Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

  • China Staging a Nationwide Attack On iCloud and Microsoft Accounts

    New submitter DemonOnIce writes: According to The Verge and an original report from the site that monitor's China's Great Firewall activity, China is conducting a large-scale attack on iCloud and Microsoft accounts using its government firewall software. Chinese users may be facing an unpleasant surprise as they are directed to a dummy site designed to look like an Apple login page (or a Microsoft one, as appropriate).

    66 comments | 6 hours ago

  • OpenStack Juno Released

    darthcamaro writes The OpenStack Juno release is now generally available. This the 10th major release for the open-source cloud platform and introduces the Sahara Data Processing Service as the major new project. That's not the only new feature in Juno though, with 310 new features in total. The new features include cloud storage policy, improved IPv6 support, a rescue mode and improved multi-cloud federation capabilities."

    20 comments | 3 days ago

  • Microsoft Partners With Docker

    rjmarvin writes Docker is teaming up with Microsoft to bring its open container technology to the next release of Windows Server. Docker Engine will work with the next release of Windows Server and images will be available in Docker Hub, which will also integrate directly into Microsoft Azure. The partnership moves Docker beyond Linux for the first time with new multi-container application capabilities for cloud and enterprise developers.

    104 comments | 5 days ago

  • Eggcyte is Making a Pocket-Sized Personal Web Server (Video)

    Eggcyte has been working on this for two years. It's on Kickstarter now; a personal server you can use to share music, video, text, and just about anything else without resorting to cloud-based services where one weak password can put your private celebrity photos (you are a celebrity, right?) into the wrong hands. If you suddenly decide you don't want to share the information on your Egg any more, turn it off. If you suddenly have something new to share, like a video you just shot of the Loch Ness Monster capturing an alien spaceship, you can connect your Egg to the Internet anywhere you find a wireless access point. The main thing, say the Eggcyte people, is that your data is yours and should stay that way. Facebook and other cloud-based "sharing" companies use your data to learn about you. Here in the U.S. their primary purpose may be to show you ads for things you might want to buy. In more repressive countries, cloud-based sharing services may use your private data in ways that could be hazardous to your health. Of course, our government people would never keep track of what we post on Twitter and other online services... or would they? (Alternate Video Link)

    94 comments | 5 days ago

  • If Your Cloud Vendor Goes Out of Business, Are You Ready?

    storagedude writes: With Amazon Web Services losing an estimated $2 billion a year, it's not inconceivable that the cloud industry could go the way of storage service providers (remember them?). So any plan for cloud services must include a way to retrieve your data quickly in case your cloud service provider goes belly up without much notice (think Nirvanix). In an article at Enterprise Storage Forum, Henry Newman notes that recovering your data from the cloud quickly is a lot harder than you might think. Even if you have a dedicated OC-192 channel, it would take 11 days to move a petabyte of data – and that's with no contention or other latency. One possible solution: a failover agreement with a second cloud provider – and make sure it's legally binding.

    150 comments | 5 days ago

  • MAVEN Spies Mars' Atmosphere Leaching Out Into Space

    astroengine writes: Early results from NASA's recently arrived MAVEN Mars spacecraft show an extensive, tenuous cloud of hydrogen surrounding the red planet, the result of water breaking down in the atmosphere, scientists said Tuesday. MAVEN, an acronym for Mars Atmosphere and Volatile Evolution, arrived on Sept. 21 to help answer questions about what caused a planet that was once warm and wet to turn into the cold, dry desert that appears today. "It's measurements like these that will allow us to estimate the escape rate of hydrogen from the Martian atmosphere to space today. It's an important measurement to make because the hydrogen ... comes from water lower down in the atmosphere," MAVEN scientist Mike Chaffin, with the University of Colorado, Boulder, told reporters on a conference call.

    63 comments | 5 days ago

  • Amazon Web Services To Build Two New Aussie Data Centers

    Bismillah writes: Sydney will get two new AWS data centers in the western and south-western parts of the city. AWS apparently decided to build the new DCs after it struggled to find enough Tier III space for rapid expansion in the region.

    27 comments | about a week ago

  • Can the Sun Realistically Power Datacenters?

    1sockchuck writes: A massive solar array in central New Jersey provides the daytime power for a server farm delivering online financial services for McGraw Hill. The 50-acre field of photovoltaic solar panels symbolizes a new phase in the use of renewable energy in data centers. Massive arrays can now provide tens of megawatts of solar power for companies (including Apple) that can afford the land and the expense. But some data center thought leaders argue that these huge fields are more about marketing than genuinely finding the best approach to a greener cloud.

