An anonymous reader writes "Dragonfly BSD recently announced the release of version 3.2 of their operating system. Improvements include: USB4BSD, a second-generation USB stack; merging of a GSoC project to provide CPU topology awareness to the scheduler, giving a nice boost for hyperthreading Intel CPUs; and last but not least, a new largely rewritten scheduler. Some background is in order for the last one. PostgreSQL 9.3 will move from SysV shared memory to mmap for its shared memory needs. It turned out that the switch much hurts its performance on the BSDs. Matthew Dillon was fast to respond with a search for bottlenecks and got the performance up to par with Linux."
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's now on IFTTT. Check it out! Check out the new SourceForge HTML5 Internet speed test! ×
snydeq writes "Facebook has said that it will soon open source Prism, an internal project that supports geographically distributed Hadoop data stores, thereby removing the limits on Hadoop's capacity to crunch data. 'The problem is that Hadoop must confine data to one physical data center location. Although Hadoop is a batch processing system, it's tightly coupled, and it will not tolerate more than a few milliseconds delay among servers in a Hadoop cluster. With Prism, a logical abstraction layer is added so that a Hadoop cluster can run across multiple data centers, effectively removing limits on capacity.'"
hessian writes "Scholars who study the role of media in society say no long-term studies have been done that adequately show how and if student attention span has changed because of the use of digital technology. But there is mounting indirect evidence that constant use of technology can affect behavior, particularly in developing brains, because of heavy stimulation and rapid shifts in attention."
First time accepted submitter TheUnFounded writes "A site that I administer was recently 'held hostage' for the vast sum of $800. We were contacted by a guy (who was, it turns out, in Lebanon), who told us that he had been asked to perform a DDoS on our site by a competitor, and that they were paying him $600. He then said for $800, he would basically go away. Not a vast sum, but we weren't going to pay just because he said he 'could' do something. Within 5 minutes, our site was down. The owner of the company negotiated with the guy, and he stopped his attack after receiving $400. A small price to pay to get the site online in our case. But obviously we want to come up with a solution that'll allow us to deal with these kinds of attacks in the future. While the site was down, I contacted our hosting company, Rackspace. They proceeded to tell me that they have 'DDoS mitigation services,' but they cost $6,000 if your site is under attack at the time you use the service. Once the attack was over, the price dropped to $1500. (Nice touch there Rackspace, so much for Fanatical support; price gouging at its worst). So, obviously, I'm looking for alternative solutions for DDoS mitigation. I'm considering CloudFlare as an option; does anyone have any other suggestions or thoughts on the matter?"
An anonymous reader writes "Security firm Kaspersky has released its latest IT Threat Evolution report. There were some interesting findings in the report, as always, but the most interesting thing that stuck out was all the way at the bottom: 'Microsoft products no longer feature among the Top 10 products with vulnerabilities. This is because the automatic updates mechanism has now been well developed in recent versions of Windows OS.'"
Hugh Pickens writes "Candace Jackson writes that an increasing number of home builders and buyers are looking for a new kind of security: homes equipped to handle everything from hurricanes, tornadoes and hybrid superstorms like this week's Sandy, to man-made threats ranging from home invasion to nuclear war. Fueling the rise of these often-fortresslike homes are new technologies and building materials—which builders say will ultimately be used on a more widespread basis in storm- and earthquake-threatened areas. For example, Alys Beach, a 158-acre luxury seaside community on Florida's Gulf Coast, has earned the designation of Fortified...for safer living® homes and is designed to withstand strong winds. The roofs have two coats of limestone and exterior walls have 8 inches of concrete, reinforced every 32 inches for 'bunkerlike' safety, according to marketing materials. Other builders are producing highly hurricane-proof residences that are circular in shape with 'radial engineering' wherein roof and floor trusses link back to the home's center like spokes on a wheel, helping to dissipate gale forces around the structure. Deltec, a North Carolina–based builder, says it has never lost a circular home to hurricanes in over 40 years of construction. But Doug Buck says some 'extreme' building techniques don't make financial sense. 'You get to a point of diminishing returns,' says Buck. 'You're going to spend so much that honestly, it would make more sense to let it blow down and rebuild it.''
