Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Transportation

Boston University Working On LED Wireless Networks 179

Madas writes "This article on Absolute Gadget details how researchers at Boston University's College of Engineering are working on devloping wireless networks that use LED lights instead of normal radio waves. This research apparently has other uses in the automobile industry. Apparently the LEDs could warn you if the driver in front has put the brakes on so could avoid hitting the car in front. Personally, I'd use the vision balls that are in my thought box."
Politics

How Can Nerds Make a Difference In November? 950

Scott Aaronson offers an intriguing call for ideas on how nerds can supercharge the political process this year. He's clearly an Obama admirer and phrases his challenge this way: "What non-obvious things can nerds who are so inclined do to help the Democrats win in November?" But the question itself is not inherently partisan. The analogy Aaronson gives is to the Nadertrading idea in 2000 (which we discussed at the time). What's the Nadertrading for 2008? "The sorts of ideas I'm looking for are ones that (1) exploit nerds' nerdiness, (2) go outside the normal channels of influence, (3) increase nerds' effective voting power by several orders of magnitude, (4) are legal, (5) target critical swing states, and (6) can be done as a hobby."
Security

Sneaky Blackmailing Virus That Encrypts Data 409

BaCa writes "Kaspersky Lab found a new variant of Gpcode which encrypts files with various extensions using an RSA encryption algorithm with a 1024-bit key. After Gpcode.ak encrypts files on the victim machine, it changes the extension of these files to ._CRYPT and places a text file named !_READ_ME_!.txt in the same folder. In the text file the criminal tells the victims that the file has been encrypted and offers to sell them a decryptor. Is this a look into the future where the majority of malware will function based on extortion?"
Math

Rubik's Cube Proof Cut To 25 Moves 386

KentuckyFC writes "A scrambled Rubik's cube can be solved in just 25 moves, regardless of the starting configuration. Tomas Rokicki, a Stanford-trained mathematician, has proven the new limit (down from 26 which was proved last year) using a neat piece of computer science. Rather than study individual moves, he's used the symmetry of the cube to study its transformations in sets. This allows him to separate the 'cube space' into 2 billion sets each containing 20 billion elements. He then shows that a large number of these sets are essentially equivalent to other sets and so can be ignored. Even then, to crunch through the remaining sets, he needed a workstation with 8GB of memory and around 1500 hours of time on a Q6600 CPU running at 1.6GHz. Next up, 24 moves."
Hardware Hacking

Hacking Asus EEE 150

An anonymous reader writes "Torsten Lyngaas has published a set of instructions with photographs on his personal wiki that describe the steps he took to install $450 worth of extra hardware, including a GPS receiver, an FM transmitter, Bluetooth, extra USB ports, 802.11n, and an extra 4GB flash storage drive."
Wireless Networking

TV White Space & The Future of Wireless Broadband 119

DeviceGuru writes "The unoccupied radio spectrum between broadcast TV channels may soon become a source of low-cost, ubiquitous broadband connectivity. Earlier this month, the U.S. Federal Communications Commission began Phase II testing of 'white space device' prototypes, to determine whether WSDs can operate without interfering with the other wireless devices commonly used in homes, offices, and public locations. A key advantage of white space wireless technology, compared to the combination of WiFI and WiMAX, is its TV-like ability to cover broad areas and penetrate walls and trees, using relatively low power levels."
Businesses

Best Practices For Process Documentation? 370

jollyreaper writes "I have a nice new IT job with a non-profit. They are a growing organization and management has realized that they need to bring their way of doing business up to a professional level. Several years back, their IT department was still operated like it was in a home office — fine when you're dealing with three people, not so good when there's over a hundred users. IT got its act together and is now running professionally and efficiently. The rest of the organization is a bit more chaotic and management wants to change that. One of the worst problems is a lack of process documentation. All knowledge is passed down via an oral tradition. Someone gets hit by a bus and that knowledge is lost forevermore. Now I know what I've seen in the past. There's the big-binder-of-crap-no-one-reads method, usually used in conjunction with nobody-updates-this-crap-so-it's-useless-anyway approach. I've been hearing good things about company wikis, and mixed reviews about Sharepoint and its intranet capabilities. And yes, I know that this is all a waste of time if there's no follow-through from management. But assuming that the required support is there, how do you guys do process documentation?"
Patents

