jones_supa writes "Details are shaping up of a plan for a new government-backed high capacity data cable between Germany and Finland, routed through the Baltic Sea. The project to significantly upgrade Finland's international data transfer capacity has long been high on the government's list of priorities. It could improve the country's competitiveness in ICT technologies and digital services. Following a meeting of the cabinet's economic policy committee on Wednesday, Pekka Haavisto, the minister responsible for state ownership steering, told the press that the state will take part in the venture as a partial owner. The estimated cost of the undersea data cable project is around 100 million euros. Haavisto said that roughly one third of the costs could be paid by the state, another third by institutional investors and the remainder by private companies. So far, all data transmission to Finland has taken place via the Øresund Bridge, that is through Denmark and Sweden."
Check out SlashCloud for the latest in cloud computing.
AcidPenguin9873 writes "Earlier this year, Google announced that it would build its next fiber network in Austin, TX. Construction is slated to start in 2014, but there's a hitch: AT&T owns 20% of the utility poles in Austin. The City of Austin is considering a rules change that would allow Google to pay AT&T to use its utility poles, but AT&T isn't happy about it. The debate appears to hinge on a technicality that specifies what types of companies can attach to the utility poles that AT&T owns. From the news story: 'Google 'would be happy to pay for access (to utility poles) at reasonable rates, just as we did in our initial buildout in Kansas City,' she said, referring to Google Fiber's pilot project in Kansas City...Tracy King, AT&T's vice president for public affairs, said in a written statement that Google "appears to be demanding concessions never provided any other entity before. ... Google has the right to attach to our poles, under federal law, as long as it qualifies as a telecom or cable provider, as they themselves acknowledge. We will work with Google when they become qualified, as we do with all such qualified providers," she said.'"
theodp writes "Among the patents granted to Facebook this week by the USPTO is one for Inferring Household Income for Users of a Social Networking System. 'For example,' Facebook explains, 'an assumption might be made about a user that reads CNN.com and nytimes.com every day that the user is in a higher income bracket than another user that only reads TMZ.com and PerezHilton.com on the theory that a user who reads newspapers might be assumed to make more money than a user who only reads celebrity gossip blogs.' Advertisements such as those for travel packages, cars, and home mortgages, Facebook adds, 'are targeted to users based on income bracket,' which might also be inferred by 'gathering and analyzing different types of information about a user's geographic location.' Hey, what could go wrong?"
Garabito writes "In April 2009, Australia's then prime minister, Kevin Rudd, dropped a bombshell on the press and the global technology community: His social democrat Labor administration was going to deliver broadband Internet to every single resident of Australia. It was an audacious goal, not least of all because Australia is one of the most sparsely populated countries on Earth. ... So now, after three years of planning and construction, during which workers connected some 210 000 premises (out of an anticipated 13.2 million), Australia's visionary and trailblazing initiative is at a crossroads. The new government plans to deploy fiber only to the premises of new housing developments. For the remaining homes and businesses — about 71 percent — it will bring fiber only as far as curbside cabinets, called nodes. Existing copper-wire pairs will cover the so-called last mile to individual buildings."
alphadogg writes "There are currently several million smartphones certified to run on a 'HotSpot 2.0' Wi-Fi network, which promises automatic Wi-Fi authentication and connection, and seamless roaming between different Wi-Fi hotspot brands, and eventually between Wi-Fi and cellular connections. In November, about 400 smartphone users finally got a chance to do so — in Beijing, China. The next big public demonstration of what's confusingly referred to as both Hotspot 2.0 and Next Generation Hotspot will be in February: an estimated 75,000 attendees at the next Mobile World Congress in Barcelona will be able to take part."
First time accepted submitter murpht2 writes "My company prides itself on an office environment that follows a modern design aesthetic: open floor plan, bold colors on the walls, cool lamps in the corners. We're now engaged in a significant upgrade to our IT systems and we have a clash: the IT team leader wants to run network cable in trays hanging from the ceiling so all the client computers have high-speed access to the new servers; the guy in charge of the office design wants to keep things looking clean and the cable trays don't fit the bill. We're in a building made entirely of bricks and concrete, so we lack some of the between-the-wall spaces that are used in other settings. Any suggestions for beautiful cable trays or other alternatives?"
