Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - Government to require vehicle-to-vehicle communication (mercurynews.com)

An anonymous reader writes: For decades, the focus of auto safety has primarily been on surviving the traumatic impact of crashes through features like air bags and seat belts. But now the focus has shifted to avoiding crashes by developing technology to make future vehicles "smart" enough to detect and respond to threats, such as an oncoming vehicle.

The technology, known as "vehicle-to-vehicle," or "V2V," lets cars "talk" to each other and exchange safety data, such as speed and position. If a nearby car abruptly changes lanes and moves into another car's blind spot, the car would be alerted.

Federal transportation officials did not announce when the new regulations would go into effect but said they hope to propose the new V2V rules before President Barack Obama leaves office in January 2017

Submission + - New York Times Suffers Redaction Failure, Exposes Name Of NSA Agent And Targeted (hitb.org)

An anonymous reader writes: It appears as if the New York Times, in its latest publication of leaked NSA documents, failed to properly redact the PDF it uploaded, exposing the name of the NSA agent who composed the presentation as well as the name of a targeted network. uh...woops. sorry.

Submission + - EU Commission: Corruption across EU 'breathtaking,' Costs $160 bn / €120 bn (bbc.co.uk)

cold fjord writes: The BBC reports, "The extent of corruption in Europe is "breathtaking" and it costs the EU economy at least 120bn euros (£99bn) annually, the European Commission says. EU Home Affairs Commissioner Cecilia Malmstroem has presented a full report on the problem. She said the true cost of corruption was "probably much higher" than 120bn. Three-quarters of Europeans surveyed for the Commission study said that corruption was widespread, and more than half said the level had increased. "The extent of the problem in Europe is breathtaking, although Sweden is among the countries with the least problems," Ms Malmstroem wrote in Sweden's Goeteborgs-Posten daily. The cost to the EU economy is equivalent to the bloc's annual budget. For the report the Commission studied corruption in all 28 EU member states. The Commission says it is the first time it has done such a survey. " — More at the Telegraph

Submission + - Stem Cells used to Regrow Severed Adult Finger, Thigh Tissue, more.

TempeNerd writes: University of Pittsburgh has successfully created a "stem cell powder" that has been shown to regenerate human tissue — in real, living humans.
The first example was an older man that severed the tip of his finger off in an accident with a model airplane. The wound was sprinkled with the powder and over the course of four weeks, the finger re-grew.
In another example, a marine lost 70% of his thigh muscle in a mortar explosion in Afghanistan. The powder was able to restore much of the tissue when other methods had failed.
This miracle powder is made with stem cells from a pig, Pig extracellular matrix.
Oh what wonders the future does hold!

http://singularityhub.com/2011...
http://www.minds.com/blog/view...

Submission + - Finnish Hacker Isolates GPS Coordinates from Youtube Video Soundtrack (windytan.com)

An anonymous reader writes: "The signal sits alone on the left audio channel, so I can completely isolate it. Judging from the spectrogram, the modulation scheme seems to be BFSK, switching the carrier between 1200 and 2200 Hz. I demodulated it by filtering it with a lowpass and highpass sinc in SoX and comparing outputs. Now I had a bitstream at 1200 bps."

Submission + - Android app claims to protect from Wi-Fi tracking

SirJorgelOfBorgel writes: Hot on the heels of stories about people's Wi-Fi signales being tracked by spy agencies and retailers (in Dutch), Android hacker Jorrit Jongma (better known as Chainfire) has released an app called Pry-Fi aiming to prevent long-term tracking. It works by periodically randomizing your MAC address and preventing your device from broadcasting all the networks it knows. There's even a "war" mode included that aims to actively confuse trackers in range. You do need a rooted Android device, it seems not all devices are supported, and not all the early adopters are having success getting it to work.

Submission + - What's your IP? The FCC wants to kill your Phone Number (engadget.com)

An anonymous reader writes: The FCC isn't necessarily a stickler for tradition, as it is now encouraging phone networks to explore what would happen if VoIP replaced everything else. In other words, how would the system cope if the only phone numbers were Internet Protocol addresses; if even emergency calls were transmitted over the web; and if remote rural communities became dependent on VoIP, with no other type of network as a backup?

Submission + - Crushing Competition: Cable Companies Try To Outlaw Google Fiber (hothardware.com)

MojoKid writes: Two events in the telecommunications and cable world this week highlight why we need net neutrality and stronger protections for consumer rights. Time Warner Cable, Cox, Eagle Communications, and Comcast have collectively introduced a bill into the Kansas legislature that prevents any city from rolling out any broadband infrastructure unless the area is completely cut off from the grid. It would bar the use of eminent domain for the purpose of providing better service to a city's citizens. And not incidentally, it makes Google Fiber effectively illegal. The bill would outlaw public/private partnerships, open access approaches, and the partnership that brought Google Fiber to Kansas City. Meanwhile, AT&T has been quietly assembling a patent portfolio for itself that simultaneously attacks net neutrality and consumer rights. The company applied for a patent titled "Prevention Of Bandwidth Abuse Of A Communications System" in October 2012. The abstract reads, in part: "A user of a communications network is prevented from consuming an excessive amount of channel bandwidth by restricting use of the channel in accordance with the type of data being downloaded to the user. The user is provided an initial number of credits. As the user consumes the credits, the data being downloaded is checked to determine if is permissible or non-permissible. Non-permissible data includes file-sharing files and movie downloads if user subscription does not permit such activity.

Slashdot Top Deals

Say "twenty-three-skiddoo" to logout.

Working...