Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
NASA

NASA Patents To Be Auctioned 224

Presto Vivace writes to tell us that as a continuing push to commercialize NASA-funded technology a group of 25 NASA patents will be auctioned off this coming October. "The sale, which will include rights to signal processing, GPS for spacecraft and sensor technologies, is the first auction under a partnership announced earlier this month between Goddard's Innovative Partnerships Program (IPP) and Ocean Tomo Federal Services LLC. Ocean Tomo provides a marketplace for intellectual property, which NASA wants to leverage in commercializing its technology."
Media

Sony CTO Starts New "Buy Once, Play Anywhere" Group 138

jriding writes to mention that a new effort, headed by Sony Pictures' CTO, will attempt to allow customers to stream video content seamlessly on any device that they own. One has to wonder how successful or "all encompassing" it will be without Apple, TiVo, and Amazon, some of the major players in the space. "It's all very much in the future, however. The press release is peppered with confidence-wilting phrases such as "will define and build a new media framework" (something this complex hasn't even been defined yet?), "we are developing," and "over time." Without even a spec in place, there's no way we will see working products for at least a year, quite possibly longer. And, if the strategy document we discussed in August remains accurate, new DECE-ready devices will be needed to make the whole scheme work. By the time video stores adopt the tech, electronics firms implement it, movie studios support it, and consumers purchase all the pieces to make it work, will it still matter?"
Software

CodeWeavers Package Google Chrome For Linux and Mac 239

jfbilodeau writes "The fine folks at Codeweavers performed an 11 day experiment in getting Google Chrome working on Linux and Mac. Their efforts resulted in the Chromium proof of concept. 'Not only does this give Mac and Linux users a chance to see what all the hype is about, it also lets the world see just how far Wine has come and how powerful it truly can be. In just 11 days, we were able to bring a modern Windows application across to Mac and Linux.' Caveat: their implementation is free as in beer but not free as in speech."
Google

Google's Floating Datahaven 450

PDG writes "Google has pending plans to take its data centers off-shore, literally. By moving their data centers to floating barges in international waters, they are able to save money on taxes and electricity (using wave based power) as well as reside their operations outside the jurisdiction of governments. There is mention of hurricane and other caveats, but I wonder how they plan to get a bandwidth pipe large enough and still be reliable. Seems like a chapter out of a Neal Stephenson novel." You might recall earlier discussions on the same subject.
Security

New Attack Against Multiple Encryption Functions 130

An anonymous reader sends word of a paper presented a few days back by Adi Shamir, the S in RSA, that promises a new form of mathematical attack against a broad range of cryptographic ciphers. The computerworld.com.au report leans heavily on Schneier's blog entry from the Crypto 2008 conference and the attached comments. Shamir's paper has not been published yet. "[The new attack could affect] hash functions (such as MD5, SHA-256), stream ciphers (such as RC4), and block ciphers (such as DES, Triple-DES, AES) at the Crypto 2008 conference. The new method of cryptanalysis has been called a 'cube attack' and formed part of Shamir's invited presentation at Crypto 2008 — 'How to solve it: New Techniques in Algebraic Cryptanalysis.' The new attack method isn't necessarily going to work against the exact ciphers listed above, but it offers a new generic attack method that can target basically formed ciphers irrespective of the basic cipher method in use, provided that it can be described in a 'low-degree polynomial equation'... What may be the biggest outcome from this research is the range of devices in widespread use that use weaker cryptographic protection, due to power or size limitations, that are now vulnerable to a straightforward mathematical attack."
Security

Submission + - Ohio Study Confirms Voting Systems Vulnerabilities (state.oh.us)

bratgitarre writes: A comprehensive study of electronic voting systems (PDF) by vendors ES&S, Hart InterCivic and Premier (formerly Diebold) found that "all of the studied systems possess critical security failures that render their technical controls insufficient to guarantee a trustworthy election". In particular, they note all systems provide insufficiently protection against threats from election insiders, do not follow well-known security practices, and have "deeply flawed software maintenance" practices. Following up on the devastating results of the California study earlier this year, the evaluation was commissioned by Ohio Secretary of State Jennifer Brunner and conducted by a sizable team of academics and industry consultants. Will Secretary Brunner be forced to decertify (and recertify?) Ohio's elections equipment less than three months before the state's March 3 primary, similar to California's Debra Bowen?
The Courts

Submission + - IP Law Vs. Torrents Vs. User Arguments (comicbookresources.com)

An anonymous reader writes: Apparently, all the cease and desist letters about torrents are as much about policing/preserving trademarks as they are about pirating. In an interview with Comic Book Resources, a lot of downloader arguments are looked at from a legal perspective (not good for the user) and then contrasted with what's actually a good business practice online. Surprise, good business and legal precedent don't mix.
Privacy

Submission + - Prison for those who lie about their age online (presscue.com) 1

Anonymous Coward writes: "An adult caught lying about their age online could face 20 years in prison, according to a bill ordered favorably reported by the US Senate Judiciary Committee yesterday. Under the KIDS Act of 2007(S. 431/H.R.719), aimed at forcing convicted sex offenders to register online identities, "Any person 18 years or older who knowingly misrepresents their age with the intent to use the Internet to engage in criminal sexual conduct involving a minor, or to facilitate or attempt such conduct, shall be fined under this title and imprisoned for not more than 20 years.""
Programming

Submission + - Shredded secret police files being reassembled

An anonymous reader writes: German researchers at the Frauenhofer Institute said Wednesday that they were launching an attempt to reassemble millions of shredded East German secret police files using complicated computerized algorithms. The files were shredded as the Berlin Wall fell in 1989 and it became clear that the East German regime was finished. Panicking officials of the Stasi secret police attempted to destroy the vast volumes of material they had kept on everyone from their own citizens to foreign leaders.
Security

Submission + - California to start review of voting machines

An anonymous reader writes: California Secretary of State Debra Bowen just announced details about the previously slashdotted "top-to-bottom review" of almost all voting and counting systems used in the state. The team features big names in e-voting security: David Wagner, Matt Bishop, Ed Felten, Matt Blaze, and Harri Hursti, among others. Vendors have time to submit their machines including documentation and source code until July 1st or face severe restrictions, including decertification, for the 2008 elections. Scheduled to start next week, the review will include a red-team attack and going through the source code.
Movies

Submission + - Lucas To Make New Live Action Star Wars films

DrNASA writes: An article that quoted George Lucas as saying that SpiderMan 3 is a 'silly movie' also had this interesting bit of King Geek speak: "And here's a little news: Lucas tells me he will make two more live-action films based in the "Star Wars" era. "But they won't have members of the Skywalker family as characters," he said. "They will be other people of that milieu." " TFA — http://www.foxnews.com/story/0,2933,270874,00.html

Slashdot Top Deals

"The chain which can be yanked is not the eternal chain." -- G. Fitch

Working...