Forgot your password?
typodupeerror
Politics

Submission + - Virtual money for real lobbying (businessinsider.com)

ogaraf writes: Here is an article on how the health-insurance industry group 'Get Health Reform Right' paid Facebook users with virtual currency to be used in Facebook games in exchange for lobbying their Congressional Rep. From the article:

Instead of asking the gamers to try a product the way Netflix would, "Get Health Reform Right" requires gamers to take a survey, which, upon completion, automatically sends the following email to their Congressional Rep:

"I am concerned a new government plan could cause me to lose the employer coverage I have today. More government bureaucracy will only create more problems, not solve the ones we have." "

Earth

Gigantic Spiral of Light Observed Over Norway; Rocket To Blame? 418

Ch_Omega writes "A mysterious light display appearing over Norway last night (more pictures) has left thousands of residents in the north of the country baffled. Witnesses from Trøndelag to Finnmark compared the amazing display to anything from a Russian rocket to a meteor to a shock wave — although no one appears to have mentioned UFOs yet. The phenomenon began when what appeared to be a blue light seemed to soar up from behind a mountain. It stopped mid-air, then began to circulate. Within seconds a giant spiral had covered the entire sky. Then a green-blue beam of light shot out from its center — lasting for ten to twelve minutes before disappearing completely. The Norwegian Meteorological Institute was flooded with telephone calls after the light storm — which astronomers have said did not appear to have been connected to the aurora, or Northern Lights, so common in that area of the world." The Bad Astronomer makes the case that a malfunctioning rocket spewing fuel is a parsimonious explanation, backed up by witnesses to similar events and a cool simulation (on video). An anonymous reader suggests that this Proton-M Carrier Rocket might be responsible for the display.
Education

Each American Consumed 34 Gigabytes Per Day In '08 245

eldavojohn writes "Metrics can get really strange — especially on the scale of national consumption. Information consumption is one such area that has a lot of strange metrics to offer. A new report from the University of California, San Diego entitled 'How Much Information?' reveals that in 2008 your average American consumed 34 gigabytes per day. These values are entirely estimates of the flows of data delivered to consumers as bytes, words and hours of consumer information. From the executive summary: 'In 2008, Americans consumed information for about 1.3 trillion hours, an average of almost 12 hours per day. Consumption totaled 3.6 zettabytes and 10,845 trillion words, corresponding to 100,500 words and 34 gigabytes for an average person on an average day. A zettabyte is 10 to the 21st power bytes, a million million gigabytes. These estimates are from an analysis of more than 20 different sources of information, from very old (newspapers and books) to very new (portable computer games, satellite radio, and Internet video). Information at work is not included.' Has the flow and importance of information really become this prolific in our daily lives?"
Mozilla

Mozilla Thunderbird 3 Released 272

supersloshy writes Today Mozilla released Thunderbird 3. Many new features are available, including Tabs and enhanced search features, a message archive for emails you don't want to delete but still want to keep, Firefox 3's improved Add-ons Manager, Personas support, and many other improvements. Download here."
Security

Submission + - Hackers ‘rip off’ Phishers (securityhacks.net)

An anonymous reader writes: "Some hackers out there don’t like to do all the hard work of running a successful phishing campaign. Instead, they developed a simple online service to ‘steal’ account details from the hard-working phishers. Named AutoWhaler, the service allows anyone to scan a phishing server for log files that contain juicy information such as usernames and passwords."
Yahoo!