    236 comments | about a week ago

  • The Correct Response To Photo Hack Victim-Blamers

    Bennett Haselton writes As commenters continue to blame Jennifer Lawrence and other celebrities for allowing their nude photos to be stolen, there is only one rebuttal to the victim-blaming which actually makes sense: that for the celebrities taking their nude selfies, the probable benefits of their actions outweighed the probable negatives. Most of the other rebuttals being offered, are logically incoherent, and, as such, are not likely to change the minds of the victim-blamers. Read below to see what Bennett has to say.

    622 comments | about a week ago

  • Microsoft's Quantum Mechanics

    New submitter catchblue22 writes MIT Technology Review has an excellent article summarizing the current state of quantum computing. It focuses on the efforts of Microsoft and Alcatel-Lucent's Bell Labs to build stable qubits over the past few years. "In 2012, physicists in the Netherlands announced a discovery in particle physics that started chatter about a Nobel Prize. Inside a tiny rod of semiconductor crystal chilled cooler than outer space, they had caught the first glimpse of a strange particle called the Majorana fermion, finally confirming a prediction made in 1937. It was an advance seemingly unrelated to the challenges of selling office productivity software or competing with Amazon in cloud computing, but Craig Mundie, then heading Microsoft's technology and research strategy, was delighted. The abstruse discovery — partly underwritten by Microsoft — was crucial to a project at the company aimed at making it possible to build immensely powerful computers that crunch data using quantum physics. "It was a pivotal moment," says Mundie. "This research was guiding us toward a way of realizing one of these systems."

    39 comments | about a week ago

  • ChromeOS Will No Longer Support Ext2/3/4 On External Drives/SD Cards

    An anonymous reader writes Chrome OS is based on the Linux kernel and designed by Google to work with web applications and installed applications. Chromebook is one of the best selling laptops on Amazon. However, devs decided to drop support for ext2/3/4 on external drivers and SD card. It seems that ChromiumOS developers can't implement a script or feature to relabel EXT volumes in the left nav that is insertable and has RW privileges using Files.app. Given that this is the main filesystem in Linux, and is thereby automatically well supported by anything that leverages Linux, this choice makes absolutely no sense. Google may want to drop support for external storage and push the cloud storage on everyone. Overall Linux users and community members are not happy at all.

    344 comments | about a week ago

  • Windows Users, Get Ready For a Bigger-Than-Usual Patch Tuesday

    dibdublin (981416) writes with a report from The Register: October is stacking up to be a bumper Patch Tuesday update with nine bulletins lined up for delivery — three rated critical. Cloud security firm Qualys estimates two of the lesser "important" bulletins are just as bad however, as they would also allow malicious code injection onto vulnerable systems. Top of the critical list is an update for Internet Explorer that affects all currently supported versions 6 to 11, on all operating system including Windows RT. Vulnerabilities discovered in most versions of Windows Server, Windows 7 and 8, and the .NET framework are covered in the other pair of critical bulletins.

    63 comments | about two weeks ago

  • Department of Defense May Give Private Cloud Vendors Access To Top Secret Data

    An anonymous reader sends news that the U.S. Department of Defense is pondering methods to store its most sensitive data in the cloud. The DoD issued an information request (PDF) to see whether the commercial marketplace can provide remote computing services for Level 5 and Level 6 workloads, which include restricted military data. "The DoD anticipates that the infrastructure will range from configurations featuring between 10,000 and 200,000 virtual machines. Any vendors selected to the scheme would be subject to an accreditation process and to security screening, and the DoD is employing the Federal Risk and Authorization Management Program to establish screening procedures for authorized cloud vendors, and to generate procedures for continuous monitoring and auditing."

    60 comments | about two weeks ago

  • Vax, PDP/11, HP3000 and Others Live On In the Cloud

    judgecorp writes: Surprisingly, critical applications still rely on old platforms, although legacy hardware is on its last legs. Swiss emulation expert Stromasys is offering emulation in the cloud for old hardware using a tool cheekily named after Charon, the ferryman to the afterlife. Systems covered include the Vax and PDP/11 platforms from Digital Equipment (which was swallowed by Compaq and then HP) as well as Digital's Alpha RISC systems, and HP's HP3000. It also offers Sparc emulation, although Oracle might dispute the need for this.

    62 comments | about two weeks ago

  • Test-Driving a $35 Firefox OS Smartphone

    An anonymous reader writes: Ars Technica got its hands on one of the extremely low-cost smart phones running Firefox OS. The Intex Cloud FX retails for about $35 in India, and its intent is to bring smartphones to people who traditionally can't afford them. So, what do you have to sacrifice to bring a smartphone's costs down that far? Well, it has a 3.5" 480x320 display, a 1Ghz A5 CPU, 128MB of RAM, and 256 MB of storage. (Those a megabytes.) There's no GPS, no notification LED, and not even 3G support. They say the build quality is as poor as you'd expect, and if you aren't at a 90 degree angle with the screen, colors are distorted. But, again: it's $35 — this is to be expected.

