Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

Submission + - The Database Exposure Survey 2007 (exaprotect.com)

ExaProtect writes: "New research by David Litchfield reveals that a staggering 368,000 Microsoft SQL Servers and 124,000 Oracle database servers were directly accessible via the internet and NOT protected by a firewall. Last ran in 2005, The Database Exposure Survey has discovered large increases in the number of unprotected databases in the two years since. Read the full article by Security Information Management firm ExaProtect"
The Internet

Submission + - Congress Passes SAFE Act, Burdens Public Networks

sqrt(2) writes: "As reported by Techdirt on the recently passed SAFE Act, "So what's so awful about the law? Well, like most "protect the children" legislation, it goes way overboard in terms of what people are expected to do, and like most legislation having to do with technology, seems utterly clueless about how technology works. The bill would require anyone providing an "electronic communication service" or a "remote computing service" to record and report information any time they "learn" that their network was used for certain broadly defined illegal activities concerning obscene images. That's double trouble, as both the illegal activities and the classification of who counts as a service provider are so broadly defined.""
Education

Submission + - Students 'should use Wikipedia' (bbc.co.uk) 3

An anonymous reader writes: The BBC has an article on these disturbing quotes from Jimmy Wales.

Wikipedia founder Jimmy Wales has said teachers who refuse students access to the site are "bad educators". Speaking at the Online Information conference at London's Olympia, he dismissed the long-running controversy over the site's authority. He said he now thinks that students should be able to cite the online encyclopaedia in their work.

Biotech

Submission + - Find biodiversity research resources more easily (gbif.org)

An anonymous reader writes: If you needed to see a specimen of a hedgehog from Herzegovina or a fish from Fiji, would you know where to look? Finding a natural history collection that has specimens from a particular time or place is now mostly a matter of guesswork. GBIF is working to make finding this out a whole lot easier.

There are thousands of specimen collections in the world (holding billions of specimens), but there is currently no index to help a person find them, much less tell what kinds of specimens are in the collection.

These collections are vitally important to understanding biodiversity, especially in the face of global change. This is because they provide a historical baseline against which to measure the effects of that change on biodiversity. Many of these collections have been around for 300 years or more.

There has never been an index to all of them. Now, GBIF and its partners will produce not only the first Internet-based index, but also the first such index of any kind.

The Biodiversity Collections Index will be available online for anyone to use for free by the end of 2008. After that it will grow to include additional kinds of collections.

It will be interconnected with other online resources like GBIF and the Encyclopedia of Life.

Programming

Submission + - Copyright, languages, and specifications

An anonymous reader writes: I was wondering recently, how copyright licences come into effect when working with multiple languages. For instance, take a simple md5 algorithm written in C. The developer then, looking at this code, writes the Java, Perl, Python, etc as direct an equivalent as possible. Is this infringement? Furthermore, let's say that the C algorithm was a direct implementation from a public specification. How would one go about ensuring that no infringement can be claimed? Does the copyright cover only the specific expression of the algorithm, any expression that can be made to be similar to the original algorithm?

What about if one simply browsed through the code to get an understanding of how it worked, or how it implemented a specific portion of a specification, but then wrote their own implementation based upon the reading of the code — how does copyright come into play there? With regard to the copyright licenses, (if it makes any difference) assume any case (i.e. license A for the existing code and license B for the new code where A and B are different, but could be open source or closed source). Assume that no trade-secrets, patents, contracts etc are being infringed upon — this is strictly a copyright question.
Space

Submission + - The Device NASA Is Leaving Behind

iminplaya writes: After years of delays, NASA hopes to launch this week a European-built laboratory that will greatly expand the research capability of the international space station. Although some call it a milestone, the launch has focused new attention on the space agency's earlier decision to back out of plans to send up a different, $1.5 billion device — one that many scientists contend would produce far more significant knowledge. "...it would be a true international disgrace if this instrument ends up as a museum piece that never is used."
Education

