Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Education

Submission + - Bird's-Eye View May Include Magnetic Fields

BoredStiff writes: In a story heard on NPR and reported in ScienceDaily reports that a new study finds that migratory birds can "see" magnetic fields. The findings from a current study by a research group from Oldenburg, Germany strongly supports the hypothesis that migratory birds use their visual system to perceive the reference compass direction of the geomagnetic field and that migratory birds are thus likely to "see" the geomagnetic field.
Operating Systems

Submission + - Intel Chief Evangelist comments on Linux scheduler

ByeByeWintel writes: "James Reinders is Intel's Chief Evangelist for Intel's Software Development Products. In a recent interview on Devx.com he stated: "If I could get ONE wish fulfilled would be for OS scheduling to focus on processes, and not threads, for scheduling. And demand that processes manage their scheduling of threads. Why? Because an effective parallel program is going to assume, in general, that all threads are either running or stopped. It is messy to write a parallel program when the OS may be scheduling and unscheduling individual threads which are trying to cooperate. [...] There is a lot of opportunity for operating systems to offer these types of control in the "running of applications" interfaces. I'd like an OS to let me specify the 'world' my application runs in (which processors, how many, etc.) These interfaces are available in Windows at run time (the task manager will let you adjust where a running task can go). I'd like to have more global tools to specify and adjust policies (8-core machinerun "only Outlook" here, run applications on these 4 cores, OS only here, explorer here, etc.)""
It's funny.  Laugh.

Submission + - WSU LUG Nerds to auction themselves to women (ap.org)

Mr. Slippery writes: "Associated Press reports that Washington State University's LUG is planning to hold a "nerd auction". According to LUG president Ben Ford,"You can buy a nerd and he'll fix your computer, help you with stats homework, or if you're really adventurous, take you to dinner!" To promote the LUG (and comp sci in general) to women, the plan is that a handful of LUG members will get makeovers from a sorority. "The girls get to have their way with them and we'll document each makeover. We'll make a snazzy video and show it over dinner. After the dinner, we'll auction off the now studly nerds.""
Security

Submission + - Ebay hacked, users personal information posted 1

An anonymous reader writes: This morning a hacker posted the personal contact information and credit card data of 1,200 ebay users on the eBay.com Trust & Saftey forums. eBay pulled the Trust & Saftey forums off line, but not before one user made a video of the hacked forums and posted it on youtube.com. eBay response is on the eBay chatter page, and seems to try and down play this "fraudster"'s activity.
Television

Submission + - Sling Media Sold to EchoStar for $380 Million

An anonymous reader writes: It was the Slingbox that invented place shifting, the ability to send the content you pay to have delivered to one location (in this case your home cable TV signal) to another location. Now long time investor and Dish Network owner Echostar has come to an agreement to purchase Slingbox parent Sling Media for $380 million. The deal, which should be finalized by the end of the year, brings a little more muscle to Sling. Sling needs a backer with some cash as the major media and sporting entities consider the Slingbox a product that induces copyright infringement and may be mulling legal action. Also, the Slingbox is the subject of a patent suit that could take considerable money to defend. The question is, now that EchoStar has control of Slingbox will it water it down to appease the same media companies it buys its programming from?
Programming

Submission + - How to write a brute-force password cracker (rbgrn.net)

rbgrn writes: "If you have access to a password's hash and salt, if applicable, a brute force attempt to crack it is a guaranteed method if you have the CPU cycles available to compute it in a reasonable amount of time. Unfortunately, guessing every single permutation of characters takes exponentially longer with the length of the password used so often times you are facing months if not years of processing time on a single PC. While there are methods to distribute the work across multiple PCs, I am only going to go over a simple brute force algorithm and will hold off on the distributed processing model for a later article."
Businesses

Submission + - Programmers and overtime

Maximum Prophet writes: Programmers and System Administrators typically don't get overtime. Here's and article about a lawyer who's challanging that:

http://www.msnbc.msn.com/id/20908975/

From the 2nd page:

