jfruh (300774) writes "Back in February, after a lengthy dispute, Netflix agreed to pay Comcast for network access after being dogged by complaints of slow speeds from Comcast subscribers. Two months later, it appears that Comcast has delivered on its promises, jumping up six places in Netflix's ISP speed rankings. The question of whether this is good news for anyone but Comcast is still open."
Catch up on stories from the past week (and beyond) at the Slashdot story archive
An anonymous reader writes "Despite whispers of growing dissatisfaction among consumers, there are still very few ISP start-ups popping up in communities all over the U.S. There are two main reasons for this: up-front costs and legal obstacles. The first reason discourages anyone who doesn't have Google's investors or the local government financially supporting them from even getting a toe in the business. 'Financial analysts last year estimated that Google had to spend $84 million to build a fiber network that passed 149,000 homes in Kansas City, with the cost per home at $500 to $674.' The second reason will keep any new start-up defending itself in court against frivolous lawsuits incumbent ISP providers have been known to file to bleed the newcomers dry in legal fees. There are also ISP lobbyists working to pass laws that prevent local governments from either entering the ISP market themselves or partnering with private companies to provide ISP alternatives. Given these set-backs and growing dissatisfaction with the status quo, one has to wonder how long before the U.S. recognizes the internet as a utility and passes laws and regulations accordingly."
An anonymous reader writes "I am a new Linux user; I'm on 2nd day now. Currently I am trying out Ubuntu, but that could change. I am looking for a user friendly firewall that I can set up that lets me do these things:1) set up a default deny rule 2) carve out exceptions for these programs: browser, email client, chat client, yum and/or apt. 3) carve out exceptions to the exceptions in requirement 2 — i.e. I want to be able to then block off IPs and IP ranges known to be used by malware, marketers, etc., and all protocols which aren't needed for requirement 2. It also needs to have good enough documentation that a beginner like me can figure it out. Previously, I had done all of the above in AVG Firewall on Windows, and it was very easy to do. So far, I have tried these things:1) IPTABLES — it looked really easy to screw it up and then not notice that it's screwed up and/or not be able to fix it even if I did notice, so I tried other things at that point... 2) searched the internet and found various free firewalls such as Firestarter, GUFW, etc., which I weren't able to make meet my requirements. Can someone either point me to a firewall that meets my needs or else give me some hints on how to make firestarter or GUFW do what I need?"
New submitter FikseGTS (3604833) writes "A Tesla Model S owner located a 4 pin connector on the left side of the Tesla Model S dashboard that turns out to be a disguised ethernet networking port. After crafting his owns patch cable to connect with the Tesla's port, a networking connection was established between the Tesla Model S and a laptop computer. The Model S is running a 100 Mbps, full duplex ethernet network and 3 devices were found with assigned IP addresses in the 192.168.90.0 subnet. Some ports and services that were open on the devices were 22 (SSH), 23 (telnet),53 (open domain), 80 (HTTP), 111 (rpcbind), 2049 (NFS), 6000 (X11). Port 80 was serving up a web page with the image or media of the current song being played. The operating system is modified version of Ubuntu using an ext3 filesystem. Using X11 it also appears that someone was able to somewhat run Firefox on both of the Model S screens. Is a jailbroken Tesla Model S on the way?" Some more details on this front would be appreciated, for anyone who has a Tesla they'd like to explore.
chicksdaddy writes: "The pervasiveness of the NSA's spying operation has turned it into a kind of bugaboo — the monster lurking behind every locked networking closet and the invisible hand behind every flawed crypto implementation. Those inclined to don the tinfoil cap won't be reassured by Vint Cerf's offhand observation in a Google Hangout on Wednesday that, back in the mid 1970s, the world's favorite intelligence agency may have also stood in the way of stronger network layer security being a part of the original specification for TCP/IP. (Video with time code.) Researchers at the time were working on just such a lightweight cryptosystem. On Stanford's campus, Cerf noted that Whit Diffie and Martin Hellman had researched and published a paper that described the functioning of a public key cryptography system. But they didn't yet have the algorithms to make it practical. (Ron Rivest, Adi Shamir and Leonard Adleman published the RSA algorithm in 1977). As it turns out, however, Cerf did have access to some really bleeding edge cryptographic technology back then that might have been used to implement strong, protocol-level security into the earliest specifications of TCP/IP. Why weren't they used? The crypto tools were part of a classified NSA project he was working on at Stanford in the mid 1970s to build a secure, classified Internet. 'At the time I couldn't share that with my friends,' Cerf said."
