Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 18 submissions in the queue.
Breaking News

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2018-07-01 to 2018-12-31
Estimated Base Goal: $3000.00
Progress So Far:
Approximately: $23.67
0.8%

Covers transactions:
2018-07-01 00:00:00 ..
2018-07-06 10:04:11 UTC
(SPIDs: [942..943])
Last Update:
2018-07-14 12:58:04 UTC
--martyb


Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

posted by martyb on Friday June 29, @09:34AM   Printer-friendly
from the Fill-'er-up! dept.

[Update (06:00 EDT / 10:00 UTC): Launch was a success. Dragon module separated cleanly and is on route to the ISS.]

CRS-15 Mission Overview (PDF)

SpaceX is targeting Friday, June 29 for an instantaneous launch of its fifteenth Commercial Resupply Services mission (CRS-15) at 5:42 a.m. EDT, or 9:42 UTC, from Space Launch Complex 40 (SLC-40) at Cape Canaveral Air Force Station, Florida. Dragon will separate from Falcon 9's second stage about nine minutes and thirty seconds after liftoff and attach to the space station on Monday, July 2. An instantaneous backup launch opportunity is available on Sunday, July 1 at 4:54 a.m. EDT, or 8:54 UTC.

Both Falcon 9 and the Dragon spacecraft for the CRS-15 mission are flight-proven. Falcon 9's first stage previously supported the TESS mission in April 2018, and Dragon previously supported the CRS-9 mission in July 2016. SpaceX will not attempt to recover Falcon 9's first stage after launch.

Follow along on the YouTube Live Stream.

SpaceX will fly the Falcon 9 Block 4 for the last time on its June 29, 2018 launch of cargo to the ISS:

Because SpaceX has no plans to fly Friday's booster again, it will be expended into the ocean. However, the rocket's second stage will make a much longer "coast" in space before de-orbiting after four revolutions around Earth. This is likely another test of the second-stage engine's ability to fire after a longer period of dormancy in space.

CRS-15 will deliver 2,697 kg of cargo, including ECOSTRESS and other equipment and experiments:

The equipment launching to the space station inside the Dragon's trunk includes a spare Canadian-built latching end effector for the research lab's robotic arm, plus a 1,213-pound (550-kilogram) instrument developed by NASA's Jet Propulsion Laboratory to be mounted outside the station's Japanese Kibo lab module to measure the temperature of plants from space.

The cargo will include CIMON, a "robot crew member":

The robot's name is CIMON — for Crew Interactive Mobile Companion — and it looks a bit like a volleyball with a computer screen on one side. The screen displays a simplified cartoon face that the bot will use to interact with the humans on the ISS. And to maneuver around, CIMON is equipped with 14 internal fans that propel the white ball, by sucking in the station's air and expelling it to move in whatever direction it needs. That means CIMON can "float" throughout the station, zooming up to astronauts that call its name and nodding in response to questions.

Airbus developed CIMON for Germany's national space agency, and the goal is to see whether intelligent bots can cooperate with astronauts to simplify work life in space. CIMON's already been tested out on a parabolic flight — an airplane that flies a special trajectory to create brief moments of weightlessness. And CIMON has trained a few times on Earth with German astronaut Alexander Gerst, who is already on board the ISS. So the bot's microphones and cameras are specially tuned to recognize his voice and face. However, CIMON's makers say the bot's voice-controlled AI capabilities, provided by IBM, allow the companion to interact with any astronaut that calls its name.


Original Submission

posted by chromas on Thursday June 21, @04:01PM   Printer-friendly
from the what-color-is-his-parachute? dept.

Intel CEO, Brian Krzanich, has resigned because of a "a violation of Intel's non-fraternisation policy". The BBC reports:

Chipmaker Intel has announced that its chief executive, Brian Krzanich, is stepping down with immediate effect because of "a violation of Intel's non-fraternisation policy".

[...] Intel said an inquiry had revealed that Mr Krzanich had had a consensual relationship with an Intel employee, which was against company rules.

His successor has been named as Robert Swan, currently the company's chief financial officer.

