Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Hardware

Quiet Cooling With a Copper Foam Heatsink 171

Zothecula writes: The Silent Power PC is claimed to be the first high-end PC able to ditch noisy electric fans in favor of fully passive cooling. In place of a conventional fan, the unit uses an open-air metal foam heatsink that boasts an enormous surface area thanks to the open-weave copper filaments of which it's composed. The Silent Power creators claim that the circulation of air through the foam is so efficient in dissipating heat that the exterior surface temperature never rises above 50 C (122 F) in normal use.
Space

The Milky Way Is Much Less Massive Than Previous Thought 119

schwit1 writes: New research by astronomers suggests that the Milky Way is about half as massive as previously estimated. It was thought to be roughly the same mass as Andromeda, weighing in at approximately 1.26 x 10^12 solar masses (PDF). This new research indicates its mass is around half the mass of Andromeda. "Galaxies in the Local Group are bound together by their collective gravity. As a result, while most galaxies, including those on the outskirts of the Local Group, are moving farther apart due to expansion, the galaxies in the Local Group are moving closer together because of gravity. For the first time, researchers were able to combine the available information about gravity and expansion to complete precise calculations of the masses of both the Milky Way and Andromeda. ... Andromeda had twice as much mass as the Milky Way, and in both galaxies 90 percent of the mass was made up of dark matter."

Submission + - Google, Linaro develop custom Android edition for Project Ara

rtoz writes: Google is working with open-source development organization Linaro to develop a special edition of Android for the Project Ara customizable smartphone.

A special edition of Android had to be created for the unique customizable design of Project Ara, said George Grey, CEO of Linaro.

  Android can already plug and play SD cards. But Grey said additional OS functionality is needed for storage, cameras and other modules that are typically inside smartphones, but can now be externally added to Project Ara.

A lot of work is also being done on UniPro transport drivers, which connect modules and components in Project Ara. UniPro protocol drivers in Android will function much like the USB protocol, where modules will be recognized based on different driver “classes,” such as those for networking, sensor, imaging, input and others.

Some attachable parts may not be recognized by Android. For those parts, separate drivers need to be developed by module makers through emulators. “That will be need to be done in a secure system so the device can’t do damage to the system,” Grey said.

Project Ara is a very disruptive concept, and it turns around conventional thinking on how to build phones, Grey said.

Submission + - Researchers Make Weak Passwords Virtually Uncrackable (securityweek.com)

wiredmikey writes: A team of researchers at the New York University Polytechnic School of Engineering say they have found a way to help organizations better protect even the weakest of passwords and make them almost impossible to crack.

Using an open-source password protection scheme dubbed PolyPasswordHasher, password information is never stored directly in a database; the information is used to encode a cryptographic "store" that cannot be validated unless a certain number of passwords are entered. In other words, an attacker would need to crack multiple passwords simultaneously in order to verify any single hash.

"PolyPasswordHasher divides secret information—in this case, password hashes—into shares, and just like a puzzle that is meaningless unless the pieces are assembled, no individual password can be validated unless a certain number of them are known and entered," explained Assistant Professor of Computer Science and Engineering Justin Cappos. "Even if the password file and all other information on disk were stolen, an attacker could not verify a single correct password without guessing a large number of them correctly."

Cappos estimated an attacker using a modern laptop could crack at least three six-character passwords in an hour if the computer was checking roughly a billion password hashes per second. With PolyPasswordHasher, the attacker would be required to compute these three passwords at the same time. The researchers estimate that in practice, all 900 million computers on Earth would need to work nonstop for longer than 13 billion years to compute the three passwords at the same time. According to the researchers' paper, the method is conceptually similar to encrypting the passwords with a key that is only recoverable when a threshold of passwords are known.

Submission + - SpaceShipTwo flies again (nbcnews.com)

schwit1 writes: The competition heats up: For the first time in six months SpaceShipTwo completed a test flight today.

The article above is from NBC, which also has a deal with Virgin Galactic to televise the first commercial flight. It is thus in their interest to promote the spacecraft and company. The following two sentences from the article however clearly confirm every rumor we have heard about the ship in the past year, that they needed to replace or completely refit the engine and that the resulting thrust might not be enough to get the ship to 100 kilometers or 62 miles:

In January, SpaceShipTwo blasted off for a powered test and sailed through a follow-up glide flight, but then it went into the shop for rocket refitting. It’s expected to go through a series of glide flights and powered flights that eventually rise beyond the boundary of outer space (50 miles or 100 kilometers in altitude, depending on who’s counting).

Hopefully this test flight indicates that they have installed the new engine and are now beginning flight tests with equipment that will actually get the ship into space.

