Madwand writes "The NetBSD Project is pleased to announce NetBSD 6.1, the first feature update of the NetBSD 6 release branch. It represents a selected subset of fixes deemed important for security or stability reasons, as well as new features and enhancements. NetBSD is a free, fast, secure, and highly portable Unix-like Open Source operating system. It is available for a wide range of platforms, from large-scale servers and powerful desktop systems to handheld and embedded devices. Its clean design and advanced features make it excellent for use in both production and research environments, and the source code is freely available under a business-friendly license. NetBSD is developed and supported by a large and vibrant international community. Many applications are readily available through pkgsrc, the NetBSD Packages Collection."
SlashBI: Your dashboard for the latest in business-intelligence news and analysis.
New submitter GoJays writes "An 18-year-old from Saratoga, California has won an international science fair for creating an energy storage device that can be fully juiced in 20 to 30 seconds. The fast-charging device is a so-called supercapacitor, a gizmo that can pack a lot of energy into a tiny space, charges quickly and holds its charge for a long time. What's more, it can last for 10,000 charge-recharge cycles, compared with 1,000 cycles for conventional rechargeable batteries, according to the inventor Eesha Khare." This one in particular has been used so far only to power an LED, rather than a phone or laptop, but I hope in a few years near-instant charging of portable electronics will be the norm as supercapacitors grow more common.
hypnosec writes with report of the possible theft of up to 22 million user IDs revealed by Yahoo! Japan. That scale is massive, but, he writes, "According to Yahoo, the information that was stolen didn't have passwords or any other information that would allow unauthorized users to carry out user identity verification." A story at the Japan Times adds a bit more detail.
An anonymous reader writes "Having entered my personal details (full real name, home address) to websites with an 'https://' prefix in order to purchase goods, I am still being sent emails from companies (or their agents) which include, in plain text, those same details I have entered over a secure connection. These are often companies which are very keen to tell you how much they value your privacy and how they will not pass your details on to third parties. What recourse does one have to tell them to desist from such behaviour whilst still doing business with them if their products are otherwise desirable? I email the relevant IT team as a matter of course to tell them it's not appropriate (mostly to no avail), but is there any legislation — in any territory — which addresses this?"
Nerval's Lobster writes that a survey from the Uptime Institute "suggests something it calls 'green fatigue' is setting in when it comes to making data centers greener. 'Green fatigue' is exactly as it sounds: managers are getting tired of the increasingly difficult race to chop their PUE, or Power Usage Effectiveness. The PUE is a measure of a data center's efficiency. The lower the PUE, the better — and Microsoft and Google, with nearly limitless resources, have set the bar so high (or low, depending on your perspective) that it's making less-capitalized firms frustrated. Just a few years ago, the Uptime Institute estimated that the average PUE of a data center was around 2.4, which meant for every dollar of electricity to power a data center, $1.4 dollars were spent to cool it. That dropped to 1.8 recently, an improvement to be sure. But then you have companies such as Google and Microsoft building data centers next to rivers for cheap hydroelectric power in remote parts of the Pacific Northwest and reporting insanely low PUEs (below 1.1 in some cases). The Institute latest survey of data center operators shows only 50 percent of respondents in North America said they considered energy efficiency to be very important to their companies, down from 52 percent last year and 58 percent in 2011."
An anonymous reader writes "For years, Bell Mobility customers in northern Canada were charged 75 cents a month for 911 emergency service. The problem is that cellphone users outside Whitehorse, Yukon, don't have access to 911 service. The Supreme Court of the Northwest Territories ruled against Bell this week, following a class action lawsuit which challenged the phantom cellphone 911 billings. Subject to a possible final appeal to the Supreme Court of Canada, Bell will likely owe 30,000 northern cellphone subscribers some bucks."
theodp writes "The last thing Wired's Mat Honan remembered before awaking on the self-driving boat that dropped him on the island was sitting through a four-hour Google I/O keynote in Moscone Center and hearing Google CEO Larry Page promote a vision of a utopia where society could be free to innovate and experiment, unencumbered by government regulations or social norms. 'Welcome to Google Island,' a naked-save-for-a-pair-of-eyeglasses Larry Page tells Honan. 'As soon as you hit Google's territorial waters, you came under our jurisdiction, our terms of service. Our laws — or lack thereof — apply here. By boarding our self-driving boat you granted us the right to all feedback you provide during your journey. This includes the chemical composition of your sweat. Remember when I said at I/O that maybe we should set aside some small part of the world where people could experiment freely and examine the effects? I wasn't speaking theoretically. This place exists. We built it.'"