The company said the relevant policy applied to all managers.

"Given the expectation that all employees will respect Intel's values and adhere to the company's code of conduct, the board has accepted Mr Krzanich's resignation."

The Register reports:

Intel chief exec Brian Krzanich has quit after his "consensual relationship" with an employee came to light.

Staff flings are frowned upon in US corporate tech world, and against Intel company policy. In a statement within the past hour, the chip maker said:

Intel was recently informed that Mr. Krzanich had a past consensual relationship with an Intel employee. An ongoing investigation by internal and external counsel has confirmed a violation of Intel's non-fraternization policy, which applies to all managers. Given the expectation that all employees will respect Intel's values and adhere to the company's code of conduct, the board has accepted Mr. Krzanich's resignation.

Krzanich – who has two daughters with wife Brandee – will be replaced by interim CEO Bob Swan, who is otherwise the chief financial officer and an exec veep.

"The board believes strongly in Intel's strategy and we are confident in Bob Swan's ability to lead the company as we conduct a robust search for our next CEO," said Intel chairman Andy Bryant in a statement.

Also at c|net and Intel.

How will this affect Intel's competitive efforts with respect to AMD, ARM, and Nvidia?


Original Submission

posted by takyon on Tuesday June 12, @12:12AM   Printer-friendly
from the launch-coded dept.

President Trump meets Kim Jong Un

President Trump and North Korea's Kim Jong Un will meet in just a few hours. Here's what to watch for and when, according to the White House schedule.

  • 8 p.m. ET (June 11) / 8 a.m. Singapore (June 12): President Trump departs Shangri-La Hotel en route to Capella Singapore, where the two leaders will meet.
  • 8:20 p.m. ET (June 11) / 8:20 a.m. Singapore (June 12): Trump arrives at Capella Singapore.
  • 9 p.m. ET (June 11) / 9 a.m. Singapore (June 12): President Trump and Kim Jong Un greet each other. This is the big moment. Cameras will be there to capture their expected handshake.
  • 9:15 p.m. ET (June 11) / 9:15 a.m. Singapore (June 12): President Trump and Kim Jong Un participate in a one-on-one bilateral meeting.
  • 10 p.m. ET (June 11) / 10 a.m. Singapore (June 12): President Trump and Kim Jong Un participate in an expanded bilateral meeting.
  • 11:30 p.m. ET (June 11) / 11:30 a.m. Singapore (June 12): President Trump and Kim Jong Un have a working lunch.
  • 4 a.m. ET (June 12) / 4 p.m. Singapore: President Trump is expected to speak with reporters.
  • 6:30 a.m. ET / 6:30 p.m. Singapore: President Trump departs Capella Singapore for Paya Lebar Air Base Singapore.
  • 7 a.m. ET / 7 p.m. Singapore: Trump departs Paya Lebar Air Base, Singapore, en route to Andersen Air Force Base, Guam. From there, he will travel on to the United States.

Kim Jong Un tours Singapore, takes selfie ahead of summit

Trump Kim: US says N Korea negotiations making quick progress

For All His Deals, Trump Has Never Faced an Adversary Like Kim Jong-un

Kim-Trump summit rife with opportunity for US


Original Submission

posted by janrinok on Tuesday May 29, @12:54PM   Printer-friendly
from the again dept.

A man has shot dead two police officers and a civilian in the eastern Belgian city of Liège.

The gunman took a female cleaner hostage at a school before being killed by police. Two other police officers were also injured.

The man's motive is not yet clear but the incident is being treated as terrorism.

Police sources quoted in local media said the man was heard shouting "Allahu Akbar" ("God is greatest" in Arabic).

Belgian broadcaster RTBF said the gunman was let out from prison on temporary release on Monday where he had been serving time on drug offenses. It said that he may have been radicalised while in jail.

The shooting unfolded late morning on Tuesday near a cafe in the city centre.

