Become a fan of Slashdot on Facebook


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

ISRO Makes History, Launches 104 Satellites With Single Rocket ( 158

neo12 writes: Indian Space Research Organization (ISRO) made history by launching 104 satellites in a single launch. The lift-off of PSLVC 37 at 9.28 am from Sriharikota was a perfect one. In 28 minutes, all 104 satellites were successfully placed into the Earth's orbit. 101 of the 104 satellites belong to six foreign countries, including 96 from the U.S. and one each from Israel, the UAE, the Netherlands, Switzerland and Kazakhstan. According to Times of India, "Russian Space Agency held a record of launching 37 satellites in one go during its mission in June 2014. India previously launched 23 satellites in a single mission in June 2015."

Submission + - India launches 104 satellites at one go (

William Robinson writes: India's ISRO successfully launched 104 satellites in a single mission, setting what its space agency says is a world record of launching the most satellites at one go. ISRO used its workhorse, PSLV, for this launch. The vehicle carried India's Cartosat-2 series and 103 nano satellites. Out of 103 nano satellites, 2 were from India, 96 were from the United States and one each from Israel, Kazakhstan, the Netherlands, Switzerland and the United Arab Emirates. The global space industry is US$ 300 billion and ISRO's low prices attracted international customers to launch 75 satellites last year from Sriharikota in the southern state of Andhra Pradesh,

Comment Some Basic Todos (Score 1) 52


Things to ponder on:
1) Primary and Secondary UPS/Generator to ensure good clean supply at all times. Depending on your power source and and stability, you may or may not need this. If you have a budget, go for it.
2) Primary and Secondary Temperature/Humidity Control to ensure a stable environment. Can get pretty hot in a Telecom room when AC is not working. Depending on your geo-location, you may or may not need this.
3) Raised Floor/Ceiling space to run cables. If budget allows, Cable Trays to run cables from one side of the room to another....could be done neatly and on a budget.
5) Position of Racks to ensure Accessibility....especially cable racks. You never know when you need to punchdown new cables and getting behind the little space behind a rack can be a pain. Make sure you can easily work around your server/cable racks.
6) Proper electrical grounding for all equipment. Ground the racks can thus be grounded via racks.
7) Physical separation of Electrical cabling and Data cabling as much as possible.
8) Labeling
9) Physical Security to the room and building room is in. - Fire/Water Alarms. Temperature sensor if budget allows. Break-in protection...etc.
10) Position of Telephone - During remote support this can be a pain unless you have a cordless phone.
11) Consider how many people will be in room at same time.

Best way to start is plan a layout using some software. Position everything. AC/ UPS/ RACKS/ TELEPHONE/ PEOPLE IN ROOM.

Just some basic considerations....among others...

All the best!

Submission + - Mt Gox hacked. All coins gone. (

ch0ad writes: Mt. Gox, once the world’s largest bitcoin exchange, has gone offline, apparently after losing hundreds of millions of dollars due to a years-long hacking effort that went unnoticed by the company.

The hacking attack is detailed in a leaked “crisis strategy draft” plan, apparently created by Gox and published Monday by Ryan Selkis, a bitcoin entrepreneur and blogger (see below). According to the document, the exchange is insolvent after losing 744,408 bitcoins — worth about $350 million at Monday’s trading prices.

Submission + - How to Choose the Right Antivirus for Your Computer (

An anonymous reader writes: The Internet is becoming an increasingly dangerous place. With almost everyone connected, it is very easy for scam artists to use viruses to get all of your personal information. However, people have become quite savvy to the techniques that people use to get viruses on their computer. They ignore dangerous emails, they stay away from vulgar sites, and they don’t download media from non-reputable sources.

Submission + - maths in trouble, pooters sound, secrecy must die (

An anonymous reader writes: I have a proof that P strictly contains NP. My Slashdot user is is the largest three digit one with different digits. Publication would destroy much of the assumed sound foundations of the world financial system. The only solution us to totally ditch secrecy. I have spent all I gave chasing this. And I need some money to live on, since my conscience won't allow me to greedily claim the prize. Http colon slas slash thewikiman dot allsup dot co details my current soyl searching. What do I do?

Para Bellum Labs Will Attempt To Make the RNC a Political-Analytics Player 212

Nerval's Lobster writes "President Obama's 2012 re-election campaign relied on a sophisticated data-analytics platform that allowed organizers and volunteers to precisely target potential donors and voters. The centerpiece of that effort was Project Narwhal, which brought voter information—steadily accumulated since Obama's 2008 campaign—onto a single platform accessible to a growing number of campaign-related apps. The GOP has only a few short years to prepare for the next Presidential election cycle, and the party is scrambling to build an analytics system capable of competing against whatever the Democrats deploy onto the field of battle. To that end, the Republican National Committee (RNC) has launched Para Bellum Labs, modeled after a startup, to produce digital platforms for election analytics and voter engagement. Is this a genuine attempt to infuse the GOP's infrastructure with data science, or merely an attempt to show that the organization hasn't fallen behind the Democratic Party when it comes to analytics? Certainly the "Welcome to Para Bellum Labs" video posted by the RNC gives the impression of a huge office staffed with data scientists and programmers. However, the creation of a muscular digital ecosystem hinges on far more than building a couple of apps. Whatever the GOP rolls out, it'll face a tough opponent in the Democratic opposition, which will almost certainly emulate the robust IT infrastructure that the Obama campaign instituted in 2012 (not to mention Obama's massive voter and donor datasets). From that perspective, Para Bellum Labs might face the toughest job in politics."
Social Networks

LinkedIn Ditches Feature That Was a 'Dream For Attackers' 70

angry tapir writes "LinkedIn is shutting down Intro, its recently launched mobile service for connecting people over email, that raised security concerns. Intro was launched last October and described at the time as a 'dream come true for hackers' The service was made for the iPhone, and was designed to grab LinkedIn profile information and insert it into emails received on phones. The service displayed that information to the recipient from the email's sender if the sender was also on LinkedIn."

Second World War Code-cracking Computing Hero Colossus Turns 70 110

DW100 writes "The Colossus computer that helped the Allies crack messages sent by the Nazis during the Second World War has celebrated its 70th birthday. The machine was a pioneering feat of engineering, able to read 5,000 characters a second to help the team at Bletchley Park crack the German's Lorenz code in rapid time. This helped the Allies gather vital information on the Nazi's plans, and is credited with helping end the war effort early, saving millions of lives."

Comment Re:And when they get bitten in the ass? (Score 5, Informative) 94

Seem like they recommending it only for "critical vulnerabilities under active exploitation". For vulnerabilities where exploits increase as each day passes because of non-disclosure, I would want quick notification.

FTA and not quite in the summary:

“Our standing recommendation is that companies should fix critical vulnerabilities within 60 days — or, if a fix is not possible, they should notify the public about the risk and offer workarounds,” the two said in a blog post today. “We encourage researchers to publish their findings if reported issues will take longer to patch. Based on our experience, however, we believe that more urgent action — within seven days — is appropriate for critical vulnerabilities under active exploitation. The reason for this special designation is that each day an actively exploited vulnerability remains undisclosed to the public and unpatched, more computers will be compromised.”

Slashdot Top Deals

"In the face of entropy and nothingness, you kind of have to pretend it's not there if you want to keep writing good code." -- Karl Lehenbauer