By samzenpus from Slashdot's best-of-the-best department
writes The hard drive market has become a lot less sexy in the past few years thanks to SSDs. What we used to consider "fast" for a hard drive is relatively slow compared to even the cheapest of today's solid state drives. But there are two areas where hard drives still rule the roost, and that's overall capacity and cost per gigabyte. Since most of us still need a hard drive for bulk storage, the question naturally becomes, "how big of a drive do you need?" For a while, 4TB drives were the top end of what was available in the market but recently Seagate, HGST, and Western Digital announced breakthroughs in areal density and other technologies, that enabled the advent of the 6 Terabyte hard drive. This round-up looks at three offerings in the market currently, with a WD Red 6TB drive, WD Green and a Seagate 6TB Enterprise class model. Though the WD drives only sport a 5400RPM spindle speed, due to their increased areal density of 1TB platters, they're still able to put up respectable performance. Though the Seagate Enterprise Capacity 6TB (also known as the Constellation ES series) drive offers the best performance at 7200 RPM, it comes at nearly a $200 price premium. Still, at anywhere from .04 to .07 per GiB, you can't beat the bulk storage value of these new high capacity 6TB HDDs.Read Replies (0)
By timothy from Slashdot's sense-of-restraint-and-decorum department
writes The New York Times Sunday Review has an interesting article on the astronomical night life when viewed from Sao Paulo, Brazil, featuring a treasure trove not visible to astronomers in the Northern Hemisphere: "Yet the Southern Hemisphere claims the three brightest stars of the night sky: Sirius, Canopus and Alpha Centauri. Canopus belongs to the Carina constellation, notorious for two things: the Carina Nebula, four times as large and even brighter than the famous Orion Nebula, and the star system Eta Carinae, which is expected to burst as a supernova or hypernova sometime in the next thousand years. (A scientist told the BBC that the explosion would be so bright that you would see it during the day, and you could even read a book by its light at night.) Alpha Centauri and Beta Centauri, the 11th-brightest star, are called "The Pointers," as they form a line in the sky to the constellation Crux (the Southern Cross). Crux is the smallest of all 88 constellations but one of the most distinctive. It is visible at practically any time of the year in all of the Southern Hemisphere."Read Replies (0)
By timothy from Slashdot's keeping-you-well-under-surveillance department
Der Spiegel has published today an excellent summary of what some of Edward Snowden's revelations show about the difficulty (or, generally, ease) with which the NSA and collaborating intelligence services can track, decrypt, and correlate different means of online communication
. An interesting slice: The NSA and its allies routinely intercept [HTTPS] connections -- by the millions. According to an NSA document, the agency intended to crack 10 million intercepted https connections a day by late 2012. The intelligence services are particularly interested in the moment when a user types his or her password. By the end of 2012, the system was supposed to be able to "detect the presence of at least 100 password based encryption applications" in each instance some 20,000 times a month.
For its part, Britain's GCHQ collects information about encryption using the TLS and SSL protocols -- the protocols https connections are encrypted with -- in a database called "FLYING PIG." The British spies produce weekly "trends reports" to catalog which services use the most SSL connections and save details about those connections. Sites like Facebook, Twitter, Hotmail, Yahoo and Apple's iCloud service top the charts, and the number of catalogued SSL connections for one week is in the many billions -- for the top 40 sites alone. ...
The NSA also has a program with which it claims it can sometimes decrypt the Secure Shell protocol (SSH). This is typically used by systems administrators to log into employees' computers remotely, largely for use in the infrastructure of businesses, core Internet routers and other similarly important systems. The NSA combines the data collected in this manner with other information to leverage access to important systems of interest.Read Replies (0)