Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Communications

Quad Lasers Deliver Fast, Earth-Based Internet To the Moon 131

A joint project involving NASA and MIT researchers had demonstrated technology last year that could supply a lunar colony with broadband via lasers ("faster Internet access than many U.S. homes get") and has already demonstrated its worth in communications with spacecraft. From ComputerWorld's article: "The Lunar Laser Communication Demonstration (LLCD) kicked off last September with the launch of NASA's LADEE (Lunar Atmosphere and Dust Environment Explorer), a research satellite [formerly] orbiting the moon. NASA built a laser communications module into LADEE for use in the high-speed wireless experiment. LLCD has already proved itself, transmitting data from LADEE to Earth at 622Mbps (bits per second) and in the other direction at 19.44Mbps, according to MIT. It beat the fastest-ever radio communication to the moon by a factor of 4,800." Communicating at such distances means overcoming various challenges; one of the biggest is the variability in Earth's atmosphere. The LLCD didn't try to power through the atmosphere at only one spot, therefore, but used four separate beams in the New Mexico desert, each aimed "through a different column of air, where the light-bending effects of the atmosphere are slightly different. That increased the chance that at least one of the beams would reach the receiver on the LADEE. Test results [were] promising, according to MIT, with the 384,633-kilometer optical link providing error-free performance in both darkness and bright sunlight, through partly transparent thin clouds, and through atmospheric turbulence that affected signal power." At the CLEO: 2014 conference in June, researchers will provide a comprehensive explanation of how it worked.
Security

DARPA Unveils Hack-Resistant Drone 107

savuporo (658486) writes with news based on the work of a DARPA project known as High Assurance Cyber Military Systems: "'The Pentagon's research arm unveiled a new drone built with secure software that "prevents the control and navigation of the aircraft from being hacked. ... The software is designed to make sure a hacker cannot take over control of a UAS. The software is mathematically proven to be invulnerable to large classes of attack,' [HACMS program manager Kathleen] Fisher said." This is currently being demoed on a quad-copter platform. It would be interesting to know the CPU architecture, chipset, programming language and the suite of communication protol this thing uses ."
Education

Teachers Union: Computers Can Negatively Impact Children's Ability To Learn 310

Rambo Tribble (1273454) writes "A teacher's union in Northern Ireland is asserting that children spending too much time on computers are impairing their ability to learn. The asserted excessive computer use is being blamed for an inability to concentrate or socialize. As one teacher puts it, '... these gadgets are really destroying their ability to learn.'" This has been a topic of debate for as long as kids have had computers.
China

China Bans Government Purchases of Windows 8 200

itwbennett (1594911) writes "Last week, China's Central Government Procurement Center posted a notice on new requirements for government tender, that included, among other things, the mysterious request that Windows 8 be excluded from the bidding process on computer purchases. The agency could not be reached Tuesday, but China's state-controlled Xinhua News Agency said that the government was forbidding the use of Windows 8 after Microsoft recently ended official support for Windows XP."
AI

Understanding an AI's Timescale 189

An anonymous reader writes "It's a common trope in sci-fi that when AIs become complex enough to have some form of consciousness, humans will be able to communicate with them through speech. But the rate at which we transmit and analyze data is infinitesimal compared to how fast a computer can do it. Would they even want to bother? Jeff Atwood takes a look at how a computer's timescale breaks down, and relates it to human timeframes. It's interesting to note the huge variance in latency. If we consider one CPU cycle to take 1 second, then a sending a ping across the U.S. would take the equivalent of 4 years. A simple conversation could take the equivalent of thousands of years. Would any consciousness be able to deal with such a relative delay?"
The Military

Gen. Keith Alexander On Metadata, Snowden, and the NSA: "We're At Greater Risk" 238

An anonymous reader writes with some snippets pulled from a lengthy Q&A session at The New Yorker with former NSA head Keith Alexander, in which Alexander defends the collection of metadata by U.S. spy agencies both abroad and within the United States: "The probability of an attack getting through to the United States, just based on the sheer numbers, from 2012 to 2013, that I gave you—look at the statistics. If you go from just eleven thousand to twenty thousand, what does that tell you? That's more. That's fair, right? [..] These aren't my stats. The University of Maryland does it for the State Department. [...] The probability is growing. What I saw at N.S.A. is that there is a lot more coming our way. Just as someone is revealing all the tools and the capabilities we have. What that tells me is we're at greater risk. I can't measure it. You can't say, Well, is that enough to get through? I don't know. It means that the intel community, the military community, and law enforcement are going to work harder."
Bug

