Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Image

Parrots Can Dance 104

juuri sends in an NPR article about the consensus created among scientists that some birds actually dance to music. "The results of this study are reported in the journal Current Biology, along with another scientific paper inspired by YouTube videos of dancing animals. Adena Schachner is a graduate student in the psychology department of Harvard University. She says she was familiar with the idea that some people had made videos of birds supposedly dancing. ... She and her colleagues eventually analyzed more than 5,000 videos. 'Imagine watching YouTube eight hours a day for a month,' she says. 'That's pretty much what we did. It was amusing for perhaps the first couple of hours.'" juuri adds, "While this makes them somewhat unique in the animal world, as only three animals are now known to dance by verifiable proofs, what struck me more was that this was the first time YouTube had helped forge a new scientific understanding. Given the explosive growth of uploading videos and people watching them, what other new understandings and popular misconceptions will be proven or disproved due to this emerging media?"
Data Storage

Sun To Include SSDs On Server Motherboards 79

snydeq writes "Sun has announced plans to integrate solid-state drives onto server motherboards to provide faster data access for I/O intensive applications. For now, the company is offering SSDs that customers can slide into their storage bays, but long term, Sun will locate SSDs closer to the server CPUs to cut the bottleneck that occurs when powerful, multicore CPUs have to wait for data to be delivered from hard drives, according to the company. The move could mark a change in how Sun servers are designed going forward, including the possibility of servers that have no hard drive, relying entirely on SSDs."
Privacy

Combining BitTorrent With Darknets For P2P Privacy 325

CSEMike writes "Currently popular peer-to-peer networks suffer from a lack of privacy. For applications like BitTorrent or Gnutella, sharing a file means exposing your behavior to anyone interested in monitoring it. OneSwarm is a new file sharing application developed by researchers at the University of Washington that improves privacy in peer-to-peer networks. Instead of communicating directly, sharing in OneSwarm is friend-to-friend; senders and receivers exchange data using multiple intermediaries in an overlay mesh. OneSwarm is built on (and backwards compatible with) BitTorrent, but includes numerous extensions to improve privacy while providing good performance: point-to-point encryption using SSL, source-address rewriting, and multi-path and multi-source downloading. Clients and source are available for Linux, Mac OS X, and Windows."
Operating Systems

DragonFly BSD 2.2 Released 44

An anonymous reader writes "DragonFly BSD 2.2 is now available. The second release to feature the HAMMER (versioning, among other things) filesystem — now considered production-ready — it includes 'major stability improvements across the board, new drivers, much better pkgsrc support and integration.' Apart from the CD ISO, this release has a DVD ISO with 'a fully operational X environment,' as well as a bootable USB disk-key image."
Google

Google Router Rumors 267

An anonymous reader writes "There's a new rumor that Google is developing its own router. The company won't comment on the story, but it's been in the hardware business for a while and expanded its presence with Android. If Larry Ellison can go halvsies with HP on a server, then Eric Schmidt should certainly be able to make Cisco nervous."
Image

Artist Wants to Replace Lost Eyeball With Webcam 156

A one-eyed San Francisco artist, Tanya Vlach, wants to replace her missing eye with a Web cam. There has even been talk of her shooting a reality TV show using the video eye. "There have been all sorts of cyborgs in science fiction for a long time, and I'm sort of a sci-fi geek, with the advancement of technology, I thought, 'Why not?'" said Vlach. I'm a bit perplexed that the obvious things you'd want in a cyborg eye: range finder, infrared/lowlight vision, and a hypno-ray are not discussed in the article.
Software

(Useful) Stupid Vim Tricks? 702

haroldag writes "I thoroughly enjoyed the recent post about Unix tricks, so I ask Slashdot vim users, what's out there? :Sex, :b#, marks, ctags. Any tricks worth sharing?"
Security

