Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Space

Virgin Galactic Shows the Finished WhiteKnight Two 212

Klaus Schmidt writes "Virgin Galactic today unveiled their WhiteKnight Two mothership, called 'EVE.' It is designed to carry the smaller SpaceShip Two into space. The rollout represents another major milestone in Virgin Galactic's quest to launch the world's first private, environmentally benign, space access system for people, payload and science. Christened 'EVE' in honor of Richard Branson's mother — Sir Richard performed the official naming ceremony — WK2 is both visually remarkable and represents ground-breaking aerospace technology. It is the world's largest all carbon composite aircraft and many of its component parts have been built using composite materials for the very first time. At 140 ft, the wing span is the longest single carbon composite aviation component ever manufactured."
The Internet

Cuba Getting Internet Upstream Via Venezuela 486

An anonymous reader writes "Seems like Cuba is working around the US internet embargo by teaming up with Venezuela: A confidential contract released yesterday on Wikileaks reveals Cuba's plan to receive internet upstream via an undersea cable to Venezuela, thus circumventing the enduring embargo of the US, denying Cuba access to nearby American undersea cables and overcoming the current limits of satellite-only connectivity. The connection, to be delivered by CVG Telecom of Venezuela, is to be completed by 2010 and will provide data, video as well as voice service for both the public and governmental services."
Government

Submission + - Bush claims executive privilege

gawiedeboef writes: ...in Valerie Plame Wilson case
The concept of executive privilege rings a special bell with readers of a certain age.
It was relied on by the Richard M. Nixon White House seeking to shield documents and personnel from inquiring congressional committees and prosecutors during the Watergate investigations.

President Bush quietly claimed executive privilege on Tuesday, after Atty. Gen. Michael B. Mukasey requested the shield.
Mukasey is seeking to avoid delivering to congressional investigators documents dealing with interviews of Vice President Dick Cheney and members of his staff regarding the unmasking of CIA covert agent Valerie Plame Wilson.
Science

NASA Drone's Sensors Battle California Wildfires 58

An anonymous reader writes "California is burning, but according to this article advanced sensors on NASA's Ikhana unmanned aerial vehicle (UAV) can detect exact temperatures (within half a degree) through the smoke, enabling the drone to spot for the firefighters battling the more than 300 wildfires. NASA's Ikhana is the same aircraft as the Predator, except it's being used here to save lives."
Google

Gmail Reveals the Names of All Users 438

ihatespam writes "Have you ever wanted to know the name of admin@gmail.com? Now you can. Through a bug in Google calendars the names of all registered Gmail accounts are now readily available. All you need to find out the names of any gmail address is a Google calendar account yourself. Depending on your view this ranges from a harmless "feature" to a rather serious privacy violation. According to some reports, spammers are already exploiting this "feature"/bug to send personalized spam messages."
Transportation

American Solar Challenge Racers Head For Canada 144

coondoggie writes "Solar race cars this week began their nine-day, 2,400 mile chase from Dallas to Calgary, Alberta using only the sun for fuel. The 24 teams in the American Solar Challenge race are mainly US college teams including entries from MIT, Ohio State and Northwestern. The University of Michigan's Continuum car is the defending champ, having won the Challenge in Australia last year. The University of Michigan has won four out of the eight North American Solar Challenges it has entered with its team of more than 100 engineering students, who have vowed to defend their title this year."
America Online

AOL In Talks With Microsoft to Merge Online Divisions, Says WSJ 143

Ian Lamont writes "Microsoft executives are reportedly meeting with their AOL counterparts to discuss combining the two companies' online divisions. No one from either side is willing to comment, nor has the structure of the supposed deal been worked out. The original unconfirmed report comes from the Wall Street Journal (password-protected). A few months ago there was talk about AOL teaming up with Yahoo, but that never materialized." The free excerpt at the WSJ link above seems to say about as much as this Bloomberg wire report which refers to it, and the above-linked story at The Standard; this Reuters story indicates that AOL is still courting or being courted by Yahoo!, too.
NASA

NASA Contractor Needs Urine 291

Apparently, NASA sent a memo to its employees at the Johnson Space Center asking for their urine so they, NASA, could use it to test the Orion space capsule. How much urine? 30 liters per day, including weekends. Disposal of urine for up to six months would be required if Orion is to work as planned.

Alert reader nettamere adds a link to story at Discovery.com, excerpting: "Donations will be treated with a chemical that can hold solid particulates in the liquid so they don't clog up the tubing in microgravity, said Leo Makowski, company spokesman for Hamilton Sundstrand, a contractor designing the new spaceship's toilet. ... "It's difficult to come up with a faux urine, explained NASA's Jim Lewis, the systems manager overseeing development of Orion's potty. 'That's why we depend on collections.'"

