Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Submission + - Virgin Galactic to launch 2,400 comm. satellites to offer ubiquitous broadband (networkworld.com)

coondoggie writes: Virgin Galactic’s Richard Branson this week said he wants to launch as many as 2,400 small satellites in an effort to set up a constellation capable of bringing broadband communications through a company called OneWeb to millions of people who do not have it. He said he plans to initially launch a low-earth-orbit satellite constellation of 648 satellites to get the project rolling.

Submission + - What advanced tech will dominate your car by 2025? (networkworld.com)

coondoggie writes: Self-healing, social network communicating, Internet-of-Things operating cars are the wave of the future, according to a study of automotive leaders conducted by IBM. The IBM study, “Automotive 2025: Industry without borders,” amassed interviews with 175 executives from automotive OEMs, suppliers, and other leaders in 21 countries and found that by 2025 cars will be able to learn, heal, drive and socialize with other vehicles and their surrounding environment.

Submission + - 3D-printed car-maker targets mass distribution (networkworld.com)

coondoggie writes: Talk about going from the drawing board to reality. The company, Local Motors that only last September demonstrated the one of the world’s first full 3D printed cars, said this week that by the end of the year they hope to be producing the vehicles for everyday consumption.

Submission + - DARPA takes aim at energy conversion technology (networkworld.com)

coondoggie writes: With a nod toward building more powerful communications technology, advanced devices that covert heat into electricity and efficient electric motors, researchers at DARPA will this month detail new program that focuses on advancing transduction or the conversion of energy from one form into another.

Submission + - FBI wants you to become a cyber agent (networkworld.com)

coondoggie writes: With its increased emphasis on Internet crime it might come as small surprise the FBI is now looking to bulk –up its cyber agent workforce. The agency in a job posting that is open until Jan. 20 said it has “many vacancies” for cyber special agents to investigate all manner of cyber crimes from website hacks and data theft to botnets and denial of service attacks. To keep pace with the evolving threat, the Bureau is appealing to experienced and certified cyber experts to consider joining the FBI to apply their well-honed tradecraft as cyber special agents, the agency stated.

Submission + - Did Alcatraz escapees survive? Computer program says they might have (networkworld.com)

coondoggie writes: This week Dutch scientists from Delft University of Technology presented findings from a computer modeling program they were working on, unrelated to the mystery, that demonstrated the escapees could have survived the journey. “In hindsight, the best time to launch a boat from Alcatraz was [11:30 am], one and a half hours later than has generally been assumed. A rubber boat leaving Alcatraz at [11:30 am] would most likely have landed just north of the Golden Gate Bridge. The model also shows that debris in that scenario would be likely to wash up at Angel Island, exactly where one of the paddles and some personal belongings were found.

Submission + - FBI: The top 3 ways Congress could help fight tenacious cyber threats (networkworld.com)

coondoggie writes: There certainly has been no shortage of cyber crime in 2014. You need look no further than the myriad problems outlined by Joseph Demarest, the FBI’s assistant director, Cyber Division touched on during testimony before a Senate Committee on Banking, Housing, and Urban Affairs hearing on cyber security today.

Submission + - Significant issues remain before drones can safely access national airspace (networkworld.com)

coondoggie writes: The story sounds familiar – while the use of unmanned, sometimes illegally, is increasing, there are myriad challenges to ultimately allow them safe access to national airspace. The watchdogs at the Government Accountability Office issued report on the integration of unmanned aerial systems as it calls them, in US national airspace (NAS) today ahead of a congressional hearing on the topic. As it has noted in past reports, the GAO said the main issues continue to include the ability for drones to avoid other aircraft in the sky; what backup network is available and how should the system behave if it loses its communications link.

Submission + - Intelligence agency wants a superconducting, super cool, supercomputer (networkworld.com)

coondoggie writes: If there’s a away to overcome the power and cooling requirements to build a supercomputer beyond exaflop – that’s over 1,000 petaflops, about 30 times faster than the current fastest supercomputer — researchers at Intelligence Advanced Research Projects Activity (IARPA) want to find it.

Submission + - Are privacy and civil liberties a secondary concern for law enforcement? (networkworld.com)

coondoggie writes: Speaking at the Cybercrime 2020 Symposium in Washington, D.C., Assistant Attorney General Leslie R. Caldwell encouraged the debate but defended the US Department of Justice stating: “Almost every decision we make during an investigation requires us to weigh the effect on privacy and civil liberties, and we take that responsibility seriously. Privacy concerns are not just tacked onto our investigations, they are baked in. Privacy concerns are in the laws that set the ground rules for us to follow; the Departmental policies that govern our investigative and prosecutorial conduct; the accountability we must embrace when we present our evidence to a judge, a jury, and the public in an open courtroom; and in the proud culture of the Department.

Submission + - DARPA looks to connect complex security dots and wipe out malicious cyberwar (networkworld.com)

coondoggie writes: The researchers at DARPA think its time for a change in the way security is handled in such systems and later this month will detail a program they call Transparent Computing (TC) they says “will develop technologies to record and preserve the provenance of all system elements/components (inputs, software modules, processes, etc.); dynamically track the interactions and causal dependencies among cyber system components; assemble these dependencies into end-to-end system behaviors; and reason over these behaviors, both forensically and in real-time.”

Slashdot Top Deals

Two wrights don't make a rong, they make an airplane. Or bicycles.

Working...