Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Censorship

Submission + - Chinese Censor Going Mad, Coutering Tools Rise (mingpaonews.com)

hackingbear writes: Hong Kong newspaper Mingpao Daily reports that the number of words being censored by Chinese authority has mushroomed and a new software tool known as Online Anti-Harmonizer has rapidly gaining popularity. The software claimed to contain a dictionary of over 10,000 words censored by the infamous Green Dam software and baidu.com and will automatically insert random punctuations to your online post to get it pass through the automated filtering algorithm. The Chinese censorship effort, known as Harmonization, has gone mad. Not only it censors politically sensitive words such as June 4, Liu Xiaobo but it starts blocking words that are far or completely unrelated. The newspaper reported earlier that the words empty chair has been blocked because it becomes a symbol of Liu Xiaobo's absence in the Nobel Peace Price ceremony; the last name Liu, one of the most common Chinese last names, is also blocked. The name of the current Chinese president, Hu Jintao, is blocked (probably because they reason that no comments with his name can be good.) Even worse, because of the lack of word separator in Chinese, topics not having the censored words are being blocked. For example, "(Chinese currency) Yuan Being Manipulated" is blocked, not because the topic is blocked, but because first two characters of the the words "being manipulated" in Chinese, i.e. "bei cao" in "bei cao zhong", means "being fucked" in Chinese.

Submission + - Postal Trucks to Become Sensor Platforms? (nytimes.com)

An anonymous reader writes: The U.S. Postal Service may face insolvency by 2011 (it lost $8.5 billion last year). An op-ed piece in today's New York Times proposes an interesting business idea for the Postal Service: use postal trucks as a giant fleet of mobile sensor platforms. (Think Google Streetview on steroids.) The trucks could be outfitted with a variety of sensors (security, environmental, RF ...) and paid for by businesses. The article's author addresses some of the obvious privacy concerns that arise.
Politics

Submission + - Vatican Latest in WikiLeaks Revelations (bryanhealey.com)

healeyb writes: WikiLeaks continued as promised to release cables daily, and the New York Times and other news outlets are reporting interesting revelations about the Vatican and the Catholic church. Amongst the discoveries is church sentiment regarding sexual abuse and complimentary legal action, with Cardinal Angelo Sodano expressing strong displeasure to US ambassadors over...
Idle

Submission + - New Clothing Line Reminds TSA of the 4th Amendment (aolnews.com)

Hugh Pickens writes: "AOL News reports that there's a line of underclothes that offer a friendly reminder of the Fourth Amendment called 4th Amendment Wear. Metallic ink printed on shirts spells out the privacy rights stated in the amendment and is designed to appear in TSA scanners. The 4th Amendment Wear line also includes non-metallic options, including underpants for both adults and children. Should a passenger be stripped down, instead of the full amendment, they'll receive a more direct message: "Read the 4th Amendment Perverts." "If you're getting that close to kids' underwear, you have license to say something a little tongue-in-cheek," says creator Tim Geoghegan."
Earth

Submission + - Coral-Like Living Skin Developed for Buildings (inhabitat.com)

An anonymous reader writes: Researchers at the University of Greenwich in the UK are developing a carbon negative building material that would not only help fight climate change but protect the structures it is built upon. The material is made from protocells — super simple cells that have only the basic elements of life, yet are able to grow and multiply — that will capture carbon in their membranes and grow over time to create a hard, coral-like armor around or under buildings.
Security

Submission + - WikiLeaks’ Biggest Revelation: Poor Security (eweekeurope.co.uk)

geek4 writes: The biggest revelation from WikiLeaks is government incompetence not government secrets, and Gary McKinnon did it first, says Eric Doyle

There is an elephant sitting in the corner of government chambers that’s being ignored while the powers-that-be concentrate public attention on the guerrilla in the room – WikiLeaks.

While Julian Assange, WikiLeaks’ whistleblower-in-chief, is being demonised by government leaders, and the US races to shut Wikileaks down, the fact that their security is leaking like a sieve appears to be going unnoticed.

The recent political disclosures show that governments still have to learn the lessons about digital security that their citizens have been trying to learn. Security has to be a prime concern and, if it is not, you only have yourself to blame.

Graphics

Submission + - Graphics fundamentals - the why of 4-D matrices (blogspot.com) 2

solarmist writes: "I've seen a lot of posts that curse the math used in computer graphics, especially 4-d matrices. Most graphics books skip over the motivation for this entirely; leading people to see this as complicating things and being done arbitrarily, but there's a good reason behind it. This article tries to explain one of the main reasons for this. Basically it simplifies the math and makes representing transformations much easier."
NASA

Submission + - Vasimr VX-200 Reaches Full Power Efficiency

Matt_dk writes: Ad Astra Rocket Company’s VASIMR® VX-200 rocket prototype demonstrated its highest power efficiency and performance so far in tests, which ended Friday November 19 at the company’s Houston laboratory. Last week’s results met the efficiency milestone set by the company as it specifies the requirements for the VF-200 flight engine for the International Space Station. The VX-200 is the full power laboratory prototype that provides the technical basis for the design of the flight hardware.

