Partially-Undersea Water Discus Hotel To Be Built In the Maldives

Zothecula writes “Polish architectural and deep-sea engineering company Deep Ocean Technology has inked a deal with Ridgewood Hotels and Suites Pvt. Ltd. to build its futuristic part-underwater Water Discus Hotel just off the shore of Kuredhivaru Island in the Maldives. ‘The luminous hotel features two large disc-shaped lounges seven-meters above the water, housing a luxury restaurant and spa. The lounges are connected to a glass tunnel plunging 30-meters below the water, leading to 21 opulent bedrooms. Not only does the hotel look like a spaceship — it actually moves like one, with the largest underwater saucer-shaped room able to slide to the surface in emergencies. ‘If you need to replace a window for example, it’s very difficult underwater,’ explained Podwojewski. ‘So we wanted to build a building that can surface any time for maintenance or safety.'” Read more of this story at Slashdot.

More:
Partially-Undersea Water Discus Hotel To Be Built In the Maldives

Oculus VR co-founder, 33, killed by speeding car

Tragedy hits the company that made the Oculus Rift head-mounted virtual-reality display, as co-founder Andrew Reisse finds himself in the wrong place at the wrong time during a police chase. [Read more]        

See original article:
Oculus VR co-founder, 33, killed by speeding car

Casting a Harsh Light On Chinese Solar Panels

New submitter Eugriped3z writes with an article in the New York Times that “indicates that manufacturing defect rates for solar panels manufactured in China vary widely, anywhere from 5-22%. Secrecy in the terms of settlements negotiated by attorneys representing multi-million dollar installations perpetuate the problem by masking the identity of unscrupulous or incompetent actors. Meanwhile, Reuters reports that unit labor costs in Mexico are now lower than in China.” Read more of this story at Slashdot.

Read More:
Casting a Harsh Light On Chinese Solar Panels

Computer Network Piecing Together a Jigsaw of Ancient Jewish Lore

First time accepted submitter aravenwood writes “The New York Times and the Times of Israel report today that artificial intelligence and a network of 100 computers in a basement in Tel Aviv University are being used to match 320,000 fragments of documents dating as far back as the 9th century in an attempt to reassemble the original documents. Since the trove of documents from the Jewish community of Cairo was discovered in 1896 only about 4000 of them have been pieced together, and the hope is that the new technique, which involves taking photographs of the fragments and using image recognition and other algorithms to match the language, spacing, and handwriting style of the text along with the shape of the fragment to other fragments could revolutionize not only the study of this trove documents, which has been split up into 67 different collections around the world since it’s discovery, but also how humanities disciplines study documents like these. They expect to make 12 billion comparisons of different fragments before the project is completed — they have already perform 2.8 billion. Among the documents, some dating from 950, was the discovery of letters by Moses Maimonides and that Cairene Jews were involved in the import of flax, linen, and sheep cheese from Sicily.” Read more of this story at Slashdot.

More here:
Computer Network Piecing Together a Jigsaw of Ancient Jewish Lore

Tesla Motors Repays $465M Government Loan 9 Years Early

Tesla Motors announced today it has completely repaid the $465 million loan from the U.S. Department of Energy the company received in 2010. The funds were generated by Tesla through a recent sale of their stock, worth close to a billion dollars. The stock price had risen sharply after the company reported its first profitable quarter (and the stock still sits roughly 50% higher than before their earnings release). Today’s payment of $451.8 million finished off both the loan’s principal and its interest, nine years before the final payment was due. Tesla CEO Elon Musk said, ‘I would like to thank the Department of Energy and the members of Congress and their staffs that worked hard to create the ATVM program, and particularly the American taxpayer from whom these funds originate. I hope we did you proud.’ Read more of this story at Slashdot.

More here:
Tesla Motors Repays $465M Government Loan 9 Years Early

Goodbye, Lotus 1-2-3

walterbyrd writes “In 2012, IBM started retiring the Lotus brand. Now 1-2-3, the core product that brought Lotus its fame, takes its turn on the chopping block. IBM stated, ‘Effective on the dates listed below, [June 11, 2013] IBM will withdraw from marketing part numbers from the following product release(s) licensed under the IBM International Program License Agreement:’ IBM Lotus 123 Millennium Edition V9.x, IBM Lotus SmartSuite 9.x V9.8.0, and Organizer V6.1.0. Further, IBM stated, ‘Customers will no longer be able to receive support for these offerings after September 30, 2014. No service extensions will be offered. There will be no replacement programs.'” Read more of this story at Slashdot.

