Remains at a Swedish fort tell a story of bloody Iron Age warfare

A Roman coin found at the site of Sandby Borg, whose inhabitants probably included a number of unemployed Roman soldiers. (credit: Max Jahrehorn Oxides) On Öland, an icy island off the coast of Sweden, archaeologists have unearthed the remains of a 1,500-year-old fort whose inhabitants were brutalized in such an extreme way that legends about it persist to this day. As researchers piece together the fort’s final days, it sounds like they’re telling a horror story. Possibly hundreds of people sheltering behind the fort’s defenses were executed and abandoned, their bodies left to rot in place without burial. Their wounds were indicative of execution. And some of their mouths were stuffed with goat and sheep teeth, possibly a dark reference to the Roman tradition of burying warriors with coins in their mouths. None of their considerable wealth was looted, which is highly unusual. Researchers have found barely hidden valuables in every house they’ve excavated. Even the livestock was left behind after the slaughter, locked up to die of starvation. This is even more bizarre than the lack of looting. On an island with scarce resources, it would have been considered a waste for victors (or neighbors) to leave healthy horses and sheep behind after battle. Read 10 remaining paragraphs | Comments

Read the original:
Remains at a Swedish fort tell a story of bloody Iron Age warfare

Chrome OS distro for regular PCs can now dual-boot with Windows

Enlarge / Dell’s old Latitude E6410 becomes a modern Chromebook. (credit: Andrew Cunningham) A few months ago, we wrote about CloudReady , a version of the open source Chromium OS from Neverware that can transform older Windows PCs into what are essentially Chromebooks (give or take a couple of media codecs and other features). Neverware takes the Chromium OS code provided by Google and does all the hard work of testing and maintaining driver compatibility and providing updates, the same things that Google handles for actual Chromebooks. The OS is aimed at schools that either want to move to Chromebooks but can’t afford the cost of all-new hardware or schools that have already begun a transition to Chromebooks but want to repurpose old hardware they already have. Today, Neverware announced a new version of CloudReady aimed at schools and individuals who want to try the software on their PCs without losing the capability to run Windows. CloudReady version 45.3 can be installed on any system with an existing UEFI-mode installation of Windows 7, 8, or 10 and 32GB of free disk space. You can find detailed installation directions on Neverware’s site. The UEFI requirement means that the list of PCs that support dual-booting is much shorter than the normal CloudReady support list, so this won’t be of much use to people with older BIOS-based PCs and Windows installations. But if you happen to have a device on the list, and you want to give the software a spin, you can download the free version from Neverware’s site. The fully featured version that supports Google’s Chrome OS management console costs $59 per machine for an unlimited license or $25 for a one-year license. Read on Ars Technica | Comments

View article:
Chrome OS distro for regular PCs can now dual-boot with Windows

Department of Defense standardizes on Windows 10, certifies Surfaces

The US Department of Defense announced today that it is to standardize on Windows 10. Over the course of the next year, some 4 million systems will be upgraded to Microsoft’s latest operating system in what must be the largest enterprise deployment of the operating system worldwide. This is a followup to a November order to upgrade systems in Combatant Commands, Service Agencies, and Field Activities to the operating system. The rationale is the government’s desire to protect better against security breaches and reduce IT costs by streamlining on a single platform. Windows 10 is better protected against security flaws than its predecessors, making it a tougher target for attackers. In tandem with this, the government has given the Surface 3, Surface Pro 3, Surface Pro 4, and Surface Book all the relevant certifications to allow those systems to be included on the Defense Information Systems Agency (DISA) Unified Capabilities (UC) Approved Products List (APL). This means that DoD agencies can now buy and use Surface family hardware in its deployments. Read 1 remaining paragraphs | Comments

More:
Department of Defense standardizes on Windows 10, certifies Surfaces

Massive US-planned cyberattack against Iran went well beyond Stuxnet

(credit: Aurich Lawson) The Stuxnet computer worm that destroyed centrifuges inside Iran’s Natanz uranium enrichment site was only one element of a much larger US-prepared cyberattack plan that targeted Iran’s air defenses, communications systems, and key parts of its power grid, according to articles published Tuesday. The contingency plan, known internally as Nitro Zeus, was intended to be carried out in the event that diplomatic efforts to curb Iran’s nuclear development program failed and the US was pulled into a war between Iran and Israel, according to an article published by The New York Times . At its height, planning for the program involved thousands of US military and intelligence personnel, tens of millions of dollars in expenditures, and the placing of electronic implants in Iranian computer networks to ensure the operation targeting critical infrastructure would work at a moment’s notice. Another piece of the plan involved using a computer worm to destroy computer systems at the Fordo nuclear enrichment site, which was built deep inside a mountain near the Iranian city of Qom. It had long been considered one of the hardest Iranian targets to disable and was intended to be a follow-up to “Olympic Games,” the code name of the plan Stuxnet fell under. Read 5 remaining paragraphs | Comments

