Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Moth-eye (Score 5, Informative) 112

I'll see your Wikipedia reference and raise you two USPTO patents granted to SONY for this:

8,027,090 and 7,633,045.

Note: according to another of SONY's patents, moth-eye can also be used to record info on optical media:

"Today, there are seven primary methods by which information can be recorded on optical media. All methods heat the recording layer to a certain temperature. The methods are known as ablative, alloying, bubble-forming, moth-eye, phase-change, dye/polymer and magneto-optic which cause or could cause some mechanical deformation of the substrate."

P.S.

Unlike TFA these patents include detailed drawings and SEM photographs.

P.S.S.

I remember when the authors of tech articles did this kind of background research. Sigh.

Technology

Submission + - How repurposed military tracking technology is remaking the NBA (fastcodesign.com)

PatPending writes: FTA:

The technology was originally developed to track missiles. Now, SportVU systems hang from the catwalks of 10 NBA arenas, tiny webcams that silently track each player as they shoot, pass, and run across the court, recording each and every move.

Their system captures the X/Y coordinates of all the players and refs--along with the X/Y/Z (3-D) coordinates of the ball--25 times every second (or 72,000 times a game). Algorithms take into account all sorts of variables to keep the system accurate, from the lines on the court to the reflections of flashing billboards. Another layer of software at a central server puts this raw data together into something meaningful. Information as specific as player ball touches and dribbles can be calculated within 60 seconds of being spotted by SportVU cams. Stats can generate these values in simple, automated reports.

On one hand, deeper data seems inevitable--and no one is disagreeing that SportVU has incredible potential with deep data--on the other, with no teams all that interested in sharing how they’re potentially innovating with that data, it’s making his job no easier. “I know for a fact some of those teams are using it quite a bit. They don’t tell me exactly what they’re doing with it. Some teams are fairly open and they ask for our help. Others are very secretive,” Kopp says. “Because, for a while, it is all about how you’re using it. Once they figure out something they think is meaningful, they don’t want anyone to get a whiff of it.”

Security

Submission + - Hacked companies fight back with controversial steps (reuters.com)

PatPending writes: FTA:

Frustrated by their inability to stop sophisticated hacking attacks or use the law to punish their assailants, an increasing number of U.S. companies are taking retaliatory action.

Known in the cyber security industry as "active defense" or "strike-back" technology, the reprisals range from modest steps to distract and delay a hacker to more controversial measures. Security experts say they even know of some cases where companies have taken action that could violate laws in the United States or other countries, such as hiring contractors to hack the assailant's own systems.

Other security experts say a more aggressive posture is unlikely to have a significant impact in the near term in the overall fight against cybercriminals and Internet espionage. Veteran government and private officials warn that much of the activity is too risky to make sense, citing the chances for escalation and collateral damage.

Comment Note: not for XP (Score 4, Informative) 104

From Adobe's news release:

[Emphasis added]

The restrictions we apply to this sandboxed process come from the Windows OS. Windows Vista and Windows 7 provide the tools necessary to properly sandbox a process. For the Adobe Reader and Acrobat sandbox implementation introduced in 2010, Adobe spent significant engineering effort trying to approximate those same controls on Windows XP. Today, with Windows 8 just around the corner and Windows XP usage rapidly decreasing, it did not make sense for the Flash Player team to make that same engineering investment for Windows XP. Therefore, we've focused on making Protected Mode for Firefox available on Windows Vista and later.

Google

Submission + - Google accused of invading privacy with pictures of house numbers (telegraph.co.uk)

PatPending writes: FTA: "Internet users are being asked to read random property numbers snapped by Google's Street View cameras, as part of new security checks.

The tests weed out "bots" by ensuring that users are human. But Google has been accused of exploiting the data submitted in by the public for commercial gain — by adding the information to its own mapping system.

Campaign groups said that the use of pictures of real house numbers presents “serious” security issues, and accused the internet company of being “underhand and crude”."

Comment New? It's been going on since at least 2003 (Score 5, Informative) 15

This research has been going on since at least 2003.

(Note: don't bother clicking the URL at the bottom of the page -- it's currently 403. I did send the webmaster an email about it.)

So the submission links to a blog? And no images! Oh, my.

Here is a link to a research paper -- with images! Multiscale photoacoustic microscopy and computed tomography

Comment Re:vice president for worldwide content protection (Score 4, Funny) 214

Heh. Reminds me of a story from the sixties about General Motors. A customer called GM to complain about his car.

The phone operator asked what was wrong and the guy said a mirror was defective.

"Which mirror?" she asked.

"The side mirror" he replied.

"Which side?"

"The passenger side."

"I'll connect you to the Vice President for Passenger Side Mirrors."

Dunno if it's true or not. My grandfather worked in the US auto industry for 30 years and had lots of interesting stories to tell...

Slashdot Top Deals

I've noticed several design suggestions in your code.

Working...