Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:Friday (Score 1) 227

Well, there are kind of four parts to the overall Callahan's saga, grouped by their main setting:
  • The original Callahan's Place, Suffolk County, NY: Callahan's Crosstime Saloon, Time Travelers Strictly Cash, Callahan's Secret
  • Lady Sally's House, Brooklyn, NY: Callahan's Lady, Lady Slings the Booze
  • Mary's Place, Suffolk County, NY: The Callahan Touch, Callahan's Legacy
  • The Place, Key West, FL: Callahan's Key, Callahan's Con

The first two parts are more or less intertwined in time; Lady Sally's House ended up closing a year after the events of Lady Slings the Booze but before the events of Callahan's Secret. The third and fourth parts basically follow on in sequence from the events of the first part.

Comment Re:Who writes these blurbs? (Score 1) 227

Actually, that's right. In Stranger, World War III is set in time between the original Envoy expedition, which brought Mike's parents to Mars in the first place, and the Champion expedition, where they found Mike and brought him back. It's a "blink-you-miss" note that comes right near the start of the second chapter, something like "there would have been another manned expedition right away if World War III hadn't intervened."

Comment Re:Nope. Telegraph operators got there first. (Score 1) 29

If you're interested in this, there's an excellent book called The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century's On-line Pioneers , by Tom Standage, that talks about the telegraph and the culture that sprung up around it. Many things we recognize from modern online culture are present: e-commerce, the use of encryption, online chat slang, and even online romance. Steampunk fans should especially appreciate it!

Submission + - Brian Krebs is back online, with Google Cloud Hosting (krebsonsecurity.com)

Gumbercules!! writes: After the massive 600mbps DDOS on http://krebsonsecurity.com/ last week that forced Akamai to withdraw the (pro-bono) DDOS protection they offered the site, krebsonsecurity.com is now back online, hosted by Google.

Following Brian Krebs breaking an article on vDOS (https://developers.slashdot.org/story/16/09/08/2050238/israeli-ddos-provider-vdos-earned-600000-in-two-years), leading to the arrest of the two founders, his site was hit with a record breaking DDOS. It will certainly be an interesting test of Google's ability to provide DDOS protection to clients.

Submission + - SPAM: Obama used a pseudonym in emails with Clinton, FBI documents reveal

schwit1 writes: President Barack Obama used a pseudonym in email communications with Hillary Clinton and others, according to FBI records made public Friday. The disclosure came as the FBI released its second batch of documents from its investigation into Clinton’s private email server during her tenure as secretary of state.

The 189 pages the bureau released includes interviews with some of Clinton’s closest aides, such as Huma Abedin and Cheryl Mills; senior State Department officials; and even Marcel Lazar, better known as the Romanian hacker “Guccifer.”

In an April 5, 2016 interview with the FBI, Abedin was shown an email exchange between Clinton and Obama, but the longtime Clinton aide did not recognize the name of the sender.

"Once informed that the sender's name is believed to be pseudonym used by the president, Abedin exclaimed: 'How is this not classified?'" the report says. "Abedin then expressed her amazement at the president's use of a pseudonym and asked if she could have a copy of the email."

Link to Original Source
The Internet

Who Is Getting Left Behind In the Internet Revolution? (sciencemag.org) 112

Reader sciencehabit writes: The internet is often hailed as a liberating technology. No matter who you are or what kind of country you live in, your voice can be amplified online and heard around the world. But that assumes that people can get on the internet in the first place. Research has shown that poverty and remoteness can prevent people from getting online, but a new study out today also shows that just belonging to a politically marginalized group can translate to poorer access. The study, published online today in Science, provides the first global map of the people being left behind by the internet revolution. Mapping the internet is hard. Although it is true that every computer with a connection has a real-world location, no one actually knows where they all are. Rather than being organized top-down, the world's computers are connected to each other by a bushy, redundant network of servers. Each country builds and maintains its own infrastructure for connecting citizens to the wider internet. The decision to expand and maintain the infrastructure in one region and not another is up to those in power. And therein lies the problem: Ethnic and religious minorities who are excluded from their country's political process may also be systematically excluded from the global internet.

Submission + - White House Names First Federal CISO

wiredmikey writes: The White House today announced that Brigadier General (retired) Gregory J. Touhill has been named the first Federal Chief Information Security Officer (CISO). Back in February, President Barack Obama unveiled a cybersecurity "national action plan" (CNAP) which called for an overhaul of aging government networks and a high-level commission to boost security awareness. As part of the plan, the White House said it would hire a federal CISO to direct cybersecurity across the federal government. General Touhill is currently the Deputy Assistant Secretary for Cybersecurity and Communications in the Office of Cybersecurity and Communications (CS&C) at the Department of Homeland Security (DHS).

The key hire comes at a time when the government needs cybersecurity talent more than ever. Earlier this week a report published a U.S. House of Representatives Committee said the data breaches disclosed by the Office of Personnel Management (OPM) last year were a result of culture and leadership failures, and should not be blamed on technology.