Update: 16:56 UTC

More recent reporting states:

https://edition.cnn.com/2018/05/29/europe/liege-shooting-intl/index.html

The incident occurred at around 10:30 a.m. when an assailant stabbed two policewomen from behind, before stealing their service weapons and using them on the officers, Liege Prosecutor Philippe Dulieu said at a news conference on Tuesday.

After killing the two officers, the attacker continued walking through the street and opened fire on a parked vehicle, fatally wounding the driver inside, Dulieu added.

https://news.sky.com/story/belgian-police-launch-terror-probe-after-shooting-of-police-and-bystander-11388883

The gunman also killed a 22-year-old male car passenger on the Boulevard d'Avory, before taking a female cleaner hostage at a nearby high school.

She was released when police shot dead the attacker, who has been named by local media as Belgian national Benjamin Herman.

See also, thanks to C0lo:


Original Submission

posted by takyon on Monday May 14, @07:55AM   Printer-friendly
from the pretty-grotesque-problem dept.

Ars Technica is reporting that there are critical PGP and S/MIME bugs which can reveal encrypted e-mails. Their advice is to uninstall the plugins, for the time being. More information will be released tomorrow (Tuesday at 07:00 UTC, 3:00 AM EDT, midnight PDT).

Little is publicly known about the flaws at the moment. Both Schinzel and the EFF blog post said they will be disclosed late Monday night California time in a paper written by a team of European security researchers. Schinzel's Twitter messages used the hashtag #efail, a possible indication of the name the researchers have given to their exploit.

The EFF also published a warning, Attention PGP Users: New Vulnerabilities Require You To Take Action Now:

A group of European security researchers have released a warning about a set of vulnerabilities affecting users of PGP and S/MIME. EFF has been in communication with the research team, and can confirm that these vulnerabilities pose an immediate risk to those using these tools for email communication, including the potential exposure of the contents of past messages.

The full details will be published in a paper on Tuesday at 07:00 AM UTC (3:00 AM Eastern, midnight Pacific). In order to reduce the short-term risk, we and the researchers have agreed to warn the wider PGP user community in advance of its full publication.

The EFF also gives additional advice on disabling PGP in Thunderbird with Enigmail as well as other mail and mail-like clients.

takyon: The embargo is broken and the full details, including the paper (PDF), have been published.


Original Submission #1Original Submission #2

posted by takyon on Friday April 27, @05:30AM   Printer-friendly
from the DMZ-dance dept.

North Korea's Kim Jong-un crosses into South Korea

Kim Jong-un has become the first North Korean leader to set foot in South Korea by crossing the military line that has divided the peninsula since the end of the Korean War in 1953. In a moment rich with symbolism and pomp, South Korean leader Moon Jae-in and Mr Kim shook hands at the border. Mr Kim said he hoped for "frank" discussion in a warm opening exchange.

Just months ago North Korean rhetoric was warlike, but now they may discuss a peace treaty and nuclear weapons. Much of what the summit will focus on has been agreed in advance, but many analysts remain deeply sceptical about the North's apparent enthusiasm for engagement.

Also at The Guardian (live) and Reuters:

During their private meeting, Kim told Moon he came to the summit to end the history of conflict and joked he was sorry for keeping Moon up with his late night missile tests, a South Korean official said.

North Korea's nuclear site collapse may be reason Kim Jong Un ceased bomb tests, scientists say

North Korea's nuclear test site has collapsed after the region sustained damage from five nuclear blast trials, Chinese scientists said Wednesday — leading many to believe it may be the reason why Kim Jong Un suddenly announced the rogue regime would freeze its nuclear and missile tests.


Original Submission #1Original Submission #2

posted by martyb on Saturday April 14, @02:09AM   Printer-friendly

Submitted via IRC for chromas

President Trump announced Friday night that the U.S. and its allies had launched attacks on Syria in response to an alleged chemical weapons attack last week by President Bashar Assad's regime.

In televised remarks from the White House, Trump said the attacks were underway, and that Great Britain and France were also taking part.

The president did not provide details, but U.S. warships in the Mediterranean Sea, armed with cruise missiles, were in position to strike. British and French forces were also in place.

[...] The president said the U.S. prepared to sustain effort until the Syrian regime stops using chemical weapons.

