jrepin writes "The GNU Hurd is the GNU project's replacement for the Unix kernel. It is a collection of servers that run on the Mach microkernel to implement file systems, network protocols, file access control, and other features that are implemented by the Unix kernel or similar kernels (such as Linux). The Debian GNU/Hurd team announces the release of Debian GNU/Hurd 2013. This is a snapshot of Debian 'sid' at the time of the Debian 'wheezy' release (May 2013), so it is mostly based on the same sources. Debian GNU/Hurd is currently available for the i386 architecture with more than 10,000 software packages available (more than 75% of the Debian archive)."
Catch up on stories from the past week (and beyond) at the Slashdot story archive
kkleiner writes "A startup called Matternet is building a network of quadcopter drones to deliver vital goods to remote areas and emergency supplies to disaster-stricken areas. The installation of solar-powered fueling station and an operating system to allow for communications with local aviation authorities will allow the network to be available around the clock and in the farthest reaches of the world. 'Matternet’s drone network has three key components. First, the drones—custom-built autonomous electric quadcopters with GPS and sensors, capable of carrying a few kilos up to 10 kilometers (and more as the tech advances). Next, the firm will set up a network of solar-powered charging stations where drones autonomously drop off dead batteries and pick up charged ones. A drone battery that can travel 10 km need not limit the drone itself to 10 km — rather, these drones can theoretically travel the whole network by swapping out batteries. The final component will be an operating system to orchestrate the drone web, share information with aviation authorities, and fly missions 24/7/365.'"
hypnosec writes "The Electronic Frontier Foundation (EFF) has started accepting donations in the form of Bitcoins again after a two year hiatus, stating that the legal uncertainty hovering over the digital currency has all but disappeared. On their blog the EFF noted that a report from U.S. Treasury Department's Financial Crimes Enforcement Network (FinCEN), in addition to their own findings, 'have confirmed that, as a user of Bitcoin or any virtual currency, EFF itself is likely not subject to regulation.'"
Nerval's Lobster writes "Yahoo has agreed to acquire Tumblr for $1.1 billion. As you know, Yahoo is a major corporation with a need to monetize its assets in a way that makes its shareholders happy, leaving open the question of whether it'll alter Tumblr's DNA in order to make the latter more of a significant cash generator. But at least for the moment, Yahoo seems content to leave its new property alone. 'Per the agreement and our promise not to screw it up, Tumblr will be independently operated as a separate business,' read the company's press release. 'The product, service and brand will continue to be defined and developed separately with the same Tumblr irreverence, wit, and commitment to empower creators.' Tumblr CEO David Karp, who has been known to make some very anti-advertising comments in the past, will remain in place. Even so, anyone who likes Tumblr may have some cause for concern, because Yahoo has a history of making high-profile acquisitions that subsequently implode. Back in 1999, for example, it paid over $3 billion for GeoCities, another blogging network that it eventually shut down after years of failing the update the property. In 2005, it acquired popular photo-sharing Website Flickr, which it likewise allowed to languish and die. That same year it bought Delicious, a popular Webpage-bookmarking site, and did exactly nothing with it. So when Yahoo starts off its Tumblr press release with a promise not to screw things up, it's a self-deprecating nod toward all that history. New Yahoo CEO Marissa Mayer has been on a bit of a buying spree of late, snatching up startups such as Summly in an attempt to make her company 'cool' and relevant."
An anonymous reader writes "Tom's Hardware reports on the Connectify Switchboard software that "divides the user's traffic between Wi-Fi, 3G/4G and Ethernet-based connections on a packet-by-packet basis. Even a single stream — such as a Netflix movie — can be split between two or three Internet connections for a higher resolution and faster buffering." As part of its Kickstarter campaign, Connectify is geolocating their backers to optimize deployment of their servers. This is a clever way for supporters to influence the project beyond pledge levels and stretch goals, and it's actually kind of fun to watch."
