You are here

Site në gjuhë të huaj

Croatian Party Advocates Government Adoption of Open Source

Slashdot.org - Sht, 29/08/2015 - 1:27pd
An anonymous reader writes: Earlier this year, Croatian political party Sustainable Development of Croatia (ORaH) published a new policy that encourages the government to pursue open source solutions, addresses the dangers of vendor lock-in, and insists on open document standards. Best of all, they did it the open source way. In this article on Opensource.com, Croatian startup founder Josip Almasi highlights some of the policy's implications, as well as why it could matter in the upcoming election.

Read more of this story at Slashdot.

Harshest Penalty for Alleged Rapist Was For Using a Computer To Arrange Contact With Teen

Slashdot.org - Sht, 29/08/2015 - 1:03pd
An anonymous reader writes: Today in a nationally publicized case, an alleged rapist from a fairly elite boarding school was convicted of a number of related misdemeanors, but the jury did not find him guilty of rape. According to the New York Times, his lone felony conviction was "using a computer to lure a minor." In effect, a criminal was convicted of multiple misdemeanors, including sexual penetration of a child, but the biggest penalty he faces is a felony record and years in jail because he used a computer to contact the child, rather than picking her up at a coffee shop, meeting her at a party, or hiring a fifteen-year-old prostitute. Prosecutors have these "using a computer" charges as an additional quiver in their bow, but should we really be making it a felony to use a computer for non-computer-related crime when there is no underlying felony conviction?

Read more of this story at Slashdot.

Uber Hires Hackers Who Remotely Killed a Jeep

Slashdot.org - Sht, 29/08/2015 - 12:20pd
An anonymous reader writes: The past several weeks have been rife with major vulnerabilities in modern cars, but none were so dramatic as when Charlie Miller and Chris Valasek tampered with the systems on a moving Jeep Cherokee. Now, Miller and Valasek have left their jobs to join a research laboratory for Uber. It's the same lab that became home for a number of autonomous vehicle experts poached from Carnegie Mellon University. From the article: "As Uber plunges more deeply into developing or adapting self-driving cars, Miller and Valasek could help the company make that technology more secure. Uber envisions autonomous cars that could someday replace its hundreds of thousands of contract drivers. The San Francisco company has gone to top-tier universities and research centers to build up this capability."

Read more of this story at Slashdot.

Amazon Developing TV Series Based On Galaxy Quest

Slashdot.org - Pre, 28/08/2015 - 11:39md
An anonymous reader writes: Entertainment Weekly reports that Amazon Studios is developing a TV show based on Galaxy Quest, the 1999 film that parodied classic sci-fi shows like Star Trek. In the movie, actors for a Trek-like show were conscripted by real aliens to help run a starship and negotiate peace with a mortal enemy. The actors had no idea what to do, of course, and ended up getting help from the most rabid fans of their show. The new TV show is still in early stages of development. It's unlikely that the original Galaxy Quest cast will return — it starred Tim Allen, Sigourney Weaver, Alan Rickman, and Sam Rockwell, to name a few. However, several important members of the production crew will return: "The film's co-writer Robert Gordon will pen the script and executive produce the pilot. The film's director Dean Parisot will direct and executive produce. And executive producers Mark Johnson and Melissa Bernstein are on board as well." The show is a ways off, yet — they haven't even been greenlit for a pilot episode — but it'd be a welcome addition to today's sci-fi TV offerings

Read more of this story at Slashdot.

Symantec Researchers Find 49 New Modules of Regin Spying Tool

Slashdot.org - Pre, 28/08/2015 - 10:57md
itwbennett writes: Security researchers from Symantec have identified 49 more modules (bringing the total number found so far to 75) of the sophisticated Regin cyberespionage platform that many believe is used by the U.S. National Security Agency and its close allies. Some of the modules implement basic malware functions, while other modules are much more specialized and built with specific targets in mind. 'One module was designed to monitor network traffic to Microsoft Internet Information Services (IIS) web servers, another was observed collecting administration traffic for mobile telephony base station controllers, while another was created specifically for parsing mail from Exchange databases,' the Symantec researchers said in an updated version of their white paper (PDF) published Thursday.

Read more of this story at Slashdot.

Ten Dropbox Engineers Build BSD-licensed, Lossless 'Pied Piper' Compression Algorithm

Slashdot.org - Pre, 28/08/2015 - 10:15md
An anonymous reader writes: In Dropbox's "Hack Week" this year, a team of ten engineers built the fantasy Pied Piper algorithm from HBO's Silicon Valley, achieving 13% lossless compression on Mobile-recorded H.264 videos and 22% on arbitrary JPEG files. Their algorithm can return the compressed files to their bit-exact values. According to FastCompany, "Its ability to compress file sizes could actually have tangible, real-world benefits for Dropbox, whose core business is storing files in the cloud."The code is available on GitHub under a BSD license for people interested in advancing the compression or archiving their movie files.

