Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment How about spending some time on the education part (Score 3, Insightful) 286

New hardware is nice and all, but it's really of minor importance compared to the elements of the platform that should be there to help kids learn. I think there's a reason that the press never covers how fantastic and ground breaking the educational aspect is. The technology is interesting, but as far as I can tell, the educational aspect is an afterthought.
Biotech

Submission + - Crime Reduction linked to Lead Free Gasoline

Hugh Pickens writes: "Even low levels of lead can cause brain damage increasing the likelihood of behavioral and cognitive traits such as impulsivity, aggressivity, and low IQ that are strongly linked with criminal behavior. The New York Times has a story on how the phase out of leaded gasoline starting with the Clean Air Act in 1973 may have led to a 56% drop in violent crime in the United States in the 1990s. Amherst Economics Professor Jessica Wolpaw Reyes discovered the connection and wrote a paper comparing the reduction of lead from gasoline between states (pdf file) and the reduction of violent crime by constructing a panel of state-year observations linking crime rates in every state to childhood lead exposure in that state 20 or 30 years earlier. If lead poisoning is a factor in the development of criminal behavior, then countries that didn't switch to unleaded fuel until the 1980s, like Britain and Australia, should soon see a dip in crime as the last lead-damaged children outgrow their most violent years."
The Internet

Submission + - P2P Source Arrested, OiNK.cd Raided, Shut Down (torrentfreak.com)

eldavojohn writes: "A British man was arrested who was allegedly the source of a distribution supply chain for leaking albums & movies to file sharers. He operated OiNK which was by invite only and would post files to be distributed which would then show up hours later further down the supply chain on other file sharing sites. This scheme stretched across many nations and is the result of a two year investigation by the IFPI. They hope that by infiltrating these layers of abstraction to the source, they can stop the early leaking of media."
Music

Submission + - Amazon DRM-Less Music Store goes Beta 2

LowSNR writes: Amazon this morning moved their DRM-Free music store into open beta. According to the release, "Since all our digital music downloads are DRM-free, you can play them on anything that plays mp3s including PCs, Macs(TM), iPods(TM), Zunes(TM), Zens(TM), iPhones(TM), RAZRs(TM), and BlackBerrys. Plus, our Amazon MP3 Downloader application makes it easy to add your downloads to iTunes(TM) and Windows Media Player(TM), so you can sync up your devices or burn your music to CD hassle-free." Not to mention Linux.
The Courts

Submission + - Pirate Bay 'kept child porn link for two weeks' 1

paulraps writes: The Pirate Bay's legal position has just become decidedly murkier after it emerged that the torrent site hosted links to child pornography for two weeks after being made aware of its existence. The Swedish police say that it is a clear child pornography case, but the prosecutor says the Pirate Bay are not suspects since they did not actually host the material. What's more questionable is the response, grammar aside, of the site's moderator when the child pornography torrent was highlighted: "I don't give a **** if you folks are upset. Me and the other moderators job are NOT to have an opinion about if it is imoral or not."
Security

Submission + - Download music, share bank account info (computerworld.com)

jcatcw writes: "According to Computerworld, a surprisingly high number of consumers who are sharing music and other files on peer-to-peer systems are also exposing all sorts of bank account and similar personal information to criminals lurking on the networks to harvest data. And not all of that is their own information. Evidence shows that bank employees and contractors are also exposing customer data."
Robotics

Submission + - Battlefield 'Bear' robot to rescue fallen soldiers

holy_calamity writes: A Maryland firm is developing a remote-controlled robot to rescue injured or abducted soldiers, New Scientist reports. The Battlefield Extraction-Assist Robot (Bear) prototype is already capable of lifting more than 135 kilograms with one arm, and recently showed how it can climb up and down stairs with a human-size dummy in its arms. There are videos of it carrying a dummy while standing and kneeling.
Media (Apple)

Submission + - Apple embeds account info in DRM-free music

Cardiff writes: Apple may have removed the DRM but they didn't remove tracking information from DRM-free music. With embedded account names and email information, which can be viewed only by searching the files for strings, Apple (or a record label) could easily determine the origin of a file shared on P2P. Ars speculates that Apple wants to keep an eye on casual file trading among friends.
Privacy

Submission + - Google Is Watching You

BLueRibbon writes: "The Independent is reporting that Google "is setting out to create the most comprehensive database of personal information ever assembled, one with the ability to tell people how to run their lives."

Eric Schmidt is quoted as saying ""The goal is to enable Google users to be able to ask the question such as 'What shall I do tomorrow?' and 'What job shall I take?'.""

And you thought Big Brother was bad?"
Software

Submission + - Vista more secure than MacOS 10.4

An anonymous reader writes: Macworld has an article up about security in MacOS 10.4, in which they post an email interview with Dino Dai Zovi, the New York-based security researcher who took home $10,000 in the highly-publicized MacBook Pro hijack on April 20. From the interview:

From your research on both platforms, is there a winner between Mac OS X 10.4 and Vista on security? I have found the code quality, at least in terms of security, to be much better overall in Vista than MacOS 10.4. It is obvious from observing affected components in security patches that Microsoft's Security Development Lifecycle (SDL) has resulted in fewer vulnerabilities in newly-written code. I hope that more software vendors follow their lead in developing proactive software security development methodologies.

I recommend that Mac users make their primary user a non-admin account, use a separate keychain for important passwords, and store sensitive documents in a separate encrypted disk image. I think these are fairly straightforward steps that many users can take to better protect their sensitive information on their computer.
Robotics

Submission + - First Hardware to go through Evolution Developed

Masq666 writes: A Norwegian team has made the first piece of hardware that uses evolution to change its design at runtime to solve the problem at hand in the most effective way. By turning on/off its "genes" it can change the way it works, and it can go through 20-30,000 generations in just a few seconds, that same number of generations took humans 8-900,000 years.

Slashdot Top Deals

"One lawyer can steal more than a hundred men with guns." -- The Godfather

Working...