Feed aggregator

Ubuntu Is the Dominant Cloud OS

Slashdot - 1 hour 14 min ago
An anonymous reader writes: According to a new report by Cloud Market, Ubuntu is more than twice as popular on Amazon EC2 as all other operating systems combined. Given that Amazon Web Services has 57% of the public cloud market, Ubuntu is clearly the most popular OS for cloud systems. This is further bolstered by a recent OpenStack survey, which found that more than half of respondents used Ubuntu for cloud-based production environments. Centos was a distant second at 29%, and RHEL came in third at 11%. "In addition to AWS, Ubuntu has been available on HP Cloud, and Microsoft Azure since 2013. It's also now available on Google Cloud Platform, Fujitsu, and Joyent." The article concludes, "People still see Ubuntu as primarily a desktop operating system. It's not — and hasn't been for some time."

Read more of this story at Slashdot.

Categories: Technology

Federal Court Overturns Ruling That NSA Metadata Collection Was Illegal

Slashdot - 1 hour 56 min ago
New submitter captnjohnny1618 writes: NPR is reporting that an appeals court has overturned the decision that found the NSA's bulk data collection to be illegal. "Judges for the District of Columbia court of appeals found that the man who brought the case, conservative lawyer Larry Klayman, could not prove that his particular cellphone records had been swept up in NSA dragnets." The article clarifies that due to the recent passage of new laws governing how metadata is collected, this is of less significance than it would have otherwise been: "If you remember, after a fierce battle, both houses of Congress voted in favor of a law that lets phone companies keep that database, but still allows the government to query it for specific data. The three-judge panel of the United States Court of Appeals for the District of Columbia still decided to take on the case, because that new program doesn't begin until 180 days after the date that law was enacted (June 2, 2015.)" On top of that, the injunction from the earlier ruling never actually went into effect. Still, it seems like an important ruling to me: a government agency was willfully and directly violating the rights of the Americans (and international citizens as well) and now it's just going to get shrugged off?

Read more of this story at Slashdot.

Categories: Technology

How NASA Defended Its Assembly Facility From Hurricane Katrina

Slashdot - 2 hours 38 min ago
An anonymous reader writes: Tomorrow marks the 10-year anniversary of Hurricane Katrina's arrival in New Orleans. Though that time was filled with tragedy, there were survival stories, and a new article gives an insider's account of how NASA's Michoud Assembly Facility weathered the storm. Michoud was their key fuel tank production location, and if it had been lost, the space program would have gone off the rails. A 17-foot levee and a building with four water pumps capable of moving 62,000 gallons per minute stood between the storm and catastrophe for NASA's launch capabilities. "Water was merely the primary concern of the first 24 hours; Hurricane Katrina left its mark on the facilities even if Michoud was the rare speck of land to escape flooding. Roofs were lost to strong winds, one building even blew out entirely. External Tank 122 took some damage." Members of the "ride out" team spent much of the next month at Michoud, working long days to inspect and repair issues caused by the water. They maintained the facility well enough that it became a base for members of the military doing search and rescue operations. Amazingly, they did it all without any injuries to the team, and NASA didn't miss a single tank shipment.

Read more of this story at Slashdot.

Categories: Technology

French Woman Gets €800/month For Electromagnetic-Field 'Disability'

Slashdot - 3 hours 20 min ago
An anonymous reader writes: If you were dismayed to hear Tuesday's news that a school is being sued over Wi-Fi sickness, you might be even more disappointed in a recent verdict by the French judicial system. A court based in Toulouse has awarded a disability claim of €800 (~$898) per month for three years over a 39-year-old woman's "hypersensitivity to electromagnetic waves." Robin Des Toits, an organization that campaigns for "sufferers" of this malady, was pleased: "We can no longer say that it is a psychiatric illness." (Actually, we can and will.) The woman has been living in a remote part of France's south-west mountains with no electricity around. She claims to be affected by common gadgets like cellphones.

Read more of this story at Slashdot.

Categories: Technology

'Ingenious' Experiment Closes Loopholes In Quantum Theory

Slashdot - 4 hours 3 min ago
Annanag writes: A Bell experiment in the Netherlands has plugged loopholes in the theory of quantum mechanics using a technique called entanglement swapping to combine the benefits of using both light and matter. It's Nobel-Prize winning stuff. Quoting: "Experiments that use entangled photons are prone to the ‘detection loophole’: not all photons produced in the experiment are detected, and sometimes as many as 80% are lost. Experimenters therefore have to assume that the properties of the photons they capture are representative of the entire set. ... [In the new work], researchers started with two unentangled electrons sitting in diamond crystals held in different labs on the Delft campus, 1.3 kilometers apart. Each electron was individually entangled with a photon, and both of those photons were then zipped to a third location. There, the two photons were entangled with each other — and this caused both their partner electrons to become entangled, too. This did not work every time. In total, the team managed to generate 245 entangled pairs of electrons over the course of nine days. The team's measurements exceeded Bell’s bound, once again supporting the standard quantum view. Moreover, the experiment closed both loopholes at once: because the electrons were easy to monitor, the detection loophole was not an issue, and they were separated far enough apart to close the communication loophole, too."

