Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
- CMS undertook the development of Healthcare.gov and its related systems without effective planning or oversight practices...
- [The task] was a complex effort with compressed time frames. To be expedient, CMS issued task orders ... when key technical requirements were unknown...
- CMS identified major performance issues ... but took only limited steps to hold the contractor accountable.
- CMS awarded a new contract to another firm [and the new contract's cost has doubled] due to changes such as new requirements and other enhancements...
In addition, Hamas has automated its rocket firing system using networked, cloud-based launching software provided by Qatar which can set off a rocket from any distance, and set them to go off at a specific time, using timers. "Anyone who thinks they have dozens of people sitting next to launchers firing rockets each time there is a barrage is mistaken," said Aviad Dadon, a senior cyber-security adviser at several Israeli government ministries. While Doha is allowing Hamas to use its technology to fight Israel, it's their own cyber-security the leaders of Qatar are worried about. For the Qataris, the war between Israel and Hamas is a proving ground to see how their investments in cyber systems have paid of — Qatar is very worried that one of its Gulf rivals — specifically Saudi Arabia — will use technology to attack it, and Qatar spends a great deal of money each year on shoring up its cyber-technology.
Certainly there are a number of well-known popular venues which offer a stage for spies to broadcast their messages from while simultaneously claiming to "cultivate conversations among all members of the security community, both public and private." This year, for instance, Black Hat USA will host Dan Greer (the CISO of In-Q-Tel) as a keynote speaker.
But after all of the lies and subterfuge is it even constructive to give voice to the talking points of intelligence officials? Or are they just muddying the water? As one observer put it, "high-profile members of the intelligence community like Cofer Black, Shawn Henry, Keith Alexander, and Dan Greer are positioned front and center in keynote slots, as if they were glamorous Hollywood celebrities. While those who value their civil liberties might opine that they should more aptly be treated like pariahs."
Today's Silicon Valley is still exceedingly liberal on social issues. But it seems more skeptical about taxes and business regulation than at any point in its recent history. Part of this is due to the rise of companies like Uber and Tesla Motors, blazing-hot start-ups that have been opposed at every turn by protectionist regulators and trade unions, in confrontations that are being used by small-government conservatives as case studies in government control run amok.
The crucial part of the short piece of legislation states that the resources mined from an asteroid would be the property of the entity undertaking the operation. This language gets around the provision of the Outer Space Treaty that says states are forbidden to establish national sovereignty over celestial bodies, which would be a prerequisite to the United States allowing a private entity to own an asteroid. It rather grants mineral rights to the asteroid, something the treaty does not mention. There is no enforcement mechanism in the event of a dispute with another country, however."
Artificial islands could help China anchor its claim to waters that host some of the world's busiest shipping lanes. The South China Sea may hold as much as 11 billion barrels of oil and 190 trillion cubic feet of natural gas, according to a 2013 report by the U.S. Energy Information Administration. China has considered the Spratlys—which it calls Nansha—part of its territory since the 1940s and on occasion has used its military might to enforce its claim. In 1988 a Chinese naval attack at Johnson South Reef, in the northern portion of the archipelago, killed 64 Vietnamese border guards.