View article:
Goodbye, Lotus 1-2-3

Computer scientists to FBI: don’t require all our devices to have backdoors for spies

In an urgent, important blog post, computer scientist and security expert Ed Felten lays out the case against rules requiring manufacturers to put wiretapping backdoors in their communications tools. Since the early 1990s, manufacturers of telephone switching equipment have had to follow a US law called CALEA that says that phone switches have to have a deliberate back-door that cops can use to secretly listen in on phone calls without having to physically attach anything to them. This has already been a huge security problem — through much of the 1990s, AT&T’s CALEA controls went through a Solaris machine that was thoroughly compromised by hackers, meaning that criminals could listen in on any call; during the 2005/6 Olympic bid, spies used the CALEA backdoors on the Greek phone company’s switches to listen in on the highest levels of government. But now, thanks to the widespread adoption of cryptographically secured messaging services, law enforcement is finding that its CALEA backdoors are of declining utility — it doesn’t matter if you can intercept someone else’s phone calls or network traffic if the data you’re captured is unbreakably scrambled. In response, the FBI has floated the idea of “CALEA II”: a mandate to put wiretapping capabilities in computers, phones, and software. As Felten points out, this is a terrible idea. If your phone is designed to secretly record you or stream video, location data, and messages to an adverse party, and to stop you from discovering that it’s doing this, it puts you at huge risk when that facility is hijacked by criminals. It doesn’t matter if you trust the government not to abuse this power (though, for the record, I don’t — especially since anything mandated by the US government would also be present in devices used in China, Belarus and Iran) — deliberately weakening device security makes you vulnerable to everyone, including the worst criminals: Our report argues that mandating a virtual wiretap port in endpoint systems is harmful. The port makes it easier for attackers to capture the very same data that law enforcement wants. Intruders want to capture everything that happens on a compromised computer. They will be happy to see a built-in tool for capturing and extracting large amounts of audio, video, and text traffic. Better yet (for the intruder), the capability will be stealthy by design, making it difficult for the user to tell that anything is amiss. Beyond this, the mandate would make it harder for users to understand, monitor, and fix their own systems—which is bad for security. If a system’s design is too simple or its operation too transparent or too easy to monitor, then wiretaps will be evident. So a wiretappability mandate will push providers toward complex, obfuscated designs that are harder to secure and raise the total cost of building and operating the system. Finally, our report argues that it will not be possible to block non-compliant implementations. Many of today’s communication tools are open source, and there is no way to hide a capability within an open source code base, nor to prevent people from simply removing or disabling an undesired feature. Even closed source systems are routinely modified by users—as with jailbreaking of phones—and users will find ways to disable features they don’t want. Criminals will want to disable these features. Ordinary users will also want to disable them, to mitigate their security risks. Felten’s remarks summarize a report [PDF] signed by 20 distinguished computer scientists criticizing the FBI’s proposal. It’s an important read — maybe the most important thing you’ll read all month. If you can’t trust your devices, you face enormous danger. CALEA II: Risks of wiretap modifications to endpoints        

Read more here:
Computer scientists to FBI: don’t require all our devices to have backdoors for spies

How Netflix Eats the Internet

pacopico writes “Every night, Netflix accounts for about one-third of the downstream Internet traffic in North America, dwarfing all of its major rivals combined. Bloomberg Businessweek has a story detailing the computer science behind the streaming site. It digs into Netflix’s heavy use of AWS and its open-source tools like Chaos Kong and Asgard, which the Obama administration apparently used during the campaign. Story seems to suggest that the TV networks will have an awful time mimicking what Netflix has done.” Read more of this story at Slashdot.

Read More:
How Netflix Eats the Internet

BT Begins Customer Tests of Carrier Grade NAT

judgecorp writes “BT Retail has started testing Carrier Grade NAT (CGNAT) with its customer. CGNAT is a controversial practice, in which IP addresses are shared between customers, limiting what customers can do on the open Internet. Although CGNAT goes against the Internet’s original end-to-end principles, ISPs say they are forced to use it because IPv4 addresses are running out, and IPv6 is not widely implemented. BT’s subsidiary PlusNet has already carried out CGNAT trials, and now BT is trying it on “Option 1″ customers who pay for low Internet usage.” Read more of this story at Slashdot.

Read the article:
BT Begins Customer Tests of Carrier Grade NAT