Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Wine

Submission + - ReactOS Presented to Russian President Putin (reactos.org) 2

An anonymous reader writes: While President Putin was touring the area of Seliger Youth Forum, Marat Karatov demonstrated what can only be described as a fair amount of daring when he called out to the president and requested to present ReactOS to him. Putin agreed, and the project has now presented ReactOS to two successive Russian presidents. Putin responded to the presentation by stating he would think on it.
Science

Submission + - Shark Sex is So Vicious that Researchers Avoid Discussing It

derekmead writes: How violent, really, is shark sex? It’s so rough that to many shark scientists, it’s taboo. Researchers fear that talking about it, writes Juliet Eilperin in Demon Fish: Travels through the Hidden World of Sharks, would only “reinforce the popular perception that these creatures are brutish and unrelenting." With barbed penetration, near drowning, uterine cannibalism and copious amounts of biting, shark sex isn't exactly romantic. And, sure, some killjoy scientists think all this bloody sex will reinforce negative stereotypes about sharks. Don’t judge, though; for sharks it’s been a proven technique for 150 million years. If shark researchers really want to change our perception of the shark and make them more relatable, maybe they should play up the hot nights of the great white and not stop until all the world knows how the mako makes love.
Twitter

Submission + - Anonymous helps turn in hacker who targeted charity (networkworld.com)

netbuzz writes: "A hacker who defaced and disabled the website of a New Zealand film company known for helping poor children could find himself in legal hot water in his home country of Spain after his attack spurred a Facebook/Twitter posse that included members of Anonymous, who the hacker may have been trying to impress. "Apparently, one of the (Anonymous) rules is you don't hack charity sites, you don't hack sites of people trying to help kids,” says the owner of the damaged site. “This guy was trying to impress them, to try and get into their group and boasting about what he'd done — but they turned on him, they chased him.""

Submission + - Peter Jackson to Film Third Hobbit Film (ew.com)

An anonymous reader writes: Today Peter Jackson announced that the upcoming two-film Hobbit series will now be a trilogy. Apparently he felt that there was enough peripheral material related to the Hobbit (the Lord of the Rings appendices, Tolkien's notes) that a justification exists for a third film. So far reactions have been mixed but it's safe to say that this announcement will only serve to increase the buzz surrounding this certain-to-be-a-blockbuster franchise.
Microsoft

Submission + - Microsoft Wants To Hide Which Patents Android, Linux Violate (muktware.com)

sfcrazy writes: The court battle between Apple and Samsung has created the possibility of disclosing the cross patent agreement between Microsoft and Samsung. Microsoft is suddenly scared and has filed a motion asking the court to seal the cross license agreement. I would like to remind that the Judge has asked both parties to makee all the filings in this dispute available to the public for free.
Piracy

Submission + - Why Readers Pirate eBooks (mediabistro.com) 1

rhyder128k writes: "From the article (on a site concerned with book publishing industry news and information):

"One confessed eBook pirate asked the Reddit community an important question: “eBook pirates, how do you justify what you do?”

We’ve collected seven responses below, complete with links to the comments thread. Publishers, authors and readers should all pay attention to these rationalizations–they will play an important role in the future of publishing.""

Security

Submission + - How do you provide secure wireless network connectivity to 6,000 hackers? (esecurityplanet.com)

kongshem writes: "Denial of Service attacks and spoofed access points are just some of the challenges faced by the folks entrusted with provisioning and defending the Wi-Fi network at the Black Hat conference. This behind-the-scenes video from eSecurity Planet takes a look at what it takes to keep 6,000 hackers safely connected at the show."
Desktops (Apple)

Submission + - Apple in trouble with developers (marco.org)

geek writes: According to Marco Arment, the creator of Instapaper, Apple may be in trouble with developers. According to Arment, the new sandboxing guidelines from Apple are pushing developers away in droves. Arment also comments on the "our way or the highway" attitude Apple often takes in these situations and how it may be backfiring this time around.
Security

Submission + - Linux Patches Intel Flaw 6 Years Ahead of Windows (esecurityplanet.com)

kongshem writes: "Unknown to tens of millions of users, a hidden security vulnerability has been lurking on many Intel-based Windows PCs for the past six years.

The vulnerability involves the unsafe use of an Intel CPU instruction called 'sysret' which would have allowed an attacker to execute a user-to-kernel privilege escalation. In such an attack, the attacker could potentially get system access and then execute arbitrary code.

A fix for the vulnerability landed in the Linux kernel in 2006 and has remained in place ever since — but users of Windows 7 (as well as the open source FreeBSD and NetBSD operating system) didn't get a patch until just six weeks ago.

While the flaw has been present for six years, it's not clear if it was every actively exploited — but at least one penetration testing framework now has a working exploit for the Intel flaw."

Games

Submission + - Games could predict whether you're color blind, a gambler, or have ADD (venturebeat.com)

An anonymous reader writes: Lukasz Twardowski, a young Polish entrepreneur, recently made an unexpected discovery. By analyzing data from video games, he thinks he’ll be able to predict whether players are color blind, have Alzheimer’s disease, or suffer from various learning and development disorders. He can already use this data to tell whether players are gamblers, cheaters, or minors, so the profiling of medical conditions is not that distant, Twardowski claims.

“Games are the richest and the most meaningful form of human computer interaction,” said Twardowski in an interview with VentureBeat. “We can use [them] to build a full user behavioral profile.”

Apple

Submission + - North Korea Makes A Tablet That Nobody Can Buy (blogspot.com)

quantr writes: ""North Korea is the odd one out of all the Communist countries left in the world. While other communist nations (i.e. China) have made strides to become more open and work with the world, North Korea is content to be the kid in the corner throwing a temper tantrum every few days. That doesn’t mean the country is behind the times.

According to the North Korea Tech blog, the new tablet is called “Achim” which translates into “morning.” State-run television says the tablet is a hit among students because it provides “teaching materials, references, dictionaries and scientific data.” Unless those school children have connections, I highly doubt any of them can actually afford it.
It’s obvious that the tablet is just another attempt on the part of North Korea to stand up screaming, “Me too!” to the world. After being left in the dust by every other developed nation in the world, the country probably believes that they have to do more than just build nukes to catch the attention of the world.""

The Military

Submission + - DARPA Awards Contract to Create "Smart Suit" to Improve Soldiers' Endurance (gizmag.com)

Zothecula writes: The Pentagon has long had a fascination with machines that turn soldiers into supermen. Back in the 1960s, it funded General Electric’s work on Hardiman, an exoskeleton that was intended to allow its operator to lift loads of 1,500 lbs (680 kg). Almost half a century later, it’s still pouring money into all sorts of exoskeletons, assisted lifting devices (think robotrousers) and similar aids. Now Harvard’s Wyss Institute for Biologically Inspired Engineering has been selected by DARPA to spearhead the effort to develop a new “smart suit” intended to improve the endurance of soldiers in the field.
Programming

Submission + - Where do you find good programmers? 1

Art3x writes: Kernighan said, 'Controlling complexity is the essence of computer programming.' My past four coworkers subscribed to the copy-and-paste method of code reuse, preferred long names (they sound more official), and built unrequested features so they "wouldn't have to code it later." The code samples from applicants indicate they believe the same. Where do you find programmers who believe in tight design, DRY, and less-is-more? I feel that it would be easier to find an architect, painter, or writer and teach him programming than to find a programmer and teach him good design — or even get him to acknowledge its existence.

Slashdot Top Deals

The key elements in human thinking are not numbers but labels of fuzzy sets. -- L. Zadeh

Working...