Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Power

Hydrogen-Powered Drone Can Fly For 4 Hours at a Time 116

stowie writes: The Hycopter uses its frame to store energy in the form of hydrogen instead of air. With less lift power required, its fuel cell turns the hydrogen in its frame into electricity to power its rotors. The drone can fly for four hours at a time and 2.5 hours when carrying a 2.2-pound payload. “By removing the design silos that typically separate the energy storage component from UAV frame development - we opened up a whole new category in the drone market, in-between battery and combustion engine systems,” says CEO Taras Wankewycz.
Security

How 1990s Encryption Backdoors Put Today's Internet In Jeopardy 42

An anonymous reader writes: While debate swirls in Washington D.C. about new encryption laws, the consequences of the last crypto war is still being felt. Logjam vulnerabilities making headlines today is "a direct result of weakening cryptography legislation in the 1990s," researcher J. Alex Halderman said. "Thanks to Moore's law and improvements in cryptanalysis, the ability to break that crypto is something really anyone can do with open-source software. The backdoor might have seemed like a good idea at the time. Maybe the arguments 20 years ago convinced people this was going to be safe. History has shown otherwise. This is the second time in two months we've seen 90s era crypto blow up and put the safety of everyone on the internet in jeopardy."

Submission + - Hydrogen-Powered Drone Flies for 4 Hours (roboticstrends.com)

stowie writes: Hycopter uses its frame to store energy in the form of hydrogen instead of air. With less lift power required, Hycopter’s fuel cell turns the hydrogen in its frame into electricity to power its rotors. Hycopter can fly for four hours at a time and 2.5 hours when carrying a 2.2-pound payload. "By removing the design silos that typically separate the energy storage component from UAV frame development — we opened up a whole new category in the drone market, in-between battery and combustion engine systems."

Submission + - The Myth of Outsourcing's Efficiency

Presto Vivace writes: Why outsourcing winds up producing cost creep over time

Outsouring over time starts to create its own bureaucracy bloat. It’s the modern corporate version of one of the observations of C. Northcote Parkinson: “Officials make work for each other.” As Clive describes, the first response to the problems resulting from outsourcing is to try to bury them, since outsourcing is a corporate religion and thus cannot be reversed even when the evidence comes in against it. And then when those costs start becoming more visible, the response is to try to manage them, which means more work (more managerial cost!) and/or hiring more outside specialists (another transfer to highly-paid individuals).

Biotech

After a Year of Secret Field-Testing, Brain-Controlled Bionic Legs Are Here 50

An anonymous reader writes: Today, an Icelandic prosthetic-maker announced that two amputees have been testing brain-controlled bionic legs for over a year. The devices respond to impulses in the subjects' residual limbs, via sensors that were implanted in simple, 15-minute-long procedures. "When the electrical impulse from his brain reaches the base of his leg, a pair of sensors embedded in his muscle tissue connect the neural dots, and wirelessly transmit that signal to the Proprio Foot. Since the command reaches the foot before the wearer's residual muscles actually contract, there's no unnatural lag between intention and action." This is a huge step forward (sorry) for this class of bionics. It may seem like a solved problem based on reports and videos from laboratories, but it's never been exposed to real world use and everyday wear and tear like this.
Encryption

'Logjam' Vulnerability Threatens Encrypted Connections 71

An anonymous reader writes: A team of security researchers has revealed a new encryption vulnerability called 'Logjam,' which is the result of a flaw in the TLS protocol used to create encrypted connections. It affects servers supporting the Diffie-Hellman key exchange, and it's caused by export restrictions mandated by the U.S. government during the Clinton administration. "Attackers with the ability to monitor the connection between an end user and a Diffie-Hellman-enabled server that supports the export cipher can inject a special payload into the traffic that downgrades encrypted connections to use extremely weak 512-bit key material. Using precomputed data prepared ahead of time, the attackers can then deduce the encryption key negotiated between the two parties."

Internet Explorer is the only browser yet updated to block such an attack — patches for Chrome, Firefox, and Safari are expected soon. The researchers add, "Breaking the single, most common 1024-bit prime used by web servers would allow passive eavesdropping on connections to 18% of the Top 1 Million HTTPS domains. A second prime would allow passive decryption of connections to 66% of VPN servers and 26% of SSH servers. A close reading of published NSA leaks shows that the agency's attacks on VPNs are consistent with having achieved such a break." Here is their full technical report (PDF).
Power

Energy Dept. Wants Big Wind Energy Technology In All 50 US States 256

coondoggie writes: Bigger wind turbines and towers are just part of what the U.S. needs in order to more effectively use wind energy in all 50 states.That was the thrust of a wind energy call-to-arms report called "Enabling Wind Power nationwide" issued this week by the Department of Energy. They detail new technology that can reach higher into the sky to capture more energy and more powerful turbines to generate more gigawatts. These new turbines are 110-140 meters tall, with blades 60 meters long. The Energy Department forecasts strong, steady growth of wind power across the country, both on land and off shore.
Programming

