First time accepted submitter murpht2 writes "My company prides itself on an office environment that follows a modern design aesthetic: open floor plan, bold colors on the walls, cool lamps in the corners. We're now engaged in a significant upgrade to our IT systems and we have a clash: the IT team leader wants to run network cable in trays hanging from the ceiling so all the client computers have high-speed access to the new servers; the guy in charge of the office design wants to keep things looking clean and the cable trays don't fit the bill. We're in a building made entirely of bricks and concrete, so we lack some of the between-the-wall spaces that are used in other settings. Any suggestions for beautiful cable trays or other alternatives?"
Please create an account to participate in the Slashdot moderation system
The L.A. Times has a short but compelling article about the state of the art (and coming state of the art) in dedicated networking technology in one of the applications where you'd expect the customers to care most about it: connecting financial trading centers. Milliseconds count, and the traders count milliseconds. From the article, one example: "[New York-based networking company] Strike, whose ranks include academics as well as former U.S. and Israeli military engineers, hoisted a 6-foot white dish on a tower rising 280 feet above the Nasdaq Stock Market's data center in Carteret, N.J., just outside New York City. Through a series of microwave towers, the dish beams market data 734 miles to the Chicago Mercantile Exchange's computer warehouse in Aurora, Ill., in 4.13 milliseconds, or about 95% of the theoretical speed of light, according to the company. Fiber-optic cables, which are made up of long strands of glass, carry data at roughly 65% of light speed."
caferace writes "I've been around the block. I'm a long-time worker in the tech industry (nearly 30 years), absolutely kickass SQA and Hardware person, networking, you name it. But I'm 50+ now, and finding new regular or contract work is a pain. And it shouldn't be. I have the skills and the aptitude to absorb and adapt to any new situations and languages way beyond what any of my college age brethren might have. But when I send out a perfectly good resume and use the more obvious resources there are still precious few bites for someone requiring to work remotely. Am I just whining, or is this common? Are we being put out to pasture far too early?"
An anonymous reader writes "Researchers at Fraunhofer FKIE, Germany have presented a paper on covert acoustical communications between laptop computers. In their paper 'On Covert Acoustical Mesh Networks in Air', they describe how acoustical communication can be used to secretly bridge air gaps between computers and connect computers and networks that are thought to be completely isolated from each other. By using ad-hoc routing protocols, they are able to build up a complete mesh network of infected computers that leaks data over multiple hops. A multi-hop acoustical keylogger is also presented where keystrokes are forwarded to an attacker over multiple hops between different office rooms. The fundamental part of the communication system is a piece of software that has originally been developed for acoustic underwater communications. The researchers also provide different countermeasures against malicious participation in a covert acoustical network. The limitations of air gaps have been discussed recently in the context of a highly advanced malware, although reports on this so-called badBIOS malware could not yet be confirmed."
Hugh Pickens DOT Com writes "The Washington Post reports that a rigorous, six-month training program launched by successful tech entrepreneurs for inmates in the decaying San Quentin State Prison is teaching carefully selected inmates the ins and outs of designing and launching technology firms, using local experts as volunteer instructors and the graduates, now trickling out of the penal system, are landing real jobs at real dot-coms. 'We believe that when incarcerated people are released into the world, they need the tools to function in today's high-tech, wired world,' says co-founder Beverly Parenti, who with her husband, Chris Redlitz, has launched thriving companies, including AdAuction, the first online media exchange. During twice-a-week evening lessons, students — many locked up before smartphones or Google— practice tweeting, brainstorm new companies and discuss business books assigned as homework. Banned from the Internet to prevent networking with other criminals, they take notes on keyboard-like word processors or with pencil on paper. The program is still 'bootstrapping,' as its organizers say, with just 12 graduates in its first two years and now a few dozen in classes in San Quentin and Twin Towers. But the five graduates released so far are working in the tech sector. 'This program will go a long way to not only providing these guys with jobs, but it is my hope that they hire people like them who have changed their lives and are now ready to contribute to society, pay taxes, follow the law, support their families,' says former California Department of Corrections and Rehabilitation director Matthew Cate who adds he made the right decision to approve the training course. 'All those things contribute to the economy.'"
msm1267 writes "Attackers are using route injection attacks against BGP-speaking routers to insert additional hops in the traffic stream, redirecting traffic to third-party locations where it can be inspected before it's sent to its destination. Internet intelligence company Renesys has detected close to 1,500 IP address blocks that have been hijacked on more than 60 days this year, a disturbing trend that indicates attackers could finally have an increased interest in weaknesses inherent in core Internet infrastructure."