Finding More Than One Worm In the Apple 116

davecb (6526) writes "At Guido von Rossum's urging, Mike Bland has a look at detecting and fixing the "goto fail" bug at ACM Queue. He finds the same underlying problem in both in the Apple and Heartbleed bugs, and explains how to not suffer it again." An excerpt: "WHY DIDN'T A TEST CATCH IT? Several articles have attempted to explain why the Apple SSL vulnerability made it past whatever tests, tools, and processes Apple may have had in place, but these explanations are not sound, especially given the above demonstration to the contrary in working code. The ultimate responsibility for the failure to detect this vulnerability prior to release lies not with any individual programmer but with the culture in which the code was produced. Let's review a sample of the most prominent explanations and specify why they fall short. Adam Langley's oft-quoted blog post13 discusses the exact technical ramifications of the bug but pulls back on asserting that automated testing would have caught it: "A test case could have caught this, but it's difficult because it's so deep into the handshake. One needs to write a completely separate TLS stack, with lots of options for sending invalid handshakes.""
Books

Game of Thrones Author George R R Martin Writes with WordStar on DOS 522

Hugh Pickens DOT Com writes: "Ryan Reed reports that when most Game of Thrones fans imagine George R.R. Martin writing his epic fantasy novels, they probably picture the author working on a futuristic desktop (or possibly carving his words onto massive stones like the Ten Commandments). But the truth is that Martin works on an outdated DOS machine using '80s word processor WordStar 4.0, as he revealed during an interview on Conan. 'I actually like it,' says Martin. 'It does everything I want a word processing program to do, and it doesn't do anything else. I don't want any help. I hate some of these modern systems where you type a lower case letter and it becomes a capital letter. I don't want a capital. If I wanted a capital, I would have typed a capital. I know how to work the shift key.' 'I actually have two computers,' Martin continued. 'I have a computer I browse the Internet with and I get my email on, and I do my taxes on. And then I have my writing computer, which is a DOS machine, not connected to the Internet.'"
The Internet

The Internet's Broken. Who's Going To Invent a New One? 162

aarondubrow writes: "The Internet has evolved to support an incredibly diverse set of needs, but we may be reaching a point at which new solutions and new infrastructure are needed in particular to improve security, connect with the Internet of Things and address an increasingly mobile computing landscape. Yesterday, NSF announced $15 million in awards to develop, deploy and test future Internet architecture in challenging real-world environments. These clean-slate designs explore novel network architectures and networking concepts and also consider the larger societal, economic and legal issues that arise from the interplay between the Internet and society.

Each project will partner with cities, non-profit organizations, academic institutions and industrial partners across the nation to test their Internet architectures. Some of the test environments include: a vehicular network deployment in Pittsburgh, a context-aware weather emergency notification system for Dallas/Fort Worth, and a partnership with Open mHealth, a patient-centric health ecosystem based in San Francisco."
Space

Astronomers Identify the Sun's Long-Lost Sister 69

An anonymous reader writes "A team of researchers led by astronomer Ivan Ramirez of the University of Texas — Austin has identified the first 'sibling' of the sun, a star almost certainly born from the same cloud of gas and dust as our star. 'Astronomers had been observing the star for almost two decades without realizing it's the long-lost sister of the Sun. No doubt we have catalogued other solar siblings whose common heritage has yet to be discovered. Indeed, the UT team, lead by astronomer Ivan Ramirez, is confident that the identification of HD 162826 is just the beginning. "We want to know where we were born," Ramirez said in a statement. "If we can figure out in what part of the galaxy the Sun formed, we can constrain conditions on the early solar system. That could help us understand why we are here."'"
Biotech

Luke Prosthetic Arm Approved By FDA 59

necro81 writes: "The FDA today approved the Luke prosthetic arm for sale. The Luke Arm, created by Dean Kamen's DEKA R&D Corp., was a project initiated by DARPA to develop a prosthetic arm for wounded warriors more advanced than those previously available. The Arm can be configured for below-the-elbow, above-the-elbow, and shoulder-level amputees. The full arm has 10 powered degrees of freedom and has the look and weight of the arm it replaces. Through trials by DEKA and the Dept. of Veterans Affairs, the Arm has been used by dozens of amputees for a total of many thousands of hours. Commercialization is still pending."
AI

Mathematical Model Suggests That Human Consciousness Is Noncomputable 426

KentuckyFC (1144503) writes "One of the most profound advances in science in recent years is the way researchers from a variety of fields are beginning to formulate the problem of consciousness in mathematical terms, in particular using information theory. That's largely thanks to a relatively new theory that consciousness is a phenomenon which integrates information in the brain in a way that cannot be broken down. Now a group of researchers has taken this idea further using algorithmic theory to study whether this kind of integrated information is computable. They say that the process of integrating information is equivalent to compressing it. That allows memories to be retrieved but it also loses information in the process. But they point out that this cannot be how real memory works; otherwise, retrieving memories repeatedly would cause them to gradually decay. By assuming that the process of memory is non-lossy, they use algorithmic theory to show that the process of integrating information must noncomputable. In other words, your PC can never be conscious in the way you are. That's likely to be a controversial finding but the bigger picture is that the problem of consciousness is finally opening up to mathematical scrutiny for the first time."

Slashdot Top Deals

"Look! There! Evil!.. pure and simple, total evil from the Eighth Dimension!" -- Buckaroo Banzai

Working...