Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Government

Daylight Saving Time Wastes Energy 550

An anonymous reader writes "With the time approaching when we'll be changing our clocks again, the Wall Street Journal is running a timely article on a study done by a UC-Santa Barbara economics professor and a Ph.D. student. The study unambiguously concludes that Daylight Saving Time not only doesn't save any energy, it actually wastes energy and costs more. The study used energy company records from Indiana before and after that state mandated DST for all of its counties, and calculated that the switch cost Indiana citizens $8.6M per year. 'I've never had a paper with such a clear and unambiguous finding as this,' the professor said."
Internet Explorer

IE8 Will Be Standards-Compliant By Default 383

A number of readers wrote in to make sure we know about Microsoft's change of heart regarding IE8. The new version of the dominant browser will render in full standards mode by default. Developers wishing to use quirks mode for IE6- and IE7-compatible rendering will have to opt in explicitly. We've previously discussed IE8's render mode a few times. Perhaps Opera's complaint to the EU or the EU's record antitrust fine had something to do with Redmond's about-face.
Media

Microsoft To Drop HD DVD 246

HockeyPuck writes to let us know that Microsoft has decided to stop making HD DVD players for the Xbox 360. No word on supporting Blu-ray on the platform though. "Microsoft said Saturday it would continue to provide standard warranty support for its HD DVD players. Toshiba President Atsutoshi Nishida last week estimated about 300,000 people own the Microsoft video player, sold as a separate $130 add-on for the Xbox 360."
Microsoft

Microsoft's New Leaf On Interoperability 371

A large number of readers are submitting the news that Microsoft has made a major announcement about interoperating with others including specifically the FOSS world. The impetus is the ongoing EU antitrust case against Microsoft. The announcement comes in the context of the release of 30,000 pages of API documentation for Microsoft Vista, Windows Server 2008, SQL Server 2008, Office 2007, Exchange Server 2007 and Office SharePoint Server 2007 — and a listing of patents that apply to these technologies, and a pledge not to sue open source developers who use the APIs. InfoWorld summarizes by saying that Microsoft "promised greater transparency in its development and business practices." Fortune is blunter, saying "Microsoft declares truce in open source war." Here's Microsoft's FAQ on the open source interop initiative.
Government

Australian Government Considers Copying UK Copyright Law Ideas 190

msim brings word that Australian legislators are considering an anti-piracy measure that would require ISPs to terminate internet access for people who repeatedly download copyrighted material. The legislation would set up a three-strikes system similar to the one proposed in the UK recently. While British ISPs resisted suggestions that they act as internet police, the response may not be the same in Australia, where the government has already tried to censor the internet. "Under the three-strikes policy, a warning would be first issued to offenders who illegally share files using peer-to-peer technology to access music, TV shows and movies free of charge. The second strike would lead to the offender's internet access being suspended; the third would cancel the offender's internet access."
Medicine

Bionic Arm Might Go Into Clinical Trials 107

prostoalex writes "The bionic arm project sponsored by DARPA is nearing completion, and might undergo clinical trials. 'The arm has motor control fine enough for test subjects to pluck chocolate-covered coffee beans one by one, pick up a power drill, unlock a door, and shake a hand. Six preconfigured grip settings make this possible, with names like chuck grip, key grip, and power grip. The different grips are shortcuts for the main operations humans perform daily.'"
Internet Explorer

Microsoft Confirms IE8 Has 3 Render Modes 525

Dak RIT writes "In a blog post this week, Microsoft's IE Platform Architect, Chris Wilson, confirmed that IE8 will use three distinct modes to render web pages. The first two modes will render pages the same as IE7, depending on whether or not a DOCTYPE is provided ('Quirks Mode' and 'Standards Mode'). However, in order to take advantage of the improved standards compliance in IE8, Web developers will have to opt-in by adding an additional meta tag to their web pages. This improved standards mode is the same that was recently reported to pass the Acid 2 test, as was discussed here."
Handhelds

Origin of the iPhone 230

rambilly brings us a story from Wired about the origin and development of the iPhone. From the article: "Steve Jobs had tasked about 200 of Apple's top engineers with creating the iPhone. Yet here, in Apple's boardroom, it was clear that the prototype was still a disaster. It wasn't just buggy, it flat-out didn't work. The phone dropped calls constantly, the battery stopped charging before it was full, data and applications routinely became corrupted and unusable. The list of problems seemed endless. At the end of the demo, Jobs fixed the dozen or so people in the room with a level stare and said, 'We don't have a product yet.' The effect was even more terrifying than one of Jobs' trademark tantrums. When the Apple chief screamed at his staff, it was scary but familiar. This time, his relative calm was unnerving. 'It was one of the few times at Apple when I got a chill,' says someone who was in the meeting."
Media