MojoKid (1002251) writes "Today, Qualcomm is announcing full support for a new wireless transmission method that could significantly boost performance on crowded networks. The new standard, MU-MIMO (Multiple User — Multiple Input and Multiple Output) has a clunky name — but could make a significant difference to home network speeds and make gigabit WiFi a practical reality. MU-MIMO is part of the 802.11ac Release 2 standard, so this isn't just a custom, Qualcomm-only feature. In SU-MIMO mode, a wireless router creates time slices for every device it detects on the network. Every active device on the network slows down the total system bandwidth — the router has to pay attention to every device, and it can only pay attention to one phone, tablet, or laptop at a time. The difference between single-user and multi-user configurations is that where SU can only serve one client at a time and can therefore only allocate a fraction of total bandwidth to any given device, MU can create groups of devices and communicate with all three simultaneously."
An anonymous reader writes "Regional ISP Charter Communications is fighting back against the potential merger between Time Warner Cable and Comcast. Charter had been bidding for TWC before Comcast got involved, and now they're urging shareholders to reject the deal. 'From the regulatory perspective, it is difficult to imagine a transaction that could concentrate the industry more than the proposed Comcast merger,' they said in an SEC filing. James Stewart with the NY Times explains what Comcast would look like if the merger continues — when you add the TWC deal to the NBCUniversal pickup a few years ago, Comcast is starting to resemble a global tech company. He also explains why the deal isn't setting off antitrust alarm bells: 'Time Warner Cable operates in 29 states, but thanks to the old system of regional and municipal cable monopolies, Comcast and Time Warner Cable don't compete anywhere. Justice Department merger guidelines define geographical markets, which is why regulators weighing airline mergers examine competition on individual routes, not national market share. ... Under conventional antitrust standards, it's pretty much an open-and-shut case.'"
itwbennett (1594911) writes "Cisco Systems said Monday it plans to invest over $1 billion to expand its cloud business over the next two years, including building a global, OpenStack-based 'network of clouds' that it has dubbed the 'intercloud'. The Intercloud will support any workload, on any hypervisor and interoperate with any cloud, both private and public, according to Cisco."
An anonymous reader writes "Turkish Finance Minister Mehmet Simsek has defended his governments ban on Twitter and accused the social networking site of not complying with court orders. Simsek said: 'The Turkish telecommunications watchdog has made a number of statements saying that they have asked Twitter on a number of occasions to remove some content on the back of court orders and Twitter has been refusing to comply. I don’t think any global company, whether it’s a media company, whether it’s an industrial company, it shouldn’t see itself [as being] above the law.'" As a result of the ban, Tor gained over 10,000 new users in Turkey.
Charliemopps (1157495) writes "New documents from Snowden indicate that the NSA hacked into and stole documents, including source code, from the Chinese networking firm Huawei. Ironically, this is the same firm that the U.S. government has argued in the past was a threat due to China's possible use of the same sort of attacks."
coondoggie writes "The Defense Advanced Research Projects Agency (DARPA) has moved along a project it says would use hot-spot enabled drones to bring wireless communications to even the most distant and harsh environments. The project known as Fixed Wireless at a Distance is designed specifically to overcome the challenge inherent with cell communication in remote areas and this week the agency awarded L-3 $16.4 million to support the next iteration of the system."
An anonymous reader writes "Speaking to The Verge, author and Microsoft Researcher Danah Boyd put words to a feeling I've had about Facebook and other social networking sites for a while, now: 'The era of Facebook is an anomaly.' She continues, 'The idea of everybody going to one site is just weird. Give me one other part of history where everybody shows up to the same social space. Fragmentation is a more natural state of being. Is your social dynamic interest-driven or is it friendship-driven? Are you going there because there's this place where other folks are really into anime, or is this the place you're going because it's where your pals from school are hanging out? That first [question] is a driving function.' Personally, I hope this idea continues to propagate — it's always seemed odd that our social network identities are locked into certain websites. Imagine being a Comcast customer and being unable to email somebody using Time Warner, or a T-Mobile subscriber who can't call somebody who's on Verizon. Why do we allow this with our social networks?"
tippen writes "The management user interface on most networking and storage appliances are, shall we say, not up to the snuff compared to modern websites or consumer products. What are the best examples of good UX design on an IT appliance that you've managed? What was it that made you love it? What should companies (or designers) developing new products look to as best-in-class that they should be striving for?"
