Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Patents

Submission + - Microsoft Gets Patent for Audio Watermarking (itworld.com)

narramissic writes: "Microsoft has been awarded a patent for a digital-watermarking technology, dubbed 'stealthy audio watermarking,' that inserts and detects watermarks in audio signals identifying the content producer. According to a filing with the U.S. Patent and Trade Organization, the technology provides 'a signature that is embedded in the audio signal and cannot be removed.' While the technology doesn't encrypt files or prevent unauthorized use, it 'can be used to prove who owns the content of the digital file by encoding a file with a unique digital signature. That means illegally traded songs could be tracked back to the original purchaser, allowing authorities to identify illegal sharers and serving as a deterrent. The technology could also be used to track files for royalty distribution.'"
Operating Systems

Submission + - Stallman: are you ready to fight for freedom?

E5Rebel writes: "Are you ready to fight for freedom or are you too lazy to resist? That is the challenge Richard Stallman throws down to the open source community in this major interview. He also spells out his views on Microsoft, Linus Torvalds and much more http://www.computerworlduk.com/management/it-business/services-sourcing/in-depth/index.cfm?articleid=771"
The Media

Submission + - High gas prices lower obesity. (reuters.com) 1

klaasb writes: Higher U.S. gasoline prices may slim more than just wallets, according to a new study from Washington University in St. Louis.
Entitled "A Silver Lining? The Connection between Gas Prices and Obesity," the study found that an additional $1 per gallon in real gasoline prices would reduce U.S. obesity by 15 percent after five years.

Businesses

Submission + - Getting hired with a criminal record.

24601 writes: Hello fellow Slashdot nerds. This is a very hard question to ask, but I figured you guys would probably have the best advice. I am finding myself in my young, soon to be post college career with a brand new criminal record. To make matter's worse, it's for a sex crime (was mislead by someone about their age. Nothing violent or involving children). Yes I will have to register, be on probation for quite a while, and currently reside in a certain very conservative state in the south famous for a certain cartoon mouse. I completely accept the stupidity of what I have done and very much want to grow and move on past it. I'm a graphical artist by trade, but with a lot of web design experience as well. Also have a good deal of IT experience, was thinking of getting a certification in something. What I want to know, however, is how hard is it to get a job in the tech industry with this kind of Scarlet Letter? I have every intention of being upfront and honest about my past with any potential employer, and making every effort to communicate my regret for my past, the fact that I'm not a threat to anyone, and my desire to prove myself. Are more technical employers willing to look past such things and give you a chance? Is there any advice people can give me on properly presenting this issue, and finding understanding employers? thanks!
Sci-Fi

Submission + - School uniforms to track kids using GPS

Gary writes: "Trutex a school uniform maker based in Lancashire, UK is considering adding satellite tracking devices to its clothing range so parents will know where their children are. The move comes after Bladerunner another English clothing company revealed it was selling stab-proof t-shirts, hooded tops and school blazers to parents worried about their children being attacked."
PC Games (Games)

Submission + - Copy Protection Goes Too Far (kotaku.com) 2

Synner writes: Anti-piracy is squeezing the legitimate user once again. The new Bioshock game from 2K Studios only allows you to install the game twice, no ifs ands or buts. Even though the "Update" for the article says that 2K has replied with a solution, if you read the following forum posts, users have tried the fix and has not been confirmed to work. You might want to hurry before the thread is locked and or deleted, like so many others. This might fuel the fires of piracy, to give legitimate customers a work around until they get the official company line.
The Internet

Submission + - Sigbritt is 75 years old and has 40 Gbps at home (com.com)

Xemu writes: "Swedish 75 year old Sigbritt has got what every nerd desires: her 40 gigabits per second home internet connection was setup by her son, Peter, who is working for the Swedish University Network. Peter installed a $300,000 Cisco CRS-1 router in his mother's garage. Sigbritt, who never previosly had internet, says she has tried to surf the net, but that she mostly uses the router to dry her laundry, because it gets hot. True story!"
Republicans

Submission + - Highway Safety Agency silences engineers (nytimes.com)

nbauman writes: Nichole R. Nason, administrator of the National Highway Traffic Safety Administration http://www.nhtsa.dot.gov/, put a new rule into effect that NHTSA officials, including scientists and engineers, are no longer allowed to be quoted by reporters, according to the New York Times http://wheels.blogs.nytimes.com/2007/08/22/whats-o ff-the-record-at-nhtsa-almost-everything/. If the officials want to say anything, it has to be off the record. Most reporters refuse to work under those conditions. The only one they can quote is Nason herself, who is a lawyer. However, she refused to be interviewed about the no-attribution policy. NHTSA conducts extensive traffic safety research, and over the last 30 years its engineers and scientists, who were proud of their work, used to talk to anybody.
Google