HD Monitor Causes DRM Issues with Netflix 540

Jeremiah Cornelius points us to Davis Freeberg's blog, where he discusses his "nightmare scenario" of losing access to his DRM-protected purchases by upgrading his PC monitor. "When I called them they confirmed my worst fears. In order to access the Watch Now service, I had to give Microsoft's DRM sniffing program access to all of the files on my hard drive. If the software found any non-Netflix video files, it would revoke my rights to the content and invalidate the DRM. This means that I would lose all the movies that I've purchased from Amazon's Unbox, just to troubleshoot the issue. Because my computer allows me to send an unrestricted HDTV feed to my monitor, Hollywood has decided to revoke my ability to stream 480 resolution video files from Netflix. In order to fix my problem, Netflix recommended that I downgrade to a lower res VGA setup."

Microsoft Complains About Google's Monopoly Abuse 384

I Don't Believe in Imaginary Property writes "Frustrated at the FTC's blessing of the Google/Doubleclick merger, Microsoft is complaining to the EU. Its latest filings detail how the merger would give Google a stranglehold on the advertising industry. While these complaints aren't new, the diagram [PDF] Microsoft created gives you an interesting look at the sort of competition Microsoft fears from Google."
The Courts

FBI Bullet Analysis Technique Invalidated With Science

Hugh Pickens writes "The Washington Post reports that the FBI has abandoned comparative bullet-lead analysis, the technique using chemistry to link crime-scene bullets to ones possessed by suspects. The comparison was made on the theory that each batch of lead had a unique elemental makeup. The National Academy of Sciences has revealed that decades of FBI statements to jurors linking a particular bullet to those found in a suspect's gun or cartridge box were so overstated that such testimony should be considered 'misleading under federal rules of evidence.' NAS says that the flaw is in using a statistical method called chaining (pdf). Analysts sequentially compared crime scene bullets to a set of reference bullets ... which can lead to the formation of artificially large sets of matching bullets. The government has fought releasing the list of the estimated 2,500 cases over three decades in which the FBI performed the flawed analysis."
United States

All US Border Crossings Now Require A 'Terrorist Risk Profile' 710

conlaw writes with a somewhat intimidating Washington Post article. "The federal government disclosed details yesterday of a border-security program to screen all people who enter and leave the United States, create a terrorism risk profile of each individual and retain that information for up to 40 years ... The risk assessment is created by analysts at the National Targeting Center, a high-tech facility opened in November 2001 and now run by Customs and Border Protection. In a round-the-clock operation, targeters match names against terrorist watch lists and a host of other data to determine whether a person's background or behavior indicates a terrorist threat, a risk to border security or the potential for illegal activity. They also assess cargo."
Music

How Do You Find New Non-RIAA Music? 319

burgundysizzle writes "Given the general reaction to the RIAA in comments, I assume that there are a number of users that try not to buy from RIAA sources. What alternatives do you use - or more importantly - what methods do you use to discover alternative sources of music? I use Sellaband.com (some free legal music available) and Amiestreet.com (new music is free and most music really cheap) to find new music, but I'm always on the lookout for interesting sites to discover new music. Tell me about your experiences and any other interesting places you get new music from. I'm looking for inexpensive, and legal."
Security

Cryptography Expert Sounds Alarm At Possible Math Hack 236

netbuzz writes "First we learn from Bruce Schneier that the NSA may have left itself a secret back door in an officially sanctioned cryptographic random-number generator. Now Adi Shamir is warning that a math error unknown to a chip makers but discovered by a tech-savvy terrorist could lead to serious consequences, too. Remember the Intel blunder of 1996? 'Mr. Shamir wrote that if an intelligence organization discovered a math error in a widely used chip, then security software on a PC with that chip could be "trivially broken with a single chosen message." Executing the attack would require only knowledge of the math flaw and the ability to send a "poisoned" encrypted message to a protected computer, he wrote. It would then be possible to compute the value of the secret key used by the targeted system.'"
It's funny.  Laugh.

Babelfish Sparks Minor Diplomatic Row 331

Stony Stevenson writes with a link to a cautionary tale on the ITnews site. A group of journalists heading to The Netherlands were gathering some information prior to the trip. They sent off an email to the Dutch foreign ministry asking some questions, but as they weren't native speakers they needed some help. Unfortunately, they turned to Babelfish for official correspondence. "The beginning of the email read: 'Helloh bud, enclosed five of the questions in honor of the foreign minister: The mother your visit in Israel is a sleep to the favor or to the bed your mind on the conflict are Israeli Palestinian.'"

Slashdot Top Deals

"Protozoa are small, and bacteria are small, but viruses are smaller than the both put together."

Working...