Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Space

First Organic Molecules Found on Alien World 146

Galactic_grub writes "The detection of planet HD 189733b is in some ways just another small victory for extra-solar planetary science. It is too hot for there to be anything 'alive'. Just the same, somewhere on the planet are trace amounts of the gas methane. The fact that the element was detected at all offers hope for understanding future discoveries of Earth-like worlds, says NewScientistSpace. Researchers from Caltech and University College London used the Hubble Space Telescope to peer at the planet and examined spectral signature of starlight filtered by the planet's atmosphere, to identify different chemicals. 'The authors suggest that some ill-understood chemical process might be responsible, either concentrating the methane in cooler parts of the atmosphere, or generating extra methane directly. Alternatively, the methane might simply mean that the planet happens to be very rich in carbon.'"
Supercomputing

One Computer to Rule Them All 288

An anonymous reader writes "IBM has published a research paper describing an initiative called Project Kittyhawk, aimed at building "a global-scale shared computer capable of hosting the entire Internet as an application." Nicholas Carr describes the paper with the words "Forget Thomas Watson's apocryphal remark that the world may need only five computers. Maybe it needs just one." Here is the original paper."

TrueCrypt 5.0 Released, Now Encrypts Entire Drive 330

A funny little man writes "The popular open source privacy tool, TrueCrypt, has just received a major update. The most exciting new feature provides the ability to encrypt an entire drive, prompting the user for a password during boot up; this makes TrueCrypt the perfect tool for non-technical laptop users (the kind who are likely to lose all of that sensitive customer data). The Linux version receives a GUI and independence from the kernel internals, and a Mac version is at last available too."
Graphics

Stanford's New Website Converts Your Photos to 3D 156

An anonymous reader writes to tell us that Stanford has a new website that not only shows you how cool their new 3-d modeling system is, but actually allows you to give it a try with your own photos. The system can take a 2-d still image and estimate a detailed 3-d structure which you can navigate. "For each small homogeneous patch in the image, we use a Markov Random Field (MRF) to infer a set of "plane parameters" that capture both the 3-d location and 3-d orientation of the patch. The MRF, trained via supervised learning, models both image depth cues as well as the relationships between different parts of the image. Other than assuming that the environment is made up of a number of small planes, our model makes no explicit assumptions about the structure of the scene; this enables the algorithm to capture much more detailed 3-d structure than does prior art (such as Saxena et al., 2005, Delage et al., 2005, and Hoiem et el., 2005), and also give a much richer experience in the 3-d flythroughs created using image-based rendering, even for scenes with significant non-vertical structure."
Space

Largest Black Hole Measured 170

porkpickle tips us to a BBC article on the quasar OJ287, a binary object containing largest black hole yet discovered, weighing in at 18 billion times the mass of Sol. Researchers were able to estimate its mass due to the presence of a smaller black hole in orbit around it. When the smaller companion's orbit intersects OJ287's accretion disk, once every 12 years, it triggers a burst of radiation that was detected by the Spitzer Space Telescope. More detail and a diagram are available on the Turku University site.
Toys

Innovative Designs and Devices 88

Patrick Griffin writes "When it comes to product design, the significance of aesthetics, the way its design looks and feels, determines the choice of the customer once the functionalities of multiple devices are more or less similar. If supported by sound user interface and a well-tested, clean implementation, innovative design solutions can drastically enhance the user experience. The article Innovative Designs and Devices presents innovative, futuristic gadgets, devices, designs and concepts which can become reality in 2008 or over the next few years." Some of the designs are real, others are stupid, and some are just dreams for the future. But some of this stuff is really cool.
Security

Facebook Widget Installs Zango Spyware 137

BaCa writes "A malicious Facebook Widget actively spreading on the social networking site ultimately prompts users to install the infamous "Zango" adware/spyware. The tremendous success and lightning fast expansion of Facebook empowered the social networking giant with an impressive user base. Needless to say, in a digital world where web traffic equals money, such a user base attracts spammers, virus/spyware seeders, and other ethic-less online marketers like honey would attract flies."
Google