First time accepted submitter iinventstuff writes "The Idaho National Laboratory has built a dirty bomb detection network out of cell phones. Camera phones operate by detecting photons and storing them as a picture. The INL discovered that high energy photons from radiological sources distort the image in ways detectable through image processing. KSL TV reports that the INL's mobile app detects radiation sources and then reports positive 'hits' to a central server. Terrorists deploying a dirty bomb will inevitably pass by people carrying cell phones. By crowdsourcing cell phones, the INL has created a potentially very large, inexpensive, and randomly mobile radiation detection grid."
dp619 writes "The tactic of patenting open source software to guard against patent trolls and the weaponization of corporate patent portfolios is gaining momentum in the FOSS community. Organizations including the Open Innovation Network, Google and Red Hat have built defensive patent portfolios (the latter two are defending their product lines). This approach has limitations. Penn State law professor Clark Asay writes in an Outercurve Foundation blog examining the trend, 'Patenting FOSS may help in some cases, but the nature of FOSS development itself may mean that patenting some collaboratively developed inventions is inherently more difficult, if not impossible, in many others. Consequently, strategies for mitigating patent risk that rely on FOSS communities patenting their technologies include inherent limitations. It's not entirely clear how best to reform patent law in order to better reconcile it with alternative models of innovation. But in the meantime, FOSS still presents certain advantages that, while dimmed by the prospect of patent suits, remain significant.'"
Nerval's Lobster writes "But at this year's Google I/O conference in San Francisco, Google announced that it has a plan to make Google Plus users more engaged, courtesy of new features backed by a handful of data-analytics tricks. Google Plus postings now feature Google-generated hashtags that, when clicked, direct the user to related content from across their network. From a backend-infrastructure perspective, that sort of thing leans heavily on Google's semantic analysis and the ability to make the right connections between various pieces of data. Google Plus will also automatically highlight certain photos out of dozens or even hundreds of shots. Say you went on vacation to India and took some photos of your significant other in front of the Taj Mahal; Google Plus will leverage its database of information to recognize that as a prominent landmark and pluck those photos out of the pile as 'special.' In the words of that posting on the Google+ Blog: 'Your darkroom is now a Google data center.' Are all these nifty, analytics-intensive features enough to change the larger fortunes of Google Plus? That's the big question. Google has a handsome-looking platform, one that performs certain activities with a high degree of polish and zip—but is that enough to counter Facebook?"
CowboyRobot writes "At the recent 2013 Open Networking Summit, Google Distinguished Engineer Amin Vahdat presented 'SDN@Google: Why and How', in which he described Google's 'B4' SDN network, one of the few actual implementations of software-defined networking. Google has deployed sets of Network Controller Servers (NCSs) alongside the switches, which run an OpenFlow agent with a 'thin level of control with all of the real smarts running on a set of controllers on an external server but still co-located.' By using SDN, Google hopes to increase efficiency and reduce cost. Unlike computation and storage, which benefit from an economy of scale, Google's network is getting much more expensive each year."
Today The New Yorker unveiled a project called Strongbox, which aims to let sources share tips and leaks with the news organization in a secure manner. It makes use of the TOR network and encrypts file uploads with PGP. Once the files are uploaded, they're transferred via thumb-drive to a laptop that isn't connected to the internet, which is erased every time it is powered on and booted with a live CD. The publication won't record any details about your visit, so even a government request to look at their records will fail to find any useful information. "There’s a growing technology gap: phone records, e-mail, computer forensics, and outright hacking are valuable weapons for anyone looking to identify a journalist’s source. With some exceptions, the press has done little to keep pace: our information-security efforts tend to gravitate toward the parts of our infrastructure that accept credit cards." Strongbox is actually just The New Yorker's version of a secure information-sharing platform called DeadDrop, built by Aaron Swartz shortly before his death. DeadDrop is free software.