Read more of this story at Slashdot.

Microsoft Builds Open-Source Browser Using HTML, JavaScript, and CSS

Slashdot.org - Pre, 28/08/2015 - 9:30md
An anonymous reader writes: Microsoft's new browser, Edge, has a new rendering engine, EdgeHTML. Like Edge, the new rendering engine is only available in Windows 10, but it does more than just power the company's new browser: It's also readily available to developers. To show off what EdgeHTML can do, Microsoft has built a browser using predominantly JavaScript, HTML, and CSS. Next, the company released the browser on the Windows Store and the sample code on GitHub.

Read more of this story at Slashdot.

Ashley Madison CEO Steps Down, Reporter Finds Clues To Hacker's Identity

Slashdot.org - Pre, 28/08/2015 - 8:48md
Dave Knott writes: Following the recent hacks on the infidelity website Ashley Madison, Noel Biderman has stepped down as CEO of both AshleyMadison.com and its parent company. Avid Life Media Inc., the company that owns the site and many others, announced Biderman's move in a short press release on Friday: "Noel Biderman, in mutual agreement with the company, is stepping down as chief executive officer of Avid Life Media Inc. (ALM) and is no longer with the company. Until the appointment of a new CEO, the company will be led by the existing senior management team." Before the data hack, the company was planning an IPO in London that would have taken in as much as $200 million from investors. According to regulatory filings, the company had $115 million in revenue last year, more than four times the amount it obtained in 2009. Meanwhile, in related news, Brian Krebs (the reporter who first uncovered the hack) says he has uncovered clues to the possible identity of the hacker. Krebs says he noticed the Twitter account operated by a known hacker recently posted a link to Ashley Madison's stolen proprietary source code before it was made public. Intrigued by the poster's apparent access, he examined the account's posting history and noticed a predilection for the music of Australian hard rock band AC/DC. This jibes with the behavior of the hacker(s), who had displayed threatening messages on the computers of Ashley Madison employees, accompanied by AC/DC song Thunderstruck. In a series of tweets, the owner of the account, one Thadeus Zu, appears to deny that he was behind the hack, and indeed makes several suggestions that the account itself isn't even run by one person, but is instead an amalgam of like-minded digital vigilantes. The NY Times also reports that people whose details were contained in the leak are beginning to face threats of blackmail.

Read more of this story at Slashdot.

Ubuntu Is the Dominant Cloud OS

Slashdot.org - Pre, 28/08/2015 - 7:54md
An anonymous reader writes: According to a new report by Cloud Market, Ubuntu is more than twice as popular on Amazon EC2 as all other operating systems combined. Given that Amazon Web Services has 57% of the public cloud market, Ubuntu is clearly the most popular OS for cloud systems. This is further bolstered by a recent OpenStack survey, which found that more than half of respondents used Ubuntu for cloud-based production environments. Centos was a distant second at 29%, and RHEL came in third at 11%. "In addition to AWS, Ubuntu has been available on HP Cloud, and Microsoft Azure since 2013. It's also now available on Google Cloud Platform, Fujitsu, and Joyent." The article concludes, "People still see Ubuntu as primarily a desktop operating system. It's not — and hasn't been for some time."

Read more of this story at Slashdot.

Federal Court Overturns Ruling That NSA Metadata Collection Was Illegal

Slashdot.org - Pre, 28/08/2015 - 7:12md
New submitter captnjohnny1618 writes: NPR is reporting that an appeals court has overturned the decision that found the NSA's bulk data collection to be illegal. "Judges for the District of Columbia court of appeals found that the man who brought the case, conservative lawyer Larry Klayman, could not prove that his particular cellphone records had been swept up in NSA dragnets." The article clarifies that due to the recent passage of new laws governing how metadata is collected, this is of less significance than it would have otherwise been: "If you remember, after a fierce battle, both houses of Congress voted in favor of a law that lets phone companies keep that database, but still allows the government to query it for specific data. The three-judge panel of the United States Court of Appeals for the District of Columbia still decided to take on the case, because that new program doesn't begin until 180 days after the date that law was enacted (June 2, 2015.)" On top of that, the injunction from the earlier ruling never actually went into effect. Still, it seems like an important ruling to me: a government agency was willfully and directly violating the rights of the Americans (and international citizens as well) and now it's just going to get shrugged off?

Read more of this story at Slashdot.

