wiredmikey writes "Iranian officials on Tuesday said a 'Stuxnet-like' cyberattack hit some industrial units in a southern province. 'A virus had penetrated some manufacturing industries in Hormuzgan province, but its progress was halted,' Ali Akbar Akhavan said, quoted by the ISNA news agency. Akhavan said the malware was 'Stuxnet-like' but did not elaborate, and that the attack had occurred over the 'past few months.' One of the targets of the latest attack was the Bandar Abbas Tavanir Co, which oversees electricity production and distribution in Hormuzgan and adjacent provinces. He also accused 'enemies' of constantly seeking to disrupt operations at Iran's industrial units through cyberattacks, without specifying how much damage had been caused. Iran has blamed the U.S. and Israel for cyberattacks in the past. In April, it said a voracious malware attack had hit computers running key parts of its oil sector and succeeded in wiping data off official servers."
Make a difference in your data center. Sign up for SlashDataCenter Update newsletter now.
An article at The H makes the case that many open source foundations have successfully proven their worth and withstood the test of time as legitimate entities. This leads to the question: where do they go from here? The author suggests an umbrella foundation to provide consistent direction across many projects. Quoting; "As you might expect, the main aim of most foundations is to promote their own particular project and its associated programs. For the putative [Open Source Foundation Foundation], that would generalise into promoting open source foundations as a way of supporting open source activity. In practical terms, that might translate into establishing best practice, codifying what needs to be done in order to create an open source foundation in different jurisdictions with their differing legal requirements. That would make it far easier for smaller projects – such as Krita – to draw on that body of knowledge once they have decided to take this route. It might also encourage yet more projects to do the same, encouraged by the existence of support mechanisms that will help them to navigate safely the legal requirements, and to minimise costs by drawing on the experience of others. After all, this is precisely the way open source works, and what makes it so efficient: it tries to avoid re-inventing the wheel by sharing pre-existing solutions to problems or sub-problems."
A recent paper in Science (abstract) examines the insurance industry's reaction to climate change. The industry rakes in trillions of dollars in revenues every year, and a shifting climate would have the potential to drastically cut into the profits left over after settlements have been paid. Hurricane Sandy alone did about $80 billion worth of damage to New York and New Jersey. With incredible amounts of money at stake, the industry is taking climate projections quite seriously. From the article: "Many insurers are using climate science to better quantify and diversify their exposure, more accurately price and communicate risk, and target adaptation and loss-prevention efforts. They also analyze their extensive databases of historical weather- and climate-related losses, for both large- and small-scale events. But insurance modeling is a distinct discipline. Unlike climate models, insurers’ models extrapolate historical data rather than simulate the climate system, and they require outputs at finer scales and shorter time frames than climate models."
New submitter Isaac-1 writes "First it was the sex offenders being mapped using public records, now it seems to be gun owners — I wonder who will be next? It seems a newspaper in New York has published an interactive map with the names and addresses of people with [handguns]." It's happened before: In 2007, Virginia's Roanoke Times raised the ire of many gun owners by publishing a database of Virginia's gun permit holders that it assembled based on public records inquiries. (The paper later withdrew that database.) Similarly, WRAL-TV in North Carolina published a database earlier this year with searchable map of (partially redacted) information about permit holders in that state, and Philadelphia made the news for a similar disclosure — complete with interactive map and addresses — of hundreds of gun permit applicants and holders.
Dupple writes with news of another tech patent thrown out for obviousness. From the article: "On Friday, the High Court of London issued a ruling that said that one of Motorola's patents covering technology to synchronize messages across several devices should be invalidated. Originally, the patent covered the synching of messages across multiple pagers, but recently Motorola has used the patent in lawsuits against Apple and Microsoft for using similar message-syncing services in iCloud and on the Xbox, respectively. The presiding Judge Richard Arnold declared Motorola's patent invalid and said it should be revoked because the patent (which has a priority date from 1995, but was issued in 2002) contained technology that 'was obvious to experts in the field at the time.'"
theodp writes "With all of the content that can be delivered electronically — e-books, music, apps, movies, e-gift cards, tickets — the percentage of Christmas gift giving that's digital is growing each year. However, the e-gift unwrapping user experience on Christmas morning leaves much to be desired. In addition to providing old-school mail delivery of gift cards, Amazon offers a variety of other options, including e-mailing a gift card on a specific day with or without a suggested gift, posting it on someone's Facebook Wall, or allowing you to print one for personal delivery. Another suggestion — using USB drives — harkens back to the days of burning CDs with custom playlists for last-minute gifts, but you'll be thwarted by DRM issues for lots of content. So, until Facebook introduces The Tree to save our e-gifts under until they're 'unwrapped' on Christmas morning with the other physical gifts, how do you plan on handling e-gift giving and getting?"
