Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Submission + - Pi Power - the power supply the Raspberry Pi *should* have come with (geppettoelectronics.com)

nsayer writes: The Raspberry Pi is awesome. There's only one thing I dislike about it — how you're meant to power it. Crappy USB power supplies are ubiquitous, and the power more or less goes straight onto the +5 rail. Not only that, but the micro USB connector is SMT, and USB cables are much thicker and heavier than their 2.1mm barrel connector cable counterparts. No, it's just not the best tool for the job.

So I made Pi Power. It's a small board that sits on the GPIO pins (it comes with a stacking header so you can piggyback onto it) and has a 2.1mm barrel connector that will accept any DC voltage from 6-15 volts and output up to 2A of well regulated 5V power.

I sell them on Tindie for $15 ( https://www.tindie.com/product... ) and am running an IndieGoGo campaign to fund building 1000 of them at http://igg.me/at/PiPower .

Books

Nightfall: Can Kalgash Exist? 86

First time accepted submitter jIyajbe (662197) writes Two researchers from the Indian Institute of Astrophysics investigate the imaginary world of Kalgash, a planetary system based on the novel 'Nightfall' (Asimov & Silverberg, 1991). From the arXiv paper: "The system consists of a planet, a moon and an astonishing six suns. The six stars cause the wider universe to be invisible to the inhabitants of the planet. The author explores the consequences of an eclipse and the resulting darkness which the Kalgash people experience for the first time. Our task is to verify if this system is feasible, from the duration of the eclipse, the 'invisibility' of the universe to the complex orbital dynamics." Their conclusion? "We have explored several aspects of Asimov's novel. We have found that the suns, especially Dovim are bright enough to blot out the stars. Kalgash 2 can eclipse Dovim for a period of 9 hours. We also tested one possible star configuration and after running some simulations, we found that the system is possible for short periods of time."
Cellphones

Greenpeace: Amazon Fire Burns More Coal and Gas Than It Should 288

Jason Koebler (3528235) writes "The biggest thing that sets the Amazon Fire Phone apart from its Android and Apple competitors probably isn't the clean interface or the unlimited photo storage—it's the dirty power behind it. When Fire users upload their photos and data to Amazon's cloud, they'll be creating a lot more pollution than iPhone owners, Greenpeace says. Apple has made a commitment to running its iCloud on 100 percent clean energy. Amazon, meanwhile, operates the dirtiest servers of any major tech giant that operates its own servers—only 15 percent of its energy comes from clean sources, which is about the default national average." Greenpeace's jaundiced eye is on Amazon more generally; the company's new phone is just an example. Maybe Amazon or some other provider could take a page from some local utilities and let users signal their own preferences with a (surcharged) "clean energy" option.
Communications

Household Robot Jibo Nets Over $1 Million On Indiegogo 61

mikejuk (1801200) writes After seven days the Jibo project has over $1.1 million. What is surprising is that Jibo isn't a complex piece of hardware that will do the dishes and pick up clothes. It doesn't move around at all. It just sits and interacts with the family using a camera, microphones and a voice. It is a social robot, the speciality of the founder, MIT's, Cynthia Breazeal. The idea is that this robot will be your friend, take photos, remind you of appointments, order takeaway and tell the kids a story. If you watch the promo video then you can't help but think that this is all too polished and the real thing will fall flat on its face when delivered. If it does work then worry about the hundreds of kids needing psychiatric counselling — shades of Robbie in I, Robot. Even if it is hopelessly hyped — there is a development system and I want one. It is the early days of the home computer all over again.

Submission + - Ask Slashdot: After TrueCrypt (slashdot.org)

TechForensics writes: (Resubmitted because was not identified as "Ask Slashdot"

We all know the TrueCrypt story-- a fine, effective encryption program beginning to achieve wide use. When you see how the national security agency modified this tool so they could easily overcome it, you'll probably understand why they don't complain about PGP anymore. The slip that showed what was happening was the information that NSA "were really ticked about TrueCrypt" either because they couldn't circumvent it or found it too difficult. From the standpoint of privacy advocates, NSA's dislike for TrueCrypt was evidence it was effective.

Next, NSA directly wrapped up the makers of TrueCrypt in legal webs that made them insert an NSA backdoor and forbade them from revealing it was there. It's only because of the cleverness of the TrueCrypt makers the world was able to determine for itself that TrueCrypt was now compromised. (Among other things, though formerly staunch privacy advocates, the makers discontinued development of TrueCrypt and recommended something like Microsoft Bitlocker, which no one with any sense believes could be NSA – hostile. It then became logically defensible, since NSA was not complaining about PGP or other encryption programs, to posit they had already been compromised.

