Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Best way to stop cheat sheets... (Score 1) 439

I agree 100%. The best tests I had in college were the ones that weren't about memorizing. They were about knowing how to apply the material, formulas, ideas, etc. Once you get out of college and get a job, you'll be able to look up whatever you want in a book to help you do your job. But if you don't know what it means or how to apply it, it won't do you any good. Open book, open notes tests do a much better job of testing learning, instead of just testing memorization.

Bug

Outlook 2010 Bug Creates Monster Email Files 126

Julie188 writes with this snippet from Network World "Office 2010 is still in beta and a patch is already out. Microsoft is trying to fix a bug in the email program Outlook 2010 Beta that creates unusually large e-mail files that take up too much space. The Outlook product team has offered a bug fix for both 32-bit and 64-bit systems that fixes the problem going forward, although previous emails will remain super-sized. This could be a problem for email programs that limit message sizes, such as Gmail or BlackBerry."
Biotech

Extinct Ibex Resurrected By Cloning 238

The Telegraph is reporting that for the first time an extinct animal has been brought back via cloning. The Pyrenean ibex, a type of mountain goat, was declared officially extinct in 2000, but thanks to preserved skin samples scientists were able to insert that DNA into eggs from domestic goats to clone a female Pyrenean ibex. While the goat didn't survive long due to lung defects this gives scientists hopes that it will be possible to resurrect extinct species from frozen tissue. "Using techniques similar to those used to clone Dolly the sheep, known as nuclear transfer, the researchers were able to transplant DNA from the tissue into eggs taken from domestic goats to create 439 embryos, of which 57 were implanted into surrogate females. Just seven of the embryos resulted in pregnancies and only one of the goats finally gave birth to a female bucardo, which died seven minutes later due to breathing difficulties, perhaps due to flaws in the DNA used to create the clone."
Communications

Utah Law Punishes Texters As Much As Drunks In Driving Fatalities 620

The NY Times reports on legislation in Utah which harshly penalizes people who cause fatal car accidents while texting. Instead of merely facing a fine, offenders may now get up to 15 years in jail — the same as drunk drivers. "In effect, a crash caused by such a multitasking motorist is no longer considered an 'accident' like one caused by a driver who, say, runs into another car because he nodded off at the wheel. Instead, such a crash would now be considered inherently reckless. 'It's a willful act,' said Lyle Hillyard, a Republican state senator and a big supporter of the new measure. 'If you choose to drink and drive or if you choose to text and drive, you're assuming the same risk.' The Utah law represents a concrete new response in an evolving debate among legislators around the country about how to reduce the widespread practice of multitasking behind the wheel — a topic to be discussed at a national conference about the dangers of distracted driving that is being organized by the Transportation Department for this fall."
Microsoft

Researchers Show How To Take Control of Windows 7 325

alphadogg writes "Security researchers demonstrated how to take control of a computer running Microsoft's upcoming Windows 7 operating system at the Hack In The Box Security Conference (HITB) in Dubai on Thursday. Researchers Vipin Kumar and Nitin Kumar used proof-of-concept code they developed, called VBootkit 2.0, to take control of a Windows 7 virtual machine while it was booting up. 'There's no fix for this. It cannot be fixed. It's a design problem,' Vipin Kumar said, explaining the software exploits the Windows 7 assumption that the boot process is safe from attack. While VBootkit 2.0 shows how an attacker can take control of a Windows 7 computer, it's not necessarily a serious threat. For the attack to work, an attacker must have physical access to the victim's computer. The attack can not be done remotely." Which makes me wonder why I'm posting this :)

Comment Write to them to complain (Score 1) 508

I sent them some feedback saying I will miss the feature and hoping they'll reconsider. If enough people do the same, maybe they'll decide not to kill it.

To send them feedback, I followed the "contact us" link at the bottom of their homepage, went to "suggestions", and wrote them a quick, but polite, note about how I will miss this feature.
Media

Blu-ray BD+ Cracked 521

An anonymous reader writes "In July 2007, Richard Doherty of the Envisioneering Group (BD+ Standards Board) declared: 'BD+, unlike AACS which suffered a partial hack last year, won't likely be breached for 10 years.' Only eight months have passed since that bold statement, and Slysoft has done it again. According to the press release, the latest version of their flagship product AnyDVD HD can automatically remove BD+ protection and allows you to back-up any Blu-ray title on the market."
The Internet

Athletes Can Blog at Olympics - with Restrictions 184

Hugh Pickens writes "The IOC has given athletes the right to blog at the Beijing Games this summer, a first for the Olympics. They're allowed, as long as they follow the many rules it set to protect copyright agreements, confidential information and security. The IOC said blogs by athletes 'should take the form of a diary or journal' and should not contain any interviews with other competitors at the games. They also should not write about other athletes. Still pictures are allowed as long as they do not show Olympic events. Athletes must obtain the consent of their competitors if they wish to photograph them. Also, athletes cannot use their blogs for commercial gain."
Graphics

Is nVidia Support for Older 3D Games Fading? 133

BrendaEM writes "A thread on Through the Looking Glass depicts the plight of fans of the original Thief Series and System Shock 2, who are asking nVidia fix rendering issues these 3D 16-bit games on their newer video cards and drivers. In the case of the original Thief series, in which the games build tension by their use of light and shadow, the rendering has been badly degraded from that which was originally intended. In another Slashdot article, the author asked the question whether or not video games were art. If one of the greatest video games of all time, with a growing wealth of hundreds of fan produced missions, as well as an entire full-sized expansion, does not play well because legacy support diminishes, then what will happen to lesser 3D video games?"
Caldera

SCO Files for Chapter 11 Bankruptcy 421

Can you say "the SCO, the" in German? writes "Trading of SCO's stock has been halted on news that SCO has filed for Chapter 11 Bankruptcy. This move just so happens to fall on the eve of SCO's trial with Novell. One would think that their prior boasts were mostly bluster, that they believe they have almost no chance of prevailing at trial, and that they're now desperate to protect their executives from SCO's creditors while seeking yet another delay. From the release: 'The SCO Group intends to maintain all normal business operations throughout the bankruptcy proceedings. Subject to court approval, SCO and its subsidiaries will use the cash flow from their consolidated operations to meet their capital needs during the reorganization process. "We want to assure our customers and partners that they can continue to rely on SCO products, support and services for their business critical operations," said Darl McBride, President and CEO, The SCO Group. "Chapter 11 reorganization provides the Company with an opportunity to protect its assets during this time while focusing on building our future plans."'"
Hardware Hacking

New AACS Fix Hacked in a Day 362

VincenzoRomano writes "ArsTechnica has just published an update to the neverending story about copy protection used in HD DVD and Blu-ray discs and hacker efforts against it. From the article: 'The ongoing war between content producers and hackers over the AACS copy protection used in HD DVD and Blu-ray discs produced yet another skirmish last week, and as has been the case as of late, the hackers came out on top. The hacker BtCB posted the new decryption key for AACS on the Freedom to Tinker web site, just one day after the AACS Licensing Authority (AACS LA) issued the key.' The article proposes a simple description of the protection schema and a brief look back at how the cracks have slowly chipped away at its effectiveness. It seems it'll be a long way to an effective solution ... if any. One could also argue whether all that money spent by the industry in this race will be worth the results and how long it would take for a return on investment."

Slashdot Top Deals

"No matter where you go, there you are..." -- Buckaroo Banzai

Working...