Submission + - Chinese government probes Microsoft over anti-monopoly issues

DroidJason1 writes: The Chinese government is investigating Microsoft for possible breaches of anti-monopoly laws, following a series of surprise visits to Redmond's offices in cities across China on Monday. These surprise visits were part of China's ongoing investigation, and were based on security complaints about Microsoft’s Windows operating system and Office productivity suite. Results from an earlier inspection apparently were not enough to clear Microsoft of suspicion of anti-competitive behavior. Microsoft's alleged anti-monopoly behavior is a criminal matter, so if found guilty, the software giant could face steep fines as well as other sanctions.

Submission + - 5 Programming Languages You'll Need Next Year (and Beyond) (dice.com)

Nerval's Lobster writes: Over at Dice, there's a breakdown of the programming languages that could prove most popular over the next year or two, including Apple's Swift, JavaScript, CSS3, and PHP. But perhaps the most interesting entry on the list is Erlang, an older language that was invented in 1986 by engineers at Erricson. It was originally intended to be used specifically for telecommunications needs, but has since evolved into a general-purpose language, and found a home in cloud-based, high-performance computing when concurrency is needed. "There aren’t a lot of Erlang jobs out there," writes developer Jeff Cogswell. "However, if you do master it (and I mean master it, not just learn a bit about it), then you’ll probably land a really good job. That’s the trade-off: You’ll have to devote a lot of energy into it. But if you do, the payoffs could be high." And while the rest of the featured languages are no-brainers with regard to popularity, it's an open question how long it might take Swift to become popular, given how hard Apple will push it as the language for developing on iOS.
Security

Ask Slashdot: Open Hardware/Software-Based Security Token? 113

Qbertino (265505) writes I've been musing about a security setup to allow my coworkers/users access to files from the outside. I want security to be a little safer than pure key- or password-based SSH access, and some super-expensive RSA Token setup is out of question. I've been wondering whether there are any feasible and working FOSS and open hardware-based security token generator projects out there. It'd be best with ready-made server-side scripts/daemons. Perhaps something Arduino or Raspberry Pi based? Has anybody tried something like this? What are your experiences? What do you use? How would you attempt an open hardware FOSS solution to this problem?
Stats

Better Living Through Data 38

jradavenport (3020071) writes "Using two years of continuous monitoring of my MacBook Air battery usage (once every minute), I have been able to study my own computer use patterns in amazing detail. This dataset includes 293k measurements, or more than 204 days of use over two years. I use the laptop over 50 hours per week on average, and my most productive day is Tuesday. Changes in my work/life balance have begun to appear over the two-year span, and I am curious whether such data can help inform how much computer use is healthy/productive."
Graphics

$299 Android Gaming Tablet Reviewed 65

Vigile (99919) writes "Last week NVIDIA announced the SHIELD Tablet and SHIELD Controller, and reviews are finally appearing this morning. Based on the high performance Tegra K1 SoC that integrates 192 Kepler architecture CUDA cores, benchmarks reveal that that the SHIELD Tablet is basically unmatched by any other mobile device on the market when it comes to graphics performance — it is more than 2.5x the performance of the Apple A7 in some instances. With that power NVIDIA is able to showcase full OpenGL versions of games like Portal and Half-Life 2 running at 1080p locally on the 19:12 display or output to a TV in a "console mode." PC Perspective has impressions of that experience as well as using the NVIDIA Game Stream technology to play your PC games on the SHIELD Tablet and controller. To go even further down the rabbit hole, you can stream your PC games from your desktop to your tablet, output them to the TV in console mode, stream your game play to Twitch from the tablet while overlaying your image through the front facing camera AND record your sessions locally via ShadowPlay and using the Wi-Fi Direct powered controller to send and receive audio. It is incredibly impressive hardware but the question remains as to whether or not there is, or will be, a market for Android-based gaming devices, even those with the power and performance that NVIDIA has built."
Sci-Fi

Ridley Scott to Produce Philip K Dick's The Man In the High Castle 144

hawkinspeter (831501) writes Amazon has given the green light to produce the Hugo award-winning "The Man in the High Castle". This is after the four-hour mini-series was rejected by Syfy and afterwards by the BBC. Philip K Dick's novel takes place in an alternate universe where the Axis Powers won the Second World War. It's one of his most successful works, probably due to him actually spending the time to do some editing on it (most of his fiction was produced rapidly in order to get some money). Ridley Scott has previously adapted PKD's "Do Androids Dream of Electric Sheep" as the film Blade Runner, so it will be interesting to see how close he keeps to the source material this time. This news has been picked up by a few sites: International Business Times; The Register and Deadline.

Submission + - sel4 microkernel now Open Source (osnews.com)

An anonymous reader writes: OSnews is reporting that the formally verified sel4 microkernel is now open source: "General Dynamics C4 Systems and NICTA are pleased to announce the open sourcing of seL4, the world's first operating-system kernel with an
end-to-end proof of implementation correctness and security enforcement. It is still the world's most highly assured OS."

Slashdot Top Deals

What the gods would destroy they first submit to an IEEE standards committee.

Working...