Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Plan For Cloaking Device Unveiled 342

Robotron23 writes "The BBC is reporting that a plan for a cloaking device has been unveiled. The design is pioneered by Professor Sir John Pendry's team of scientists from the US and Britain. Proof of the ability of his invention could be ready in just 18 months time using radar testing. The method revolves around certain materials making light "flow" around the given object like water."

2006 ACM Programming Contest Complete 180

prostoalex writes "World finals for 2006 ACM programming contest took place in San Antonio, TX this year, and the results are in. Russia's Saratov State University solved 5 contest problems in record time, followed closely by Altai State Technical University (Russia) with 5 problems solved as well. University of Twente (Netherlands), Shanghai Jiao Tong University (China), Warsaw University (Poland), St. Petersburg State University (Russia), Massachusetts Institute of Technology (USA), Moscow State University (Russia), University of Waterloo (Canada) and Jagiellonian University - Krakow (Poland) all completed 4 problems."

Wal-Mart Controls Modern Game Design? 696

An anonymous reader writes "That Wal-Mart smiley face is looking pretty evil now that Allen Varney has explained how much influence they have on virtually every modern game: 'Publisher sales reps inform Wal-Mart buyers of games in development; the games' subjects, titles, artwork and packaging are vetted and sometimes vetoed by Wal-Mart. If Wal-Mart tells a top-end publisher it won't carry a certain game, the publisher kills that game. In short, every triple-A game sold at retail in North America is managed start to finish, top to bottom, with the publisher's gaze fixed squarely on Wal-Mart, and no other.'"

Pentium Computers Vulnerable to Attack? 227

An anonymous reader writes "One of the latest security scares is coming from security experts at CanSecWest/core '06 in the form of a possible hardware-specific attack. The attack is based on the built-in procedure that Pentium based chips use when they overheat. From the article: 'When the processor begins to overheat or encounters other conditions that could threaten the motherboard, the computer interrupts its normal operation, momentarily freezes and stores its activity, said Loïc Duflot, a computer security specialist for the French government's Secretary General for National Defense information technology laboratory. Cyberattackers can take over a computer by appropriating that safeguard to make the machine interrupt operations and enter System Management Mode, Duflot said. Attackers then enter the System Management RAM and replace the default emergency-response software with custom software that, when run, will give them full administrative privileges.'"

Slashdot Top Deals

It's a naive, domestic operating system without any breeding, but I think you'll be amused by its presumption.

Working...