By samzenpus from Slashdot's it's-getting-hot-in-here department
writes A new study shows that the increase of atmospheric carbon dioxide that contributed to the end of the last ice age more than 10,000 years ago did not occur gradually but rather was characterized by three abrupt pulses. Scientists are not sure what caused these abrupt increases, during which carbon dioxide levels rose about 10 to 15 parts per million – or about 5 percent per episode – during a span of one to two centuries. It likely was a combination of factors, they say, including ocean circulation, changing wind patterns and terrestrial processes. The finding, published Oct. 30 in the journal Nature, casts new light on the mechanisms that take the Earth in and out of ice ages.
"We used to think that naturally occurring changes in carbon dioxide took place relatively slowly over the 10,000 years it took to move out of the last ice age," said lead author Shaun Marcott, who did the work as a postdoctoral researcher at Oregon State University and is now at the University of Wisconsin-Madison. "This abrupt, centennial-scale variability of CO2 appears to be a fundamental part of the global carbon cycle."
Previous research has hinted at the possibility that spikes in atmospheric carbon dioxide may have accelerated the last deglaciation, but that hypothesis had not been resolved, the researchers say. The key to the new finding is the analysis of an ice core from the West Antarctic that provided the scientists with an unprecedented glimpse into the past."Read Replies (0)
By timothy from Slashdot's is-there-a-market-for-non-discrimination? department
An anonymous reader writes John Oliver calls it "cable company f*ckery" and we've all suspected it happens. Now on Steven Levy's new Backchannel publication on Medium, Susan Crawford delivers decisive proof, expertly dissecting the Comcast-Netflix network congestion controversy. Her source material is a detailed traffic measurement report (.pdf) released this week by Google-backed M-Lab — the first of its kind — showing severe degradation of service at interconnection points between Comcast, Verizon and other monopoly "eyeball networks" and "transit networks" such as Cogent, which was contracted by Netflix to deliver its bits. The report shows that interconnection points give monopoly ISPs all the leverage they need to discriminate against companies like Netflix, which compete with them in video services, simply by refusing to relieve network congestion caused by external traffic requested by their very own ISP customers. And the effects victimize not only companies targeted but ALL incoming traffic from the affected transit network. The report proves the problem is not technical, but rather a result of business decisions. This is not technically a Net neutrality problem, but it creates the very same headaches for consumers, and unfair business advantages for ISPs. In an accompanying article, Crawford makes a compelling case for FCC intervention.Read Replies (0)
By timothy from Slashdot's cue-up-the-poorly-socialized-legions department
An anonymous reader writes Apple CEO Tim Cook has publicly come out as gay. While he never hid his sexuality from friends, family, and close co-workers, Cook decided it was time to make it publicly known in the hopes that the information will help others who don't feel comfortable to do so. He said, "I don't consider myself an activist, but I realize how much I've benefited from the sacrifice of others. So if hearing that the CEO of Apple is gay can help someone struggling to come to terms with who he or she is, or bring comfort to anyone who feels alone, or inspire people to insist on their equality, then it's worth the trade-off with my own privacy."
Cook added that while the U.S. has made progress in recent years toward marriage equality, there is still work to be done. "[T]here are laws on the books in a majority of states that allow employers to fire people based solely on their sexual orientation. There are many places where landlords can evict tenants for being gay, or where we can be barred from visiting sick partners and sharing in their legacies. Countless people, particularly kids, face fear and abuse every day because of their sexual orientation."Read Replies (0)
By timothy from Slashdot's you-haul department
A friend of mine who buys and sells used books, movies, etc. recently came purchased a box full of software on CD, including quite a few old Linux distributions, and asked me if I'd like them. The truth is, I would
like them, but I've already collected over the last two decades more than I should in the way of Linux distributions, on at least four kinds of media (starting with floppies made from a CD that accompanied a fat book on how to install some distribution or other -- very useful in the days of dialup). I've got some boxes (Debian Potato, and a few versions of Red Hat and Mandrake Linux), and an assortment of marketing knickknacks, T-shirts, posters, and books. I like these physical artifacts, and they're not dominating my life, but I'd prefer to actually give many of them to someplace where they'll be curated. (Or, if they should be tossed, tossed intelligently.) Can anyone point to a public collection of some kind that gathers physical objects associated with Free software and Open Source, and makes them available for others to examine? (I plan to give some hardware, like a pair of OLPC XO laptops, to the same Goodwill computer museum highlighted in this video
, but they probably don't want an IBM-branded radio in the shape of a penguin.)Read Replies (0)
By timothy from Slashdot's legitimacy-generally-is-too department
writes with a selection from The Intercept describing instructions for commercial spyware sold by Italian security firm Hacking Team. The manuals describe Hacking Team's software for government technicians and analysts, showing how it can activate cameras, exfiltrate emails, record Skype calls, log typing, and collect passwords on targeted devices. They also catalog a range of pre-bottled techniques for infecting those devices using wifi networks, USB sticks, streaming video, and email attachments to deliver viral installers. With a few clicks of a mouse, even a lightly trained technician can build a software agent that can infect and monitor a device, then upload captured data at unobtrusive times using a stealthy network of proxy servers, all without leaving a trace. That, at least, is what Hacking Team's manuals claim as the company tries to distinguish its offerings in the global marketplace for government hacking software.
(Here are the manuals themselves
.)Read Replies (0)