Obama, McCain Campaigns Both Hacked, Files Compromised 255

dunezone writes "As the election ends, news is coming out from both campaigns on what happened behind closed doors. During the summer, the Obama campaign had their systems hacked, but so did McCain — and not by each other, but by a third party. '... both the FBI and the Secret Service came to the campaign with an ominous warning: "You have a problem way bigger than what you understand," an agent told Obama's team. "You have been compromised, and a serious amount of files have been loaded off your system." The following day, Obama campaign chief David Plouffe heard from White House chief of staff Josh Bolten, to the same effect: "You have a real problem ... and you have to deal with it." The Feds told Obama's aides in late August that the McCain campaign's computer system had been similarly compromised.'" Also from the article: "Officials at the FBI and the White House told the Obama campaign that they believed a foreign entity or organization sought to gather information on the evolution of both camps' policy positions — information that might be useful in negotiations with a future administration."
Security

Critical Vulnerability In Adobe Reader 160

An anonymous reader writes "Core Security Technologies issued an advisory disclosing a vulnerability that could affect millions using Adobe's Reader PDF file viewing software. Engineers from CoreLabs determined that Adobe Reader could be exploited to gain access to vulnerable systems via the use of a specially crafted PDF file with malicious JavaScript content. Successful exploitation of the vulnerability requires that users open a maliciously crafted PDF file, thereby allowing attackers to gain access to vulnerable systems and assume the privileges of a user running Acrobat Reader."
Software

Wayland, a New X Server For Linux 487

An anonymous reader writes "Phoronix has a new article out on Wayland: A New X Server For Linux. One of Red Hat's engineers has started writing a new X11 server around today's needs and to eliminate the cruft that has been in this critical piece of free software for more than a decade. This new server is called Wayland and it is designed with newer hardware features like kernel mode-setting and a kernel memory manager for graphics. Wayland is also dramatically simpler to target for in development. A compositing manager is embedded into the Wayland server and ensures 'every frame is perfect' according to the project's leader."
The Internet

Air Force To Rewrite the Rules of the Internet 547

meridiangod writes "The Air Force is fed up with a seemingly endless barrage of attacks on its computer networks from stealthy adversaries whose motives and even locations are unclear. So now the service is looking to restore its advantage on the virtual battlefield by doing nothing less than the rewriting the 'laws of cyberspace.'" I'm sure that'll work out really well for them.
Image

Programming .NET 3.5 224

lamaditx writes "The world of the .NET framework is taken to the next level by the release of .NET 3.5. The intended audience of this book are experienced .NET programmers. There are no sections that tell you details about C#, SQL servers or anything like that. I don't recommend this book if you never worked on a .NET project and don't know how to set up a SQL database. You should be aware that the code is written in C#. You might use one of the software code converters if you prefer Visual Basic instead. I think the code is still readable even if you do not know C#. I appreciate the fact that the authors decided to use one language only because it keeps the book smaller. The authors assume you are using Visual Studio 2008. You don't necessarily need to update to 2008 if you are working with an older edition because you can use the free Express Edition to get started." Keep reading for the rest of Adrian's review.
Privacy

Anonymous Anger Rampant On the Web 399

the4thdimension writes "In a story that may bring out the 'duh' in you, CNN has a story about how anonymous anger is rampant on the Internet. Citing various reasons, it attempts to explain why sites like MyBiggestComplaint and Just Rage exist and why anger via the web seems to be everywhere. Various reasons include: anonymity, lack of rules, and lack of immediate consequences. Whatever the reason, they describe that online anger has resulted in real-life violence and suggest methods for parents and teens to cope with e-aggression and to learn to be aware of it." I can't figure out what makes me angrier: my habit of anonymously trolling web forums, or my video game playing.
Education

Discuss the US Presidential Election & Education 1515

In 24 hours, many of you will be able to vote. So as we come down to the wire, this is really our last chance to talk about the issues. We've already discussed Health Care, the War, and the Economy. Today I'm opening up the floor to discuss education. Perhaps no other issue will matter more in 50 years. Which candidate will make the next generation smarter?

Slashdot Top Deals

"Money is the root of all money." -- the moving finger

Working...