Lemeowski writes "Honeybees are disappearing at an alarming rate, with a third of U.S. honeybees vanishing last year. Since bees pollinate many fruits and vegetables, the disappearance of honeybees could cause the United States to lose $15 billion worth of crops, and even change the American diet. The honey bee disappearance is called Colony Collapse Disorder, a serious problem of bees abruptly leaving their hives. A new open source effort called the Open Source Beehives project hopes to help by creating "a mesh network of data-generating honey bee colonies for local, national, and international study of the causes and effects of Colony Collapse Disorder." Collaborators have created two beehive designs that can be downloaded for free and milled using a CNC machine, then filled with sensors to track bee colony health."
Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!
AcidPenguin9873 writes "Earlier this year, Google announced that it would build its next fiber network in Austin, TX. Construction is slated to start in 2014, but there's a hitch: AT&T owns 20% of the utility poles in Austin. The City of Austin is considering a rules change that would allow Google to pay AT&T to use its utility poles, but AT&T isn't happy about it. The debate appears to hinge on a technicality that specifies what types of companies can attach to the utility poles that AT&T owns. From the news story: 'Google 'would be happy to pay for access (to utility poles) at reasonable rates, just as we did in our initial buildout in Kansas City,' she said, referring to Google Fiber's pilot project in Kansas City...Tracy King, AT&T's vice president for public affairs, said in a written statement that Google "appears to be demanding concessions never provided any other entity before. ... Google has the right to attach to our poles, under federal law, as long as it qualifies as a telecom or cable provider, as they themselves acknowledge. We will work with Google when they become qualified, as we do with all such qualified providers," she said.'"
New submitter fierman writes "In a work to be presented at the Network and Distributed System Security Symposium (ISOC NDSS'14), INRIA researchers show the privacy risks of Real-Time Bidding (PDF) and High-Frequency Trading for selling advertisement spaces. Combining Real-Time Bidding and Cookie Matching, advertisers can significantly improve their tracking and profiling capabilities. Both technologies are already prevalent on the Web. The research discusses the value of users' private data (browsing history) retrieved directly from the advertisers, leveraging an exposed information leak in RTB systems. Advertisers will pay about $0.0005 to display a targeted ad to a single user, while at the same time acquiring information about them. The research also shows evidence of price variation with users' profiles, physical location, time of day and content of visited sites."
Velcroman1 writes "Banking giant JPMorgan Chase has filed a patent application for an electronic commerce system that sounds remarkably like Bitcoin — but never mentions the controversial, Internet-only currency. The patent application was filed in early August but made publicly available only at the end of November; it describes a 'method and system for processing Internet payments using the electronic funds transfer network.' The system would allow people to pay bills anonymously over the Internet through an electronic transfer of funds — just like Bitcoin. It would allow for micropayments without processing fees — just like bitcoin. And it could kill off wire transfers through companies like Western Union — just like Bitcoin. There are 18,126 words in the patent application. 'Bitcoin' is not one of them."
mask.of.sanity writes "Google has revealed details on its Beyond Corp project to scrap the notion of a corporate network and move to a zero-trust model. The company perhaps unsurprisingly considers the traditional notion of perimeter defense and its respective gadgetry as a dead duck, and has moved to authenticate and authorize its 42,000 staff so they can access Google HQ from anywhere (video). Google also revealed it was perhaps the biggest Apple shop in the world, with 43,000 devices deployed and staff only allowed to use Windows with a supporting business case."
An anonymous reader writes "There is a lot of advice about backing up data, but it seems to boil down to distributing it to several places (other local or network drives, off-site drives, in the cloud, etc.). We have hundreds of thousands of family pictures and videos we're trying to save using this advice. But in some sparse searching of our archives, we're seeing bitrot destroying our memories. With the quantity of data (~2 TB at present), it's not really practical for us to examine every one of these periodically so we can manually restore them from a different copy. We'd love it if the filesystem could detect this and try correcting first, and if it couldn't correct the problem, it could trigger the restoration. But that only seems to be an option for RAID type systems, where the drives are colocated. Is there a combination of tools that can automatically detect these failures and restore the data from other remote copies without us having to manually examine each image/video and restore them by hand? (It might also be reasonable to ask for the ability to detect a backup drive with enough errors that it needs replacing altogether.)"