Read more of this story at Slashdot.

Categories: Technology

Concerning Containers' Connections: on Docker Networking

LinuxToday - 4 hours 8 min ago

LinuxJournal: Containers can be considered the third wave in service provision after physical boxes (the first wave) and virtual machines (the second wave).

Categories: Technology

Boeing Demonstrates Drone-Killing Laser

Slashdot - 4 hours 45 min ago
An anonymous reader writes: Boeing has successfully tested a new weapon system that tracks unmanned aircraft and shoots them down with a laser. The system is surprisingly small — it can be transported in a few medium-sized boxes, and two techs can set it up in minutes. The laser needs just a few seconds of continuous to set a drone aflame, and the tracking gimbal is precise enough to target specific parts of a drone. "Want to zap the tail so it crashes and then you can go retrieve the mostly intact drone and see who is trying to spy on you? Can do. Think it's carrying explosives and you want to completely destroy it? No problem." The laser is controlled with custom targeting software that runs on a laptop, with help from an Xbox 360 controller. Boeing expects the laser system to be ready for sale in the next year or two.

Read more of this story at Slashdot.

Categories: Technology

How to find out if your PC is compatible with Linux

LinuxToday - 5 hours 8 min ago

PC World: Can your PC run Linux? Probably. But here's how to find out for sure.a

Categories: Technology

German Intelligence Traded Citizen Data For NSA Surveillance Software

Slashdot - 5 hours 29 min ago
An anonymous reader sends news that Germany's domestic intelligence agency, the BfV, was so impressed with the NSA's surveillance software that they were willing to "share all data relevant to the NSA's mission" in order to get it. "The data in question is regularly part of the approved surveillance measures carried out by the BfV. In contrast, for example, to the Bundesnachrichtendienst (BND), Germany’s foreign intelligence agency, the BfV does not use a dragnet to collect huge volumes of data from the Internet. Rather, it is only allowed to monitor individual suspects in Germany -- and only after a special parliamentary commission has granted approval. ... Targeted surveillance measures are primarily intended to turn up the content of specific conversations, in the form of emails, telephone exchanges or faxes. But along the way, essentially as a side effect, the BfV also collects mass quantities of so-called metadata. Whether the collection of this data is consistent with the restrictions outlined in Germany's surveillance laws is a question that divides legal experts."

Read more of this story at Slashdot.

Categories: Technology

At 24, Linux Has Come Out of the Basement

LinuxToday - 6 hours 8 min ago

LinuxInsider: Happy Birthday, Linux Project -- this week you turned 24.

Categories: Technology

Google Container Engine is The Product Version of Kubernetes and It’s Now Live

LinuxToday - 6 hours 8 min ago

The New Stack: Container Engine is effectively Google’s public product-ization of Kubernetes as a service.

Categories: Technology

Chrome To Freeze Flash Ads On Sight From September 1

Slashdot - 6 hours 11 min ago
An anonymous reader writes: Shaun Nichols from the Register reports that unimportant Flash content will be click-to-play by default in Google Chrome from September 1. He writes, "Google is making good on its promise to strangle Adobe Flash's ability to auto-play in Chrome. The web giant has set September 1, 2015 as the date from which non-important Flash files will be click-to-play in the browser by default – effectively freezing out 'many' Flash ads in the process. Netizens can right-click over the security-challenged plugin and select 'Run this' if they want to unfreeze an ad. Otherwise, the Flash files will remain suspended in a grey box, unable to cause any harm nor any annoyance."

Read more of this story at Slashdot.

Categories: Technology

Study: More Than Half of Psychological Results Can't Be Reproduced

Slashdot - 6 hours 54 min ago
Bruce66423 writes: A new study trying to replicate results reported in allegedly high quality journals failed to do so in over 50% of cases. Those of us from a hard science background always had our doubts about this sort of stuff — it's interesting to see it demonstrated — or rather, as the man says: 'Psychology has nothing to be proud of when it comes to replication,' Charles Gallistel, president of the Association for Psychological Science. Back in June a crowd-sourced effort to replicate 100 psychology studies had a 39% success rate.

Read more of this story at Slashdot.

Categories: Technology

Is There Such Thing as Too Many GNU/Linux Distributions?

LinuxToday - 7 hours 8 min ago

 Is too much of a good thing - a bad thing?

