Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Space

Voyager Clue Points To Origin of the Axis of Evil 293

KentuckyFC writes "Cosmologists have been scratching their heads over the discovery of a pattern imprinted on the cosmic microwave background, the radiation left over from the Big Bang. This pattern, the so-called Axis of Evil, just shouldn't be there. Now an independent researcher from Canada says the pattern may be caused by the boundary between the Solar System and interstellar space where there is a sharp change in pressure, temperature and density of ions in space. Known as the termination shock, astronomers had thought this boundary was spherical. But last year, data from the Voyager spacecraft which have crossed the boundary, showed it was asymmetric. The new thinking is that the termination shock acts like a giant lens, refracting light that passes through it. Any distortion of the lens ought to show up as a kind of imprinted pattern on an otherwise random image. But the real eye-opener is that as the shape of the termination shock changes (as the Solar Wind varies, for example), so too should the pattern in the microwave background. And there is tentative evidence that this is happening too (abstract)."
Technology (Apple)

Apple Tablet Rumors Again (Still?) 165

LSU_ADT_Geek writes "With a conventional netbook clearly out of the question, researchers for Piper Jaffray said Thursday there's mounting evidence to suggest Apple next year will introduce its own take on the market in the form of a tablet-based device that will sell for $700 or less."
The Military

DARPA's Map-Based Wiki Keeps Platoons Alive 86

blackbearnh writes "One of the biggest problem that a platoon on the ground in Iraq or Afghanistan faces is that when a new unit cycles in, all the street-sense and experience of the old unit is lost. Knowing where insurgents like to plant IEDs, or even which families have a lot of domestic disputes, can spell the difference between living and dying. In response to this, DARPA created TIGR, the Tactical Ground Reporting System. Developed as much on the ground in active warzones as in a lab, TIGR lets platoons access the latest satellite and drone imagery in an easy-to-use map based interface, as well as recording their experiences in the field and accessing the reports of other troops. In this O'Reilly Radar interview, two of the people responsible for the development of TIGR talk about the intel issues that troops face in hostile territory, the challenges of deploying new technology meant for combat areas, the specific tricks that they had to employ to make TIGR work over less-than-robust military networking, and how TIGR is impacting platoons in their day to day operations"

Comment Re:Terrorists? Probably not. (Score 1) 461

"A friend of mine is working for an entity involved in this" + "They are 99% sure it was disgruntled CWA workers" == 100% ironclad credibility. As President of Slashdot, I order that we invade south San Jose and San Carlos and locate those WMDs. We don't want the next Morgan Hill to come in the form of a mushroom cloud.
Microsoft

The History of Microsoft's Anti-Competitive Behavior 361

jabjoe writes "Groklaw is highlighting a new document from the European Committee for Interoperable Systems (PDF) about the history of Microsoft's anti-competitive behavior. Quoting: 'ECIS has written it in support of the EU Commission's recent preliminary findings, on January 15, 2009, that Microsoft violated antitrust law by tying IE to Windows. It is, to the best of my knowledge, the first time that the issue of Microsoft's patent threats against Linux have been framed in a context of anti-competitive conduct.' The report itself contains interesting quotes, like this one from Microsoft's Thomas Reardon: '[W]e should just quietly grow j++ share and assume that people will take more advantage of our classes without ever realizing they are building win32-only java apps.' It also has the Gates 1998 Deposition."
Power

Developing Battery Replacement Infrastructure For Electric Cars 369

FathomIT sends in a NY Times profile of Shai Agassi, owner of a company named Better Place, who is working to build the infrastructure to support large numbers of small-scale charging spots for electric cars, as well as fast, automated battery swap stations. "The robot — a squat platform that moves on four dinner-plate-size white wheels — scuttled back and forth along a 20-foot-long set of metal rails. At one end of the rails, a huge blue battery, the size of a large suitcase, sat suspended in a frame. As we watched, the robot zipped up to the battery, made a nearly inaudible click, and pulled the battery downward. It ferried the battery over to the other end of the rails, dropped it off, picked up a new battery, hissed back over to the frame and, in one deft movement, snapped the new battery in the place of the old one. The total time: 45 seconds."
United States