The L.A. Times has a short but compelling article about the state of the art (and coming state of the art) in dedicated networking technology in one of the applications where you'd expect the customers to care most about it: connecting financial trading centers. Milliseconds count, and the traders count milliseconds. From the article, one example: "[New York-based networking company] Strike, whose ranks include academics as well as former U.S. and Israeli military engineers, hoisted a 6-foot white dish on a tower rising 280 feet above the Nasdaq Stock Market's data center in Carteret, N.J., just outside New York City. Through a series of microwave towers, the dish beams market data 734 miles to the Chicago Mercantile Exchange's computer warehouse in Aurora, Ill., in 4.13 milliseconds, or about 95% of the theoretical speed of light, according to the company. Fiber-optic cables, which are made up of long strands of glass, carry data at roughly 65% of light speed."
caferace writes "I've been around the block. I'm a long-time worker in the tech industry (nearly 30 years), absolutely kickass SQA and Hardware person, networking, you name it. But I'm 50+ now, and finding new regular or contract work is a pain. And it shouldn't be. I have the skills and the aptitude to absorb and adapt to any new situations and languages way beyond what any of my college age brethren might have. But when I send out a perfectly good resume and use the more obvious resources there are still precious few bites for someone requiring to work remotely. Am I just whining, or is this common? Are we being put out to pasture far too early?"
An anonymous reader writes "Researchers at Fraunhofer FKIE, Germany have presented a paper on covert acoustical communications between laptop computers. In their paper 'On Covert Acoustical Mesh Networks in Air', they describe how acoustical communication can be used to secretly bridge air gaps between computers and connect computers and networks that are thought to be completely isolated from each other. By using ad-hoc routing protocols, they are able to build up a complete mesh network of infected computers that leaks data over multiple hops. A multi-hop acoustical keylogger is also presented where keystrokes are forwarded to an attacker over multiple hops between different office rooms. The fundamental part of the communication system is a piece of software that has originally been developed for acoustic underwater communications. The researchers also provide different countermeasures against malicious participation in a covert acoustical network. The limitations of air gaps have been discussed recently in the context of a highly advanced malware, although reports on this so-called badBIOS malware could not yet be confirmed."
Hugh Pickens DOT Com writes "The Washington Post reports that a rigorous, six-month training program launched by successful tech entrepreneurs for inmates in the decaying San Quentin State Prison is teaching carefully selected inmates the ins and outs of designing and launching technology firms, using local experts as volunteer instructors and the graduates, now trickling out of the penal system, are landing real jobs at real dot-coms. 'We believe that when incarcerated people are released into the world, they need the tools to function in today's high-tech, wired world,' says co-founder Beverly Parenti, who with her husband, Chris Redlitz, has launched thriving companies, including AdAuction, the first online media exchange. During twice-a-week evening lessons, students — many locked up before smartphones or Google— practice tweeting, brainstorm new companies and discuss business books assigned as homework. Banned from the Internet to prevent networking with other criminals, they take notes on keyboard-like word processors or with pencil on paper. The program is still 'bootstrapping,' as its organizers say, with just 12 graduates in its first two years and now a few dozen in classes in San Quentin and Twin Towers. But the five graduates released so far are working in the tech sector. 'This program will go a long way to not only providing these guys with jobs, but it is my hope that they hire people like them who have changed their lives and are now ready to contribute to society, pay taxes, follow the law, support their families,' says former California Department of Corrections and Rehabilitation director Matthew Cate who adds he made the right decision to approve the training course. 'All those things contribute to the economy.'"
msm1267 writes "Attackers are using route injection attacks against BGP-speaking routers to insert additional hops in the traffic stream, redirecting traffic to third-party locations where it can be inspected before it's sent to its destination. Internet intelligence company Renesys has detected close to 1,500 IP address blocks that have been hijacked on more than 60 days this year, a disturbing trend that indicates attackers could finally have an increased interest in weaknesses inherent in core Internet infrastructure."