Categories: Technology

Ask Slashdot: Advice On Enterprise Architect Position

Slashdot - 7 hours 40 min ago
dave562 writes: I could use some advice from the community. I have almost 20 years of IT experience, 5 of it with the company I am currently working for. In my current position, the infrastructure and applications that I am responsible for account for nearly 80% of the entire IT infrastructure of the company. In broad strokes our footprint is roughly 60 physical hosts that run close to 1500 VMs and a SAN that hosts almost 4PB of data. The organization is a moderate sized (~3000 employees), publicly traded company with a nearly $1 billion market value (recent fluctuations not withstanding). I have been involved in a constant struggle with the core IT group over how to best run the operations. They are a traditional, internal facing IT shop. They have stumbled through a private cloud initiative that is only about 30% realized. I have had to drag them kicking and screaming into the world of automated provisioning, IaaS, application performance monitoring, and all of the other IT "must haves" that a reasonable person would expect from a company of our size. All the while, I have never had full access to the infrastructure. I do not have access to the storage. I do not have access to the virtualization layer. I do not have Domain Admin rights. I cannot see the network. The entire organization has been ham strung by an "enterprise architect" who relies on consultants to get the job done, but does not have the capability to properly scope the projects. This has resulted in failure after failure and a broken trail of partially implemented projects. (VMware without SRM enabled. EMC storage hardware without automated tiering enabled. Numerous proof of concept systems that never make it into production because they were not scoped properly.) After 5 years of succeeding in the face of all of these challenges, the organization has offered me the Enterprise Architect position. However they do not think that the position should have full access to the environment. It is an "architecture" position and not a "sysadmin" position is how they explained it to me. That seems insane. It is like asking someone to draw a map, without being able to actually visit the place that needs to be mapped. For those of you in the community who have similar positions, what is your experience? Do you have unfettered access to the environment? Are purely architectural / advisory roles the norm at this level?

Read more of this story at Slashdot.

Categories: Technology

IoT server is loaded with Linux "Candi"

LinuxToday - 8 hours 8 min ago

 LinuxGizmos: Logic Supply's Atom N2800 based "CC150" industrial IoT gateway is loaded with a version of the Linux-based IoT Server software from Candi Controls.

Categories: Technology

ISRO Successfully Launches Satellite Into Geostationary Orbit

Slashdot - 9 hours 38 min ago
vasanth writes: Indian Space Research Organization (Isro) on Thursday cleared all doubts on its cryogenic capabilities, successfully launching the Geostationary Satellite Launch Vehicle (GSLV-D6), placing GSAT-6, a 2,117kg communication satellite in orbit. The GSLV D-6 is the second consecutive successful launch of the GSLV series with indigenous cryogenic upper stage. ISRO had on January 5, 2014 launched GSLV D-5, after a similar attempt failed in 2010. For the country, ISRO perfecting the cryogenic engine technology is crucial, as precious foreign exchange can be saved by launching communication satellites on its own. Currently ISRO flies its heavy communication satellites by European space agency Ariane. ISRO has already perfected its Polar Launching Vehicle for launching lighter satellites, with decades of success stories. It has already put 45 foreign satellites of 9 nations into orbit. ISRO is to put 9 satellites in space using the PSLV launcher for the United States in 2015-2016.

Read more of this story at Slashdot.

Categories: Technology

Ocean Cleanup Project Completes Great Pacific Garbage Patch Research Expedition

Slashdot - 12 hours 2 min ago
hypnosec writes: The reconnaissance mission of the Great Pacific Garbage Patch, dubbed the Mega Expedition by Ocean Clean, has been concluded. The large-scale cleanup of the area is set to begin in 2020. The primary goal of the Mega Expedition was to accurately determine how much plastic is floating in the Great Pacific Garbage Patch. This was the first time large pieces of plastic, such as ghost nets and Japanese tsunami debris, have been quantified. “I’ve studied plastic in all the world’s oceans, but never seen any area as polluted as the Great Pacific Garbage Patch,” said Dr. Julia Reisser, Lead Oceanographer at The Ocean Cleanup. “With every trawl we completed, thousands of miles from land, we just found lots and lots of plastic.”

Read more of this story at Slashdot.

Categories: Technology

How to set up a system status page of your infrastructure

LinuxToday - 13 hours 8 min ago

 xmodulo: Suppose your production storage server is on fire...

Categories: Technology

Inside the Booming, Unhinged, and Dangerous Malvertising Menace

Slashdot - 14 hours 35 min ago
mask.of.sanity writes: The Register has a feature on the online malicious advertising (malvertising) menace that has become an explosively potent threat to end-user security on the internet. Experts say advertising networks and exchanges need to vet their customers, and publishers need to vet the third party content they display. Users should also consider script and ad blockers in the interim. From the article: "Ads as an attack vector was identified in 2007 when security responders began receiving reports of malware hitting user machines as victims viewed online advertisements. By year's end William Salusky of the SANS Internet Storms Centre had concocted a name for the attacks. Since then malvertising has exploded. This year it increased by more than 260 percent on the previous year, with some 450,000 malicious ads reported in the first six months alone, according to numbers by RiskIQ. Last year, security firm Cyphort found a 300 percent increase in malvertising. In 2013, the Online Trust Alliance logged a more than 200 percent increase in malvertising incidents compared to 2012, serving some 12.4 billion malvertisement impressions."

Read more of this story at Slashdot.

Categories: Technology
Syndicate content