How NASA Defended Its Assembly Facility From Hurricane Katrina

Slashdot.org - Pre, 28/08/2015 - 6:30md
An anonymous reader writes: Tomorrow marks the 10-year anniversary of Hurricane Katrina's arrival in New Orleans. Though that time was filled with tragedy, there were survival stories, and a new article gives an insider's account of how NASA's Michoud Assembly Facility weathered the storm. Michoud was their key fuel tank production location, and if it had been lost, the space program would have gone off the rails. A 17-foot levee and a building with four water pumps capable of moving 62,000 gallons per minute stood between the storm and catastrophe for NASA's launch capabilities. "Water was merely the primary concern of the first 24 hours; Hurricane Katrina left its mark on the facilities even if Michoud was the rare speck of land to escape flooding. Roofs were lost to strong winds, one building even blew out entirely. External Tank 122 took some damage." Members of the "ride out" team spent much of the next month at Michoud, working long days to inspect and repair issues caused by the water. They maintained the facility well enough that it became a base for members of the military doing search and rescue operations. Amazingly, they did it all without any injuries to the team, and NASA didn't miss a single tank shipment.

Read more of this story at Slashdot.

Gunnar Wolf: 180

Planet Debian - Pre, 28/08/2015 - 6:09md

180 degrees — people say their life has changed by 180° whenever something alters their priorities, their viewpoints, their targets in life.

In our case, it's been 180 days. 183 by today, really. The six most amazing months in my life.

We are still the same people, with similar viewpoints and targets. Our priorities have clearly shifted.

But our understanding of the world, and our sources of enjoyment, and our outlook for the future... Are worlds apart. Not 180°, think more of a quantic transposition.

French Woman Gets €800/month For Electromagnetic-Field 'Disability'

Slashdot.org - Pre, 28/08/2015 - 5:48md
An anonymous reader writes: If you were dismayed to hear Tuesday's news that a school is being sued over Wi-Fi sickness, you might be even more disappointed in a recent verdict by the French judicial system. A court based in Toulouse has awarded a disability claim of €800 (~$898) per month for three years over a 39-year-old woman's "hypersensitivity to electromagnetic waves." Robin Des Toits, an organization that campaigns for "sufferers" of this malady, was pleased: "We can no longer say that it is a psychiatric illness." (Actually, we can and will.) The woman has been living in a remote part of France's south-west mountains with no electricity around. She claims to be affected by common gadgets like cellphones.

Read more of this story at Slashdot.

'Ingenious' Experiment Closes Loopholes In Quantum Theory

Slashdot.org - Pre, 28/08/2015 - 5:05md
Annanag writes: A Bell experiment in the Netherlands has plugged loopholes in the theory of quantum mechanics using a technique called entanglement swapping to combine the benefits of using both light and matter. It's Nobel-Prize winning stuff. Quoting: "Experiments that use entangled photons are prone to the ‘detection loophole’: not all photons produced in the experiment are detected, and sometimes as many as 80% are lost. Experimenters therefore have to assume that the properties of the photons they capture are representative of the entire set. ... [In the new work], researchers started with two unentangled electrons sitting in diamond crystals held in different labs on the Delft campus, 1.3 kilometers apart. Each electron was individually entangled with a photon, and both of those photons were then zipped to a third location. There, the two photons were entangled with each other — and this caused both their partner electrons to become entangled, too. This did not work every time. In total, the team managed to generate 245 entangled pairs of electrons over the course of nine days. The team's measurements exceeded Bell’s bound, once again supporting the standard quantum view. Moreover, the experiment closed both loopholes at once: because the electrons were easy to monitor, the detection loophole was not an issue, and they were separated far enough apart to close the communication loophole, too."

Read more of this story at Slashdot.

Boeing Demonstrates Drone-Killing Laser

Slashdot.org - Pre, 28/08/2015 - 4:23md
An anonymous reader writes: Boeing has successfully tested a new weapon system that tracks unmanned aircraft and shoots them down with a laser. The system is surprisingly small — it can be transported in a few medium-sized boxes, and two techs can set it up in minutes. The laser needs just a few seconds of continuous to set a drone aflame, and the tracking gimbal is precise enough to target specific parts of a drone. "Want to zap the tail so it crashes and then you can go retrieve the mostly intact drone and see who is trying to spy on you? Can do. Think it's carrying explosives and you want to completely destroy it? No problem." The laser is controlled with custom targeting software that runs on a laptop, with help from an Xbox 360 controller. Boeing expects the laser system to be ready for sale in the next year or two.

Read more of this story at Slashdot.