Google's I/O annual conference is ramping up at San Francisco's Moscone Center. Last year, in the conference keynote, the company took its biggest-yet dive into hardware when it introduced the Nexus 7 tablet, Google Glass, and the ill-fated Nexus Q. The secret is out on Glass, of course: this year, there's a pavilion inside the conference center where I'm sure they'll be showing off applications for it. (Quite a few of the people in the endless lines here are wearing their own, too.) Anticipating the announcements at I/O is practically its own industry, but it's easy to guess that there will be announcements from all the major pots in which Google has its many thousands of (tapping) fingers. Android, search, Chrome, mapping, and all the other ways in which the behemoth of Mountain View is watching what you do. You can watch the keynote talk (talks, really) streamed online from the main conference link above, but this story will be updated with highlights of the announcements, as well with stories that readers contribute. Update: 05/15 16:22 GMT by T : Updates below. Update: 05/15 19:02 GMT by T :Update details: Notes (ongoing) added below on maps, gaming, the Play store, Google+, and more. And, notable, Larry Page is (at this writing) on stage, with an unannounced Q & A session.
colinneagle sends this quote from an article at NetworkWorld: "I run a very nifty desktop utility called Rainmeter on my PC that I heartily recommend to anyone who wants to keep an eye on their system. One of its main features is it has skins that can monitor your system activity. Thanks to my numerous meters, I see all CPU, disk, memory and network activity in real time. the C: drive meter. It is a circle split down the middle, with the right half lighting up to indicate a read and the left half lighting up for write activity. The C: drive was flashing a fair amount of activity considering I had nothing loaded save Outlook and Word, plus a few background apps. At the time, I didn't have a Rainmeter skin that lists the top processes by CPU and memory. So instead, I went into the Task Manager, and under Performance selected the Resource Monitor. Under the Processes tab, the culprit showed its face immediately: AppleMobileDeviceService.exe. It was consuming a ridiculous amount of threads and CPU cycles. The only way to turn it off is to go into Windows Services and turn off the service. There's just one problem. I use an iPhone. I can't disable it. But doing so for a little while dropped the CPU meters to nothing. So I now have more motivation to migrate to a new phone beyond just having one with a larger screen. This problem has been known for years. AppleMobileDeviceService.exe has been in iTunes since version 7.3. People complained on the Apple boards more than two years ago that it was consuming up to 50% of CPU cycles, and thus far it's as bad as it always has been. Mind you, Mac users aren't complaining. Just Windows users."
nametaken writes with this excerpt from Slate: "From the state that brought you the nation's first ban on climate science comes another legislative gem: a bill that would prohibit automakers from selling their cars in the state. The proposal, which the Raleigh News & Observer reports was unanimously approved by the state's Senate Commerce Committee on Thursday, would apply to all car manufacturers, but the intended target is clear. It's aimed at Tesla, the only U.S. automaker whose business model relies on selling cars directly to consumers, rather than through a network of third-party dealerships. ... [The article adds] it's easy to understand why some car dealers might feel a little threatened: Tesla's Model S outsold the Mercedes S-Class, BMW 7 Series, and Audi A8 last quarter without any help from them. If its business model were to catch on, consumers might find that they don't need the middle-men as much as they thought." State laws imposing restrictions on manufacturers in favor of dealers aren't new, though; For more on ways that franchise operations have "used state regulations to protect their profits" long before Tesla was in the picture, check out this 2009 interview with Duke University's Michael Munger.
Sockatume writes "The Sunday Times has revealed that analytics firm Ipsos MORI and 4G network EE attempted to sell detailed information on 27m subscribers' activities to various parties including the UK's police forces. The data encompasses the gender, postcode and age of subscribers, the sites they visit and times they are visited, and the places and times of calls and text messages. Ipsos MORI were reportedly 'bragging that the data can be used to track people and their location in real time to within 100 meters' in negotiations. Ipsos MORI has rushed to contradict this in an effort to save face, stating that the users are anonymized and data is aggregated into groups of 50 or more, while location is only precise to 700m. Despite their prior enthusiasm, the police have indicated that they will no longer go ahead with the deal. It is not clear whether the other sales will go ahead."
