Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Technology

Submission + - Chip Company gets $48M to Battle Intel (sfgate.com)

An anonymous reader writes: A group of investors, including companies from the United States, Europe and the United Arab Emirates, has formed in a bid to disrupt one of Santa Clara chipmaker Intel's most lucrative franchises.

The companies have put $48 million into Smooth-Stone, a startup based in Austin, Texas, betting that it can modify low-power smart-phone chips to run servers, the computers in corporate data centers. If successful, Smooth-Stone would undermine Intel's server-chip business and offer companies — especially those with vast data centers like Mountain View's Google and Palo Alto's Facebook — enormous energy cost savings.

Security

Submission + - 5 Million Domains Serving Malware via NS (net-security.org)

An anonymous reader writes: A compromised widget provided by Network Solutions was serving malware on otherwise legitimate websites. But, as bad as this discovery was, it was bound to be overshadowed a couple of days later by another revelation: the widget is automatically included on every "parked" domain by Network Solutions! A quick search on Google and Yahoo! revealed that there are around 500,000 and 5,000,000 domains affected and serving malware, respectively. A manual check of some 200 parked domains on the list showed that all of them were provided with the malware-serving widget.

Space Junk Getting Worse 242

HockeyPuck writes "According to Space.com the amount of space junk is getting worse. 'A head-on collision was averted between a spent upper stage from a Chinese rocket and the European Space Agency's (ESA) huge Envisat Earth remote-sensing spacecraft. [...] But what if the two objects had tangled? Such a space collision would have caused mayhem in the heavens, adding clutter to an orbit altitude where there are big problems already, said Heiner Klinkrad, head of the European Space Agency's Space Debris Office in Darmstadt, Germany."

Comment Re:One other reason, Algae is more valuable! (Score 4, Interesting) 238

Actually .. there are both yeasts and algae that literally -output- diesel as a byproduct of their metabolic processes. The researchers in this article focused on the conversion of algae to biofuels using heat and industrial processes, but this is not the technique currently in favor amongst the algae biofuel startups. Most have strains of yeasts (and algae) that were discovered around the world that have low yields of diesel fuel byproduct, and are working via rapid natural selection and genetic engineering techniques to increase the yield to commercially viable levels.

So, you get the valuable algae .. AND .. you get the diesel byproducts. It costs sunlight, and fertilizer plus some post processing and captures more carbon than is emitted by burning the fuel. Sounds pretty good to me.

Comment No surprise here .. from Psystar's front page: (Score 3, Insightful) 245

December 22, 2009

Psystar has voluntarily suspended the sale of our Rebel EFI software product. Psystar feels it would be prudent to halt the sale of Rebel EFI while we explicitly ask the court for clarification on the legality of Rebel EFI. Our patience has been tested but our resolve is unwavering. Psystar's vision of bringing the Mac OS to generic PC hardware is and always will be unyielding. Although Rebel EFI may be temporarily unavailable for purchase on the Psystar online store, those who purchase a t-shirt or donate over twenty dollars will receive one free copy of Rebel EFI once the court has ruled in our favor on this issue. ... (more moaning and groaning) ...

Any and all information regarding Rebel EFI, future software products and all other things Psystar should be directed to press@psystar.com or legal@psystar.com.

Comment Re:It is obvious she is biased (Score 3, Interesting) 929

Lets see .. you're a terrorist, and you want to get a bomb into place. So:

o) you make yourself as conspicuous as possible
o) ... put antisemitic stuff all over your baggage
o) ... post TONS of antisemitic stuff on the internet just to be sure
o) ... enter Israel from a country known to harbor terrorists

Get my drift? It's that very kind of behavior at a border crossing that makes her the least likely candidate to be carrying explosives. Also, most explosives have a residue signature that can be easily scanned for in Israel because they keep that kind of tech handy at customs points. A few swipes with a swab and a portable scanner later .. you know -exactly- what's in the bag. Five minutes or less. I can't say if shooting her bag was an over-reaction, but I can say that at least at that facility -- they had options.

At the end of the day, it's a wash. She is getting reimbursed for the laptop, and the Israeli security forces look good inside of Israel, but look silly to the outside world. Nobody really wins.

Comment Re:My $.02 (Score 1) 1127

Gods, don't be so melodramatic and naive. These days Usenet is full of posts, and the pornographers are posting to everything from alt.comp.literacy to alt.binaries.pictures.landscapes and everything in between. Perhaps even the FBI is posting it as well, who knows.

To preserve privacy on your machine, for whatever reason, it's as simple as:

a) Use TOR! Preserver your privacy online by using onion routing networks. It's good sense for web browsing.
a) Use the built in privacy features in your browser to delete the cache when you finish browsing.
b) Use any of a number of utilities to overwrite the free space of your drive with zeroes. Heck, it's built in with mac OS X

--no-- computer forensic techiques exist to recover data once it has been overwritten once with zeros. There is a long standing challenge for any data recovery company to retrieve data from a hard drive that has been "dd if=/dev/zero of=/dev/whatever"ed to death. They won't take it, and for good reason.

That's what it boils down to. You don't need to smash your hard disk. You do need to be a levelheaded, smart person.

Media (Apple)

Submission + - Apple May Track IPod Thieves & You (msn.com)

Ryan N. Kamfolt - ClickAway writes: "Apple may begin implementing software in its I-Tunes suite to track serial numbers of I-Pods and compare them to a stolen I-Pod database. Due to the worlds most successful and popular product being on the #1 most stolen items list. This may alert the local police to come knocking on your door, if "Your" I-Pod is in question. Weather it be stolen or legit, people are not taking this to heart kindly at all. With the right to privacy walls closing in on us ever so fast, this seems to be another push to take our privacy rights away even more, or is it? Those who have had their I-Pods stolen love the idea. Others are not so happy about the idea. Some privacy right advocates have suggested implementing I-Pods or I-Phones with owner ID verification, such as a password or other forms of verification that must be entered into the devices before they will take a charge or allow you to place songs on the device. Or offer a service that is apart of Apple iCare, which allows users who feel they may become a victim of theft, to join this database, to further protect them in the even their I-Pod is stolen."

Slashdot Top Deals

The rule on staying alive as a program manager is to give 'em a number or give 'em a date, but never give 'em both at once.

Working...