Bennett Haselton writes with a bit of online detective work done with a little help from some (internet-distributed) friends: "A website that was temporarily inaccessible on my Comcast Internet connection (but accessible to my friends on other providers) led me to investigate further. Using a perl script, I found a sampling of websites that were inaccessible on Comcast (hostnames not resolving on DNS) but were working on other networks. Then I used Amazon Mechanical Turk to pay volunteers 25 cents apiece to check if they could access the website, and confirmed that (most) Comcast users were blocked from accessing it while users on other providers were not. The number of individual websites similarly inaccessible on Comcast could potentially be in the millions." Read on for the details.
alphadogg writes "Having lots of Wi-Fi networks packed into a condominium or apartment building can hurt everyone's wireless performance, but Stanford University researchers say they've found a way to turn crowding into an advantage. In a dorm on the Stanford campus, they're building a single, dense Wi-Fi infrastructure that each resident can use and manage like their own private network. That means the shared system, called BeHop, can be centrally managed for maximum performance and efficiency while users still assign their own SSIDs, passwords and other settings. The Stanford project is making this happen with inexpensive, consumer-grade access points and SDN (software-defined networking)."
BUL2294 writes "The Chicago Tribune is reporting that, over the next few months in Chicago, Comcast is turning on a feature that turns customer networks into public Wi-Fi hotspots. After a firmware upgrade is installed, 'visitors will use their own Xfinity credentials to sign on, and will not need the homeowner's permission or password to tap into their Wi-Fi signal. The homegrown network will also be available to non-subscribers free for several hours each month, or on a pay-per-use basis. Any outside usage should not affect the speed or security of the home subscriber's private network. [...] Home internet subscribers will automatically participate in the network's growing infrastructure, although a small number have chosen to opt out in other test markets.' The article specifically mentions that this capability is opt-out, so Comcast is relying on home users' property, electricity, and lack of tech-savvy to increase their network footprint." Comcast tried this in the Twin Cities area, and was apparently satisfied with the results, though subscribers are starting to notice.
judgecorp writes "Facebook is reportedly hoping to buy drone specialist Titan Aerospace in order to provide airborne relays for Internet connectivity in developing countries, as part of its internet.org project. The solar-powered drones are classified as "atmospheric satellites" and can fly for five years. The rumoured project sounds quite similar to Google's Project Loon, which proposes using balloons for the same job." More coverage at SlashCloud, which notes that the purchase is rumored but not yet publicly confirmed.
alphadogg writes "Cisco today kicked off a contest with $300,000 in prize money that challenges security experts around the world to put together ways to secure what's now called the 'Internet of Things,' the wide range of non-traditional computing devices used on the electric grid, in healthcare and many other industries. A Cisco SVP concluded his keynote at this week's RSA Conference by announcing what he called the 'Internet of Things Security Grand Challenge.' Christopher Young said the idea is 'a contest of experts around the world to submit blueprints' for how security issues created by the Internet of Things could be addressed. It's expected that up to six winning entries would be selected and the prize money awarded at the Internet of Things Forum in the fall."
sciencehabit writes "700-year-old human feces, preserved in sealed barrels under a town square from the Middle Ages, are shedding new light on the evolution of the bacteria in our guts. Viruses isolated from the ancient poop reveal a growing arms race between our native bacteria and microbial invaders. Such viruses may have been instrumental in helping us digest food, temper inflammation, and fight obesity." Less frightening news that touches on the same domain: European cities (notably Britain) decided to go with sewers instead of barrels, and now, writes reader DW100 "An ISP in the UK has come up with an innovative way to deliver broadband around London: its Victorian sewer network. Geo Networks runs the cables along the roof of the sewers, avoiding any 'waste' issues and providing fast, low-latency, high-fibre services to business and other providers."
lpress writes "I was at a Time Warner Cable (TWC) store returning a router, when I asked what my new monthly bill would be. The answer — $110 — surprised me, so I asked a few questions and ended up with the same service for $76.37. Check out my conversation with their representative to see what was said, then do the same yourself."