Nerval's Lobster writes "Vint Cerf, widely considered one of the 'founders of the Internet,' told an audience at the Federal Trade Commission's Internet of Things workshop that privacy could be considered 'an anomaly.' That workshop, held Nov. 19 in Washington, DC, explored (via speeches and panel discussions) how the proliferation of sensors on everything from cars to household devices is fundamentally changing how people live and work—while raising questions of how to best maintain privacy and security in an environment where more and more things are 'watchers.' 'The technology that we use today has far outraced our social intuition, our headlights,' he added. '[There's a] need to develop social conventions that are more respectful of people's privacy.' Current social behaviors, such as instantly posting images from smartphones to social networks, can result in a whole lot of embarrassment—and maybe even penalties, if data and media happens to catch someone in the act of doing something illegal. Cerf currently works at Google as chief Internet evangelist, which would make him uniquely positioned to comment on these sorts of issues even if he hadn't co-created the TCP/IP backbone that supports the modern Web. (Back in April, he told an audience that, if he had to do it all over again, he'd construct the Internet in the mold of Software-Defined Networking — but that's a whole different, tangled discussion.)"
jfruh writes "The new Chinese leadership released a document outlining its vision for the country Friday, and most of the attention was paid to reforms, like plans to loosen state control of the economy and end the one-child policy. But when it comes to the Internet, the Chinese Communist government is doubling down on its restrictive policies. The document notes that social networking and instant messaging tools can rapidly disseminate information and mobilize society; the government doesn't think those are good things, and plans to bolster its regulatory systems and increase the scope of their legal authority."
An anonymous reader writes "The FreeBSD Foundation's annual year-end fundraising drive is currently running. Their goal this year is US$ 1M, and they're currently at US$ 427K. In 2013, the efforts that were funded were from the last drive were: Native iSCSI kernel stack, Updated Intel graphics chipset support, Integration of Newcons, UTF-8 console support, Superpages for ARM architecture, and Layer 2 networking updates. Also various conferences and summit sponsorships, as well as hardware purchases for the Project. The Foundation is a US 501(c)3 non-profit, so your donations (if in the US) are tax-deductible. Some of the larger 2013 (corporate?) sponsors so far are NetApp, LineRate, WhatsApp, and Tarsnap."
coondoggie writes "Amazon Web Services recently won a reported $600 million contract to build the U.S. Central Intelligence Agency (CIA) a cloud. But that cloud will not look like any other cloud on the planet. Amazon will build the cloud using AWS architectures and AWS will manage it, but executives hinted that it will not be accessed the way other customers use AWS services through the public Internet. 'We're managing the operations in the data center,' Andy Jassy, Amazon's senior vice president and the head of the company's cloud computing division AWS said about the CIA deal. 'It's our hardware, it's our networking.'"
judgecorp writes "British mobile operator EE is offering a massive 1 Petabyte data bundle to businesses spread across multiple phones,.It's more than a gimmick to promote the 4G data service — it's aimed at heavy data users such as media companies who use data networks to upload content. This deal charges £8 per gigabyte, which is less than half the cost of the satellite uplinks they currently use. So the £8 million cost of this package might even result in savings for some organizations."
itwbennett writes "Google's latest proposals aimed at avoiding an antitrust fine from European authorities have been leaked amid growing anger over the secrecy surrounding the case. The documents, which have been verified by sources in possession of the originals, revealed the full remedies put forward by Google, the questionnaire that rivals have been asked to fill in giving their response to the remedies and a comparison document showing the changes in Google's remedies since the last proposals. Unlike the first round of so-called 'market testing,' Google's revised proposals have not been made public and were only sent to 125 interested parties who were warned that they were not to be made public."
alphadogg writes "The equipment is big and expensive, with the research costs at almost $500,000. But by just using retail components, Chinese professor Chi Nan has built her own Li-Fi wireless system that can use LED lights to send and receive Internet data. "I bought the lights from Taobao," she said, referring to the Chinese e-commerce site. The professor from Fudan University showed off the technology on Tuesday at the China International Industry Fair in Shanghai. Unlike traditional Wi-Fi routers that use radio signals, Chi's system relies on light to send and receive data wirelessly. Others scientists, especially in the U.K., have also been researching the technology, and dubbed it "Li-Fi". But rather than develop specialized hardware, Chi bought off-the-shelf retail parts to create her system."