More here:
Massive US-planned cyberattack against Iran went well beyond Stuxnet

This flower, preserved in amber, may be 45 million years old

George Poinar The new fossil flower Strychnos electri in its original Dominican amber piece of mid-Tertiary age. The whole flower is less than 20 mm long and is the first finding of an asterid flower in amber from the New World. 4 more images in gallery This delicate flower has been preserved in amber, with each petal and tiny hair intact, for as many as 45 million years. Scientists discovered the flower in a cave in the Dominican Republic along with a treasure trove of insects preserved in amber. Now the flower has been identified by an expert as a member of the vast Asterid clade of flowers, whose members include the coffee plant as well as potatoes, peppers, and the poisonous Strychnine tree. Amber is fossilized tree sap, and pinning an exact date on it is extremely difficult. In paper published this morning in Nature Plants , biologists George Poinar and Lena Struwe  carefully used two methods of dating the material to suggest that this flower might have been fossilized as early as 45 million years ago or as late as 15 million. They came up with such a broad spread of dates largely because we still don’t have very many fossils from these kinds of plants, which makes precise dates difficult. The researchers had to date the flower by proxy, by examining other life forms found the amber cache, including the common single-celled organisms known as foraminifera and coccoliths. There are distinct evolutionary and population changes in foraminifera and coccoliths over time, and paleontologists often use these tiny animals to place fossils during specific geological periods. What’s certain is that this flower bloomed long before the age of apes during the mid-Tertiary period. Read 3 remaining paragraphs | Comments

Original post:
This flower, preserved in amber, may be 45 million years old

Netflix finishes its massive migration to the Amazon cloud

(credit: Netflix) Netflix has been moving huge portions of its streaming operation to Amazon Web Services (AWS) for years now, and it says it has finally completed its giant shift to the cloud. “We are happy to report that in early January of 2016, after seven years of diligent effort, we have finally completed our cloud migration and shut down the last remaining data center bits used by our streaming service,” Netflix said in a blog post that it plans to publish at noon Eastern today. (The blog should go up at this link .) Netflix operates “many tens of thousands of servers and many tens of petabytes of storage” in the Amazon cloud, Netflix VP of cloud and platform engineering Yury Izrailevsky told Ars in an interview. Netflix had earlier planned to complete the shift by the end of last summer . Read 19 remaining paragraphs | Comments

See original article:
Netflix finishes its massive migration to the Amazon cloud

Teen sues TV station for $1M over unauthorized broadcast of his genitals

(credit: NURV.com ) A South Carolina teenager has sued a Colorado television station over allegations the station broadcasted a picture of his erect penis taken from a cell phone video uploaded to YouTube. The case, known as Holden v. KOAA , asks for $1 million in damages and accuses the station, its reporter, its parent companies (NBC and Comcast), and other defendants of violating federal child pornography laws, invasion of privacy and negligence, and other allegations. According to the lawsuit , the teen was 14 years old and living in Colorado at the time of the incident. (The incident occurred two years ago, but Ars will not name the individual as he is still a minor.) The cell phone video had been taken of the teen and put online as a way to blackmail him. His father’s girlfriend, Heather Richardson, soon contacted the KOAA TV station to let them know about the situation. KOAA sent a local reporter, Matthew Prichard, to the family’s home in Pueblo, Colorado, where Prichard interviewed the boy and filmed the offending material. The suit claims that the boy’s father specifically told Prichard to keep his son’s name out of the report. Read 7 remaining paragraphs | Comments

Read the original post:
Teen sues TV station for $1M over unauthorized broadcast of his genitals

Yahoo sued over employee rankings, anti-male discrimination

(credit: Clever Cupcakes ) A new lawsuit  (PDF) filed against flailing tech giant Yahoo claims that company managers governing the “Media Org” were biased against men. It also claims that the company’s Quarterly Performance Review (QPR) process favored female employees and that the company engaged in mass layoffs without proper warnings. Gregory Anderson was editorial director of Yahoo’s Autos, Homes, Shopping, Small Business, and Travel sections until he was terminated in 2014. In his complaint, Anderson says that between 2012 and 2015, Yahoo reduced its work force by more than 30 percent to fewer than 11,000 employees. That constitutes a mass-layoff, which requires 60-day notice under state and federal law, he says. Read 13 remaining paragraphs | Comments

Read more here:
Yahoo sued over employee rankings, anti-male discrimination

Israel’s electric grid hit by “severe” hack attack

Israel experienced a serious hack attack on its electrical grid that officials are still working to repel, the head of the country’s energy minister said Tuesday. “The virus was already identified and the right software was already prepared to neutralize it,” Israeli Energy Minister Yuval Steinitz told attendees of a computer security conference in Tel Aviv, according to this article published Tuesday by The Times of Israel . “We had to paralyze many of the computers of the Israeli Electricity Authority. We are handling the situation and I hope that soon, this very serious event will be over … but as of now, computer systems are still not working as they should.” The “severe” attack was detected on Monday as temperatures in Jerusalem dipped to below freezing, creating two days of record-breaking electricity consumption, according to The Jerusalem Post . Steinitz said it was one of the biggest computer-based attacks Israel’s power infrastructure has experienced, and that it was responded to by members of his ministry and the country’s National Cyber Bureau. The energy minister didn’t identify any suspects behind the attack or provide details about how it was carried out. Read 2 remaining paragraphs | Comments

Read More:
Israel’s electric grid hit by “severe” hack attack

After FBI briefly ran Tor-hidden child-porn site, investigations went global

(credit: Andrew ) In 2015, the FBI seized a Tor-hidden child-porn website known as Playpen and allowed it to run for 13 days so that the FBI could deploy malware in order to identify and prosecute the website’s users. That malware, known in FBI-speak as a “network investigative technique,” was authorized by a federal court in Virginia in February 2015. In a new revelation, Vice Motherboard has now determined that this operation had much wider berth. The FBI’s Playpen operation was effectively transformed into a global one, reaching Turkey, Colombia, and Greece, among others. Motherboard’s Joseph Cox wrote on Twitter on Friday that he was able to find a document describing this infiltration as something called “Operation Pacifier” by using creative “Google-fu.” Read 11 remaining paragraphs | Comments

Read the article:
After FBI briefly ran Tor-hidden child-porn site, investigations went global