Submission + - Laser-powered copter drone sets record (msn.com)

Freddybear writes: A small model helicopter set a new record for laser-powered copter drone flight. Powered by a diode-laser beamed power system from LaserMotive, the copter drone, built by built by Ascending Technologies, hovered for 12 hours, 26 minutes and 56 seconds.
Piracy

Submission + - Operation Payback targets RIAA CEO's family (myce.com)

An anonymous reader writes: In retaliation for the Limewire shutdown, Anonymous is launching a new DDoS attack against the RIAA. But this time they've published the CEO's home address, his wife's name, and is encouraging pizza delivery orders, prank phone calls, and "creative" pranks on his home. Too far?

Submission + - CRTC to Allow Usage Based Billing (www.cbc.ca)

Idiomatick writes: The CRTC ruled in favour today for usage based billing. Bell Canada was given a monopoly on lines in Canada, in exchange they were made to resell to competitors at cost in order to have a functional market. The new CRTC ruling will allow Bell to charge their competitors more money based on individual customer usage. They are now able to implement a 60GB cap on a competitor's highest speed lines (charging $1.12/GB for overages). Bell however; it was ruled that they are permitted to continue with it's unlimited usage plan. The effect on the market seems clear.

Submission + - Ask Slashdot: Induction cooktop fun

fishfrys writes: Besides generating heat quickly and efficiently in ferromagnetic pans, what sorts of fun things can you do with an induction cooktop? This seems like a pretty serious piece of electromagnetic equipment — boiling water can't be the only thing it's good for. I went to youtube expecting to find all sorts of crazy videos of unsafe induction cooktop shenanigans, but only found cooking. What sort of exciting, if not stupid, physics experiments can be performed with one? Hard drive scrubber... DIY Tesla coil? There's got to be something. Thanks.
Power

Submission + - TFETs as an alternative to MOSFTs in CMOS chips (idg.com.au)

angry tapir writes: "A number of chip manufacturers and European research institutions have banded together to figure out how redesign microprocessors so that they consume less energy when in use and leak less energy when in stand-by mode. Called Steeper, the three-year research project will explore an alternative design to the standard CMOS (complementary metal-oxide-semiconductor) designs used to build virtually all commercially available computer chips today. The new approach will use nanowire-based TFETs (tunnel field effect transistors), as an alternative to the MOSFTs (metal--oxide-semiconductor field-effect transistors) used in CMOS chips."
Security

Submission + - China Reverse Engineered Classified NSA OS 2

Pickens writes: "Seymour M. Hersh writes in the New Yorker that China has managed to reverse-engineered a Classified NSA operating system, estimated at between thirty and fifty million lines of computer code, giving China a road map for decrypting the US Navy’s classified intelligence and operational data. The story begins after an American EP-3E Aries II reconnaissance plane on an eavesdropping mission collided with a Chinese interceptor jet over the South China Sea in 2001 and landed at a Chinese F-8 fighter base on Hainan Island, the 24 member crew were unable to completely disable the plane’s equipment and software. Hersh writes that crew of the EP-3E managed to erase the hard drive—“zeroed it out”—but did not destroy the hardware, which left data retrievable: “No one took a hammer.” The Navy’s experts didn’t believe that China was capable of reverse-engineering the plane’s NSA-supplied operating system, but over the next few years the US intelligence community began to “read the tells” that China had gotten access to sensitive traffic and in early 2009, Admiral Timothy J. Keating, then the head of the Pacific Command, brought the issue to the new Obama Administration. "If China had reverse-engineered the EP-3E’s operating system, all such systems in the Navy would have to be replaced, at a cost of hundreds of millions of dollars," writes Hersch. "After much discussion, several current and former officials said, this was done.""
Science

Submission + - Stopping Malaria By Immunizing Bugs (ibtimes.com)

RedEaredSlider writes: Millions of people in the tropics suffer from malaria, a mosquito-borne disease that has been difficult to treat and which costs many developing countries millions of dollars per year in lost productivity. Up to now, efforts at controlling it have focused on attacking the parasites that cause it, keeping mosquitoes from biting, or killing the insects.

But at Johns Hopkins University, Rhoel Dinglasan, an entomologist and biologist, decided to try another tack: immunizing mosquitoes. ...

When a mosquito bites an infected human, it takes up some of the gametocytes.They aren't dangerous to people at that stage. Since plasmodium is vulnerable there, and that is the point that Dinglasan chose to attack.

A mosquito's gut has certain receptor molecules in it that the plasmodium can bind to. Dinglasan asked what would happen if the parasite couldn't "see" them, which would happen if another molecule, some antigen, were binding to those receptors.

Slashdot Top Deals

Always draw your curves, then plot your reading.

Working...