Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Submission + - Sony’s 360 View 3D Display - No Glasses Need (singularityhub.com)

kkleiner writes: Sony’s been showing off a really cool looking 3D display that’s very reminiscent of the holoprojectors in Star Wars. Called the RayModeler, the cylinder like device projects a 360 view of the virtual objects ‘inside’. Walk all the way around it and you can see a 3D video from every conceivable angle. Not only that, but you can pick up a video game controller and interact with it, or just wave your hand to play with it, because it has gesture controls and renders images in real time! Did I mention you don’t need glasses to watch it?
Apple

Submission + - Apple works to bypass carriers

An anonymous reader writes: Apple and SIM card maker Gemalto are joining hands to weave the SIM card into the iPhone hardware, dealing a blow to carrier exclusivity. Apple and Gemalto have crafted a SIM that is integrated with the iPhone. This allows customers to choose the carrier offering the best deals and also avails Apple the opportunity to sell the phone directly from its retail outlet or from the online store. Customers can activate the phones through the App Store thus bypassing carriers in the process.
Facebook

Submission + - U.S. woman kills baby for interrupting Farmville (torontosun.com)

An anonymous reader writes: A woman in Jacksonville, Fla., pleaded guilty to second-degree murder Wednesday after shaking her infant to death for interrupting her game of Farmville.

Submission + - How often do you google yourself?

Gates82 writes: How often do you google yourself?
Never!
Hourly
Daily
Weekly
Monthly
Yearly
When looking for a job
I thought googling yourself was the other thing

Comment Interesting marketing idea... (Score 1) 1

a) someone, somewhere in the entirety of film history has made a hand gesture that we might interpret nowadays as "a bit like holding a mobile phone".

b) this hand gesture appears on a couple of seconds of film. Two and a half minutes is a lot of Youtube single-shot watching time just to see the bit the conspiracy theorists are going to get all moist about.

Wireless Networking

Submission + - Wireless HDMI at 1080p, Lag-Free WHDI Tested (hothardware.com) 1

MojoKid writes: "Wireless HDMI technologies have finally come of age. Though there are two camps currently in the market (Intel's WiDi and WHDI), the bottom line is lag-free full HD 1080p wireless HDMI video/audio transmission is now a reality. No longer does an HTPC need to be shoehorned into the confines of the entertainment center. Also, that notebook you have perched on the coffee table just got a major display upgrade. This demo of the Asus WiCast and the briteView HDelight wirless HDMI transmitter kits, shows the technology in action and it's impressive actually. Both of these WHDI-based kits utilize the same family of Amimon WHDI transmitter and receiver chipsets. The technology is capable of full 1080p HD video and Dolby Digital surround sound audio transmissions, over distances of up to 30 feet with less than a millisecond of latency."

Submission + - Vacuums Made From Plastic Waste From the Sea (gizmag.com)

Zothecula writes: Since announcing the Vac from the Sea initiative in June, Electrolux has been busy working with environmental organizations and concerned individuals to collect plastic debris from marine environments around the globe. Now the company has announced the creation of five one-off vacuum cleaner creations manufactured using waste collected from key areas, including Hawaii, the North Sea and the Mediterranean.

Submission + - The Arbitrary Future of Mac App Store Development (infoworld.com)

snydeq writes: "Fatal Exception's Neil McAllister views the explicitly arbitrary nature of Apple's Mac App Store developer guidelines not only troubling but a possible harbinger of hard times for developers, should Apple's Mac App Store model prove the PC norm. 'Who decides whether a crash was caused by an application or by a bug in someone else's device driver? How many bugs can be "exhibited" before a complex application is deemed unsuitable for sale? When does an application cross the line from being similar to another application in the store to duplicating it, and who decides which app came first? How many Human Interface Guidelines can you bend before your UI is considered unappealing? The Mac App Store guidelines make it clear that Apple intends to be the sole arbiter of such decisions, yet the terms seem almost intentionally vague, and developers are given no process of appeal,' McAllister writes. 'That's a disturbing precedent, and with a Windows App Store already reportedly on the way, it's one I hope other platform vendors don't follow.'"
Security

Submission + - New Critical Flash Bug Being Exploited (threatpost.com)

Trailrunner7 writes: On the same day that it plans to release a patch for a critical flaw in Shockwave, Adobe confirmed on Thursday morning that there is a newly discovered bug in Flash that is being actively exploited already in attacks against Reader. The vulnerability affects Flash on all of the relevant platforms, including Android, as well as Reader on Windows and Mac, and won't be patched for nearly two weeks.

The new Flash bug came to light early Thursday when a researcher posted information about the problem, as well as a Trojan that is exploiting it and dropping a pair of malicious files on vulnerable PCs. Researcher Mila Parkour tested the bug and posted a screenshot of the malicious files that a Trojan exploiting the vulnerability drops during its infection routine. Adobe has since confirmed the vulnerability and said that it is aware of the attacks against Reader.

Google

Submission + - Oracle: Google 'Directly Copied' Our Java Code (itworld.com) 1

itwbennett writes: On Wednesday, Oracle amended the lawsuit it filed against Google in August, saying that 'approximately one third of Android's Application Programmer Interface (API) packages' are 'derivative of Oracle's copyrighted Java API packages' and related documents. In particular, 'the infringed elements of Oracle America's copyrighted work include Java method and class names, definitions, organization, and parameters; the structure, organization and content of Java class libraries; and the content and organization of Java's documentation,' Oracle says. 'In at least several instances, Android computer program code also was directly copied from copyrighted Oracle America code,' Oracle alleges.

Submission + - Life-saving radio network being developed in Congo (wired.co.uk)

Lanxon writes: Vulnerable towns and villages in Congo are being given a potentially life-saving early-warning to escape rebel assaults. The plan is to reinforce and modify an existing Very High Frequency radio network maintained by rural parishes, transforming it into a system capable of quickly disseminating information on rebel movements, reports Wired. The early-warning network promises to save hundreds or even thousands of lives, and at low cost: just $140,000 for new equipment. It's a striking example of applying basic technology to mitigate strictly human problems in a harsh and remote environment. It's frontier tech. And for the hundreds of thousands of people it will benefit, the radio network is a "home-run," according to Adam Finck, a key organiser.

Submission + - Time Traveler Using Cellphone in 1928 Movie (foxnews.com) 1

capitalj writes: Has someone already gone back from the future? This week, the makers of Back To The Future kicked off celebrations marking the 25th anniversary of the release of the original movie
  starring Michael J. Fox. In the same week, an Irish independent filmmaker has gone public with what he says is footage of a time traveller caught walking through a scene on a recent DVD release of Charlie Chaplin's 1928 film, The Circus.

Security

Submission + - Cybercriminals Increase Targeted Attacks on Retail (securityweek.com)

wiredmikey writes: Targeted attacks or Advanced Persistent Threats as they are also known, have the ultimate aim of gaining access to specific sensitive data, corporate intellectual property or access to confidential internal systems. A report released today notes that between 200 and 300 organizations are typically targeted each month with the industry sector varying. Over time, the same individuals are targeted but using different exploit methods. For example, in October, an average of 5.4 users was targeted within each organization. While targeted emails by nature are sent in low volumes, they are one of the most damaging types of malicious attacks...

Slashdot Top Deals

Living on Earth may be expensive, but it includes an annual free trip around the Sun.

Working...