    How well does the phone work? Well, the UI works well enough, but multitasking is rough. Everything's functional, but slow, sometimes taking several seconds to register touch input. The real killer, according to the article, is the on-screen keyboard, which is unbearable. The article concludes, "Sure, we're spoiled, "rich" people compared to the target market, but it's hard to believe that this is a "best attempt" at a cheap smartphone. ... The problem is that Firefox OS just isn't the right choice of operating system for this device—it's trying to do way too much with the limited hardware. It isn't configurable enough." They say the phone doesn't even make sense for a $35 budget.

    132 comments | about two weeks ago

  • Why Military Personnel Make the Best IT Pros

    Nerval's Lobster writes Every year, approximately 250,000 military personnel leave the service to return to civilian life. When the home front beckons, many will be looking to become IT professionals, a role that, according to the U.S. Bureau of Labor Statistics, is among the fastest growing jobs in the country. How their field skills will translate to the back office is something to ponder. With the advent of virtualization, mobile, and the cloud, tech undergoes rapid changes, as do the skill sets needed to succeed. That said, the nature of today's military—always on the go, and heavily reliant on virtual solutions—may actually be the perfect training ground for IT. Consider that many war-fighters already are IT technicians: They need to be skilled in data management, mobile solutions, security, the ability to fix problems as they arise onsite, and more. Military personnel used to working with everything from SATCOM terminals to iPads are ideally suited for handling these issues; many have successfully managed wireless endpoints, networks, and security while in the field. Should programs that focus on placing former military personnel in civilian jobs focus even more on getting them into IT roles?

    299 comments | about two weeks ago

  • Professor Kevin Fu Answers Your Questions About Medical Device Security

    Almost a year ago you had a chance to ask professor Kevin Fu about medical device security. A number of events (including the collapse of his house) conspired to delay the answering of those questions. Professor Fu has finally found respite from calamity, coincidentally at a time when the FDA has issued guidance on the security of medical devices. Below you'll find his answers to your old but not forgotten questions.

    21 comments | about two weeks ago

  • Is an Octopus Too Smart For Us To Eat?

    An anonymous reader writes: The New Yorker is running a piece on the ethical dilemma we face when considering octopus intelligence alongside our willingness to eat them. "Octopus intelligence is well documented: they have been known to open jars, guard their unhatched eggs for months or even years, and demonstrate personalities. Most famously, they can blast a cloud of ink to throw off predators, but even more impressive is the masterfully complex camouflage employed by several members of Cephalopoda (a class that also includes squid and cuttlefish)." While humans eat animals ranging widely in mental faculties, the octopus remains one of the smartest ones we do consume. And unlike pigs, for example, their population is not dependent on humanity to survive. As our scientific understanding of intelligence grows, these ethical debates will only come into sharper focus. Where do we draw the line?

    481 comments | about two weeks ago

  • Building a Honeypot To Observe Shellshock Attacks In the Real World

    Nerval's Lobster writes A look at some of the Shellshock-related reports from the past week makes it seem as if attackers are flooding networks with cyberattacks targeting the vulnerability in Bash that was disclosed last week. While the attackers haven't wholesale adopted the flaw, there have been quite a few attacks—but the reality is that attackers are treating the flaw as just one of many methods available in their tool kits. One way to get a front-row seat of what the attacks look like is to set up a honeypot. Luckily, threat intelligence firm ThreatStream released ShockPot, a version of its honeypot software with a specific flag, "is_shellshock," that captures attempts to trigger the Bash vulnerability. Setting up ShockPot on a Linux server from cloud host Linode.com is a snap. Since attackers are systematically scanning all available addresses in the IPv4 space, it's just a matter of time before someone finds a particular ShockPot machine. And that was definitely the case, as a honeypot set up by a Dice (yes, yes, we know) tech writer captured a total of seven Shellshock attack attempts out of 123 total attacks. On one hand, that's a lot for a machine no one knows anything about; on the other, it indicates that attackers haven't wholesale dumped other methods in favor of going after this particular bug. PHP was the most common attack method observed on this honeypot, with various attempts to trigger vulnerabilities in popular PHP applications and to execute malicious PHP scripts.

    41 comments | about three weeks ago

  • Xen Cloud Fix Shows the Right Way To Patch Open-Source Flaws

    darthcamaro writes Amazon, Rackspace and IBM have all patched their public clouds over the last several days due to a vulnerability in the Xen hypervisor. According to a new report, the Xen project was first advised of the issue two weeks ago, but instead of the knee jerk type reactions we've seen with Heartbleed and now Shellshock, the Xen project privately fixed the bug and waited until all the major Xen deployments were patched before any details were released. Isn't this the way that all open-source projects should fix security issues? And if it's not, what is?

    81 comments | about three weeks ago

Slashdot Login

Need an Account?

Forgot your password?