[...] In the days leading up to the U.S. attack, Russia had warned that it would defend its troops in Syria. This has raised fears of a possible direct clash of U.S. and Russian forces.

Source: https://www.npr.org/sections/thetwo-way/2018/04/13/601794830/u-s-launches-attacks-on-syria

Also at Bloomberg and The Guardian


Original Submission

posted by chromas on Tuesday April 03, @09:47PM   Printer-friendly
from the oh-FFS-another dept.

Submitted via IRC for fyngyrz

From NPR:

Police are responding to an active shooter at the headquarters of YouTube. A hospital has received "several" patients from the incident, a spokesman says.

Local TV news reports show pictures of people evacuating a building with their hands over their heads. Each person was being frisked by a police officer, apparently to make sure that they pose no threat.

Local law enforcement officials have not issued any information.

From Reuters:

Police in San Bruno warned people in a Twitter message to stay away from the address where YouTube, owned by Alphabet Inc's Google, is based.

"We are responding to an active shooter. Please stay away from Cherry Ave & Bay Hill Drive," San Bruno police said on Twitter.

Lisa Kim, a spokeswoman for Stanford Health Care, said the hospital was receiving between four to five patients from the shooting incident at the YouTube offices.


Original Submission

posted by takyon on Wednesday March 21, @10:55AM   Printer-friendly
from the went-out dept.
Austin bomb suspect blows self up as SWAT team approached

The suspect in a spate of bombings that terrorized residents of Austin, Texas, died after detonating an explosive inside his vehicle as a SWAT team approached to apprehend him on the side of a highway, officials said.

Early Wednesday, authorities tracked the suspect — a 24-year-old white man — to a hotel in Round Rock, a city in the Austin metropolitan area, Austin Police Chief Brian Manley told a news conference early Wednesday.

They tracked his vehicle until it pulled over on Interstate 35 and the suspect "detonated a bomb inside the vehicle, knocking one of our SWAT officers back and one of our officers fired on the vehicle as well," Manley said.

Austin serial bombings.

Also at CNN, BBC, and Bloomberg.

Previously: Two Injured in Fourth Package Bombing Incident this Month in Austin, Texas

posted by martyb on Tuesday March 13, @10:57PM   Printer-friendly
from the or-else? dept.

The UK says that a Soviet-developed Novichok nerve agent was used against Sergei Skripal, his daughter, and bystanders, and has given Russia "until midnight tonight" to explain how it came to be used:

British Foreign Secretary Boris Johnson said Tuesday that Russia has "until midnight tonight" to explain how a lethal Novichok nerve agent that was developed in Russia came to be used on U.K. soil. Johnson said Britain is preparing to take "commensurate but robust" action.

Reiterating British Prime Minister Theresa May's statement that it was "highly likely" Russia was to blame for the poisoning of former Russian spy Sergei Skripal and his daughter, Yulia, Johnson said, "the use of this nerve agent would represent the first use of nerve agents on the continent of Europe since the Second World War."

Meanwhile, police are probing the death of a Russian exile living in London:

Nikolai Glushkov, a Russian exile who was a close friend of a noted critic of President Vladimir Putin, has died from an "unexplained" cause in London, police say. The Metropolitan Police says that its counter-terrorism unit is handling the case "because of associations that the man is believed to have had."

Glushkov, 68, was a close friend of former Russian oligarch Boris Berezovsky, a prominent critic of the Kremlin who was found dead in 2013. At the time, an inquiry found he had hanged himself — but Glushkov publicly disputed the idea that his friend and former business ally would have killed himself.

As British media began reporting Glushkov's death, the police issued a statement saying, "An investigation is underway following the death of a man in his 60s in Kingston borough."

Previously: Former Russian Spy Exposed to "Unknown Substance" in Salisbury, England
Use of Nerve Agent Confirmed in Skripal Assassination Attempt


Original Submission

posted by martyb on Friday March 02, @12:04AM   Printer-friendly
from the Danger-Will-Robinson!-Danger! dept.