Portables

Toshiba Launches First Cell-based Laptop 172

MojoKid writes "On Tuesday, Toshiba launched the Qosmio G55-802, the first laptop available with the Cell CPU. Yes, think PS3 technology, developed jointly by Toshiba, Sony, and IBM. However, in particular, the Cell CPU is not about gaming, but about the multimedia experience. Taking the load away from the Intel CPU, the Cell processor performs gesture control, face navigation, transcoding and upscaling to HD. Interestingly (and necessary, with 4 GB of RAM), the system comes with 64-bit Vista installed by default, but 32-bit Vista ships as an option as well." However, semi-relatedly, if you'd prefer your Cells run open-source code, 1i1' blu3 writes "IBM's put up an open source project downloads page for the Cell processor — APIs, toolkits, IDEs, libraries, algorithms, etc. Most of the stuff on it right now is from SourceForge, but they are asking for user contributions to add to it." (Terra Soft's also been providing a Cell-compatible Linux distro for a while now, and according to Wikipedia the kernel's supported it since version 2.6.16.)
Security

Researchers Simplify Quantum Cryptography 106

Stony Stevenson writes "Quantum cryptography, the most secure method of transmitting data, has taken a step closer to mainstream viability with a technique that simplifies the distribution of keys. Researchers at NIST claim that the new 'quantum key distribution' method minimizes the required number of detectors, the most costly components in quantum crypto. Four single-photon detectors are usually required (these cost $20K to $50K each) to send and decode cryptography keys. In the new method, the researchers designed an optical component that reduces the required number of detectors to two. (The article mentions that in later refinements to the published work, they have reduced the requirement to one detector.) The researchers concede that their minimum-detector arrangement cuts transmission rates but point out that the system still works at broadband speeds."
Security

Schneier's Keynote At Linux.conf.au 138

Stony Stevenson writes "Computer security expert Bruce Schneier took a swipe at a number of sacred cows of security including RFID tags, national ID cards, and public CCTV security cameras in his keynote address to Linux.conf.au (currently being held in Melbourne, Australia). These technologies were all examples of security products tailored to provide the perception of security rather than tackling actual security risks, Schneier said. The discussion of public security — which has always been clouded by emotional decision making — has been railroaded by groups with vested interests such as security vendors and political groups, he claimed. 'For most of my career I would insult "security theater" and "snake oil" for being dumb. In fact, they're not dumb. As security designers we need to address both the feeling and the reality of security. We can't ignore one. It's not enough to make someone secure, that person needs to also realize they've been made secure. If no-one realizes it, no-one's going to buy it,' Schneier said."
Security

Yahoo CAPTCHA Hacked 252

Hell Yeah! reminds us of a 2-week-old development that somehow escaped notice here. A team of Russian hackers has found a way to decipher a Yahoo CAPTCHA, thought to be one of the most difficult, with 35% accuracy. The Russian group's notice, posted by one "John Wane," is dated January 16. This site hosts a rapidshare link to what looks to be demonstration software for Windows, and quotes the Russian researchers: "It's not necessary to achieve high degree of accuracy when designing automated recognition software. The accuracy of 15% is enough when attacker is able to run 100,000 tries per day, taking into the consideration the price of not automated recognition — one cent per one CAPTCHA."
The Courts

Magistrate Suggests Fining RIAA Lawyers 133

NewYorkCountryLawyer writes "Angered at the RIAA's 'gamesmanship' in joining multiple 'John Does' in a single case without any basis for doing so, a Magistrate Judge in Maine has suggested to the presiding District Judge in Arista v. Does 1-27 that the record companies and/or their lawyers should be fined under Rule 11 of the Federal Rules, for misrepresenting the facts. In a lengthy footnote to her opinion recommending denial of a motion to dismiss the complaint (PDF, see footnote 5), Judge Kruvchak concluded that 'These plaintiffs have devised a clever scheme to obtain court-authorized discovery prior to the service of complaints, but it troubles me that they do so with impunity and at the expense of the requirements of Rule 11(b)(3) because they have no good faith evidentiary basis to believe the cases should be joined.' She noted that once the RIAA dismisses its 'John Doe' case it does not thereafter join the defendants when it sues them in their real names. Arista v. Does 1-27 is the same case in which student attorneys at the University of Maine Law School, "enthusiastic about being directly connected to a case with a national scope and significance", are representing undergrads targeted by the RIAA."
Social Networks

Aboriginal Archive Uses New DRM 182

ianare writes "An application that gives fresh new meaning to 'digital rights management' has been pioneered by Aboriginal Australians. It relies on a user's profile to control access to a multimedia archive. The need to create profiles based on a user's name, age, sex and standing within their community comes from traditions over what can and cannot be viewed. For example, men cannot view women's rituals, and people from one community cannot view material from another without first seeking permission. Images of the deceased cannot be viewed by their families. These requirements threw up issues surrounding how the material could be archived, as it was not only about preserving the information into a database in a traditional sense, but also about how people would access it depending on their gender, their relationship to other people, and where they were situated."

Slashdot Top Deals

There's nothing worse for your business than extra Santa Clauses smoking in the men's room. -- W. Bossert

Working...