German Intelligence Traded Citizen Data For NSA Surveillance Software

Slashdot.org - Pre, 28/08/2015 - 3:39md
An anonymous reader sends news that Germany's domestic intelligence agency, the BfV, was so impressed with the NSA's surveillance software that they were willing to "share all data relevant to the NSA's mission" in order to get it. "The data in question is regularly part of the approved surveillance measures carried out by the BfV. In contrast, for example, to the Bundesnachrichtendienst (BND), Germany’s foreign intelligence agency, the BfV does not use a dragnet to collect huge volumes of data from the Internet. Rather, it is only allowed to monitor individual suspects in Germany -- and only after a special parliamentary commission has granted approval. ... Targeted surveillance measures are primarily intended to turn up the content of specific conversations, in the form of emails, telephone exchanges or faxes. But along the way, essentially as a side effect, the BfV also collects mass quantities of so-called metadata. Whether the collection of this data is consistent with the restrictions outlined in Germany's surveillance laws is a question that divides legal experts."

Read more of this story at Slashdot.

Chrome To Freeze Flash Ads On Sight From September 1

Slashdot.org - Pre, 28/08/2015 - 2:57md
An anonymous reader writes: Shaun Nichols from the Register reports that unimportant Flash content will be click-to-play by default in Google Chrome from September 1. He writes, "Google is making good on its promise to strangle Adobe Flash's ability to auto-play in Chrome. The web giant has set September 1, 2015 as the date from which non-important Flash files will be click-to-play in the browser by default – effectively freezing out 'many' Flash ads in the process. Netizens can right-click over the security-challenged plugin and select 'Run this' if they want to unfreeze an ad. Otherwise, the Flash files will remain suspended in a grey box, unable to cause any harm nor any annoyance."

Read more of this story at Slashdot.

Study: More Than Half of Psychological Results Can't Be Reproduced

Slashdot.org - Pre, 28/08/2015 - 2:14md
Bruce66423 writes: A new study trying to replicate results reported in allegedly high quality journals failed to do so in over 50% of cases. Those of us from a hard science background always had our doubts about this sort of stuff — it's interesting to see it demonstrated — or rather, as the man says: 'Psychology has nothing to be proud of when it comes to replication,' Charles Gallistel, president of the Association for Psychological Science. Back in June a crowd-sourced effort to replicate 100 psychology studies had a 39% success rate.

Read more of this story at Slashdot.

Ask Slashdot: Advice On Enterprise Architect Position

Slashdot.org - Pre, 28/08/2015 - 1:28md
dave562 writes: I could use some advice from the community. I have almost 20 years of IT experience, 5 of it with the company I am currently working for. In my current position, the infrastructure and applications that I am responsible for account for nearly 80% of the entire IT infrastructure of the company. In broad strokes our footprint is roughly 60 physical hosts that run close to 1500 VMs and a SAN that hosts almost 4PB of data. The organization is a moderate sized (~3000 employees), publicly traded company with a nearly $1 billion market value (recent fluctuations not withstanding). I have been involved in a constant struggle with the core IT group over how to best run the operations. They are a traditional, internal facing IT shop. They have stumbled through a private cloud initiative that is only about 30% realized. I have had to drag them kicking and screaming into the world of automated provisioning, IaaS, application performance monitoring, and all of the other IT "must haves" that a reasonable person would expect from a company of our size. All the while, I have never had full access to the infrastructure. I do not have access to the storage. I do not have access to the virtualization layer. I do not have Domain Admin rights. I cannot see the network. The entire organization has been ham strung by an "enterprise architect" who relies on consultants to get the job done, but does not have the capability to properly scope the projects. This has resulted in failure after failure and a broken trail of partially implemented projects. (VMware without SRM enabled. EMC storage hardware without automated tiering enabled. Numerous proof of concept systems that never make it into production because they were not scoped properly.) After 5 years of succeeding in the face of all of these challenges, the organization has offered me the Enterprise Architect position. However they do not think that the position should have full access to the environment. It is an "architecture" position and not a "sysadmin" position is how they explained it to me. That seems insane. It is like asking someone to draw a map, without being able to actually visit the place that needs to be mapped. For those of you in the community who have similar positions, what is your experience? Do you have unfettered access to the environment? Are purely architectural / advisory roles the norm at this level?

Read more of this story at Slashdot.

Zlatan Todorić: The big life adventure called DebConf15

Planet Debian - Pre, 28/08/2015 - 12:38md

By the help of sponsorship I managed again to attend the conference where Debian family gathers. This is going to be a mix without any particular order of everything, anything and nothing else ;)

I arrived to Heidelberg Main Train Station around 9am on 15th August and almost right away found Debian people so it made my trip to hostel easier. After arrival I checked in but needed to wait for 3 hours to get the key (it seems that SA will not have that problem at all, which is already an improvement). Although waiting was 3 hours long, it wasn't actually difficult at all as I started hugging and saying hi to many old (the super old super friend of mine - moray, or how I call him, "doc") and new friends. I just must say - if you know or don't know Rhonda, try to get somehow into her hugs. With her hug I acknowledged that I really did arrive to reunion.

Read more… (14 min remaining to read)

Faqet

Subscribe to AlbLinux agreguesi - Site në gjuhë të huaj