Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Submission + - Cancer Cells Detected Using $400 Digital Camera (gizmag.com)

fergus07 writes: Researchers have detected oral cancer cells using a fiber-optic cable and an off-the-shelf Olympus E-330 camera worth $400. The work by Rice University biomedical engineers and researchers from the University of Texas M.D. Anderson Cancer Center could improve access to diagnostic imaging tools in many parts of the world where these expensive resources are scarce. In the tests, a common fluorescent dye was used to make cell nuclei glow brightly and images taken using tip of the fiber-optic bundle attached to the camera. The distorted nuclei which indicate cancerous and pre-cancerous cells could then be distinguished on the camera's LCD monitor.
Music

Submission + - Richie Hawtin's gear: Stolen. (facebook.com)

indrora writes: Richie Hawtin, better known as Plastikman, professional mix-master and DJ has had his things stolen while on tour in France. From his Facebook page:

To all my French fans, friends and supporters. I need your help! On Friday night someone broke into my hotel room at Hotel Costes in Paris and stole my iPod and 2 x Plastikman Live iPads (serial #GB01723UZ38 and #GB0129CAZ3A) and my Plastikman Live show Apple Macbook Pro 17" laptop (serial #C02CK0GXDC7C). I am asking everyone to keep their ears and eyes open for any information about these very important and personal items. I'm offering a 2500 € reward for any information that leads to the return of the equipment.

He mentions that he does not wish to punish those who did the act, but instead just ask them to come forth and give his stuff back. He's offering a EUR2500 reward for info that helps him get his stuff back.

Censorship

Submission + - Google v. China: Google Blinks (washingtonpost.com)

An anonymous reader writes: Google will stop auto-redirecting its users to its uncensored search site in Hong Kong in an attempt to keep its Internet license to operate in China.
Nintendo

Submission + - E3 2010 Hands-On Impressions: Donkey Kong Country (sidequesting.com)

kewlrats writes: Nintendo has a knack for building on our nostalgia. The latest iteration is a sort of re-imagining of the original DKC instead of a real sequel. Much like New Super Mario Bros before it, Donkey Kong Country Returns strips the franchise to its basics before adding a layer of polish to it. Thankfully, Nintendo knows how to create brilliant platforming experiences even from those bare essentials.
Graphics

Submission + - AMD Drives Cost Out of Pro Graphics Cards (hothardware.com) 2

MojoKid writes: "Workstation "pro" graphics cards are validated versions of standard desktop graphics cards but with specialized drivers for compatibility with the latest 3D rendering and CAD tools on the market. Typically these cards sell for a massive premium over their desktop counterparts but with very little, if any, difference in hardware. AMD has bolstered their ATI lineup with five different FirePro models recently at various price points and performance levels. In addition to the top of the line V8800, the new lineup consists of the high-end V7800, the mid-range V5800, an entry-level V4800, and the almost ridiculously affordable V3800. This detailed review covers performance and features of three of the more affordable cards in the FirePro lineup. It's safe to say that AMD is driving cost out of pro graphics finally and in some cases, prices have actually hit parity with standard desktop models."
The Internet

Submission + - New Northern Arizona Univ. Internet policy 2

An anonymous reader writes: I'm a student at NAU, and just today I told to use a software called SafeConnect that will monitor my computer for violations to the terms of Use (which follows)
"Internet Use Policy

All computers attached to the Campus Network must have appropriate software running on their machine to ensure a secure environment for all users. Campus Network will provide the monitoring software to ensure compliance with this policy. The software will assist students in maintaining their computer's in the manner prescribed by Campus Network . Software needed to ensure a secure environment will include:

                * Campus Network approved anti-virus software
                * The most current security patch software for your operating system(s).
                * Monitoring software to ensure that copyrighted files are not freely shared over the internet.
                *Other software as periodically deemed appropriate by Campus Network to ensure a safe and secure Internet and Intranet for all students and faculty.

In addition, bandwidth consumption is monitored to prevent inappropriate use of university resources (for example, setting up a public web site from a dormitory room). Students are asked not to exceed 1 GB of bandwidth use per week. No enforcement will occur at present, however we will be monitoring use and taking more affirmative action if there is wide violation of this policy.

The use of the Campus Internet Service is a privilege that may be revoked at any time for inappropriate behavior. Such behavior would include but not be limited to the use of obscene, abusive, or otherwise objectionable language and/or materials in either public or private messages.

The primary purpose of the Campus Network is to support students' educational goals. In support of these goals, the following activities are prohibited with express written consent of Campus Network . Participating in these activities may result in revocation of Campus Network without refund and possible University judicial action and/or criminal charges.

