Garabito writes "In April 2009, Australia's then prime minister, Kevin Rudd, dropped a bombshell on the press and the global technology community: His social democrat Labor administration was going to deliver broadband Internet to every single resident of Australia. It was an audacious goal, not least of all because Australia is one of the most sparsely populated countries on Earth. ... So now, after three years of planning and construction, during which workers connected some 210 000 premises (out of an anticipated 13.2 million), Australia's visionary and trailblazing initiative is at a crossroads. The new government plans to deploy fiber only to the premises of new housing developments. For the remaining homes and businesses — about 71 percent — it will bring fiber only as far as curbside cabinets, called nodes. Existing copper-wire pairs will cover the so-called last mile to individual buildings."
Navigate with confidence through the cloud. Sign up for the SlashCloud Update newsletter now.
alphadogg writes "There are currently several million smartphones certified to run on a 'HotSpot 2.0' Wi-Fi network, which promises automatic Wi-Fi authentication and connection, and seamless roaming between different Wi-Fi hotspot brands, and eventually between Wi-Fi and cellular connections. In November, about 400 smartphone users finally got a chance to do so — in Beijing, China. The next big public demonstration of what's confusingly referred to as both Hotspot 2.0 and Next Generation Hotspot will be in February: an estimated 75,000 attendees at the next Mobile World Congress in Barcelona will be able to take part."
An anonymous reader writes "An article by Abbas El-Zein at The Guardian explores the ethical responsibilities for engineers who create and maintain 'technologies of violence.' He says, 'Engineers who see themselves as builders of the shelter and infrastructure for human needs also use their expertise in order to destroy and kill more efficiently. When doctors or nurses use their knowledge of anatomy in order to torture or conduct medical experiments on helpless subjects, we are rightly outraged. Why doesn't society seem to apply the same standards to engineers? There is more than one answer to the question of course, but two points are especially pertinent: the common good we engineers see ourselves serving and our relationship to authority. ... Our ethics have become mostly technical: how to design properly, how to not cut corners, how to serve our clients well. We work hard to prevent failure of the systems we build, but only in relation to what these systems are meant to do, rather than the way they might actually be utilised, or whether they should have been built at all. We are not amoral, far from it; it's just that we have steered ourselves into a place where our morality has a smaller scope.'"
Nerval's Lobster writes "Microsoft will encrypt consumer data and make its software code more transparent, in a bid to boost consumer confidence in its security. Microsoft claims that it will now encrypt data flowing through Outlook.com, Office 365, SkyDrive, and Windows Azure. That will include data moving between customers' devices and Microsoft servers, as well as data moving between Microsoft data-centers. The increased-transparency part of Microsoft's new initiative is perhaps the most interesting, considering the company's longstanding advocacy of proprietary software. But Microsoft actually isn't planning on throwing its code open for anyone to examine, as much as that might quell fears about government-designed backdoors and other nefarious programming. Instead, according to its general counsel Brad Smith, "transparency" means "building on our long-standing program that provides government customers with an appropriate ability to review our source code, reassure themselves of its integrity, and confirm there are no back doors." In addition, Microsoft plans on opening a network of "transparency centers" where customers can go to "assure themselves of the integrity of Microsoft's products." That's not exactly the equivalent of volunteers going through TrueCrypt to ensure a lack of NSA backdoors, and it seems questionable whether such moves (vague as they are at this point) on Microsoft's part will assure anyone that it hasn't been compromised by government sources. But with Google and other tech firms making a lot of noise about encrypting their respective services, Microsoft has little choice but to join them in introducing new privacy initiatives."
curtwoodward writes "For some reason, we're still plugging in electric-powered devices like a bunch of savages. But technology developed at MIT could soon make that a thing of the past, at least for hybrid cars. A small Boston-area company, WiTricity, is a key part of Toyota's growing experiment with wireless charging tech---something the world's largest car maker says it will start seriously testing in the U.S., Japan and Europe next year. The system works by converting AC to a higher frequency and voltage and sending it to a receiver that resonates at the same frequency, making it possible to transfer the power safely via magnetic field. Intel and Foxconn are also investors, and you might see them license the tech soon as well."
sl4shd0rk writes "In 2012, Oracle took Google to court over Java. In the balance hung the legalities of writing code to mimic the functionality of copyrighted software. The trial was set to determine how all future software would be written (and by whom). Oracle's entire case boiled down to an inadvertent 9 lines of code; an argument over a simple and basic comparison of a range of numbers. The presiding judge (who had some background in writing software) didn't buy it stating he had 'written blocks of code like rangeCheck a hundred times before.' A victory for more than just Google. This week, however, Microsoft, EMC, Oracle and Netapp have filed for appeal and seek to reverse the ruling. It's not looking good as the new bevy of judges Indicating they may side with Oracle on the issue."