[Ed note: After this story was submitted, it became known that there was a remote code execution (RCE) vulnerability on the Trustico web site which allowed malicious users to run arbitrary code as root on the server. Story at Ars Technica: Trustico website goes dark after someone drops critical flaw on Twitter. Link to the tweet. As of the time of this writing, the Trustico web site is unavailable. --martyb]

23,000 HTTPS certs will be axed in next 24 hours after private keys leak

Customers of HTTPS certificate reseller Trustico are reeling after being told their website security certs – as many as 23,000 – will be rendered useless within the next 24 hours.

This is allegedly due to a security blunder in which the private keys for said certificates ended up in an email sent by Trustico. Those keys are supposed to be secret, and only held by the cert owners, and certainly not to be disclosed in messages. In the wrong hands, they can be used by malicious websites to masquerade as legit operations.

Unless the affected certificates are replaced in time, visitors to websites using Trustico-sold HTTPS certs will be turned away by their browsers, due to the digital certificates being revoked.

The whole situation is a mess, and possibly the result of a turf war. Here's what we've managed to ascertain.

What is Trustico?

Trustico, based in Croydon, UK, touted SSL/TLS certificates, which are used by websites to encrypt and secure their connections. It resold certs from the Symantec brand umbrella: Symantec, GeoTrust, Thawte, and RapidSSL. This umbrella is now owned and operated by DigiCert.

If you wanted to buy, say, a RapidSSL-issued certificate, you could do so via Trustico. The HTTPS cert ultimately leads back, along a chain of trust, to DigiCert, a root certificate authority trusted by web browsers and other software. In turn, a website presenting the Trustico-sold cert is trusted, its traffic secured using encryption, and the reassuring green padlock is displayed in visitors' browsers.

Why are the certificates being revoked?

According to DigiCert's chief product officer Jeremy Rowley earlier today, Trustico told DigiCert in early February that its resold certificates had been in some way "compromised," and that the certs needed to be mass revoked as a result.

DigiCert staff, we're told, asked Trustico for more information on this security mishap. The reseller replied it had a copy of the private keys, which is usually grounds for revocation, and thus insisted that DigiCert revoke the certificates.

When pressed for evidence, Trustico on Wednesday simply emailed DigiCert 23,000 certificates' private keys as proof it held this information, it is claimed. This forced DigiCert's hand: under the rulebook of standards set by the elders of the certificate security and browser worlds, the Trustico-sold certificates had to be revoked as a precaution within 24 hours. Specifically, the ones with their private keys in the email will be canceled.


Original Submission

posted by takyon on Wednesday February 14, @05:05PM   Printer-friendly
from the blame-Snowden dept.

There has been a "security incident" at the entrance to the NSA's headquarters in Fort Meade, Maryland:

Several people have been injured and a suspect was taken into custody after a car crashed outside the US National Security Agency's headquarters.

Gunfire rang out after the black SUV approached the facility in Fort Meade, Maryland, without authorisation.

An NSA spokesman said it was unclear if the shots had been fired by law enforcement officers or the suspect, adding that the scene was now secure.

Also at Reuters, CBS, The Hill, and Vice.


Original Submission

posted by martyb on Tuesday February 06, @09:10PM   Printer-friendly
from the it-IS-rocket-science dept.

Update: Launch seems to have been successful. The two side boosters landed nearly simultaneously. Footage from the drone ship was cut off. The car made it into space; but the third stage will need to coast through the Van Allen radiation belts for around six hours before it makes the final burn for trans-Mars injection.

Update 2: The middle booster of SpaceX's Falcon Heavy rocket failed to land on its drone ship
Falcon Heavy Post-Launch Media Briefing - Megathread

SpaceX's newest rocket, the Falcon Heavy, is set to be launched at around 1:30 PM EST (6:30 PM UTC) today. The launch window extends to 4:00 PM EST (9:00 PM UTC).

SpaceX will attempt to recover all three boosters during the launch. The two previously-flown side boosters will attempt to land nearly simultaneously at Cape Canaveral Air Force Station's Landing Zones 1 and 2. The center core will attempt to land on a drone barge hundreds of miles off the coast of Florida.