An anonymous reader writes in with news that some NSA agents were trying to dig up info by joining the horde. "To the National Security Agency analyst writing a briefing to his superiors, the situation was clear: their current surveillance efforts were lacking something. The agency's impressive arsenal of cable taps and sophisticated hacking attacks was not enough. What it really needed was a horde of undercover Orcs. That vision of spycraft sparked a concerted drive by the NSA and its UK sister agency GCHQ to infiltrate the massive communities playing online games, according to secret documents disclosed by whistleblower Edward Snowden.....The agencies, the documents show, have built mass-collection capabilities against the Xbox Live console network, which has more than 48 million players. Real-life agents have been deployed into virtual realms, from those Orc hordes in World of Warcraft to the human avatars of Second Life. There were attempts, too, to recruit potential informants from the games' tech-friendly users."
An anonymous reader writes "Ekisto is an interactive network visualization of three online communities: StackOverflow, Github and Friendfeed. Ekisto tries to map our online habitats using graph algorithms and the city as a metaphor. A graph layout algorithm arranges users in 2D space based on their similarity. Cosine similarity is computed based on the users' network (Friendfeed), collaborate, watch, fork and follow relationships (Github), or based on the tags of posts contributed by users (StackOverflow). The height of each user represents the normalized value of the user's Pagerank (Github, Friendfeed) or their reputation points (StackOverflow)."
New submitter krakman writes "The Washington Post has an interesting story about how the FBI can investigate and collect details from computers over the net, without knowing anything about the computer location. Here's an example of the FBI's network investigative techniques: 'The man who called himself "Mo" had dark hair, a foreign accent and — if the pictures he e-mailed to federal investigators could be believed — an Iranian military uniform. When he made a series of threats to detonate bombs at universities and airports across a wide swath of the United States last year, police had to scramble every time. Mo remained elusive for months, communicating via e-mail, video chat and an Internet-based phone service without revealing his true identity or location, court documents show. ... The FBI’s elite hacker team designed a piece of malicious software that was to be delivered secretly when Mo signed on to his Yahoo e-mail account, from any computer anywhere in the world, according to the documents. The goal of the software was to gather a range of information — Web sites he had visited and indicators of the location of the computer — that would allow investigators to find Mo and tie him to the bomb threats. ... Even though investigators suspected that Mo was in Iran, the uncertainty around his identity and location complicated the case. Had he turned out to be a U.S. citizen or a foreigner living within the country, a search conducted without a warrant could have jeopardized his prosecution. ...But, [a court document] said, Mo’s computer did send a request for information to the FBI computer, revealing two new IP addresses in the process. Both suggested that, as of last December, Mo was still in Tehran.'"
sfcrazy writes "A team of extremely creative people have created a really inexpensive bullet time set-up using Raspberry Pis — and the whole set-up costs less than a professional DSLR camera. The rig looks more like the LHC at CERN using nearly half a kilometre of network cables, 48 Raspberry Pis fitted with cameras and PiFace Control. The rig worked perfectly — in terms of doing what a bullet time set-up should do. Raspberry Pis achieved the Hollywood's 'frozen time' effect at a much lesser cost."
Garabito writes "In April 2009, Australia's then prime minister, Kevin Rudd, dropped a bombshell on the press and the global technology community: His social democrat Labor administration was going to deliver broadband Internet to every single resident of Australia. It was an audacious goal, not least of all because Australia is one of the most sparsely populated countries on Earth. ... So now, after three years of planning and construction, during which workers connected some 210 000 premises (out of an anticipated 13.2 million), Australia's visionary and trailblazing initiative is at a crossroads. The new government plans to deploy fiber only to the premises of new housing developments. For the remaining homes and businesses — about 71 percent — it will bring fiber only as far as curbside cabinets, called nodes. Existing copper-wire pairs will cover the so-called last mile to individual buildings."
alphadogg writes "There are currently several million smartphones certified to run on a 'HotSpot 2.0' Wi-Fi network, which promises automatic Wi-Fi authentication and connection, and seamless roaming between different Wi-Fi hotspot brands, and eventually between Wi-Fi and cellular connections. In November, about 400 smartphone users finally got a chance to do so — in Beijing, China. The next big public demonstration of what's confusingly referred to as both Hotspot 2.0 and Next Generation Hotspot will be in February: an estimated 75,000 attendees at the next Mobile World Congress in Barcelona will be able to take part."