Zothecula writes "A ship with a hull longer than the Empire State Building is tall has been floated out of dry dock in Geoje, South Korea. Measuring 488 m (1,601 ft) long and 74 m (243 ft) wide, the hull belongs to Shell's Prelude floating liquefied natural gas (FLNG) facility, which upon completion will be the largest floating facility ever built."
tdog17 writes "China says it wants Microsoft to extend support for Windows XP because that will help in its fight to stop proliferation of pirated Microsoft software. A state copyright official says the release of Windows 8 means a substantial increase in the selling price of a Windows operating system, especially in light of the upcoming end-of-life of Windows XP, which is still used by a large percentage of Chinese. That could drive users to buy pirated copies of a new operating system because they are cheaper, he says."
An anonymous reader writes "There's a chronic shortage of tech savvy teacher all over Africa, and at the same time a strong belief that the tech economy is vital to growth. Enter Afrimakers, a crowdfunded project to visit tech hubs in seven continents and leave behind Arduino boards, Raspberry Pis, soldering kits and — most importantly — the smarts to use them. The Indiegogo fund opened up a week or so ago, and they've managed to raise enough for the first two countries so far."
An anonymous reader writes "A medical radioactive material truck has been stolen just outside Mexico City. From the article: 'BBC world affairs correspondent Rajesh Mirchandani says Cobalt-60 could theoretically be used in a so-called "dirty bomb" - an explosive device that could spread radioactive material over a wide area - although there is no official suggestion this was the purpose of the theft. Mexican police are currently conducting a search for the truck and its contents and have issued a press release to alert the public to its potential dangers.'"
cartechboy writes "As car manufacturers battle over futuristic announcements of when autonomous cars will (allegedly) be sold, they are also starting to more seriously put self-driving technology to the test. Earlier this week several Japanese dignitaries drove — make that rode along — as an autonomous Nissan Leaf prototype completed its first public highway test near Tokyo. The Nissan Leaf electric car successfully negotiated a section of the Sagami Expressway southwest of Tokyo, with a local Governor and Nissan Vice Chairman Toshiyuki Shiga onboard. The test drive reached speeds of 50 mph and took place entirely automatically, though it was carried out with the cooperation of local authorities, who no doubt cleared traffic to make the test a little easier. Nissan has already stated its intent to offer a fully autonomous car for sale by 2020."
chicksdaddy writes "Cyber attacks on 'connected vehicles' are still in the proof of concept stage. But those proofs of concept are close enough to the real thing to prompt an inquiry from U.S. Senator Ed Markey, who sent a letter to 20 major auto manufacturers (PDF) asking for information about consumer privacy protections and safeguards against cyber attacks in their vehicles. Markey's letter, dated December 2, cites recent reports of 'commands...sent through a car's computer system that could cause it to suddenly accelerate, turn or kill the breaks,' and references research conducted by Charlie Miller and Chris Valasek (PDF) on the Toyota Prius and Ford Escape. 'Today's cars and light trucks contain more than 50 separate electronic control units (ECUs), connected through a controller area network (CAN) ... Vehicle functionality, safety and privacy all depend on the functions of these small computers, as well as their ability to communicate with one another,' Markey wrote. Among the questions Markey wants answers to: What percentage of cars sold in model years 2013 and 2014 do not have any wireless entry points? What are automakers' methods for testing for vulnerabilities in technologies it deploys — including third pressure technologies? Markey asks specifically about tire pressure monitors, bluetooth and other wireless technologies and GPS (like Onstar). What third party penetration testing is conducted on vehicles (and any results)? What intrusion detection features exist for critical components like controller area network (CAN) buses on connected vehicles?"
sl4shd0rk writes "Remember when the ex-cable lobbyist Tom Wheeler was appointed to the FCC chair back in May of 2013? Turns out he's currently gunning for Internet Service Providers to be able to 'favor some traffic over other traffic.' It would set a dangerous precedent, considering the Open Internet Order in 2010 forbade such action if it fell under unreasonable discrimination. The bendy interpretation of the 2010 order is apparently aimed somewhat at Netflix, as Wheeler stated: 'Netflix might say, "I'll pay in order to make sure that my subscriber might receive the best possible transmission of this movie."'"
cathyreisenwitz sends word of a San Francisco trial in which the U.S. government appears to be manipulating the no-fly list to its advantage. The court case involves a Stanford Ph.D. student who was barred from returning to the U.S. after visiting her native Malaysia. She's one of roughly 700,000 people on the no-fly list. Here's the sketchy part: the woman's eldest daughter, who was born in the U.S. and is a U.S. citizen, was called as a witness for the trial. Unfortunately, she mysteriously found herself on the no-fly list as well, and wasn't able to board a plane to come to the trial. Lawyers for the Department of Justice told the court that she simply missed her plane, but she was able to provide documents from the airline explaining that the Department of Homeland Security was not allowing her to fly.
