Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Dupe ? (Score 1) 25

News Flash: ESA and NASA fly similar Earth-observation missions ALL THE TIME.

Odds are good, if NASA is doing it, so is ESA. And they collaborate on mission plans, and share data.

Earth observation is one area of very good international cooperation. Since, after all, it's just one Earth.

Comment I work in Earth-observing satellite ground systems (Score 3, Interesting) 24

The last I looked, the state of remote-sensing algorithms for limb profiling (i.e., looking through the layer of the Earth's atmosphere over the limb of the planet from your orbital position) is something between bad and "are you kidding?".

I wonder what kind of secret sauce these Young Turks have that NASA and NOAA doesn't?

Security

Georgia Institute of Technology Researchers Bridge the Airgap 86

An anonymous reader writes Hacked has a piece about Georgia Institute of Technology researchers keylogging from a distance using the electromagnetic radiation of CPUs. They can reportedly do this from up to 6 meters away. In this video, using two Ubuntu laptops, they demonstrate that keystrokes are easily interpreted with the software they have developed. In their white paper they talk about the need for more research in this area so that hardware and software manufacturers will be able to develop more secure devices. For now, Faraday cages don't seem as crazy as they used to, or do they?
Medicine

Brain Implants Get Brainier 49

the_newsbeagle writes "Did my head just beep?" wonders a woman who just received a brain implant to treat her intractable epilepsy. We're entering a cyborg age of medicine, with implanted stimulators that send pulses of electricity into the brain or nervous system to prevent seizures or block pain. The first generation of devices sent out pulses in a constant and invariable rhythm, but device-makers are now inventing smart stimulators that monitor the body for signs of trouble and fire when necessary.
Programming

Anonymous No More: Your Coding Style Can Give You Away 220

itwbennett writes Researchers from Drexel University, the University of Maryland, the University of Goettingen, and Princeton have developed a "code stylometry" that uses natural language processing and machine learning to determine the authors of source code based on coding style. To test how well their code stylometry works, the researchers gathered publicly available data from Google's Code Jam, an annual programming competition that attracts a wide range of programmers, from students to professionals to hobbyists. Looking at data from 250 coders over multiple years, averaging 630 lines of code per author their code stylometry achieved 95% accuracy in identifying the author of anonymous code (PDF). Using a dataset with fewer programmers (30) but more lines of code per person (1,900), the identification accuracy rate reached 97%.

Comment New Laptop? Windows? (Score 5, Insightful) 467

I thought the included (pre-installed) Microsoft Windows Defender (or Windows Security Essentials) was already good enough.

That, plus not installing every stupid piece of malware-studded "freeware" I come across and being a bit conservative in my browsing, has always been enough since Windows 7.

Windows after 7 also has a built-in software firewall, so wouldn't seem like you'd need one of those either.

I just can't picture needing anything beyond that.

Slashdot Top Deals

Receiving a million dollars tax free will make you feel better than being flat broke and having a stomach ache. -- Dolph Sharp, "I'm O.K., You're Not So Hot"

Working...