        * Setting up a router and building a private subnet.
        *Setting up any type of information server such as a web, gopher, e-mail, game, etc.
        *Propagating e-mail chain letters.
        *Forging mail.
        *Allowing unauthorized persons access to Campus Network .
        *Using Campus Network for personal financial gain.
        *Copying University-owned or licensed information to another computer without prior written approval.
        *Copyrighted files and software cannot be shared over the Campus Network .
        *Modifying or attempting to modify University-owned or licensed information including software and data.
        *Attempting to damage or disrupt networking services.
        *Using the Campus Network , the University'(TM)s campus-wide network, or related resources in the commission of a crime.
        *Using traffic intensive applications that may cause problems within the network or diluting the level of service to other users. No print servers, mail servers, FTP servers, etc. are allowed. The network sharing of any computer-related device or materials that may cause excessive network traffic is forbidden.

The user is not allowed to share her/his RJ45 Ethernet port with more than one computer/device at the same time. This prohibition includes any use of hubs and/or switches which would permit the user to connect more than one computer/device to the RJ45 Ethernet port and share the port with others or herself/himself.

The user will abide by all policies and statues included in the Computer Crimes Act. Crimes against this Act will result in University judicial action and/or investigation by the University Police Department for criminal offense. The Act includes offenses against intellectual property; offenses against computer equipment and supplies; and offenses against computer access. The Computer Crimes Act is available at each area office."

Want I wonder is this legal, and is there any way to fight this new policy, i understand some of it but what I don't like is this gives them access to all my private messages and accounts
Medicine

Submission + - Xprize Wants AI Physician On Every Smartphone (singularityhub.com)

kkleiner writes: One of the exciting ideas being tossed around recently at the Xprize Foundation is the creation of an Artificial Intelligence physician that you could access from your smartphone. Want to know if that rash on your leg is poison ivy or smallpox? Take a photo of it with your phone and ask the AI! The possibilities are enormous. Especially for the billion plus people around the world who live more than a few hours walk or drive from the nearest doctor, the AI physician would represent a revolution in health care.

Submission + - Analysis by Joe Fleming on RI Governor Debate (wpri.com)

wpri writes: In part two of the gubernatorial debate, moderator Tim White asks the candidates for Rhode Island Governor the tough questions on a slew of topics including gay marriage, immigration bill, the healthcare reform act, full-scale casinos in the Ocean State and much more.
Security

Submission + - World's 101 hottest women clickjack Facebook users (sophos.com)

An anonymous reader writes: Facebook's users are being hit by another clickjacking worm that is spreading rapidly across the social network.

Messages are appearing on users' newsfeeds claiming that they like a webpage called

:|:| 101 Hottest Women in the World :D :|:|

Security researchers are reporting that clicking on the link takes user to a page which contains an image of X-Men actress Jessica Alba with the message "Click here to continue". However, the page has silently opened an invisible iFrame which means that wherever you click on the page you will be unknowingly clicking on a Facebook "Like" button.

Sophos claims that this is the latest in a series of widespread clickjacking attacks on Facebook, and provides information on how users can clean-up their accounts.

Communications

Submission + - Why video calling is a wasted feature in the UK

An anonymous reader writes: Technology affects the way we live but sociocultural influences also dictate what technology we absorb into our day to day lives. Take video calling on the iPhone 4 for example: it was pitched as an impressive feature but will people adopt it? According to one british writer, the UK is unlikely to start making lots of video calls because it's awkward and, well, not very British. "It's not the way we look when we say them, but the way we say them in order to inject the most bile into a negative statement. Or, on our more enthusiastic days, finding the most wryly witty way to say something while indicating that you couldn’t really care less about it. This is the reason we’ve taken so well to Twitter and are better at watching than creating YouTube videos, to put it in sweepingly generic Internet terms."
Social Networks

Submission + - Researchers create Social Engineering IRC Bot (irc-junkie.org)

An anonymous reader writes: Researchers of the Vienna University of Technology developed an IRC bot that acts as a "Man in the middle" between two unsuspecting users, modifies URLs passed between them and also is capable of steering the direction the conversation goes. Not only this works surprisingly well on IRC — 76,1% click rate at maximum — also 4 out of 10 persons clicked on links on Facebook Chat after complete strangers befriended them. This would have worked even better if the bot were to clone existing friends profiles and submitting friend requests from those, say researchers.
Networking

Submission + - iPhone 4 May Have Wi-Fi Driver Fault (arstechnica.com) 1

eggboard writes: After examining the WWDC video and talking to two veteran Wi-Fi experts, it seems likely that the iPhone 4 has a Wi-Fi driver flaw that was part of the trouble in making a network connection during Steve Job's WWDC keynote. The other problem was the massive congestion caused by so many independent access points. (Congestion may have triggered the iPhone 4's troubles, too.) With mobile hotspots proliferating on phones and in portable devices like the MiFi, we're going to see more trouble in the future.

Slashdot Top Deals

No man is an island if he's on at least one mailing list.

Working...