Gumbercules!! writes "While many smartphone users are still on 3G and are waiting for 4G to be available, Samsung is now testing 5G networks, capable of getting speeds up to 1gbps. Obviously, we're years away from seeing these in the wild (the company is shooting for 2020) but it's still an amazing improvement over what many people are experiencing now."
Lucas123 writes "Researchers are developing machine-to-machine (M2M) communication technology that allows cars to exchange data with each other, enabling vehicles to know what the cars all around them are doing, and perhaps, where they're going. Intel is working with National Taiwan University on M2M connectivity, an idea came from caravanning — an available, but-not-yet-deployed technology that uses direct line of site infrared (IR) and a range finder in order to automatically adjust the speed of cars so they can travel at a measured distance from each other. In other words, they're electronically tethered to one another. Now, imagine a group of cars traveling down the road together as an ad hoc network, each one aware of the location, any sudden actions or even the travel route of other vehicles as uploaded to the cloud from a GPS device. 'We're even imagining in the future cars would be able to ask other cars, "Hey, can I cut into your lane?" Then the other car would let you in,' said Jennifer Healey, a research scientist with Intel."
rye writes "Even the tiniest snippets of network traffic reveal a lot — not just about viruses and botnets, but also about the malware research lab setup inside corporations like RSA. Watch as Sherri Davidoff of LMG Security tears apart a teeny tiny snippet of gh0st RAT traffic released by RSA during their investigation of the VOHO 'watering hole' attack. Quoting: 'From just a few bits and bytes, we've learned that RSA's investigator was probably using Windows XP on a VMWare guest, which was assigned the IP address 192.168.0.106. The local router had a network card likely manufactured by 2Wire. We've also seen firsthand that the C2 channel traffic, which was masquerading as "HTTPS," was running over port 80, and confirmed the gh0st RAT's destination.'"
another random user writes "Facebook is reportedly introducing video advertisements to News Feeds this summer. Reports in the Financial Times (registration required) say that the clips will last for around 15 seconds, and the first one users see each day will play automatically. The first video will apparently play without audio, and restart if the account holder chooses to activate sound. Facebook is yet to officially confirm the move, but the report claims that the social network will gradually introduce video advertising to minimize user disruption. The company's most lucrative marketing partners, including American Express, Coca Cola, Ford, Diageo and Nestle, are expected to be the first brands to make use of the feature. Facebook is said to have implemented the strategy in a bid to take a slice out of TV ad revenue by undercutting the sector."
wiredmikey writes "A new report from the Pentagon marked the most explicit statement yet from the United States that it believes China's cyber espionage is focused on the U.S. government, as well as American corporations. China kept up a steady campaign of hacking in 2012 that included attempts to target U.S. government computer networks, which could provide Beijing a better insight into America's policy deliberations and military capabilities, according to the Pentagon's annual assessment of China's military. 'China is using its computer network exploitation capability to support intelligence collection against the U.S. diplomatic, economic, and defense industrial base sectors that support U.S. national defense programs,' said the report to Congress (PDF). The digital espionage was part of a broader industrial espionage effort that seeks to secure military-related U.S. and Western technology, allowing Beijing to scale back its reliance on foreign arms manufacturers, the report said. One day later, Beijing dismissed the Pentagon's report that accused it of widespread cyberspying on the U.S. government, rejecting it as an 'irresponsible' attempt to drum up fear of China as a military threat."
halfEvilTech writes "CenturyLink, the nation's third largest telco network, is experiencing an outage of its broadband service nationwide, leaving its support systems overwhelmed and even causing its website to hit a few snags this morning. The company, which at last count has 5.8 million broadband subscribers, has no estimates yet on how long it will take to restore service." CenturyLink is the company that will be providing the Defense Department with the equivalent of Internet2.