Submission + - "Lawful spying" price lists leaked (cryptome.org) 1

ogaraf writes: Wired has a story about how the site Cryptome leaked the price lists for "lawful spying" activities of Yahoo and other companies, and subsequently received a DMCA takedown notice from Yahoo. The documents are however still online and in them you can learn for instance that IP logs last for one year, but the original IPs used to create accounts are kept since 1999. The contents of your Yahoo account are bought for $30 to $40 by law enforcement agencies.
Idle

Submission + - Tiger Woods Gives Science Education a Boost

theodp writes: After a copy of Get a Grip on Physics appeared in police photos of Tiger Wood's golf club/hydrant-damaged SUV, the book's Amazon sales rank jumped from 396,224 to 2,268. 'I'm delighted,' said author John Gribbin upon hearing that Tiger was in possession of his layman's guide to physics. 'I write books about science for people who aren't scientists so he's exactly my target audience.'
Censorship

Submission + - Iranian Crackdown Goes Global (wsj.com)

An anonymous reader writes: Tehran's leadership faces its biggest crisis since it first came to power in 1979, as Iranians at home and abroad attack its legitimacy in the wake of June's allegedly rigged presidential vote. An opposition effort, the "Green Movement," is gaining a global following of regular Iranians who say they never previously considered themselves activists. The regime has been cracking down hard at home. And now, a Wall Street Journal investigation shows, it is extending that crackdown to Iranians abroad as well. Part of the effort involves tracking the Facebook, Twitter and YouTube activity of Iranians around the world, and identifying them at opposition protests abroad. People who criticize Iran's regime online or in public demonstrations are facing threats intended to silence them.
Book Reviews

Submission + - Book Review: The Book of Xen

swsuehr writes: The Book of Xen (Takemura and Crawford, No Starch Press, 2009) provides an excellent resource for learning about Xen virtualization. I frequently need to create test environments for examples that appear in various books and magazine articles (in the interest of full disclosure, I've never written for the publisher of this book). In the days before virtualization that meant finding and piecing together hardware. Like many readers, I've been using virtualization in one form or another for several years, including Xen. This book would've saved hours searching around the web looking for tidbits of information and sifting through what works and doesn't work in setting up Xen environments. The authors have done the sifting for me within the ~250 pages of the book. But far beyond, the authors also convey their experience with Xen using walkthroughs, tips, and recommendations for Xen in the real world.

"The Book of Xen", "A Practical Guide for the System Administrator"

As stated in the subtitle, The Book of Xen is written with the system administrator in mind; someone who is comfortable with tasks like installing Linux and working with the command line. While it wouldn't be impossible for someone completely new to Linux to accomplish the tasks in the book, a bit of experience would go a long way to both visualize and complete the installation and configuration steps shown in the book. As stated in the introduction, the book is organized "(mostly) alternating between theoretical and practical discussion [because] an admin needs both practical experience and a firm theoretical ground to effectively solve problems..." (xxiii).

The authors do an excellent job of explaining what Xen is and where it fits in the virtualization landscape. This explanation begins with the introduction where the reader gathers a brief history of virtualization along with Xen's place in the landscape. Xen's limitations and reasons for using Xen are also covered right in the introduction, along with an overview of the book.

Chapter 1 begins with a high-level overview of Xen. This discussion is excellent if only to get the readers on equal footing for the discussions to come later in the book. Included in this chapter is a discussion of various techniques for virtualization including Full Virtualization, OS Virtualization, and Paravirtualization. The section on Paravirtualization leads nicely into some of the underlying details of scheduling, interrupts, and memory, and other resource management which are handled by Xen and discussed later in the chapter.

Chapter 2 sends the reader down the path of installing and using Xen. It's a short chapter, coming in at about 9 pages, and the reader is expected to be able to handle an install of CentOS with just a bit of guidance from the authors on specific options to select. This is a key point for those among us who have a preference for a certain Linux distribution. The book isn't tied specifically to a single distro, as the authors note in the introduction, "[w]e've tried to keep this book as distribution- and version-independent as possible, except in the tutorial sections, where we try to be extremely specific and detailed..." (xxiv). The base or host system upon which the examples run is based on CentOS, which the authors acknowledge and highlight in Chapter 2, "[f]or the purposes of this chapter, we'll assume you're installing CentOS 5.x with the server defaults and using its built-in Xen support. If you're using something else, this chapter will probably still be useful, but you might have to improvise a bit" (13). There is discussion of the Xen-tools package in a later chapter which shows its installation under Debian Linux too. So far from being tied to one distro, the book is refreshingly neutral in this regard.

