Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
NASA

Lucky Thirteen On the ISS 120

Hugh Pickens writes "Things may get a little tight in space as seven shuttle astronauts blast off from Florida on June 13 to join up with six colleagues already on the International Space Station bringing the ISS contingent to thirteen, the largest number of individuals on the platform ever at one time. The 13 space-farers represent seven from the US, two each from Russia and Canada, and one each from Europe and Japan. '"I don't know what it's going to be like," says Endeavour commander Mark Polansky, a veteran of two prior spaceflights. "We know it's going to be challenging with 13 people aboard."' During five spacewalks, an external platform will be added to the lab which will enable those experiments to be performed that require materials to be exposed to the harsh environment of space and astronauts also have to fit equipment to the exterior of the platform such as batteries and a spare space-to-ground antenna."
Security

Default Passwords Blamed In $55M PBX Hacks 102

An anonymous reader writes "The Washington Post is reporting that the US Justice Department has indicted three residents of the Philippines for breaking into more than 2,500 corporate PBX systems in the United States and abroad. The government says the hackers sold access to those systems to operators of call centers in Italy, which allegedly made 12 million minutes of unauthorized phone calls through the system, valued at more than $55 million. The DOJ's action coincides with an announcement from Italian authorities today of the arrest of five men there who are suspected of funneling the profits from those call centers to terrorist groups in Southeast Asia."
Power

First Floating Wind Turbine Buoyed Off Norway 265

MonkeyClicker writes to tell us that the world's first large-scale floating turbine has been installed off the coast of Norway. A combined effort between Siemens and StatoiHydro, this marks the first foray into deeper waters due to restrictions in place that require offshore turbines to be attached to the sea bed. "The turbine in Norway will be 7.4 miles offshore where the water is 721 feet deep. It will be utility-size turbine, with a hub height of about 100 feet, capable of generating 2.3 megawatts of electricity. To address the conditions of the deep sea, the turbine will have a specially designed control system that will seek to dampen the motion from waves."
It's funny.  Laugh.

Lightning Strikes Amazon's Cloud (Really) 109

The Register has details on a recent EC2 outage that is being blamed on a lightning strike that zapped a power distribution unit of the data center. The interruption only lasted around 6 hours, but the irony should last much longer. "While Amazon was correcting the problem, it told customers they had the option of launching new server instances to replace those that went down. But customers were also able to wait for their original instances to come back up after power was restored to the hardware in question."
Security

The Birth and Battle of Conficker 239

NewScientist has an interesting look back at the birth of the Conficker worm and how this sophisticated monster quickly grew to such power and infamy. "Since that flurry of activity in early April, all has been uneasily quiet on the Conficker front. In some senses, that marks a victory for the criminals. The zombie network is now established and being used for its intended purpose: to make money. Through its peer-to-peer capabilities, the worm can be updated on the infected network at any time. It is not an unprecedented situation. There are several other large networks of machines infected with malicious software. Conficker has simply joined the list. The security community will continue to fight them, but as long as the worm remains embedded in any computer there can be no quick fixes."
Image

Frog Species Discovered Living In Elephant Dung 56

rhettb writes "Three different species of frogs have been discovered living in the dung of the Asian elephant in southeastern Sri Lanka. The discovery — the first time anyone has recorded frogs living in elephant droppings — has widespread conservation implications both for frogs and Asian elephants, which are in decline. Apparently the frogs feed on the many invertebrates present in elephant dung."
Math

Wolfram Alpha Rekindles Campus Math Tool Debate 339

An anonymous reader sends in a story about how Wolfram Alpha is becoming the latest tool students are using to help with their schoolwork, and why some professors are worried it will interfere with the learning process. Quoting: "The goal of WolframAlpha is to bring high-level mathematics to the masses, by letting users type in problems in plain English and delivering instant results. As a result, some professors say the service poses tough questions for their classroom policies. 'I think this is going to reignite a math war,' said Maria H. Andersen, a mathematics instructor at Muskegon Community College, referring to past debates over the role of graphing calculators in math education. 'Given that there are still pockets of instructors and departments in the US where graphing calculators are still not allowed, some instructors will likely react with resistance (i.e. we still don't change anything) or possibly even with the charge that using WA is cheating.'"
Music

Game, DVD Sales Hurting Music Industry More Than Downloads 223

Aguazul writes with this excerpt from the Guardian: "The music industry likes to insist that filesharing — aka illegal downloading — is killing the industry; that every one of the millions of music files downloaded each day counts as a 'lost' sale, which if only it could somehow have been prevented would put stunning amounts of money into impoverished artists' hands. ... If you even think about it, it can't be true. People — even downloaders — only have a finite amount of money. In times gone by, sure, they would have been buying vinyl albums. But if you stopped them downloading, would they troop out to the shops and buy those songs? I don't think so. I suspect they're doing something different. I think they're spending the money on something else. What else, I mused, might they be buying? The first clue of where all those downloaders are really spending their money came in searching for games statistics: year after year ELSPA had hailed 'a record year.' In fact ... games spending has risen dramatically — from £1.18bn in 1999 to £4.03bn in 2008. Meanwhile music spending has gone from £1.94bn to £1.31bn."
Government

How Should a Constitution Protect Digital Rights? 151

Bibek Paudel writes "Nepal's Constituent Assembly is drafting a new constitution for the country. We (FOSS Nepal) are interacting with various committees of the Assembly regarding the issues to be included in the new constitution. In particular, the 'Fundamental Rights Determination Committee' is seeking our suggestions in the form of a written document so that they can discuss it in their meeting next week. We have informed them, informally, of our concerns for addressing digital liberties and ensuring them as fundamental rights in the constitution. We'd also like to see the rights to privacy, anonymity, and access to public information regardless of the technology (platforms/software). Whether or not our suggestions will be incorporated depends on public hearings and voting in the assembly later, but the document we submit will be archived for use as reference material in the future when amendments in the constitution will be discussed or new laws will be prepared. How are online rights handled in your country? How would you want to change it?" Read on for more about Bibek's situation.
Privacy