Nerval's Lobster writes "Microsoft will encrypt consumer data and make its software code more transparent, in a bid to boost consumer confidence in its security. Microsoft claims that it will now encrypt data flowing through Outlook.com, Office 365, SkyDrive, and Windows Azure. That will include data moving between customers' devices and Microsoft servers, as well as data moving between Microsoft data-centers. The increased-transparency part of Microsoft's new initiative is perhaps the most interesting, considering the company's longstanding advocacy of proprietary software. But Microsoft actually isn't planning on throwing its code open for anyone to examine, as much as that might quell fears about government-designed backdoors and other nefarious programming. Instead, according to its general counsel Brad Smith, "transparency" means "building on our long-standing program that provides government customers with an appropriate ability to review our source code, reassure themselves of its integrity, and confirm there are no back doors." In addition, Microsoft plans on opening a network of "transparency centers" where customers can go to "assure themselves of the integrity of Microsoft's products." That's not exactly the equivalent of volunteers going through TrueCrypt to ensure a lack of NSA backdoors, and it seems questionable whether such moves (vague as they are at this point) on Microsoft's part will assure anyone that it hasn't been compromised by government sources. But with Google and other tech firms making a lot of noise about encrypting their respective services, Microsoft has little choice but to join them in introducing new privacy initiatives."
chicksdaddy writes "Cyber attacks on 'connected vehicles' are still in the proof of concept stage. But those proofs of concept are close enough to the real thing to prompt an inquiry from U.S. Senator Ed Markey, who sent a letter to 20 major auto manufacturers (PDF) asking for information about consumer privacy protections and safeguards against cyber attacks in their vehicles. Markey's letter, dated December 2, cites recent reports of 'commands...sent through a car's computer system that could cause it to suddenly accelerate, turn or kill the breaks,' and references research conducted by Charlie Miller and Chris Valasek (PDF) on the Toyota Prius and Ford Escape. 'Today's cars and light trucks contain more than 50 separate electronic control units (ECUs), connected through a controller area network (CAN) ... Vehicle functionality, safety and privacy all depend on the functions of these small computers, as well as their ability to communicate with one another,' Markey wrote. Among the questions Markey wants answers to: What percentage of cars sold in model years 2013 and 2014 do not have any wireless entry points? What are automakers' methods for testing for vulnerabilities in technologies it deploys — including third pressure technologies? Markey asks specifically about tire pressure monitors, bluetooth and other wireless technologies and GPS (like Onstar). What third party penetration testing is conducted on vehicles (and any results)? What intrusion detection features exist for critical components like controller area network (CAN) buses on connected vehicles?"
An anonymous reader writes "I work at a manufacturing company. We have roughly 150 employees, 130 desktops, 8 physical servers, 20 virtual servers + a commercial SAN. We're a Windows shop with Exchange 2013. That's the first part. The second part is we have an ERP system that controls every aspect of our business processes. It has over 100 customizations (VB, but transitioning over to C#). We also have 20 or so custom-made support applications that integrate with the ERP to provide a more streamlined interface to the factory workers in some cases, and in other cases to provide a functionality that is not present in the ERP at all. Our IT department consists of: 1 Network Administrator (me), 4 Programmers (one of which is also the IT Manager). I finally convinced our immediate boss that we need another network support person to back me up (but he must now convince the CEO who thinks we have a large IT department already). I would like them to also hire dedicated help desk people. As it stands, we all share help desk duties, but that leads to projects being seriously delayed or put on hold while we work on more mundane problems. It also leads to a good amount of stress, as I can't really create the solid infrastructure I want us to have, and the developers are always getting pressure from other departments for projects they don't have the manpower to even start. I'm not really sure how to convince them we need more people. I need something rather concrete, but there are widely varying ratios of IT/user ratios in different companies, and I'm sure their research turned up with some generic rule of thumb that leads them to believe we have too many already. What can we do?"