dcblogs writes "China is on track to overtake the U.S. in spending on research and development in about 10 years, as federal R&D spending either declines or remains flat. The U.S. today maintains a large lead in spending over China, with federal and private sector investment expected to reach $424 billion next year, a 1.2% increase. By contrast, China's overall R&D spending is $220 billion next year, an increase of 11.6% over 2012, a rate similar to previous years. This finding is shared by the President's Council of Advisors on Science and Technology. 'China's investment as a percentage of its GDP shows continuing, deliberate growth that, if it continues, should surpass the roughly flat United States investment within a decade,' it said in a report last month."
benrothke writes "When the IBM PC first came out 31 years ago, it supported a maximum of 256KB RAM. You can buy an equivalent computer today with substantially more CPU power at a fraction of the price. But in those 31 years, the information security functionality in which the PC operates has not progressed accordingly. In Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents, author Jean-François Blanchette observes that the move to a paperless society means that paper-based evidence needs to be recreated in the digital world. It also requires an underlying security functionality to flow seamlessly across organizations, government agencies and the like. While the computing power is there, the ability to create a seamless cryptographic culture is much slower in coming." Keep reading for the rest of Ben's review.
New submitter wilbrod writes "A Quebec special effects artist charged with corrupting morals has been found not guilty in a case that tested the boundaries of creative expression and Canadian obscenity laws. He was charged with three counts of corrupting morals by distributing, possessing and producing obscene material. During the trial, Couture argued his gory works, roughly a thousand images and two short videos that appeared on Couture's website, Inner Depravity, should be considered art. The material in question depicts gruesome murders, torture, sexual abuse, assaults and necrophilia — all with young female victims."
The Internet Archive curates an astounding collection (actually, a collection of collections) of online resources, from historically significant to modern but obscure. Storing, serving and organizing more than 10 petabytes isn't cheap, despite their ongoing efforts to innovate on that front. An anonymous reader writes "An anonymous donor is matching $3 for every $1 given (up to $450,000) until December 31. One petabyte has been paid for so far and the archive is looking at getting three more. 'These massive servers are the backbone of the Archive, and critical to our continued growth. To all of you who've contributed to our fundraising drive, thanks from all of us here at the Internet Archive. '"
An anonymous reader writes "Researchers have discovered four wooden water wells in the Greater Leipzig region, Germany, which are believed to be the oldest known timber constructions in the world. A team of experts led by Willy Tegel and Dr. Dietrich Hakelberg from the Institute of Forest Growth of the University of Freiburg, Germany, uncovered the wells built during the early Neolithic period between the years 5206 and 5098 B.C." The (quite short) paper itself, and some cool pictures of the artifacts, are freely available.
SchrodingerZ writes "The Venus, Steve Jobs' custom-made mega yacht, (valued at 137.5 million dollars), has been impounded in Amsterdam. Philippe Starck, the boat's main designer, had The Venus impounded by debt collectors, after supposedly Starck and his company, Ubik, were paid only 6 million of the 9-million-euro commission. Roelant Klaassen, a lawyer for Ubik, released in a statement that 'These guys [Jobs and Starck] trusted each other, so there wasn't a very detailed contract.' 'The Venus is a floating ode to both Jobs and Starck's minimalist aesthetic. Made entirely out of aluminum, with 40-foot-long floor-to-ceiling windows lining the passenger compartment and seven 27-inch iMacs making up the command center.' The ship was unofficially unveiled in late October, a year after Jobs' death. It now sits dormant in the Port of Amsterdam, until the payment dispute is resolved."
dryriver writes "The BBC reports that cosmetic products using bee venom as an ingredient are a new 'hot seller' in the cosmetics market. Bee venom is said to have an effect on female skin similar to Botox injections, tightening the skin and making wrinkles and other signs of aging appear less pronounced than before. Unlike Botox, however, bee venom does not need to be injected, and can be absorbed through the skin naturally as an ingredient of cosmetic skin creme. Now comes the kicker: A special electrified device that causes bees to sting a synthetic membrane and release their venom can harvest about one gram of bee venom from 20 bee hives. That one gram of bee venom is worth a whopping 350 dollars. This makes bee venom almost seven times more valuable than gold, which, in comparison, is worth only about 53 dollars per gram."
An anonymous reader writes "Google on Friday announced that it is changing its stance for silently installing extensions in its browser. As of Chrome 25, external extension deployment options on Windows will be disabled by default and all extensions previously installed using them will be automatically disabled."
New submitter dgrobinson writes "NY Times reports that West Antarctica has warmed more over the last half century than was first thought. A paper released Sunday by the journal Nature Geoscience (abstract) found that the temperature at a research station in the middle of West Antarctica has warmed by 4.4 degrees Fahrenheit since 1958. That is roughly twice as much as scientists previously thought and three times the overall rate of global warming, making central West Antarctica one of the fastest-warming regions on earth."