Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Science

String Theory in Two Minutes 328

An anonymous reader writes "Most of us have heard of string theory, many of us know what it is and some of us may even be experts in the field. But could you explain it in two minutes? Discover Magazine recently had a contest to do precisely that: create a two minute or less video of everything you need to know about string theory. You can view some of the best entries (video) as well as the winning video: String Ducky!"
Google

Free IMAP On Gmail 440

A number of readers are writing in to tell us that Google is rolling out IMAP support for Gmail accounts. Several people say that some of their gmail accounts offer the IMAP option (in Settings, Forwarding and POP/IMAP) and others do not.
The Courts

IFPI Domain Dispute Likely to Go To Court 90

fgaliegue writes "Ars Technica has a follow-up on the ifpi.com domain takeover by The Pirate Bay. The International Federation of the Phonographic Industry, ifpi.org, is quite unhappy that the .com is now a link to the (still not live) International Federation of Pirates Interests. The ifpi.com domain has been free as soon as March of this year, according to WebArchive. Nevertheless, the "real" IFPI wants to take it to the WIPO under the accusation of cybersquatting."
The Courts

Provider of Free Public Domain Music Shuts Down 242

Mark Rogers writes "The International Music Score Library Project has provided access to copies of many musical scores that are in the public domain. It has just been shut down due to a cease-and-desist letter sent to the site operator by a European Union music publisher (Universal Edition). A majority of the scores recently available at IMSLP were in the public domain worldwide. Other scores were not in the public domain in the United States or the EU (where copyright extends for 70 years after the composer's death), but were legal in Canada (where the site is hosted) and many other countries. The site's maintainers clearly labeled the copyright status of such scores and warned users to follow their respective country's copyright law. Apparently this wasn't enough for Universal Edition, who found it necessary to protect the interests of their (long-dead) composers and shut down a site that has proved useful to many students, professors, and other musicians worldwide."
It's funny.  Laugh.

Facebook Goes To 64 Bit User IDs 144

NewsCloud writes "Facebook has announced to developers that they are moving to a 64 bit user ID in November. At 32 bits, the current ID allows nearly 4.3 billion user accounts. Yet, despite having only 47 million users today, Facebook's move to 64 bits will allow it to have more than 18 quintillion (18,446,744,074,000,000,000) user accounts. Of course, there are currently only about 6.5 billion people in the world. Is Facebook setting their sights beyond Earth or just trying to avoid what happened when Slashdot ran out of space for comment IDs last year. Perhaps they are planning to implement personas."

Slashdot's Setup, Part 1- Hardware 273

As part of our 10-Year anniversary coverage, we intend to update our insanely dated FAQ entry that describes our system setup. Today is Part 1 where we talk mostly about the hardware that powers Slashdot. Next week we'll run Part 2 where we'll talk mostly about Software. Read on to learn about our routers, our databases, our webservers and more. And as a reminder, don't forget to bid on our charity auction for the EFF and if you are in Ann Arbor, our anniversary party is tomorrow night.
Power

Internet Uses 9.4% of Electricity In the US 271

ribuck writes "Equipment powering the internet accounts for 9.4% of electricity demand in the U.S., and 5.3% of global demand, according to research by David Sarokin at online pay-for-answers service Uclue. Worldwide, that's 868 billion kilowatt-hours per year. The total includes the energy used by desktop computers and monitors (which makes up two-thirds of the total), plus other energy sinks including modems, routers, data processing equipment and cooling equipment."
Books

Harry Potter Leaked Via Handheld Camera 427

owlgorithm writes "Salon reports that Harry Potter and the Deathly Hallows has been leaked four days before it hits bookstores. It turns out that someone with access to the American edition of the book has taken a photograph of every one of the pages and made them available via bittorrent. Publishers may well be quaking in their boots, but in some places the quality is barely legible. On many pages the pirateer's hands are in the pictures with other pages needing a bit of Photoshopping just to make out the words. It appears many of the sites have been removing the content, naturally enough."
The Internet

The Next Big Thing — Why Web 2.0 Isn't Enough 286

An anonymous reader writes "TechConsumer has an interesting discussion about what it will take for the next big thing, and why Web 2.0 is only just the beginning. 'Realtors have been giving us the answer for years, although they didn't know it. The next big thing is..."location, location, location". Think of how we access all the information of the Internet. We do it at a desk, where wires keep us attached to a specific location. Laptops help us branch out a bit, but even then we are tied to a wireless connection. Go to far and you no longer have access to information.'"
Hardware Hacking

Cryptography To Frustrate Printer-Ink Piracy 305

Zack Melich writes with news of a new front about to open in the war printer manufacturers wage with cartridge counterfeiters, refillers, and hardware hackers. A San Francisco company, Cryptography Research Inc., is designing a crypto chip to marry cartridges to printers. There's no word so far that any printer manufacturer has committed to using it. Quoting: "The company's chips use cryptography designed to make it harder for printers to use off-brand and counterfeit cartridges. CRI plans to create a secure chip that will allow only certain ink cartridges to communicate with certain printers. CRI also said that the chip will be designed that so large portions of it will have no decipherable structure, a feature that would thwart someone attempting to reverse-engineer the chip by examining it under a microscope to determine how it works. 'You can see 95 percent of the [chip's] grid and you still don't know how it works,' said Kit Rodgers, CRI's vice president of business development. Its chip generates a separate, random code for each ink cartridge, thus requiring a would-be hacker to break every successive cartridge's code to make use of the cartridge."
GNU is Not Unix

Submission + - Stallman to step down as Emacs maintainer

davids-world.com writes: "Richard Stallman is planning to step down as head maintainer of the GNU Emacs project. In an e-mail to fellow Emacs developers, he today asked for candidates to succeed him. RMS wrote the first extensible Emacs text editor in 1975 at MIT's AI Lab. Seen by many as the founder and chief advocate of the free software movement, Stallman has also been actively involved in Emacs' development. GNU Emacs 22, due soon, will be the first major release of the editor since 2001."
Programming

When a CGI Script is the Most Elegant Solution 256

An anonymous reader writes "Writing local Web applications can be quick, easy, and efficient for solving specific Intranet problems. Learn why a Web browser is sometimes a better interface than a GUI application and why experienced Web developers find themselves struggling to learn a GUI toolkit, and descover that a simple CGI script would serve their needs perfectly well, if not better."
Security

Hacker Defeats Hardware-based Rootkit Detection 126

Manequintet writes "Joanna Rutkowska's latest bit of rootkit-related research shatters the myth that hardware-based (PCI cards or FireWire bus) RAM acquisition is the most reliable and secure way to do forensics. At this year's Black Hat Federal conference, she demonstrated three different attacks against AMD64 based systems, showing how the image of volatile memory (RAM) can be made different from the real contents of the physical memory as seen by the CPU. The overall problem, Rutkowska explained, is the design of the system that makes it impossible to reliably read memory from computers. "Maybe we should rethink the design of our computer systems so they they are somehow verifiable," she said."
Novell

Novell May be Banned from Distributing Linux 553

Hymer writes "Reuters is reporting that Novell may be banned from selling Linux. In the wake of the (much maligned) Novell/Microsoft deal, the Free Software Foundation is reviewing Novell's right to sell the operating system at all. The foundation controls the rights to key parts of the operating system, and council for the organization said that 'the community wants to interfere any way it can' with the Novell business arrangement. No decision has yet been reached, but one should be made in the next two weeks." Is this a measured response, or an over-reaction to the Novell/Microsoft arrangement?

Slashdot Top Deals

"God is a comedian playing to an audience too afraid to laugh." - Voltaire

Working...