Quoted in Google News? Post a Comment 53

An anonymous reader writes "Google News has a feature it calls "Comments From People in the News." (rude interrupting registration may be required) The idea is simple: if you have been quoted in an article that appears on Google News, you can post a comment that will be paired with that article. (Journalists can comment, as well, Google says, though none have done so thus far.) Since it was introduced in the spring, the feature has largely existed under the radar, with roughly only about 150 total comments having been made. Thus far, Google News has used e-mail messages to encourage people quoted in articles to submit comments — an effort to prime the pump similar to the process that results in the first issue of a new magazine magically having letters to the editor."
The Almighty Buck

Egypt to Copyright Pyramids and Sphynx 393

empaler writes "We all know the usual pro-copyright arguments. Most of them hinge on the fact that the individual or company that has a copyright needs an incentive to make something that is copyrightable, and therefore ensure a revenue stream in a period after the copyright has been granted. In a never-surpassed move, Egypt is working on legislation to extend copyright well above 3000 years — they are going to start claiming royalties for using likenesses of the Sphynx and the Pyramids. It is still unclear whether the original intent of the Pyramids included 'making sure them bastards pay for a plastic copy in 3000 years' alongside 'securing a pathway to the heavens for the God King.' Speaking as a Greenlandic national, I want dibs on ice cubes." It sounds straight out of The Onion, but instead you can read another story on the BBC.
Security

Flash Vulnerabilities Affect Thousands of Sites 214

An anonymous reader sends us to The Register for this security news. The problem is compounded by the fact that some of the most popular Web development tools for generating SWF produce files containing the recently disclosed vulnerabilities. "Researchers from Google have documented serious vulnerabilities in Adobe Flash content which leave thousands of websites susceptible to attacks that steal the personal details of visitors. A web search reveals more than 500,000 vulnerable applets on major corporate, government and media sites. Removing the vulnerable content will require combing through website directories for SWF files and then testing them one by one. Updates in the Adobe software that renders SWF files in browsers are also likely, but they probably wouldn't quell the threat completely... No patch in sight from Adobe, that's the price to pay for depending on proprietary solutions."
Software

Major Australian ISP Pulls OpenOffice 336

thefickler writes "Australia's largest Internet service provider Telstra BigPond has removed OpenOffice from its unmetered file download area following the launch of its own, free, hosted, office application, BigPond Office. The removal of OpenOffice was brought to TECH.BLORGE's attention by a reader, who complained to Telstra BigPond's support department about no longer being able to download OpenOffice updates. The support people were quite open about why OpenOffice was no longer available, i.e. because it was perceived to be competitive with BigPond Office."
Hardware Hacking

Playing With Atomic Clocks At Home 167

Wired is running a profile of the Time Nuts, a small group of people who buy surplus precision time equipment — cesium clocks for example — on eBay and keep really accurate time, because they can. The article quotes Tom Van Baak, who has outfitted a time lab superior to those of many small countries: "If you have one clock... you are peaceful and have no worries. If you have two clocks... you start asking, 'What time is it, really?'"
Media

Space Shifting DVDs to Cost Extra? 361

Depending on who you listen to Steve Jobs has supposedly been pitching the idea of selling "premium" DVDs that would include an extra fee for the privilege of transferring your legally-purchased DVD to a different device. "The courts have held that "space-shifting" your CDs to a portable music device is a fair use. So you can legally import your CD collection to your iPod, or any other device, without paying a penny. But Steve Jobs apparently wants to charge you $4 for the privilege of doing the same with your DVDs."
Music

How Do You Find New Non-RIAA Music? 319

burgundysizzle writes "Given the general reaction to the RIAA in comments, I assume that there are a number of users that try not to buy from RIAA sources. What alternatives do you use - or more importantly - what methods do you use to discover alternative sources of music? I use Sellaband.com (some free legal music available) and Amiestreet.com (new music is free and most music really cheap) to find new music, but I'm always on the lookout for interesting sites to discover new music. Tell me about your experiences and any other interesting places you get new music from. I'm looking for inexpensive, and legal."
Security

Spying On Tor 198

juct writes "The long-standing suspicion that the anonymizing network TOR is abused to catch sensitive data by Chinese, Russian, and American government agencies as well as hacking groups gets new support. Members of the Teamfurry community found TOR exit-nodes which only forward unencrypted versions of certain protocols. These peculiar configurations invite speculation as to why they are set up in this way. Another tor exit node has been caught doing MITM attacks using fake SSL certificates."

Slashdot Top Deals

"Ada is the work of an architect, not a computer scientist." - Jean Icbiah, inventor of Ada, weenie

Working...