Pentagon Cyber-Command In the Works 90

An anonymous reader sends word of a new cybersecurity project to defend US networks from attacks and strengthen the government's "offensive capabilities in cyberwarfare." Right now, the most likely candidate to lead the project is the Director of the NSA, Keith Alexander, who was quick to assert that the NSA itself wouldn't try to run the whole show (something they've been criticized for in the past). Quoting the Wall Street Journal: "Cyber defense is the Department of Homeland Security's responsibility, so the command would be charged with assisting that department's defense efforts. The relationship would be similar to the way Northern Command supports Homeland Security with rescue capabilities in natural disasters. The NSA, where much of the government's cybersecurity expertise is housed, established a similar relationship with Homeland Security through a cybersecurity initiative that the Bush administration began in its final year."
Displays

Visualizing Data Inside the 30-ft Allosphere 131

TEDChris writes "The Allosphere, being created at UC Santa Barbara, is the most ambitious attempt yet at creating powerful 3d visualizations of raw scientific data, such as the structure of a crystal, or how quantum effects take place. Researchers watch from a bridge inside the 30-foot sphere, looking at data projected 360 degrees around them and listening to 3D sound. The first major public demo of the facility has just been posted at TED.com. Optimists would argue that many of the greatest scientific breakthroughs happened through a new visual way of imagining data. Penicillin and relativity come to mind. So this is either a killer new research vehicle, an incredible toy, or just an insanely expensive art project."
Image

The Rootkit Arsenal 79

Nicola Hahn writes "One of the first things I noticed while flipping through this hefty book is the sheer number of topics covered. Perhaps this is a necessity. As the author puts it, rootkits lie "at the intersection of several related disciplines: computer security, forensics, reverse-engineering, system internals, and device drivers." Upon closer inspection, it becomes clear that great pains have been taken to cover each subject in sufficient depth and to present ideas in a manner that's both articulate and well organized. This accounts for the book's girth; it weighs in at roughly 900 pages." Keep reading for the rest of Nicola's review.
Security

Malicious Activity Grew At a Record Pace In 2008 56

An anonymous reader writes "Symantec announced that malicious code activity continued to grow at a record pace throughout 2008, primarily targeting confidential information of computer users. According to the company's Internet Security Threat Report Volume XIV (PDF), Symantec created more than 1.6 million new malicious code signatures in 2008. This equates to more than 60 percent of the total malicious code signatures ever created by Symantec — a response to the rapidly increasing volume and proliferation of new malicious code threats. These signatures helped Symantec block an average of more than 245 million attempted malicious code attacks across the globe each month during 2008." Another anonymous reader notes a related report from Verizon (PDF), which says 285 million records were compromised in 2008, more than the total of the previous four years combined.
Security

Subverting PIN Encryption For Bank Cards 182

An anonymous reader sends in a story at Wired about the increasingly popular methods criminals are using to bypass PIN encryption and rack up millions of dollars in fraudulent withdrawals. Quoting: "According to the payment-card industry ... standards for credit card transaction security, [PINs] are supposed to be encrypted in transit, which should theoretically protect them if someone intercepts the data. The problem, however, is that a PIN must pass through multiple HSMs across multiple bank networks en route to the customer's bank. These HSMs are configured and managed differently, some by contractors not directly related to the bank. At every switching point, the PIN must be decrypted, then re-encrypted with the proper key for the next leg in its journey, which is itself encrypted under a master key that is generally stored in the module or in the module's application programming interface, or API. 'Essentially, the thief tricks the HSM into providing the encryption key,' says Sartin. 'This is possible due to poor configuration of the HSM or vulnerabilities created from having bloated functions on the device.'"
The Courts

Jack Thompson Spams Utah Senate, May Face Legal Action 319

eldavojohn writes "Yesterday, GamePolitics ran an interesting story about the Utah Senate President threatening Jack Thompson with the CAN-SPAM Act. You might recall Utah being Jack's last hope and hold-out after being disbarred in Florida and more or less made a mockery everywhere else. Well, from Utah's Senate Site, we get the picture of what Jack is up to now: spamming his last friends on the planet. The Salt Lake Tribune is reporting on Senate President Michael Waddoups' statements: 'I asked you before to remove me from your mailing list. I supported your bill but because of the harassment will not again. If I am not removed, I will turn you over to the AG for legal action.' The Salt Lake Tribune reports that Waddoups confirmed on Tuesday that he would attempt to pursue legal action under the federal CAN-SPAM Act of 2003 against Jack Thompson."

Slashdot Top Deals

Always draw your curves, then plot your reading.

Working...