NSA Ill-Suited For Domestic Cybersecurity Role 72

Hugh Pickens writes "Former CIA counterterrorism analyst Stephen Lee has an interesting article in the Examiner asserting that the National Security Agency is 'a secretive, hidebound culture incapable of keeping up with innovation,' with a history of disregard for privacy and civil liberties. Lee says that for most of its sixty-year history, the NSA has been geared to cracking telecom and crypto gear produced by Soviet and Chinese design bureaus, but at the end of the cold war became 'stymied by new-generation Western-engineered telephone networks and mobile technologies that were then spreading like wildfire in the developing world and former Soviet satellite countries.' When the NSA finally recognized that it needed to get better at innovation, it launched several mega-projects, tagged like 'Trailblazer' and 'Groundbreaker,' that have been spectacular failures, costing US taxpayers billions. More recently, the NY Times reported that the NSA has been breaking rules set by the Obama administration to peer even more aggressively into American citizens' phone traffic and email inboxes. Whistleblower reports portray NSA domestic eavesdropping programs as unprofessional and poorly supervised, with intercept technicians ridiculing and mishandling recordings of citizens' private 'pillow talk' conversations. Lee concludes that 'if the Federal government must play a role, then Congress and President Obama should turn to another agency without a record of creating mistrust — perhaps even a new entity. Meanwhile, NSA should focus on listening in on America's enemies, instead of being an enemy of Americans and their enterprises.'"
The Internet

Disney Strikes Against Net Neutrality 442

1 a bee writes "Ars Technica is running a story by Matthew Lasar about how Disney's ESPN360.com is charging ISPs for 'bulk' access to their content. According to the article, if you visit ESPN using a 'non-subscribing' ISP, you're greeted with a message explaining why access is restricted for you. This raises a number of issues: '... it's one thing to charge users an access fee, another to charge the ISP, potentially passing the cost on to all the ISPs subscribers whether they're interested in the content or not.' Ironically, the issue came to the fore in a complaint from the American Cable Association (ACA) to the FCC. A quoted ACA press release warns, 'Media giants are in the early stages of becoming Internet gatekeepers by requiring broadband providers to pay for their Web-based content and services and include them as part of basic Internet access for all subscribers. These content providers are also preventing subscribers who are interested in the content from independently accessing it on broadband networks of providers that have refused to pay.' So, is this a real threat to net neutrality (and the end-to-end principle) or just another bad business model that doesn't stand a chance?"
Image

14-Year-Old Boy Smote By Meteorite 435

eldavojohn writes "Winning the lottery requires incredible luck and one in a million odds. So does getting hit by a falling space rock. A 14-year-old German boy was granted a three-inch scar by the gods. A pea-sized meteorite smote young Gerrit Blank's hand before leaving a foot-sized crater on the road. The boy's account: 'At first I just saw a large ball of light, and then I suddenly felt a pain in my hand. Then a split second after that there was an enormous bang like a crash of thunder. The noise that came after the flash of light was so loud that my ears were ringing for hours afterwards. When it hit me it knocked me flying and then was still going fast enough to bury itself into the road.' Curiously, the rock was magnetic, and tests were done to verify it is extraterrestrial. The Telegraph notes the only other recorded event of a meteorite striking a person was 'in November 1954 when a grapefruit-sized fragment crashed through the roof of a house, bounced off furniture and landed on a sleeping woman.' Space.com lists a few more anomalies and we discussed the probability of these things downing aircraft recently."
Databases

Oracle Beware — Google Tests Cloud-Based Database 123

narramissic writes "On Tuesday, the same day Google held a press event to launch its Google Apps Sync for Microsoft Outlook, the company quietly announced in its research team blog a new online database called Fusion Tables. Under the hood of Fusion Tables is data-spaces technology, which would 'allow Google to add to the conventional two-dimensional database tables a third coordinate with elements like product reviews, blog posts, Twitter messages and the like, as well as a fourth dimension of real-time updates,' according to Stephen E. Arnold, a technology and financial analyst. 'So now we have an n-cube, a four-dimensional space, and in that space we can now do new kinds of queries which create new kinds of products and new market opportunities,' said Arnold, whose research about this topic includes a study done for IDC last August. 'If you're IBM, Microsoft and Oracle, your worst nightmare is now visible.'"
Handhelds

Will AT&T Charge Extra For MMS & Tethering? 326

snydeq writes "InfoWorld's Bill Snyder questions whether AT&T's jockeying on tethering and MMS may signal coming iPhone pricing surcharges. After all, as Apple's exclusive US partner, Ma Bell should have plenty of insight into upcoming iPhone features and revenue opportunities. Yet AT&T was very conspicuous in its absence from the list of providers who will support tethering and MMS at Tuesday's launch of the new iPhone at WWDC, and by Wednesday, it was backpedaling furiously, saying it will offer both services — later in the year. Certainly, the exclusive arrangement between the companies is proving to be an ugly roadblock to Apple's iPhone vision. But Snyder thinks it may go deeper than that: 'My best guess is that we'll see horrendous pricing surcharges for tethering and MMS, on top of the already expensive data and voice charges iPhone users pay. I don't think AT&T execs wanted to stand up at WWDC and announce that.'"

Slashdot Top Deals

One can search the brain with a microscope and not find the mind, and can search the stars with a telescope and not find God. -- J. Gustav White

Working...