Submission + - Google Proxy Hacking: 3rd Party Site Deletions (seofaststart.com)

cheekygeek writes: "After sitting on this information for over a year (with no fix from Google) this guy is releasing the information publicly in the hopes that it will force Google to act to fix it. He says: "In June of 2006, while working to resolve some indexing issues for a client, I discovered a bug in Google's algorithm that allowed 3rd parties to literally hack a web page out of Google's index and search results. I notified a contact at Google soon after, once I managed to confirm that what we thought we were seeing was really happening. The problem still exists today...""
Supercomputing

Submission + - http://www.quantenblog.net/physics/work-heat (quantenblog.net)

hweimer writes: "The question how ideas from classical physics may be incorporated into the quantum realm is a long-standing topic in theoretical physics. Together with some colleagues, I have written a paper describing how the concepts of work and heat turn out in quantum mechanics. As a result you get some remarkable things, like a machine that both works and does not at the same time, but this may also help towards a better understing of thermodynamic properties of quantum computers."
Censorship

Submission + - Virgil Griffith and the Wikipedia Scanner (howstuffworks.com)

starexplorer2001 writes: With all the controversy about corporations, media outlets and government officials messing around with Wikipedia entries, HowStuffWorks has a backgrounder on How the Wikipedia Scanner Works and the method beyond the madness from WikiScanner's creator, Virgil Griffith. Now about that edited lightsaber entry...
Portables

Submission + - User Review: Dell Inspiron 1420N with Ubuntu (starryhope.com)

wehe writes: "After two weeks of using the new Dell Inspiron 1420N with pre-installed Ubuntu, Starry Hope decided it's time to write down some of his thoughts about this new Linux offering from Dell: "Unfortunately, Dell and Ubuntu's parent company Canonical have not worked together closely enough to make this a first-rate offering. While I think the 1420N is a great computer overall, the lack of attention to detail (and unbelievably bad driver support) keep these latest Linux offerings from being ready for the general public. Hopefully Dell and Canonical will resolve these problems and make a truly great product that I could feel comfortable recommending to family members who are not familiar with Linux. ... With just a little extra work and closer attention to the pre-installed software and drivers, they could be shipping the perfect Linux notebook. The way it is now, I wouldn't recommend this notebook for anyone who's not a seasoned Linux geek." One special detail: the pictures illustrating his review are showing the Windows Key of the laptop, which is sort of a bummer on an Ubuntu machine. The official Dell wiki about the Inspiron 1420N with Ubuntu 7.04 pre-installed doesn't provide much details about the Linux compatibility of the laptop. Most Linux laptop installation guides from average Linux users provide much more information."
Quickies

Submission + - Arm Wrestling Machine Breaking Arms

iminplaya writes: Japanese arcade distributor Atlus Co. said it will recall 150 arm-wrestling machines that are breaking players' arms.

The machine, known as Arm Spirit, has so far broken three arms of players who put it to the challenge. The machine features 10 levels of arm-wrestling difficulty, including a French maid, a drunken martial arts master and a Chihuahua. The final throw-down, for those who manage to avoid having their forearms snapped, is against a professional arm-wrestler.

"We think that maybe some players get overexcited and twist their arms in an unnatural way."
Encryption

Submission + - Researchers develop a practical attack on KeeLoq (kuleuven.be)

StevenOdb writes: "Cryptography researchers from Belgium and Israel have developed a practical attack on KeeLoq, a cipher used in several car anti-theft mechanisms distributed by Microchip Technology Inc. The cipher is included in the remote control device that opens and locks your car and that activates the anti-theft mechanisms. Each device has a unique key that takes 18 billion billion values. With 100 computers, it would take several decades to find such a key. Therefore KeeLoq was widely believed to be secure. Now, a method has been found to identify the key in less than a day. The attack requires access to the remote control for about 1 hour (for example, stored in the victim's pocket while he's enjoying a meal). With this key the alarm can be easily deactivated. The results were presented at the CRYPTO 2007 conference."

Slashdot Top Deals

You knew the job was dangerous when you took it, Fred. -- Superchicken

Working...