Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Submission + - Does Lockheed Martin Really Have a Breakthrough Fusion Machine? (technologyreview.com)

Mr D from 63 writes: Some followup to the recent /. article on this topic;

Lockheed Martin’s announcement last week that it had secretly developed a promising design for a compact nuclear fusion reactor has met with excitement but also skepticism over the basic feasibility of its approach.

Ian Hutchinson, a professor of nuclear science and engineering at MIT, says he was only able to comment on what Lockheed has released—some pictures, diagrams, and commentary, which can be found here. “Based on that, as far as I can tell, they aren’t paying attention to the basic physics of magnetic-confinement fusion energy. And so I’m highly skeptical that they have anything interesting to offer,” he says...


Submission + - Unix Admins on Debian's systemd adoption: "The Fork is strong with this one"

Tsolias writes: It appears that systemd is still a hot topic in the Debian community. As seen earlier today, there is a new movement shaping up against the adoption of systemd for the upcoming stable release, Jessie. They claim that "systemd betrays the UNIX philosophy", it makes things more complex, thus breaking the "do one thing and do it well" principle.

Submission + - More Eye Candy Coming to Windows 10

jones_supa writes: Microsoft is expected to release a new build of the Windows 10 Technical Preview in the very near future, according to their own words. The only build so far to be released to the public is 9841 but the next iteration will likely be in the 9860 class of releases. With this new build, Microsoft has polished up the animations that give the OS a more comprehensive feel. When you open a new window, it flies out on to the screen from the icon and when you minimize it, it collapses back in to the icon on the taskbar. It is a slick animation and if you have used OS X, it is similar to the one used to collapse windows back in to the dock.

Submission + - Where will Hadoop be in 5 years? (opensource.com)

jenwike writes: Some experts in open source say working in the field is more about common sense than creed. Doug Cutting of Cloudera speaks from working on projects like Hadoop and Lucene. In this interview with Opensource.com, prior to his keynote at the All Things Open conference this week, he dives into open source adoption in the enterprise and where he thinks Hadoop will be in 5 years.

Submission + - Driven by care needs, will it be seniors who drive wider acceptance of robots? (robohub.org)

Hallie Siegel writes: Tony Prescott, Professor of Cognitive Neuroscience and Director of the Sheffield Center of Robotics believes that the medical industry could be at the forefront of changing the public perception of robotics. Why? Because this is an industry that already understands how paramount it is, when dealing with the elderly, disabled and ill, to provide a service that is helpful, friendly and nonthreatening.

Submission + - In 2001 the tech industry employed 6.5 million, today it's at 6.3 million (computerworld.com)

dcblogs writes: In 2001, the tech industry employed 6.5 million people. That year remains the tech industry's employment peak. Tech industry employment reached 6.3 million in the first half of this year, a gain of 118,800 jobs, up 1.9% compared to the first half of 2013. That's below the 3.7% growth rate overall for private-sector employers, according to new data from TechAmerica Foundation.

Comment gpg (Score 4, Informative) 210

gpg, when you can.

To encrypt, but have the encrypted output be encoded as text (so can be put copy/paste into an email)
gpg --symmetric --cipher-algo AES256 --armor example.txt

(gpg will then ask for a passphrase, make it long, as random as possible, upper and lower case, a punctuation, and a number)

TO DECRYPT
gpg example.txt.gpg

Steve Gibson has a very cool Internet resource for helping people learn about password strength: https://www.grc.com/haystack.h...

Per the haystack page:

Example passphrase = search space size

64characters of hex = 4.13 x 10^99

63characters of hex, plus adding a punctuation symbol = 4.93 x 10^117

62characters of hex, plus adding a punctuation symbol, plus adding an upper case letter = 3.79 x 10^126

Submission + - The Empire Strikes Back Uncut (Fan Movie) (youtube.com)

kdataman writes: Live Action and Legos, MineCraft and Muppets, Pets and Produce. 480 fan-created 15-second clips have been assembled to remake the entire movie, scene for scene (but not always word for word). The variations swing from professional production values to cardboard cutouts, but they are all creative and many are hilarious. Hard to pick a favorite scene but the guys at MTV selected a few highlights: http://www.mtv.com/news/196080...

Submission + - Volvo Unveils Its 4-cylinder Engine Which Gives Out 450hp (gizmorati.com)

An anonymous reader writes: Unlike the regular turbocharged engines Volvo has come up with a new concept in engineering its engine. This new engine is on-par racing engine delivering almost the power same as that of V8s and other race track engines... Read more...

Submission + - Former NSA director had thousands personally invested in obscure tech firms (arstechnica.com)

An anonymous reader writes: New financial disclosure documents released this month by the National Security Agency (NSA) show that Keith Alexander, who served as its director from August 2005 until March 2014, had thousands of dollars of investments during his tenure in a handful of technology firms.

Each year disclosed has a checked box next to this statement: "Reported financial interests or affiliations are unrelated to assigned or prospective duties, and no conflicts appear to exist."

Submission + - Core Secrets: NSA Saboteurs in China and Germany (firstlook.org)

Advocatus Diaboli writes: The National Security Agency has had agents in China, Germany, and South Korea working on programs that use “physical subversion” to infiltrate and compromise networks and devices, according to documents obtained by The Intercept. The documents, leaked by NSA whistleblower Edward Snowden, also indicate that the agency has used “under cover” operatives to gain access to sensitive data and systems in the global communications industry, and that these secret agents may have even dealt with American firms. The documents describe a range of clandestine field activities that are among the agency’s “core secrets” when it comes to computer network attacks, details of which are apparently shared with only a small number of officials outside the NSA.

Slashdot Top Deals

The moon is made of green cheese. -- John Heywood

Working...