First time accepted submitter renzema writes "I'm looking for a way to do near-site backups — backups that are not on my physical property, but with a hard drive still accessible should I need to do a restore (let's face it — this is where cloud backup services are really weak — 1 TB at 3-4mb downloads just doesn't cut it). I've tried crashplan, but that requires that someone has a computer on all the time and they don't ship hard drives to Sweden. What I want is to be able to back up my Windows and Mac to both a local disk and to a disk that I own that is not on site. I don't want a computer running 24x7 to support this — just a router or NAS. I would even be happy with a local disk that is somehow mirrored to a remote location. I haven't found anything out there that makes this simple. Any ideas?" What, besides "walk over a disk once in a while," would you advise?
An anonymous reader writes "Despite what we hear about how much the U.S. government is struggling with a website, it is reassuring that most of government entities can update their websites within a day after they are asked to. This conclusion is the result of research done by the Networking Systems Laboratory at the Computer Science Department of the University of Houston. The research team tracked government websites and their update times, and found that 96% of the websites were updated within 24 hours after President Obama signed HR 2775 into law, ending the Government shutdown. Worth noting that two websites took 8 days to update. It is interesting that the team was able to use the shutdown as an opportunity to study the efficiency of the IT departments of various parts of Government."
An anonymous reader writes "Almost three years ago, I started looking for a cloud storage service. Encryption and the "zero-knowledge" concept were not concerns. Frankly, after two weeks testing services, it boiled down to one service I used for almost 2 years. It was perfect — in the technical sense — because it simply works as advertised and is one of the cheapest for 500GB. But this year, I decided changing that service for another one, that would encrypt my files before leaving my machine. Some of these services call themselves 'zero-knowledge' services, because (as they claim) clear text does not leave your host: they only receive encrypted data — keys or passwords are not sent. I did all testing I could, with the free bit of their services, and then, chose one of them. After a while, when the load got higher (more files, more folders, more GB...), my horror story began. I started experiencing sync problems of all sorts. In fact, I have paid for and tested another service and both had the same issues with sync. Worse, one of them could not even handle restoring files correctly. I had to restore from my local backup more than once and I ended up losing files for real. In your experience, which service (or services) are really able to handle more than a hundred files, in sync within 5+ hosts, without messing up (deleting, renaming, duplicating) files and folders?"
jfruh writes "Marshall Rose, one of the creators of the SNMP protocol, has a beef with current home automation gadgets: it's very, very difficult to get them to talk to each other, and you often end up needing a pile of remote controls to operate them. To fix these problems, he's proposed the Thing System, which will serve as an intermediary on your home automation network. The Thing System aims to help integrate gadgets already on the market, which may help it take off."
Hugh Pickens DOT Com writes "Dan Goodwin writes at Ars Technica about a rootkit that seems straight out of a science-fiction thriller. According to security consultant Dragos Ruiu one day his MacBook Air, on which he had just installed a fresh copy of OS X, spontaneously updated the firmware that helps it boot. Stranger still, when Ruiu then tried to boot the machine off a CD ROM, it refused and he also found that the machine could delete data and undo configuration changes with no prompting. Next a computer running the Open BSD operating system also began to modify its settings and delete its data without explanation or prompting and further investigation showed that multiple variants of Windows and Linux were also affected. But the story gets stranger still. Ruiu began observing encrypted data packets being sent to and from an infected laptop that had no obvious network connection with—but was in close proximity to—another badBIOS-infected computer. The packets were transmitted even when the laptop had its Wi-Fi and Bluetooth cards removed. Ruiu also disconnected the machine's power cord so it ran only on battery to rule out the possibility it was receiving signals over the electrical connection. Even then, forensic tools showed the packets continued to flow over the airgapped machine. Then, when Ruiu removed internal speaker and microphone connected to the airgapped machine, the packets suddenly stopped. With the speakers and mic intact, Ruiu said, the isolated computer seemed to be using the high-frequency connection to maintain the integrity of the badBIOS infection as he worked to dismantle software components the malware relied on. It's too early to say with confidence that what Ruiu has been observing is a USB-transmitted rootkit that can burrow into a computer's lowest levels and use it as a jumping off point to infect a variety of operating systems with malware that can't be detected. It's even harder to know for sure that infected systems are using high-frequency sounds to communicate with isolated machines. But after almost two weeks of online discussion, no one has been able to rule out these troubling scenarios, either. 'It looks like the state of the art in intrusion stuff is a lot more advanced than we assumed it was,' says Ruiu. 'The take-away from this is a lot of our forensic procedures are weak when faced with challenges like this. A lot of companies have to take a lot more care when they use forensic data if they're faced with sophisticated attackers.'"