Yik Yak set out to make social media more authentic, but despite a collective $200 million in funding, anonymity has remained a kind of kryptonite for social apps. The reason is simple: An online social network serves one purpose, to connect people. Without names attached, people’s words become either mean—or meaningless. At Backchannel, a look at the rise and fall of anonymous social media, and why pure anonymity will never be enough to build a multibillion dollar business.

Submission + - This USB firewall protects against malicious device attacks (

An anonymous reader writes: The USG is a small, portable hardware USB firewall that isolates a potentially harmful device from your computer. It's designed to prevent malicious USB sticks and devices laden with malware from infecting your computer.

That's where the USG firewall comes in. You plug in one end to your computer, and you plug in a suspect USB device into the other. A simple hardware serial link that only accepts a very few select number of safe commands, which prevents the device from executing system commands or intercepting network traffic. That means the data can flow from the USB device but effectively blocks other USB exploits.

These kinds of attacks might be rare, compared to spam, ransomware, and other kinds of malware, but they can still do considerable damage.

Submission + - Verizon Wireless Wades Right Back Into the Net Neutrality Debate With Fios Deal (

An anonymous reader writes: Verizon is taking a page out of AT&T’s book by zero rating its Fios cable TV service for all Verizon Wireless customers. That means that if you purchase your mobile data plan from Verizon Wireless and your cable TV plan from Fios, you can now use the Fios Mobile app to stream live channels and on-demand shows and not have it count against your monthly data cap. This builds on Verizon’s previous decision to zero rate its Go90 mobile app for customers of its own wireless service, which net neutrality advocates see as prioritizing its own products to the detriment of those from competitors and upstarts. One notable exception here is for customers with unlimited mobile data plans. Streaming Fios Mobile content will in fact count toward the unlimited plans’ 22GB a month cap, after which Verizon will cap speeds. This caveat is not made clear in Verizon’s marketing language, and instead is found only in the App Store release notes.

Submission + - Extensive Range of Designer Casual Maxi Dresses (

gownsdresses writes: Feel comfortable and fabulous in designer casual maxi dress and flip-flops. Couture Candy offers well-cut full-length dresses with the wide spectrum of colors, and extensive range of unique prints. Shop with us today!

Submission + - Confide App Full of Security Holes, Researchers Find

Trailrunner7 writes: Researchers at IOActive have uncovered a number of serious security flaws in the Confide secure messaging app, some of which could allow an attacker to hijack a user’s session or impersonate a target user.

Confide is one of the group of encrypted chat apps that have emerged in the last few years and promises end-to-end encryption and self-destructing messages. But the team at IOActive discovered a group of vulnerabilities in the app that make users susceptible to a range of attacks that could result in account compromises, message disclosure, and other problems. The vulnerabilities are across a number of different areas in the app, but one of the main issues is the way Confide handles SSL certificates.

“The application’s notification system did not require a valid SSL server certificate to communicate, which would leak session information to actors performing a man-in-the-middle attack,” the IOActive bulletin says.

Submission + - Radio Shack brand again in bankruptcy.

BarbaraHudson writes: Bloomberg is reporting that the "new" Radio Shack is preparing to file for bankruptcy.

General Wireless Operations, the RadioShack successor created by a partnership between Sprint Corp. and the defunct retailer’s owners, is preparing to file for bankruptcy, according to people familiar with the matter.

A filing could happen within the coming days and will probably result in liquidation, said the people, who asked not to be identified because the process isn’t public. The beleaguered company, which does business as RadioShack, operates outlets that share space with Sprint’s retail locations, as well as franchising the name to other stores.

Investors had thrown $75 million in lines of credit and term loans at the business, which was used for "renovated locations and updated inventory". That's less than $60,000 per store — chickenfeed in today's world, where renovating a McDonalds can run between $500,000 and $2,000,000, and you're not trying to pivot.

Slashdot Top Deals

When you make your mark in the world, watch out for guys with erasers. -- The Wall Street Journal