Computer workers of various stripes, for example, have commonly not been paid for their extra hours. ... But under California law, the exemption applies only for workers whose primary function involves "the exercise of discretion and independent judgment." In numerous lawsuits, Thierman and other plaintiffs' attorneys have alleged that legions of systems engineers, help desk staff, and customer service personnel do no such thing. Of programmers, Thierman says, "Yes, they get to pick whatever code they want to write, but they don't tell you what the program does.... All they do is implement someone else's desires."
The takeaway: Everyone start recording your hours now. Even if you don't sue, someone else might, and documentation about your overtime will go a long way. towards getting your piece of the pie.
Security

Submission + - Security expert: F/OSS taking over in every niche (itmanagersjournal.com)

pschmied writes: From the article: 'For me, when I'm able to sell the concept of open source, it's because I convince them that the total cost of ownership is the lowest. It's not just that sticker price. You can go out and buy commercial products from IBM and Microsoft, but the open source product works just as well, and chances are, you can find more people familiar and skilled with the open source tools than you are going to find with skills for a particular proprietary product. In the end, this is what has driven TCO down. It used to be an argument that you would have a hard time finding employees with open source skills. Now that's an easier proposition than finding the other.'
Privacy

Submission + - British police using microdrone for surveillance (wired.com)

randomjohndoe writes: From the Wired Danger Room blog, British police are using a remotely operated microdrone from Microdrones GmbH for aerial surveillance. TFA includes an embedded video which '...contains some footage shot from a Microdrone, which gives an impressive display of its powers. Zooming in on a sunbather in a bikini as a demonstration is not likely to allay fears about how intrusive this technology might be. And the ability to hover outside a window and peer in is one which is equally open to use and abuse.'

All that's needed to complete the aerial assassin in Dean Ing's 1993 novel, Butcher Bird, is the frickin' laser beam.

http://blog.wired.com/defense/2007/09/british-polices.html

Space

Submission + - Do You Need a Permit to Land on the Moon? (slate.com) 4

Billosaur writes: "With the recent announcement of Google's X-prize for a successful private landing of a robot on the Moon, someone has asked the Explainer at Slate.com if permission is required to land something on the Moon? Turns out that while there is no authority that regulates landing objects on another world, getting there does require the permission of the national government from where the launch takes place. This is in accordance with the 1967 Outer Space Treaty, signed by 91 nations, which regulates the uses of outer space by the nations of Earth. Specifically, Article VI enjoins: "The activities of non-governmental entities in outer space, including the Moon and other celestial bodies, shall require authorization and continuing supervision by the appropriate State Party to the Treaty." Start your paperwork!"
Biotech

Submission + - Pen testing and unintended consequences. 2

shdo writes: Over at http://isc.sans.org/ Craig Goranson submitted a thought provoking question about unintended consequences of pen testing.
http://isc.sans.org/diary.html?storyid=3407

A nagging feeling is telling me that this is just the tip of the iceberg and one which is not only something we will need to take in to account but the possibility of abuse is staggering.
Space

Submission + - Mystery Illness After Meteorite Crash

xynopsis writes: Villagers in southern Peru were struck by a mysterious illness after a meteorite made a fiery crash to Earth in their area, regional authorities said Monday. Residents complained of headaches and vomiting brought on by a "strange odor," local health department official Jorge Lopez told Peruvian radio RPP. Seven policemen who went to check on the reports also became ill and had to be given oxygen before being hospitalized.
Security

Submission + - Which Lost/Stolen Laptop Trackers Do You Like? 2

saudadelinux writes: "I got held up at gunpoint in July, and my laptop was stolen. Fortunately, I was able to get a new one, and I'm typing this post on it.
There companies out which for a fee, install tracker software on your laptop. If it's stolen or lost, they track its whereabouts whenever it gets on the 'Net and work with local law enforcement and ISPs to find the machine. I'm wondering: does anyone use one of those services? Does anyone have a recommendation for which company to go with? I'm using a dual-boot Ubuntu/XP machine, and the couple of companies I've looked at do Windows-only. Are there Linux options? TIA, saudadelinux"

Slashdot Top Deals

"Pay no attention to the man behind the curtain." -- Karl, as he stepped behind the computer to reboot it, during a FAT

Working...