Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Hardware Hacking

Submission + - TI frees its DSP toolchain for open source apps

An anonymous reader writes: Texas Instruments (TI) is offering open source developers free use of a DSP toolchain for DSPs (digital signal processors) found in several popular TI OMAP and DM-series RISC/DSP chips. The first-of-its-kind release may lower cost barriers for prospective developers of open source video codecs, motion sensors, and other "number-crunching" applications.
Graphics

Recreating Cities Using Online Photos 87

Roland Piquepaille writes "The billion of images available from a site like Flickr has stimulated the imagination of many researchers. After designing tools using Flickr to edit your photos, another team at the University of Washington (UW) is using our vacation photos to create 3D models of world landmarks. But recreating original scenes is challenging because all the photos we put on Flickr and similar sites don't exhibit the same quality. With such a large number of pictures available, the researchers have been able to reconstruct with great accuracy virtual 3D model of landmarks, including Notre Dame Cathedral in Paris and the Statue of Liberty in New York City."
IBM

Submission + - eComStation Release 2.0 RC3 available

Kim Haverblad writes: "Serenity Systems has released eComstation v2.0 RC3 that is an OEM-version of IBM:s OS2 Warp v4.52. It's great news for the OS2 users still hanging around since it supports dual and quad core CPU:s which IBM original code didn't support. The full press release can be found at OS2 World.Com where there also are technical notes with more specific updates."
Security

Fake Codec is Mac OS X Trojan 473

Kenny A. writes "Multiple news organisations are reporting on an in-the-wild Mac OS X malware attack that uses porn lures to plant phishing Trojans on Mac machines. The attack site attempts to trick users into download a disk image (.dmg) file disguised as a codec that's required for viewing the video. If the Mac machine's browser is set to to open 'Safe' files after downloading, the .dmg gets mounted and the Installer is launched. The target must click through a series of screens to become infected but once the Trojan is installed, it has full control of the machine."
Media (Apple)

Submission + - Asterisk ported to iPhone

Syn Ack writes: "One of the engineers that works in my office spent his weekend porting Asterisk for running on the iPhone. It was done in one weekend. His webpage can be found here with all the details. For obvious reasons Asterisk can't interact with the GSM phone, but he does have it working with SIP phones. A wireless PBX in your pocket! We're not sure what value this has other than showing people just how far you can take an iPhone. If only Apple would open the environment up to development. So if you want a "PBX in your pocket" go grab Matt's code and give it a try."

Slashdot Top Deals

HELP!!!! I'm being held prisoner in /usr/games/lib!

Working...