Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Censorship

TI vs. Calculator Hackers 463

Nyall writes "So a bunch of TI calculator programming enthusiasts got together to factor the keys Texas Instruments uses to sign the operating system binaries for the ti83+ (a z80 architecture) and the ti89/v200 (a 68k architecture) series of calculators. Now Texas Instruments is sending out DMCA notices to take them down."
Businesses

Dell Buying Perot Systems For $3.9 Billion 92

alphadogg writes "Dell has agreed to buy Perot Systems for around $3.9 billion in cash, and intends to make the company its global services delivery division, the companies said Monday.The deal will allow Dell to expand its range of IT services, and potentially allow it to sell more hardware to existing Perot customers, it said. Dell's rival Hewlett-Packard expanded its own global services unit with the acquisition of EDS for $13.9 billion in May 2008. Over the last four quarters, Dell and Perot together had revenue of $16 billion from enterprise hardware and IT services, with $8 billion coming from enhanced services and support, Dell said. Perot's contribution to that is relatively small: In 2008, the company reported total revenue of $2.78 billion."
Censorship

Left 4 Dead 2 Banned In Australia 215

An anonymous reader writes "According to Australia's Office of Film and Literature Classification, Left 4 Dead 2's content exceeds that allowable for an MA15+ rating. Any such game is rated as Refused Classification, effectively banning it. From the report: 'The game contains realistic, frenetic, and unrelenting violence which is inflicted upon "the Infected" who are living humans infected with a rabies-like virus that causes them to act violently. The player can choose from a variety of weapons including pistols, shotguns, machine guns, and sniper rifles. However, it is the use of the "melee" weapons such as the crowbar, axe, chainsaw and Samurai sword which inflict the most damage. These close-in attacks cause copious amounts of blood spray and splatter, decapitations and limb dismemberment as well as locational damage where contact is made to the enemy which may reveal skeletal bits and gore.'"
The Courts

Lawyer Demands Jury Stops Googling 517

coomaria noted an unsurprising story about how courts are having problems with jurors Googling during cases. As anyone who has ever been called for jury duty knows, you aren't allowed to get outside information about the case you are hearing, but apparently the iPhone makes it far too easy to ignore this advice. A lawyer is trying to get jurors to sign a form explicitly stating they won't "use 'personal electronic and media devices' to research or communicate about the case." Of course, I'm not exactly sure why a juror should need to sign something for your iPhone but not a newspaper.
Graphics

Rome, Built In a Day 107

spmallick writes "Researchers at the University of Washington, in collaboration with Microsoft, have recreated the city of Rome in 3D using images obtained from Flickr. The data set consists of 150,000 images from Flickr.com associated with the tags 'Rome' or 'Roma,' and it took 21 hours on 496 compute cores to create a 3D digital model. Unlike Photosynth / Photo Tourism, the goal was to reconstruct an entire city and not just individual landmarks. Previous versions of the Photo Tourism software matched each photo to every other photo in the set. But as the number of photos increases the number of matches explodes, increasing with the square of the number of photos. A set of 250,000 images would take at least a year for 500 computers to process... A million photos would take more than a decade! The newly developed code works more than a hundred times faster than the previous version. It first establishes likely matches and then concentrates on those parts."
Cellphones

Feds Ask IT Execs To Throw Away Cellphones After Visiting China 382

sholto writes "US intelligence agencies are advising top US IT executives to weigh their laptops before and after visiting China as one of many precautions against corporate espionage. Symantec Chief Technology Officer Mark Bregman said he was also advised to buy a new cellphone for each visit and to throw it away after leaving. Bregman said he kept a separate MacBook Air for use in China, which he re-images on returning, but claimed he didn't subscribe to the strictest policies. 'Bregman said the US was also concerned about its companies employing Chinese coders, particularly in security.'"
Social Networks

Happiness May Be Catching 176

chrb writes "The NY Times Magazine has an interesting article about research, based on the long-running Framingham Heart Study, modeling real world social networks. It seems that tendencies to be happy, not to smoke, and not to become obese are passed between nodes in a directed graph in a way that suggests such concepts are 'contagious.' Well-connected nodes in the graph (i.e., people with more friends) are more likely to be happier than less-connected nodes, even when the edges represent more distant friendships. Individuals quitting smoking, or becoming obese, influence not only their immediately connected friends but also friends of friends, with the effect sometimes skipping the intermediary node. The contagion effect is most noticeable when a tendency is passed from one person to another of the same sex — friends of the opposite sex, including spouses, are not as influential."
Medicine