Submission + - The Dangerous Wealth of the Ivy League 1

theodp writes: "BusinessWeek reports that higher education is increasingly a tale of two worlds, with elite schools getting richer and buying up all the talent. Thanks to endowments like the one that netted Harvard $5.7B in investment gains just last year, the Ivy Plus colleges — which account for less than 1% of students — have been able to lift their spending into the stratosphere, including extravagances like $272,000-a-bed-dorms and even a $4M student-horse-housing rehab. 'People used to look at every penny,' says a Yale Dean. 'The mind-set is different now.' Meanwhile, reports BW, public colleges and universities struggle to educate 75% of the country's students in an era when most states are devoting a dwindling share of their budgets to higher ed."
Security

Submission + - Penn student at center of worldwide hacking invest (philly.com)

An anonymous reader writes: When a suspicious computer server crash at the University of Pennsylvania last year denied service to 4,000 students, faculty and staff, technicians called the FBI — triggering a case that would take agents around the world and lead to the arrest of a brilliant but brash Penn junior. Ryan Goldstein, a 20-year-old bioengineering major, conspired with a New Zealand hacker known as AKILL to use Penn's computer system as a staging ground for a 50,000-computer attack against several online chat networks, authorities said. The FBI and Secret Service are expected to announce indictments today against Goldstein, a Florida man, and three others. Police recently executed related raids in New Zealand, Florida, California and Pennsylvania. The latest came Tuesday near Philadelphia. An FBI agent from the region is in New Zealand this week, and more arrests are possible. "We've been executing search warrants all over the world in this case," said Assistant U.S. Attorney Michael Levy. View article for more.
Software

Submission + - Assyrian, Babylonian, Sumerian Translator Created (marketwire.com)

DrJackson writes: A new ancient languages online translator has been developed. It can translate Assyrian, Babylonian, Sumerian and the hieroglyphic script of Egyptian (1 of the 3 anyway). This is the website: virtualsecrets.com . This is the first time I ever saw a translator for cuneiform. Something like this would be great for translating interesting historical records like the Amarna Letters.
Security

Submission + - Newest Version of Storm Worm in "BETA Testing& (robertmcardle.com)

Robert McArdle writes: "There is a new wave of the now infamous Storm Worm doing the rounds. This time the mail attempts to convince users to download a program that is currently undergoing Beta Testing. In return the helpful victim receives their own Free Edition (lucky them) and from 5 years to a lifetime of free updates. Oh ... and their computer joins a massive P2P Botnet, and starts generating massive amounts of SPAM to help spread the worm...still no BETA software comes without the odd bug. Read More"
Privacy

Submission + - Going to Yosemite? Get your passport ready! (cnn.com)

rev_media writes: The Real ID acts mandates all states to begin issuing federal IDs to all citizens by 2008. Costs could be as much at $14 billion, but only 40 million are currently allocated. Several states have passed legislation expressly forbidding participation in the program, while others seem to be all for it. The IDs will be required for access to all federal areas including flights, state parks and federal buildings. People in states refusing to comply will need to show passports even for domestic flights.
Power

Submission + - Superefficient Solar Cell from Silicon Nanocrystal 1

chinmay7 writes: "Researchers at the National Renewable Energy Laboratory (NREL), have shown that silicon nanocrystals can produce two or three electrons per photon of high-energy (blue and UV) sunlight. The small size of nanoscale crystals results in the conversion of this energy into electrons instead of heat. Solar cells made of silicon nanocrystals could theoretically reach more than 40% efficiency, compared to 20% efficiency of the best conventional silicon solar cells.
An article in the Tech Review goes into more detail."
Robotics

Submission + - Robots in Media - Keepon, the Dancing Bot (waziwazi.com)

itsbeavertime writes: "Keepon, a robot designed by Hideki Kozima, has appeared in its second music video — "Don't You Evah" by Spoon. The first video has garnered over 1.3 million hits on You Tube. The little bot is doing his part for a good cause too. Keepon will appear alongside Spoon for a Los Angeles concert in support of Creative Commons!. The concert is organized by Wired as part of its Nextfest kickoff in September. "About 1' tall, the cutesy witzy little bot bobs up and down, turns around and nods rhythmically in sync to groovy music! The robot is designed to 'interact with children by communicating attention and emotion'. It features two 'eye' cameras and a microphone in its nose and unfortunately, isn't for sale and used only for research purposes.""

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...