puddingebola writes with an excerpt from the New York Times: "The Web site and several Twitter accounts belonging to The Financial Times were hacked on Friday by the Syrian Electronic Army in a continuing campaign that has aimed at an array of media outlets ranging from The Associated Press to the parody site The Onion, according to a claim by the so-called army. The Syrian Electronic Army said it seized control of several F.T. Twitter accounts and amended a number of the site's blog posts with the headline 'Hacked by Syrian Electronic Army.' Hackers used their access to the F.T.'s Twitter feed to post messages, including one that said, 'Syrian Electronic Army Was Here,' and another that linked to a YouTube video of an execution. Both messages were quickly removed.'"
mikejuk writes "The new Arduino robot looks a bit like a robot vacuum cleaner, but it has a lot more going for it and it certainly doesn't suck — well not unless you add an air pump to it. As always, the Arduino Robot is completely open source and comes as an easy to assemble kit involving no soldering, just some plugging in of components. It consists of two circular boards, 19cm in diameter, each with its own Arduino controller. They fit together to create a stack about 10cm tall. The bottom board has two wheels and motors which allow it to move in any direction. The top board contains lots of sensors and a central display. The two communicate via a serial connection. There is also a lot of space for expansion. There is a new library which can be downloaded to help write programs for this fairly sophisticated robot. There is only one big problem with the Arduino robot — you can't buy one at the moment. If you really can't wait, until early July when they should start shipping from the Arduino shop and from distributors, then you will have to get to the Maker Faire San Mateo (May 17-19) where they are being demonstrated and sold."
From an article at the Houston Chronicle (not The Onion) comes a report of concern to anyone in a warm climate with, well, electronics. From the article: "According to researchers at The University of Texas at Austin, invasive 'crazy ants' are slowly displacing fire ants in the southeastern United States. These 'Tawny Crazy Ants' have a peculiar predilection toward electronics as well. 'They nest in electronics and create short circuits, as they create a contact bridge between two points when they get electrocuted they release an alarm pheromone,' says UT research assistant Edward LeBrun. 'The other ants are attracted to the chemicals that other ants give off,' he adds. At this point, more ants arrive and create a larger nest." The L.A. Times also has a report, which says "Thus far, the crazy ants are not falling for the traditional poisons used to eliminate fire ant mounds. And when local mounds are destroyed manually, they are quickly regenerated. 'They don't sting like fire ants do, but aside from that they are much bigger pests,' LeBrun said. 'There are videos on YouTube of people sweeping out dustpans full of these ants from their bathroom. You have to call pest control operators every three or four months just to keep the infestation under control. It's very expensive.'"
MojoKid writes "In an effort to coax developers to begin taking Atom seriously as an Android platform, Intel has just released a complete suite of tools that should help ease them into things — especially since it can be used for ARM development as well. It's called Beacon Mountain, named after the highest peak outside of Beacon, New York. As you'd expect, Beacon Mountain supports Jelly Bean (4.2) development, and with this suite, you're provided with a collection of important Intel tools: Hardware Accelerated Execution Manager, Integrated Performance Primitives, Graphics and System Performance Analyzers, Threaded Building Blocks and Software Manager. In addition, Android SDK and NDK, Eclipse and Cygwin third-party tools are included to complete the package."
An anonymous reader writes "In a decision that's almost certainly going to result in this issue heading up to the Supreme Court, the Federal 1st Circuit Court of Appeals [Friday] ruled that police can't search your phone when they arrest you without a warrant. That's contrary to most courts' previous findings in these kinds of cases where judges have allowed warrantless searches through cell phones." (But in line with the recently mentioned decision in Florida, and seemingly with common sense.)
leathered writes "The BBC reports that some customers of UK retailer Marks and Spencer have reported that the store's contactless payment terminals have debited their cards despite being in their bags or pockets, sometimes paying twice when they have used another payment method. The cards are supposed to work only when the card comes within 4cm of the terminal. Customers of fast-food chain Pret a Manger have been reporting similar problems, and in both cases cited the customers weren't even aware they had been issued with NFC-enabled cards by their bank."
Techmeology writes "In response to declining utility of CALEA mandated wiretapping backdoors due to more widespread use of cryptography, the FBI is considering a revamped version that would mandate wiretapping facilities in end users' computers and software. Critics have argued that this would be bad for security (PDF), as such systems must be more complex and thus harder to secure. CALEA has also enabled criminals to wiretap conversations by hacking the infrastructure used by the authorities. I wonder how this could ever be implemented in FOSS."