Nerval's Lobster writes "Vint Cerf, widely considered one of the 'founders of the Internet,' told an audience at the Federal Trade Commission's Internet of Things workshop that privacy could be considered 'an anomaly.' That workshop, held Nov. 19 in Washington, DC, explored (via speeches and panel discussions) how the proliferation of sensors on everything from cars to household devices is fundamentally changing how people live and work—while raising questions of how to best maintain privacy and security in an environment where more and more things are 'watchers.' 'The technology that we use today has far outraced our social intuition, our headlights,' he added. '[There's a] need to develop social conventions that are more respectful of people's privacy.' Current social behaviors, such as instantly posting images from smartphones to social networks, can result in a whole lot of embarrassment—and maybe even penalties, if data and media happens to catch someone in the act of doing something illegal. Cerf currently works at Google as chief Internet evangelist, which would make him uniquely positioned to comment on these sorts of issues even if he hadn't co-created the TCP/IP backbone that supports the modern Web. (Back in April, he told an audience that, if he had to do it all over again, he'd construct the Internet in the mold of Software-Defined Networking — but that's a whole different, tangled discussion.)"
jfruh writes "The new Chinese leadership released a document outlining its vision for the country Friday, and most of the attention was paid to reforms, like plans to loosen state control of the economy and end the one-child policy. But when it comes to the Internet, the Chinese Communist government is doubling down on its restrictive policies. The document notes that social networking and instant messaging tools can rapidly disseminate information and mobilize society; the government doesn't think those are good things, and plans to bolster its regulatory systems and increase the scope of their legal authority."
An anonymous reader writes "The FreeBSD Foundation's annual year-end fundraising drive is currently running. Their goal this year is US$ 1M, and they're currently at US$ 427K. In 2013, the efforts that were funded were from the last drive were: Native iSCSI kernel stack, Updated Intel graphics chipset support, Integration of Newcons, UTF-8 console support, Superpages for ARM architecture, and Layer 2 networking updates. Also various conferences and summit sponsorships, as well as hardware purchases for the Project. The Foundation is a US 501(c)3 non-profit, so your donations (if in the US) are tax-deductible. Some of the larger 2013 (corporate?) sponsors so far are NetApp, LineRate, WhatsApp, and Tarsnap."
coondoggie writes "Amazon Web Services recently won a reported $600 million contract to build the U.S. Central Intelligence Agency (CIA) a cloud. But that cloud will not look like any other cloud on the planet. Amazon will build the cloud using AWS architectures and AWS will manage it, but executives hinted that it will not be accessed the way other customers use AWS services through the public Internet. 'We're managing the operations in the data center,' Andy Jassy, Amazon's senior vice president and the head of the company's cloud computing division AWS said about the CIA deal. 'It's our hardware, it's our networking.'"
judgecorp writes "British mobile operator EE is offering a massive 1 Petabyte data bundle to businesses spread across multiple phones,.It's more than a gimmick to promote the 4G data service — it's aimed at heavy data users such as media companies who use data networks to upload content. This deal charges £8 per gigabyte, which is less than half the cost of the satellite uplinks they currently use. So the £8 million cost of this package might even result in savings for some organizations."
itwbennett writes "Google's latest proposals aimed at avoiding an antitrust fine from European authorities have been leaked amid growing anger over the secrecy surrounding the case. The documents, which have been verified by sources in possession of the originals, revealed the full remedies put forward by Google, the questionnaire that rivals have been asked to fill in giving their response to the remedies and a comparison document showing the changes in Google's remedies since the last proposals. Unlike the first round of so-called 'market testing,' Google's revised proposals have not been made public and were only sent to 125 interested parties who were warned that they were not to be made public."
alphadogg writes "The equipment is big and expensive, with the research costs at almost $500,000. But by just using retail components, Chinese professor Chi Nan has built her own Li-Fi wireless system that can use LED lights to send and receive Internet data. "I bought the lights from Taobao," she said, referring to the Chinese e-commerce site. The professor from Fudan University showed off the technology on Tuesday at the China International Industry Fair in Shanghai. Unlike traditional Wi-Fi routers that use radio signals, Chi's system relies on light to send and receive data wirelessly. Others scientists, especially in the U.K., have also been researching the technology, and dubbed it "Li-Fi". But rather than develop specialized hardware, Chi bought off-the-shelf retail parts to create her system."