Choosing the Right IDE 443

Nerval's Lobster writes: Modern software development often requires working with multiple tools in a variety of languages. The complexity can give even the most skilled developer a nasty headache, which is why many try to rely on Integrated Development Environments (IDEs) to accomplish most of the work; in addition to source-code editors and automation, some even feature intelligent code completion. With so much choice out there, it's hard to settle on an IDE, so we interviewed several developers, who collectively offered up a list of useful questions to ask when evaluating a particular IDE for use. But do developers even need an IDE at all? When you go to smaller, newer developer shops, you're seeing a lot more standalone editors and command-line tools; depending on what you do, you might just need a good editor, and to master the command-line tools for the languages you use. What IDE do you prefer, if any, and why?
Software

Software Glitch Caused Crash of Airbus A400M Military Transport Aircraft 120

An anonymous reader writes: A software glitch caused the crash of an Airbus A400M military transport aircraft, claims German newspaper Der Spiegel (Google translation). The accident, which happened in Seville on the vehicle's first production test flight on 9 May, killed four crew members. Airbus is investigating the system controlling the aircraft's engines. The early suspicions are that it was an installation problem, rather than a design problem.
Education

Video Learn About The Technology Education And Literacy in Schools Program (Video) 17

The Technology Education And Literacy in Schools program (TEALS to its friends) started with one volunteer, a Berkeley CS grad named Kevin Wang who taught high school for a while, then went to Microsoft for a much higher salary than he got from teaching. But before long, he was getting up early and teaching a first period computer science class at a Seattle-area high school that was (sort of) on his way to work. Then some other local high schools came to him and wanted similar programs. Kevin's a smart guy, but not smart enough to be in four places at once, so he recruited coworkers to join him as volunteer computer science educators. Today (as this is being written) TEALS is in 130 high schools and has 475 volunteers in multiple states. Kevin works full time on the program, sponsored by Microsoft, but 78% of the volunteers now come from other companies.

TEALS has stuck with Kevin's original 1st period (usually somewhere between 7:30 and 9:30) schedule not just because it's convenient for many of the volunteers, but because (contrary to teen-nerd stereotypes) 60% of their students are in after-school sports and 20% are in band. The program is growing steadily and they're looking for more volunteers. We'll have another video with Kevin tomorrow, and that's when the transcript of both videos will appear. Meanwhile, you can read the TEALS FAQ and see how you might fit in with this group or one of many other similar ones either as a volunteer, as a student or as a teacher or school administrator interested in giving your students at least a basic grounding in Computer Science. (Coincidentally, today's 'Ask Slashdot' is about tech skills for HS students -- an unintentional but excellent tie-in.)

Submission + - Best Portable Hard Drives of 2015 (techgeck.com)

TechGeck.com writes: With loads of data you collect from different sources, it becomes difficult to manage with the limited space availability of your laptop or desktop secondary storage. Hence, it lead to increase in demand of external drives. External drives previously was coming up with the separate adopter you need to plugin. But now, with slimmer portable hard drives comes up with 3.0 USB connectivity, that plugins to your station just like pen drives. These portable hard drive have now become the perfect storage for your laptop needs like music, movies or photos storage.

These faster portable hard drives are coming safe with encryption and password security software to take care of your privacy concerns as well as automatic backup softwares.

Submission + - China plans to land on the far side of the moon by 2020 (examiner.com)

An anonymous reader writes: According to a story in Quartz, the Chinese have decided to land the Chang’e 4 probe on the far side of the moon. Chang’e 4 is a backup probe to the Chang’e 3, which landed on the lunar surface in December 2013 and carried a rover called Yutu. Because the spacecraft will have to be reconfigured, its scheduled launch will be delayed until sometime before 2020, likely after the Chang’e 5 sample return mission which is currently scheduled to launch in 2017.

Submission + - Why there needs to be a quantum theory of gravity

StartsWithABang writes: If you’re not a theoretical physicist yourself, you might think that physics is physics — we ask questions about the Universe, do experiments/make observations, and get the answers — and math is just a tool that we use to help us get there. But that really sells the power of mathematics short. For a physical theory to be valid, there are a whole host of mathematical properties that theory needs to possess, including being free of logical inconsistencies, making predictions about observables, and that those predictions agree with observations. Yet when we look at our theory of gravitation at the smallest scales and with the strongest gravitational fields, our theory itself fails, which is precisely why we need a quantum theory of gravity.

Submission + - Feds bust cops who cleaned up credit histories by filing fake police reports. (miamiherald.com)

McGruber writes: For a few very profitable years, Vanessa and Mario Perez made more than $322,000 by clearing up the blemished credit reports of people with bad bill-paying histories, almost as if by magic.

Federal authorities say the Perezes had a secret weapon: a network of dirty Miami-Dade County, Florida police officers, who wrote 215 falsified police reports. The Perezes used these falsified police reports to claim their customers were victims of identity theft when they were not.

The false ID theft claims provided the Perezes’ clients with an official excuse for their bad credit histories so they could get negative items removed from their reports. In turn, the customers could boost their credit scores with reporting agencies such as Equifax and obtain credit cards, loans and other financing again.

Slashdot Top Deals

Love may laugh at locksmiths, but he has a profound respect for money bags. -- Sidney Paternoster, "The Folly of the Wise"

Working...