By the end of Chapter 2, the reader has a working Xen host system and a domain 0 or dom0 host upon which to provision virtual machines. Included in Chapter 3 is a discussion of how to provision guest operating systems, known as domU in Xen-speak. The authors devote a good number of pages to making this task clear, and work through examples of basic domU installation and the use of package management systems and Debian's debootstrap to create domUs. Additionally in Chapter 3 the reader learns how to convert VMware disk images to a format usable by Xen.

Chapters 4 and 5 examine details of the Xen backend, including storage and networking. Chapter 4 stands out for its recommendation of blktap and LVM (Logical Volume Manager) as the storage backend as well as an overview of LVM itself, along with the use of networked storage for Xen.

Chapter 6 looks at tools for management of Xen, focusing on Xen-tools, libvirt, and Xen-shell while Chapter 7 gives advice for hosting untrusted users with Xen. Chapter 8 discusses the use of Xen with Unix-like operating systems and includes sections on Solaris and NetBSD.

The ability to migrate the virtual machine from one physical machine to another is one of the advantages of virtualization. As pointed out by the authors, a virtual machine might be migrated to take advantage of newer hardware, to perform maintenance, or any number of other reasons. Chapter 9 is of interest for its discussion of Xen migration. Cold and Live migrations are examined and Footnote 1 on page 126 is interesting for its reference to the Kemari Project and Project Remus which are projects to add hardware redundancy to Xen.

Tools and techniques for the measurement of Xen performance are shown in Chapter 10, which walks the reader through basic usage of well-known tools such as Bonnie++, httperf, UnixBench, and others. More importantly for the Xen admin is the discussion of Xen-aware profilers like Xenoprof which is "a version of OProfile that has been extended to work as a system-wide profiling tool under Xen..." (151).

Chapter 11 covers the Citrix XenServer, which is the enterprise-grade commercial Xen product from Citrix. The authors summarized it best in the review of Chapter 11: "Can Citrix's product replace the open source Xen? As always, the answer is maybe. It offers significant improvements in management and some interesting new capabilities, but that's balanced against the substantial cost and annoying limitations" (174).

Chapter 12 begins the discussion of Hardware Virtual Machines (HVMs), which are virtualization extensions that enable "an unmodified operating system [to run] as a domU" (176). This means the ability to run an unmodified version of Microsoft Windows as a guest OS within a Xen environment. The HVM discussion in Chapter 12 leads nicely into Chapter 13, "Xen and Windows".

The main chapters of the book end with Chapter 14, "Tips", and Chapter 15, "Troubleshooting". Both chapters draw on the experience of the authors and provide value to the book for their recommendations. Though the tool of choice for troubleshooting is the nearest Google search box, it's still helpful to glance over the content in the Troubleshooting chapter if for no other reason than to maybe remember that it's there when you receive the dreaded "Error: DestroyDevice() takes exactly 3 arguments" error.

The Book of Xen is almost certainly a time-saver for anyone looking to implement Xen or virtualization with Linux. The back cover states "The Complete Guide to Virtualization with Xen". The book lives up to that statement and more.
Politics

Submission + - Scientists step down after CRU Hack fallout (wsj.com)

An anonymous reader writes: In the wake of the recent release of thousands of private files and emails after a server of the Climate Research Unit of the University of East Anglia was hacked, Prof. Phil Jones is stepping down as head of the CRU. Prof. Michael Mann, another prominent climate scientist is also under inquiry by Penn State University.

Slashdot Top Deals

The first time, it's a KLUDGE! The second, a trick. Later, it's a well-established technique! -- Mike Broido, Intermetrics

Working...