This is the situation we have: all of the main are important encryption programs are compromised at least in use against the federal government. Whether NSA tools are made available to local law enforcement is not known. This all begs the question:

Does the public now have *any* encryption that works? Even if we can see the source code of the encryption algorithm the source code of the program employing that algorithm must be considered false. (TrueCrypt was the only program NSA complained about.) In the case of other software, it becomes believable the NSA has allowed to be published only source code that hides their changes, and the only way around that may be to check and compile the published code yourself. Half the public probably doesn't bother.

Okay, Slashdot, what do you think? Where do we stand? And what ought we to do about it?We all know the TrueCrypt story-- a fine, effective encryption program beginning to achieve wide use. When you see how the national security agency modified this tool so they could easily overcome it, you'll probably understand why they don't complain about PGP anymore. The slip that showed what was happening was the information that NSA "were really ticked about TrueCrypt" either because they couldn't circumvent it or found it too difficult. From the standpoint of privacy advocates, NSA's dislike for TrueCrypt was evidence it was effective.

Next, NSA directly wrapped up the makers of TrueCrypt in legal webs that made them insert an NSA backdoor and forbade them from revealing it was there. It's only because of the cleverness of the TrueCrypt makers the world was able to determine for itself that TrueCrypt was now compromised. (Among other things, though formerly staunch privacy advocates, the makers discontinued development of TrueCrypt and recommended something like Microsoft Bitlocker, which no one with any sense believes could be NSA–hostile. It then became logically defensible, since NSA was not complaining about PGP or other encryption programs, to posit they had already been vitiated.

This is the situation we have: all of the main or important encryption programs are compromised at least in use against the federal government. Whether NSA tools are made available to local law enforcement is not known. This all begs the question:

Does the public now have *any* encryption that works? Even if we can see the source code of the encryption algorithm the source code of the program employing that algorithm must be considered tainted. (TrueCrypt was the only program NSA complained about.) In the case of other software, it becomes believable the NSA has allowed to be published only source code that hides their changes, and the only way around that may be to check and compile the published code yourself. Half the public probably doesn't bother. (Would it not be possible for the NSA to create a second TrueCrypt that has the same hash value as the original?)

Okay, Slashdot, what do you think? Where do we stand? And what ought we to do about it?

IOS

Private Data On iOS Devices Not So Private After All 101

theshowmecanuck (703852) writes with this excerpt from Reuters summarizing the upshot of a talk that Jonathan Zdziarski gave at last weekend's HOPE conference: Personal data including text messages, contact lists and photos can be extracted from iPhones through previously unpublicized techniques by Apple Inc employees, the company acknowledged this week. The same techniques to circumvent backup encryption could be used by law enforcement or others with access to the 'trusted' computers to which the devices have been connected, according to the security expert who prompted Apple's admission. Users are not notified that the services are running and cannot disable them, Zdziarski said. There is no way for iPhone users to know what computers have previously been granted trusted status via the backup process or block future connections. If you'd rather watch and listen, Zdziarski has posted a video showing how it's done.
Science

Soccer Superstar Plays With Very Low Brain Activity 160

jones_supa (887896) writes "Brazilian superstar Neymar's (Neymar da Silva Santos Júnior) brain activity while dancing past opponents is less than 10 per cent the level of amateur players, suggesting he plays as if on "auto-pilot", according to Japanese neurologists Eiichi Naito and Satoshi Hirose. The findings were published in the Swiss journal Frontiers in Human Neuroscience following a series of motor skills tests carried out on the 22-year-old Neymar and several other athletes in Barcelona in February this year. Three Spanish second-division footballers and two top-level swimmers were also subjected to the same tests. Researcher Naito told Japan's Mainichi Shimbun newspaper: "Reduced brain activity means less burden which allows [the player] to perform many complex movements at once. We believe this gives him the ability to execute his various shimmies." In the research paper Naito concluded that the test results "provide valuable evidence that the football brain of Neymar recruits very limited neural resources in the motor-cortical foot regions during foot movements"."

Submission + - Nuclear Plants Should Focus on Risks Posed by External Events (nytimes.com) 1

mdsolar writes: "Engineers at American nuclear plants have been much better at calculating the risk of an internal problem that would lead to an accident than they have at figuring the probability and consequences of accidents caused by events outside a plant, a report released Thursday by the National Academy of Science said.

Accidents that American reactors are designed to withstand, like a major pipe break, are “stylized” and do not reflect the bigger source of risk, which is external, according to the study. That conclusion is one of the major lessons from the Fukushima Daiichi nuclear accident in Japan in 2011, which began after an earthquake at sea caused a tsunami."

NAS Report: http://www.nap.edu/catalog.php...