First time accepted submitter murpht2 writes "My company prides itself on an office environment that follows a modern design aesthetic: open floor plan, bold colors on the walls, cool lamps in the corners. We're now engaged in a significant upgrade to our IT systems and we have a clash: the IT team leader wants to run network cable in trays hanging from the ceiling so all the client computers have high-speed access to the new servers; the guy in charge of the office design wants to keep things looking clean and the cable trays don't fit the bill. We're in a building made entirely of bricks and concrete, so we lack some of the between-the-wall spaces that are used in other settings. Any suggestions for beautiful cable trays or other alternatives?"
An anonymous reader writes "D-Link has released firmware patches for a number of its older routers sporting a critical authentication security bypass vulnerability discovered in October. The flaw was discovered and its exploitability proved with a PoC by Tactical Network Solutions' security researcher Craig Heffner. D-Link confirmed the existence of the problem a few weeks later."
New submitter palemantle writes with this excerpt from The Hindu, updating our earlier mention of the successful launch of India's Mars-bound probe: "In a remarkably successful execution of a complex manoeuvre, the Indian Space Research Organisation (ISRO) fired the propulsion system on board the spacecraft for a prolonged duration of 23 minutes from 0049 hours on Sunday. In space parlance, the manoeuvre is called Trans-Mars Injection (TMI). ISRO called it 'the mother of all slingshots.' Celebrations broke out at the control centre of the ISRO Telemetry, Tracking and Command Network (ISTRAC) at Bangalore from where the spacecraft specialists gave commands for the orbiter's 440 Newton engine to begin firing. The Mars Orbiter Mission (MOM), also known as Mangalyaan, is designed to demonstrate the technological capability to reach Mars orbit. But the $72m (£45m) probe will also carry out experiments, including a search for methane gas in the planet's atmosphere."
An anonymous reader writes "Over the last couple years, I have taught myself the basic concepts behind Computational Neuroscience, mainly from the book by Abbott and Dayan. I am not currently affiliated with any academic Neuroscience program. I would like to take a DIY approach and work on some real world problems of Computational Neuroscience. My questions: (1) What are some interesting computational neuroscience simulation problems that an individual with a workstation class PC can work on? (2) Is it easy for a non-academic to get the required data? (3) I am familiar with (but not used extensively) simulators like Neuron, Genesis etc. Other than these and Matlab, what other software should I get? (4) Where online or offline, can I network with other DIY Computational Neuroscience enthusiasts? My own interest is in simulation of Epileptogenic neural networks, music cognition networks, and perhaps a bit more ambitiously, to create a simulation on which the various Models of Consciousness can be comparatively tested."
New submitter TheRealHocusLocus writes "The FCC is drafting rules to formalize the process of transition of 'last-mile' subscriber circuits to digital IP-based data streams. The move is lauded by AT&T Chairman Tom Wheeler who claims that significant resources are spent to maintain 'legacy' POTS service, though some 100 million still use it. POTS, or 'Plain Old Telephone Service,' is the analog standard that allows the use of simple unpowered phone devices on the wire, with the phone company supplying ring and talk voltage. I cannot fault progress, in fact I'm part of the problem: I gave up my dial tone a couple years ago because I needed cell and could not afford to keep both. But what concerns me is, are we poised to dismantle systems that are capable of standing alone to keep communities and regions 'in-touch' with each other, in favor of systems that rely on centralized (and distant) points of failure? Despite its analog limitations POTS switches have enforced the use of hard-coded local exchanges and equipment that will faithfully complete local calls even if its network connections are down. But do these IP phones deliver the same promise? For that matter, is any single local cell tower isolated from its parent network of use to anyone at all? I have had a difficult time finding answers to this question, and would love savvy Slashdot folks to weigh in: In a disaster that isolates the community from outside or partitions the country's connectivity — aside from local Plain Old Telephone Service, how many IP and cell phones would continue to function?"