The dummy payload for the Falcon Heavy is Elon Musk's personal 2008 Tesla Roadster. It is carrying a mannequin wearing SpaceX's space suit flight suit that will be used when the company begins to send astronauts to the International Space Station. The car will be launched into a heliocentric orbit that will bring it close to Mars (and back near Earth) periodically, and is equipped with three cameras. Its stereo system will be playing David Bowie's Space Oddity.

If the launch is successful, the Falcon Heavy could be flown within the next 3 to 6 months for a customer such as the U.S. Air Force, Arabsat, Inmarsat, or ViaSat.

Falcon Heavy will be capable of launching 63,800 kg to low-Earth orbit (LEO), 26,700 kg to geosynchronous transfer orbit (GTO), 16,800 kg to Mars, or 3,500 kg to Pluto (New Horizons was 478 kg). It will supplant the Delta IV Heavy, which is capable of launching 28,790 kg to LEO or 14,220 kg to GTO. Space Launch System Block 1 will be capable of launching 70,000 kg to LEO (Block 1B: 105,000 kg to LEO, Block 2: 130,000 kg to LEO).

Musk has suggested that an additional two side boosters could be added to Falcon Heavy (perpendicularly?) to make a "Falcon Super Heavy" with even more thrust. This may not happen if SpaceX decides to focus on the BFR instead, which as planned would be able to launch 150,000 kg to LEO while being fully reusable and potentially cheaper than the Falcon 9 (or capable of launching 250,000 kg to LEO in expendable mode).

The webcast can be seen here or directly on YouTube.


Original Submission

posted by cmn32480 on Monday January 22, @09:27PM   Printer-friendly
from the damned-if-you-do-and-damned-if-you-don't dept.

Computerworld has just posted a story warning that you should immediately hold off installing any of Intel's Meltdown/Spectre microcode fixes.

From Belay That Order: Intel Says you Should NOT Install its Meltdown Firmware Fixes:

The warning, which encompasses just about every Intel processor out there, from all PC manufacturers, takes effect immediately. And there's no indication when it will get fixed.

You know how you're supposed to flash the BIOS or update the UEFI on all of your Intel machines, to guard against Meltdown/Spectre? Well, belay that order, private! Intel just announced that you need to hold off on all of its new patches. No, you can't uninstall them. To use the technical term, if you ran out and applied your Intel PC's latest firmware patch, you're hosed.

In what appears to be a catastrophic curtain call to the "oops" moment that I discussed ten days ago, it now seems that the bright, new firmware versions — which Intel has had six months to patch — have a nasty habit of causing "higher system reboots."

According to executive vice president Navin Shenoy, on the Intel Newsroom site, the current advice is:

We recommend that OEMs, cloud service providers, system manufacturers, software vendors and end users stop deployment of current versions, as they may introduce higher than expected reboots and other unpredictable system behavior.

And that covers just about everybody in the sentient non-ARM universe.

While the affected products site[*] doesn't list individual chips, the breadth of the recall is breathtaking — second-, third-, fourth-, fifth-, sixth-, seventh- and eighth-generation Core processors, Xeon, Atom, and lesser Core i3, i5 and i7 processors — they're all in the bin.

From Intel Root Cause of Reboot Issue Identified; Updated Guidance for Customers and Partners:

As we start the week, I want to provide an update on the reboot issues we reported Jan. 11. We have now identified the root cause for Broadwell and Haswell platforms, and made good progress in developing a solution to address it. Over the weekend, we began rolling out an early version of the updated solution to industry partners for testing, and we will make a final release available once that testing has been completed.

Based on this, we are updating our guidance for customers and partners:

  • We recommend that OEMs, cloud service providers, system manufacturers, software vendors and end users stop deployment of current versions, as they may introduce higher than expected reboots and other unpredictable system behavior. For the full list of platforms, see the Intel.com Security Center site.
  • We ask that our industry partners focus efforts on testing early versions of the updated solution so we can accelerate its release. We expect to share more details on timing later this week.
  • We continue to urge all customers to vigilantly maintain security best practice and for consumers to keep systems up-to-date.