Taking Showers Can Be Harmful To Your Health 431

TheClockworkSoul writes "According to both the BBC and NewScientist, showering may be bad for your health. Apparently, dirty shower heads can be an ideal breeding ground for Mycobacterium avium, a bug responsible for a type of pulmonary disease more prevalent than tuberculosis in developed countries, cases of which have risen in parallel with the rise in showering. Tests revealed nearly a third of devices harbor significant levels of the critter."
Media (Apple)

How the iPod Nano's Video Abilities Stack Up 216

andylim writes "Recombu.com has pitted the iPod Nano's video capabilities against an iPhone 3GS, a Nokia 5530 XpressMusic and Flip Mino HD. This simple test shows how the camera deals with motion, colour and audio. The iPod Nano's camera seems to offer a basic yet decent video experience and some might say delivers a higher picture quality than the iPhone 3GS's camera. What's interesting is how well it deals with close-ups."
Classic Games (Games)

New 2D, HD Sonic Game Coming In 2010 123

Anonymouse writes "Sonic the Hedgehog is going back to his roots, but with a fresh coat of HD paint. 'An all-new 2D side-scrolling High Definition Sonic game is coming with a 2010 release date, according to a new teaser trailer from Sega.' Sega's Ken Ballough had this to say: 'Old-school Sonic fans have long asked to see Sonic return to a more 2D style of gameplay. Many liked the daytime stages in Unleashed but wanted to see a game that plays purely similar to the early games of the Genesis. Project Needlemouse is that critical first step that brings Sonic back to his 2D roots.'"

Which Filesystem Do You Use On Portable Media For Linux Systems? 569

An anonymous reader writes "Most people use MS filesystems on Disk-On-Keys, and portable hard drives, as these are readable from most machines. But this way you lose the files' permission information, which many times is very inconvenient (you must agree that having Ubuntu asking you whether to execute or display every text file or image you open from a DOK is annoying). Using 'regular' Linux filesystems like ext keeps the permissions, but may require using the superuser when switching machines (as the UIDs are different). So do any of you have a creative solution for this problem?"
Data Storage

Cryptographic Tools To Keep You Hidden On Facebook 148

Al writes "Many people reveal way too much personal information on social networking sites — something that can easily lead to identity theft or unwanted attention from employers etc. Technology Review has a story about several cryptographic tools that can be used to hide your activity on Facebook, from both untrusted users and from Facebook itself. Urs Hengartner, an assistant professor of computer science at the University of Waterloo, developed a Firefox plugin that obfuscates anything marked with '@@' on Facebook and only reveals the correct information to trusted users who have the right keys. The sensitive data itself is even stored on an outside server so that even Facebook cannot access it. The piece mentions two other projects, NOYB and flybynight, that also aim to make personal information more secure on Facebook."
Medicine

Swine Flu Outbreak At PAX 374

whisper_jeff writes "There's been a confirmed outbreak of Swine Flu at PAX. Those who attended and are feeling under-the-weather after the con should not write it off as a typical convention cold and go see a doctor to make sure, just in case." The linked post also lists the airplane flights of the cases known so far, so if you flew from Seattle on Sunday, Monday, or Tuesday for any reason, you might want to compare your itinerary.

Does Your College Or University Support Linux? 835

yuna49 writes 'Lately I've been visiting colleges with my daughter, who is a senior in high school. Every school has proudly announced that they support both Windows and Macs, and most of these schools report having about a 50-50 split between the two. However we've been a Linux household for many years now, and my daughter routinely uses a laptop running Kubuntu 9.04. Sometimes I would ask the student tour guide if Linux was supported and was usually met with a blank stare. We're obviously not concerned about whether she can write papers using OpenOffice and Linux. Rather we've been wondering about using other computing services on campus like classroom applications, remote printing, VPNs, or Wi-Fi support (nearly all these campuses have ubiquitous Wi-Fi). Given the composition of Slashdot's readership, I thought I'd pose the question here. Does your school support Linux? Have you found it difficult or impossible to use Linux in concert with the school's computing services?'
Image

Trapped Girls Call For Help On Facebook 380

definate writes "Two teenage girls (aged 10 and 12) found themselves trapped/lost in a stormwater drain in Adelaide, South Australia. The interesting point of this article that makes it Slashdot worthy, is that although the teenage girls had mobile phones, instead of calling for help using 000 (Australia's 911 number), they decided to notify people through Facebook. My guess is it was something along the lines of 'Jane Doe is like totally trapped in a stormwater drain, really need help, OMG!'. Luckily a young friend of the girls was online at the time and was able to call the proper authorities."

Slashdot Top Deals

If you analyse anything, you destroy it. -- Arthur Miller

Working...