Submission + - Hot Debate Raging on The Proposed Super Particle Collider in China (scmp.com)

hackingbear writes: Chinese high-energy physicists proposed four years ago to build a particle collider four times the size of the Large Hadron Collider in Europe. On Sunday, Dr Yang Chen-ning, co-winner of the Nobel Prize in physics in 1957 and now living on campus at Tsinghua University in Beijing, released an article on WeChat opposing the construction of the collider. He said the project would become an investment “black hole” with little scientific value or benefit to society, sucking resources away from other research sectors such as life sciences and quantum physics. Yang’s article hit nearly all social media platforms and internet news portals, drawing tens of thousands of positive comments over the last couple of days. The first stage of the project was estimated to cost 40 billion yuan (US$6 billion) by 2030, and the total cost would exceed 140 billion yuan (US$21 billion) when construction is completed in 2050, making it the most expensive research facility built in China. Yang’s main argument was that China would not succeed where the United States had failed. A similar project had been proposed in the US but was eventually cancelled in 2012 as the construction far exceeded the initial budget. Yang said existing facilities including the Large Hadron Collider contributed little to the increase of human knowledge and was irrelevant to most people’s daily lives. But Dr Wang Yifang, lead scientist of the project with the Chinese Academy of Sciences’ Institute of High Energy Physics, argued research in high energy physics lead to the world wide web, mobile phone touch screens and magnetic resonance imaging in hospitals, among other technological breakthroughs.

Submission + - Did China suffer the first space launch failure of 2016? (gbtimes.com) 1

schwit1 writes: A scheduled Chinese launch has apparently ended in failure, though exactly what happened remains presently unknown.

China was early this morning expected to launch its Gaofen-10 Earth observation satellite from Taiyuan, following the issuance of an airspace exclusion zone days in advance. However, it seems the launch did not go to plan. Gaofen-10, nominally part of the ‘CHEOS’ Earth observation system for civilian purposes, was due to be launched on a Long March 4C rocket between 18:46 and 19:11 UTC on Wednesday (02:46-03:11 Thursday Beijing time). China usually releases information of launches once payloads are successfully heading towards their target orbits around an hour after launch. Much earlier, spectators and insiders often share details and photos of the launch on social media.

However, many hours after the launch window passed there was still silence, with the launch timing and location of the Taiyuan Satellite Launch Centre apparently limiting opportunities for outside viewers.

The launch however was not scrubbed, as first stage launch debris was found as expected along the flight path, suggesting that some failure occurred with the upper stage.

Like today’s Falcon 9 failure, this Chinese failure could have a rippling effect on their ambitious plans this fall, including the launch of their next space station followed by a 30-day manned mission.

Submission + - Clinton E-Mail server was hacked, so says the FBI (politico.com)

An anonymous reader writes: Politico has an article today which states that An unknown individual using the encrypted privacy tool Tor to hide their tracks accessed an email account on a Clinton family server, the FBI revealed Friday.

The FBI disclosed the event in its newly released report on the former secretary of state’s handling of classified information. According to the bureau’s review of server logs, someone accessed an email account on Jan. 5, 2013, using three IP addresses known to serve as Tor “exit nodes”

Submission + - Palo Alto, CA to ban software coding firms? (nytimes.com)

davemc writes: Palo Alto to ban software coding firms? Seems there is a little-known (and definitely not enforced) regulation on R&D. Including software coding. I guess the residents in Palo Alto already have their slice of the pie, so want to ban pies altogether.

"... the mayor is looking to enforce, in some form, an all-but-forgotten zoning regulation that bans companies whose primary business is research and development, including software coding. (To repeat: The mayor is considering enforcing a ban on coding at ground zero of Silicon Valley.)"

Submission + - Russians Hacked Arizona Voter Registration Database -Official (time.com)

alir1272 writes: Russians were responsible for the recent breach of Arizona’s voter registration system, the FBI told state officials in June.

Matt Roberts, a spokesman for Arizona Secretary of State Michele Reagan said on Monday that FBI investigators did not say whether the hackers were working for the Russian government or not, the Washington Post reported. He said hackers gained access after stealing the username and password of an election official in Gila County, rather than compromising the state or county system.

Comment Web-skewed (Score 1) 241

Anyone can put up a web page, and Javascript and PHP have a large footprint there. (I guess Java, on the enterprise server side?) It's not hard to imagine there's lots of folks that have to deal with these languages as part of their larger duties, but aren't really trained as programmers in any traditional sense. That could fuel a bunch of StackOverflow traffic for sure...

Whichever ranking you look at will be skewed by the methodology. It feels like web-oriented languages are overemphasized in this cut.

Of course, my own worldview is skewed, too. I deal more with low-level hardware, OS interactions, etc. You won't find a lick of Javascript or PHP anywhere near any of the stuff I work on daily. Lots of C, C++, some Go and Python.

Comment Re:It does almost nothing very very fast (Score 1) 205

Ah, OK, so it is more or less the latest version of ASaP/ASaP2. I just made a post up-thread about my memory of ASaP. It looked interesting, but as you point out, it has some real practical issues.

At the time we spoke with them, it sounded like whenever you loaded an algorithm chain, you had to map it to the specific chip you were going to run it on, even, to account for bad cores, different core speeds, etc. Each core has a local oscillator. Whee...

Slashdot Top Deals

"I've finally learned what `upward compatible' means. It means we get to keep all our old mistakes." -- Dennie van Tassel

Working...