[*] Intel's updated security advisory lists the affected processors:

The following Intel-based platforms are impacted by this issue. Intel may modify this list at a later time. Please check with your system vendor or equipment manufacturer for more information regarding updates for your system.

  • Intel® Core™ i3 processor (45nm and 32nm)
  • Intel® Core™ i5 processor (45nm and 32nm)
  • Intel® Core™ i7 processor (45nm and 32nm)
  • Intel® Core™ M processor family (45nm and 32nm)
  • 2nd generation Intel® Core™ processors
  • 3rd generation Intel® Core™ processors
  • 4th generation Intel® Core™ processors
  • 5th generation Intel® Core™ processors
  • 6th generation Intel® Core™ processors
  • 7th generation Intel® Core™ processors
  • 8th generation Intel® Core™ processors
  • Intel® Core™ X-series Processor Family for Intel® X99 platforms
  • Intel® Core™ X-series Processor Family for Intel® X299 platforms
  • Intel® Xeon® processor 3400 series
  • Intel® Xeon® processor 3600 series
  • Intel® Xeon® processor 5500 series
  • Intel® Xeon® processor 5600 series
  • Intel® Xeon® processor 6500 series
  • Intel® Xeon® processor 7500 series
  • Intel® Xeon® Processor E3 Family
  • Intel® Xeon® Processor E3 v2 Family
  • Intel® Xeon® Processor E3 v3 Family
  • Intel® Xeon® Processor E3 v4 Family
  • Intel® Xeon® Processor E3 v5 Family
  • Intel® Xeon® Processor E3 v6 Family
  • Intel® Xeon® Processor E5 Family
  • Intel® Xeon® Processor E5 v2 Family
  • Intel® Xeon® Processor E5 v3 Family
  • Intel® Xeon® Processor E5 v4 Family
  • Intel® Xeon® Processor E7 Family
  • Intel® Xeon® Processor E7 v2 Family
  • Intel® Xeon® Processor E7 v3 Family
  • Intel® Xeon® Processor E7 v4 Family
  • Intel® Xeon® Processor Scalable Family
  • Intel® Xeon Phi™ Processor 3200, 5200, 7200 Series
  • Intel® Atom™ Processor C Series
  • Intel® Atom™ Processor E Series
  • Intel® Atom™ Processor A Series
  • Intel® Atom™ Processor x3 Series
  • Intel® Atom™ Processor Z Series
  • Intel® Celeron® Processor J Series
  • Intel® Celeron® Processor N Series
  • Intel® Pentium® Processor J Series
  • Intel® Pentium® Processor N Series

Original Submission

posted by takyon on Saturday January 20, @05:05AM   Printer-friendly
from the limited-government dept.

After 10 PM EST on Friday, The U.S. Senate rejected a deal that would fund the U.S. government for another month:

Only five Democrats voted to advance the bill — Sens. Joe Manchin (W.Va.), Joe Donnelly (Ind.), Heidi Heitkamp (N.D.) and Claire McCaskill (Mo.), who are all up for reelection this year in states carried by President Trump in 2016 election, and newly-elected Sen. Doug Jones (D-Ala.).

Republicans were also not united, as Sens. Rand Paul (Ky.), Lindsey Graham (S.C.), Mike Lee (Utah) and Jeff Flake (Ariz.) also voted against advancing the legislation. Sen. John McCain (R-Ariz.), who is battling brain cancer, was absent.

The procedural vote remained open late Friday, though it needed 60 votes to pass and was well short of that number with 48 senators voting against it.

Senate Majority Leader Mitch McConnell and Senate Minority Leader Charles Schumer continued to negotiate after the vote opened (archive), but no deal has been reached yet. As of midnight (5 minutes before this story went live), the government shutdown was in effect.

At Wikipedia: Deferred Action for Childhood Arrivals (DACA) and Children's Health Insurance Program (CHIP). Government shutdowns in the United States.