Submission + - Jibo, the friendly helpful robot, nets over $1 million on Indiegogo (i-programmer.info)

mikejuk writes: After seven days the Jibo project has over $1.1 million. What is surprising is that Jibo isn't a complex piece of hardware that will do the dishes and pick up clothes. It doesn't move around at all. It just sits and interacts with the family using a camera, microphones and a voice. It is a social robot, the speciality of the founder, MIT's, Cynthia Breazeal. The idea is that this robot will be your friend, take photos, remind you of appointments, order takeaway and tell the kids a story. If you watch the promo video then you can't help but think that this is all too polished and the real thing will fall flat on its face when delivered. If it does work then worry about the hundreds of kids needing psychiatric counselling — shades of Robbie in I, Robot. Even if it is hopelessly hyped — there is a development system and I want one. It is the early days of the home computer all over again.
Media

Enraged Verizon FiOS Customer Seemingly Demonstrates Netflix Throttling 398

MojoKid (1002251) writes The ongoing battle between Netflix and ISPs that can't seem to handle the streaming video service's traffic, boiled over to an infuriating level for Colin Nederkoon, a startup CEO who resides in New York City. Rather than accept excuses and finger pointing from either side, Nederkoon did a little investigating into why he was receiving such slow Netflix streams on his Verizon FiOS connection. What he discovered is that there appears to be a clear culprit. Nederkoon pays for Internet service that promises 75Mbps downstream and 35Mbps upstream through his FiOS connection. However, his Netflix video streams were limping along at just 375kbps (0.375mbps), equivalent to 0.5 percent of the speed he's paying for. On a hunch, he decided to connect to a VPN service, which in theory should actually make things slower since it's adding extra hops. Speeds didn't get slower, they got much faster. After connecting to VyprVPN, his Netflix connection suddenly jumped to 3000kbps, the fastest the streaming service allows and around 10 times faster than when connecting directly with Verizon. Verizon may have a different explanation as to why Nederkoon's Netflix streams suddenly sped up, but in the meantime, it would appear that throttling shenanigans are taking place. It seems that by using a VPN, Verizon simply doesn't know which packets to throttle, hence the gross disparity in speed.
Displays

Day One With the Brand New Oculus Rift DK2: the Good, the Ugly and the Games 48

muterobert (2927951) writes Paul James goes hands on with one of the first next-gen Oculus Rifts in the wild: "After much hacking (and some kind developer linkage) I stepped into a DK2 enabled version of Technolust and lost myself utterly! The stunning attention to detail, neon on black really lets the OLED panel shine here. In fact, this experience was the closest I think I've ever some to presence in virtual reality thus far. Leaning in to check the myriad retro objects, gawking at the lighting and just generally being blown away by the experience. This game was fabulous on the DK1, it's utterly compelling now."
Television

How Stanford Engineers Created a Fictitious Compression For HBO 90

Tekla Perry (3034735) writes Professor Tsachy Weissman and Ph.D student Vinith Misra came up with (almost) believable compression algorithms for HBO's Silicon Valley. Some constraints -- they had to seem plausible, look good when illustrated on a whiteboard, and work with the punchline, "middle out." Next season the engineers may encourage producers to tackle the challenge of local decodability.
Science

Submission + - Soccer Superstar Plays With Very Low Brain Activity

jones_supa writes: Brazilian superstar Neymar's (Neymar da Silva Santos Júnior) brain activity while dancing past opponents is less than 10 per cent the level of amateur players, suggesting he plays as if on "auto-pilot", according to Japanese neurologists Eiichi Naito and Satoshi Hirose. The findings were published in the Swiss journal Frontiers in Human Neuroscience following a series of motor skills tests carried out on the 22-year-old Neymar and several other athletes in Barcelona in February this year. Three Spanish second-division footballers and two top-level swimmers were also subjected to the same tests. Researcher Naito told Japan's Mainichi Shimbun newspaper: "Reduced brain activity means less burden which allows [the player] to perform many complex movements at once. We believe this gives him the ability to execute his various shimmies." In the research paper Naito concluded that the test results "provide valuable evidence that the football brain of Neymar recruits very limited neural resources in the motor-cortical foot regions during foot movements".

Submission + - Private Data On iOS Devices, Not So Private (reuters.com)

theshowmecanuck writes: Personal data including text messages, contact lists and photos can be extracted from iPhones through previously unpublicized techniques by Apple Inc employees, the company acknowledged this week.

The same techniques to circumvent backup encryption could be used by law enforcement or others with access to the "trusted" computers to which the devices have been connected, according to the security expert who prompted Apple's admission.

Users are not notified that the services are running and cannot disable them, Zdziarski said. There is no way for iPhone users to know what computers have previously been granted trusted status via the backup process or block future connections.

Slashdot Top Deals

Is your job running? You'd better go catch it!

Working...