An anonymous reader writes "Four years after discovering that militants were tapping into drone video feeds, the U.S. military still hasn't secured the transmissions of more than half of its fleet of Predator and Reaper drones, Danger Room has learned. The majority of the aircraft still broadcast their classified video streams 'in the clear' — without encryption. With a minimal amount of equipment and know-how, militants can see what America's drones see."
First time accepted submitter lukpac writes "We have an old (ancient) Unisys server in production that hosts a legacy system and are attempting to virtualize it. Unfortunately we don't have a generic UnixWare (2.1.2) installation CD, just a Unisys-specific one, and given the recent unpleasantness (see Groklaw for details), SCO isn't much of an option. We're not looking at pirating it (as above, we do still have the Unisys-specific media), but do need a generic copy of UnixWare. What options, if any, are available?"
Nerval's Lobster writes "The local utility serving most of the New York City area, Con Edison, reported that it should begin supplying utility power to midtown and lower Manhattan by Saturday evening, returning the island's data centers and citizens to some semblance of normalcy. In the past few days, data center managers have been forced to add fuel logistics to their list of responsibilities, as most Manhattan data centers have been subsisting on generator power. That should come to an end, for the most part, when utility power is restored. In a possibly worrying note, Verizon warned late on Nov. 1 that its services to business customers could be impacted due to lack of fuel."
jrepin sends this news from the FSF Europe site: "The UK government is certainly taking a long and winding road towards Free Software and Open Standards. The UK's public sector doesn't use a lot of Free Software, and many smaller Free Software companies have found it comparatively hard to get public sector buyers for their products and services. The main reason is that government agencies at all levels are locked into proprietary, vendor-specific file formats. ... The UK government has released a new Open Standards policy. With this policy (PDF), and in particular with its strong definition of Open Standards, the UK government sets an example that governments elsewhere should aspire to,' says Karsten Gerloff, President of the Free Software Foundation Europe. Under the new policy, effective immediately, patents that are essential to implementing a standard must be licensed without royalties or restrictions that would prevent their implementation in Free Software."
BigBadBus writes "The BBC is reporting that the remains of a World War 2 carrier pigeon were found during renovation of a chimney in England. What is interesting is that the pigeon's remains still had its message attached to the leg ring; even more interesting, this is the first recorded instance of a code being used rather than plain text. The successor to WW2 code-breaking HQ Bletchley Park, the GCHQ, is trying to decipher this unique code. Maybe a Slashdot reader can beat them to it?"
mask.of.sanity writes "Dangerous website flaws have been discovered in PayPal that grant attackers access to customer credit card data, account balances and purchase histories. The holes still exist. One was publicly disclosed after a failed effort in July to responsibly disclose them under PayPal's bug bounty program. PayPal is working to close the holes."
CowboyRobot writes "A pair of reports by Juniper and Bit9 confirm the suspicion that many apps are spying on users. '26 percent of Android apps in Google Play can access personal data, such as contacts and email, and 42 percent, GPS location data... 31 percent of the apps access phone calls or phone numbers, and 9 percent employ permissions that could cost the user money, such as incurring premium SMS text message charges... nearly 7 percent of free apps can access address books, 2.6 percent, can send text messages without the user knowing, 6.4 percent can make calls, and 5.5 percent have access to the device's camera.' The main issue seems to be with poor development practices. Only in a minority of cases is there malicious intent. The Juniper report and the Bit9 report are both available online."
kgeiger writes "Voting machine designs and data formats are a free-for-all. The result is poor validation and hence opportunity for fraud. An IEEE standards group wants all election computer systems to speak the same language. From the article: 'IEEE Standards Project 1622 is working on electronic data interchange for voting systems. The plan is to create a common format, based on the Election Markup Language (EML) already recommended for use in Europe. This is a subset of the popular XML (eXtensible Markup Language) that specifies particular fields and data structures for use in voting.'"
pigrabbitbear writes "Just three weeks after Defense Secretary Leon Panetta told an audience at the Sea, Air and Space Museum that the U.S. is on the brink of a 'cyber Pearl Harbor,' the government has decided it needs to beef up the ranks of its digital defenses. It's assembling a league of extraordinary computer geeks for what will be known as the 'Cyber Reserve.'"