An anonymous reader writes "I am a senior engineer and software architect at a fortune 500 company and manage a brand (website + mobile apps) that is a household name for anyone with kids. This year we migrated to a new technology platform including server hosting and application framework. I was brought in towards the end of the migration and overall it's been a smooth transition from the users' perspective. However it's a security nightmare for sysadmins (which is all outsourced) and a ripe target for any hacker with minimal skills. We do weekly and oftentimes daily releases that contain and build upon the same security vulnerabilities. Frequently I do not have control over the code that is deployed; it's simply given to my team by the marketing department. I inform my direct manager and colleagues about security issues before they are deployed and the response is always, 'we need to meet deadlines, we can fix security issues at a later point.' I'm at a loss at what I should do. Should I go over my manager's head and inform her boss? Approach legal and tell them about our many violations of COPPA? Should I refuse to deploy code until these issues are fixed? Should I look for a new job? What would you do in my situation?"
crookedvulture writes "AMD's recently introduced Radeon R9 290X is one of the fastest graphics cards around. However, the cards sent to reviewers differ somewhat from the retail units available for purchase. The press samples run at higher clock speeds and deliver better performance as a result. There's some variance in clock speeds between different press and retail cards, too. Part of the problem appears to be AMD's PowerTune mechanism, which dynamically adjusts GPU frequencies in response to temperature and power limits. AMD doesn't guarantee a base clock speed, saying only that the 290X runs at 'up to 1GHz.' Real-world clock speeds are a fair bit lower than that, and the retail cards suffer more than the press samples. Cooling seems to be a contributing factor. AMD issued a driver update that raises fan speeds, and that helps the performance of some retail cards. Retail units remain slower than the cards seeded to the press, though. Flashing retail cards with the press firmware raises clock speeds slightly, but it doesn't entirely close the gap, either. AMD hasn't explained why the retail cards are slower than expected, and it's possible the company cherry-picked the samples sent to the press. At the very least, it's clear that the 290X exhibits more card-to-card variance than we're used to seeing in a PC graphics product."
sl4shd0rk writes "It seems you can be arrested in Georgia for drawing 5 cents of electricity from a school's outdoor receptacle. Kaveh Kamooneh was charged with theft for plugging his Nissan Leaf into a Chamblee Middle School 110V outlet; the same outlet one could use to charge a laptop or cellphone. The Leaf draws 1KW/hour while charging which works out to under $0.10 of electricity per hour. Mr Kamooneh charged his Leaf for less than 30 minutes, which works out to about a nickel. Sgt. Ernesto Ford, the arresting officer, pointed out, 'theft is a theft,' which was his argument for arresting Mr. Kamooneh. Considering the cost of the infraction, it does not seem a reasonable decision when considering how much this will cost the state in legal funds. Does this mean anyone charging a laptop or cell phone will be charged with theft as well?"
sfcrazy writes "The creator of the most sought after 'Android' of the world has been secretly working on creating a robotics division within Google. The search engine giant has acquired over seven robotics companies recently to create the robotics unit which is being headed by none other than Andy Rubin himself. Andy made the disclosure in an interview given to the New York Times." Their initial goal is to automate the woefully manual process of electronics manufacturing.
theodp writes "'The desktop or laptop is now in decline,' writes John Sall, 'squeezed from one side by mobile platforms and from the other side by the cloud. As a developer of desktop software [by choice not necessity], I believe it is time to address the challenges to our viability. Is software for the desktop PC now the living dead, or zombieware.' While conceding there's some truth to truisms about the death of the desktop, Sall believes there's still life in the old desktop dog, 'We live in a world of computing where dreams come true,' Sall concludes. 'The mainframe bows to the minicomputer. The minicomputer bows to the personal computer. The personal computer bows to the tablet and smart phone. It seems as if these will soon bow to the smart watch or smart glasses. But at each step along the way, some applications find their best home – and other applications as well as new applications find the more convenient and smaller home better...So let's keep our desktops and laptops, our PCs and Macs. They are amazingly good at what they do.'"
grex writes "In 2002, the first FLOSS survey was launched. With over 2,500 participants, it was the first large survey of open source developers around the world and had a major impact in the community, academia and politics. Over 10 years later, a group of researchers is replicating this survey in order to see how the community has changed. This time not only developers, but all kind of contributors to open source projects are asked to participate. How has the community changed in this last 10 years? Are the views the same? Is its composition and focus similar? These types of questions, among others, are the ones this survey is looking to answer (so far with over 1,000 respondents)."