AIDS Drug Patent Revoked In US 357

eldavojohn writes "Doctors Without Borders is reporting that four patents for tenofovir disoproxil fumarate, a key AIDS/HIV drug, have been revoked on grounds of prior art. This is potentially good news for India & Brazil who need this drug to be cheap; if the US action leads to the patent being rejected in these countries, competition could drastically lower prices. But the ruling bad news for Gilead Sciences. The company has vowed to appeal. We discussed this drug before."
Science

Tool Use Is Just a Trick of the Mind 326

TwistedOne151 writes to recommend a ScienceNOW article describing the work of a team of Italian neurobiologists who have found the roots of the capacity for tool use in the primate brain: the brain treats the tool as part of the body. The experiment as described is passing clever.
Security

Schneier's Keynote At Linux.conf.au 138

Stony Stevenson writes "Computer security expert Bruce Schneier took a swipe at a number of sacred cows of security including RFID tags, national ID cards, and public CCTV security cameras in his keynote address to Linux.conf.au (currently being held in Melbourne, Australia). These technologies were all examples of security products tailored to provide the perception of security rather than tackling actual security risks, Schneier said. The discussion of public security — which has always been clouded by emotional decision making — has been railroaded by groups with vested interests such as security vendors and political groups, he claimed. 'For most of my career I would insult "security theater" and "snake oil" for being dumb. In fact, they're not dumb. As security designers we need to address both the feeling and the reality of security. We can't ignore one. It's not enough to make someone secure, that person needs to also realize they've been made secure. If no-one realizes it, no-one's going to buy it,' Schneier said."
Security

Yahoo CAPTCHA Hacked 252

Hell Yeah! reminds us of a 2-week-old development that somehow escaped notice here. A team of Russian hackers has found a way to decipher a Yahoo CAPTCHA, thought to be one of the most difficult, with 35% accuracy. The Russian group's notice, posted by one "John Wane," is dated January 16. This site hosts a rapidshare link to what looks to be demonstration software for Windows, and quotes the Russian researchers: "It's not necessary to achieve high degree of accuracy when designing automated recognition software. The accuracy of 15% is enough when attacker is able to run 100,000 tries per day, taking into the consideration the price of not automated recognition — one cent per one CAPTCHA."
The Courts

Magistrate Suggests Fining RIAA Lawyers 133

NewYorkCountryLawyer writes "Angered at the RIAA's 'gamesmanship' in joining multiple 'John Does' in a single case without any basis for doing so, a Magistrate Judge in Maine has suggested to the presiding District Judge in Arista v. Does 1-27 that the record companies and/or their lawyers should be fined under Rule 11 of the Federal Rules, for misrepresenting the facts. In a lengthy footnote to her opinion recommending denial of a motion to dismiss the complaint (PDF, see footnote 5), Judge Kruvchak concluded that 'These plaintiffs have devised a clever scheme to obtain court-authorized discovery prior to the service of complaints, but it troubles me that they do so with impunity and at the expense of the requirements of Rule 11(b)(3) because they have no good faith evidentiary basis to believe the cases should be joined.' She noted that once the RIAA dismisses its 'John Doe' case it does not thereafter join the defendants when it sues them in their real names. Arista v. Does 1-27 is the same case in which student attorneys at the University of Maine Law School, "enthusiastic about being directly connected to a case with a national scope and significance", are representing undergrads targeted by the RIAA."
Social Networks

Aboriginal Archive Uses New DRM 182

ianare writes "An application that gives fresh new meaning to 'digital rights management' has been pioneered by Aboriginal Australians. It relies on a user's profile to control access to a multimedia archive. The need to create profiles based on a user's name, age, sex and standing within their community comes from traditions over what can and cannot be viewed. For example, men cannot view women's rituals, and people from one community cannot view material from another without first seeking permission. Images of the deceased cannot be viewed by their families. These requirements threw up issues surrounding how the material could be archived, as it was not only about preserving the information into a database in a traditional sense, but also about how people would access it depending on their gender, their relationship to other people, and where they were situated."

Slashdot Top Deals

"Protozoa are small, and bacteria are small, but viruses are smaller than the both put together."

Working...