Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Huge Cash Pile (Score 3, Insightful) 144

Almost certainly the case on three grounds.

(1) Getting a serious fusion effort off the ground is fabulously expensive. Even if you have some kind of whizbang micro-reactor concept you need a small army of physicists, engineers and highly skilled fabricators. People who don't come cheap.

(2) Running out of cash is what most startups do.

(3) They probably didn't have as much cash as "everyone knows they have", for the simple reason that the best way to convince someone to give you the mountain of cash you need is to make them thing you've as good as got it from someone else.

Submission + - Ubuntu Is In Urgent Need of a SystemD Developer/Maintainer (softpedia.com)

devphaeton writes: From TFA: Martin Pitt, a renowned Ubuntu developer, who apparently is in charge of the systemd maintenance/development for the Ubuntu Linux operating system, posted a message on the Ubuntu mailing list asking for assistance in maintaining systemd in Ubuntu:

"I'm working on systemd about 90% of my time these days, but currently this is a one-man show in Ubuntu, and about a 1.3 man show in Debian," says Mr. Pitt. "So please talk to me if you are interested in working on any of this. I'm happy to provide mentoring, guidance, introduction to upstream, etc."

Power

Mystery Company Blazes a Trail In Fusion Energy 144

sciencehabit writes: Of the handful of startup companies trying to achieve fusion energy via nontraditional methods, Tri Alpha Energy Inc. has always been the enigma. Publishing little and with no website, but apparently sitting on a cash pile in the hundreds of millions, the Foothill Ranch, California-based company has been the subject of intense curiosity and speculation. But last month Tri Alpha lifted the veil slightly with two papers, revealing that its device, dubbed the colliding beam fusion reactor, has shown a 10-fold improvement in its ability to contain the hot particles needed for fusion over earlier devices at U.S. universities and national labs. 'They've improved things greatly and are moving in a direction that is quite promising,' says plasma physicist John Santarius of the Fusion Technology Institute at the University of Wisconsin, Madison.

Comment Re:50 aircraft? Actual count: 97 (Score 1) 167

my information is clearly more complete than what is in the AP story

They're doing what they always do; drip drip drip out the bad news, a little worse each time. Fifty?!! Wow. 97?? Well, that's only 47 more than 50 so; "no new information," as their spokes-fucks will say.

It's going on right now with the anthrax news. Yesterday the DOD revealed they sent live anthrax into Canada, in addition to the 12 US states they had already admitted to.

The Clintons have been pulling this crap since the 90's. They're dripping out Foundation donor information one foreign turd at a time; timed to run out long before the election. They've got the State Department dripping out their copies of her emails on a published schedule now.

They know there are far more than 50 aircraft. So does the AP. They'll admit to a few more in a couple news cycles. They'll probably fess up to the whole number just before Rand Paul or whomever seats the first hearing on it.

Security

New SOHO Router Security Audit Uncovers Over 60 Flaws In 22 Models 66

Home and small-office routers have become a hotbed for security research lately, with vulnerabilities and poor security practices becoming the rule, rather than the exception. A new security audit by researchers from Universidad Europea de Madrid only adds to that list, finding 60 distinct flaws in 22 different device models. They posted details of their research on the Full Disclosure mailing list, and the affected brands include D-Link, Belkin, Linksys, Huawei, and others. Many of the models they examined had been distributed to internet customers across Spain by their ISPs. About half of the flaws involve Cross Site Scripting and Cross Site Request Forgery capabilities, though there is at least one backdoor with a hard-coded password. Several routers allow external attackers to delete files on USB storage devices, and others facilitate DDoS attacks.
DRM

The Bizarre Process Used For Approving Exemptions To the DMCA 69

harrymcc writes: The Digital Millennium Copyright Act imposes severe penalties on those who overcome copy-protection technologies. It allows for exemptions for a variety of purposes — but in a weird proviso, those exemptions must be re-approved by the Librarian of Congress every three years. Over at Fast Company, Glenn Fleishman takes a look at this broken system and why it's so bad for our rights as consumers. "The Librarian has opted to require one or more 'champions' or proponents of a carefully defined category, like "Audiovisual works – educational uses – colleges and universities," to file a brief. His office also opens the floor to rebuttals from opponents. Further, the Librarian sunsets every exemption every three years—something not required by the law, and which requires champions to arise again to launch a new defense. The office also doesn't propose its own examples of circumvention that should be permitted, even though the law permits it to do so."

Comment Re:Sometimes even your hack gets outdated... (Score 2) 258

Eh... it wasn't really until the mid 90s before laptops or processors had a large difference between generations. 15 and 30 mhz 486s desktops were still common on store shelves in 1995. Sound cards and CD roms were still expensive add ons around then too. A lot of systems were still dos or Windows 3.1 and not only did you have to purchase a web browser, you had to install a network stack just to dial up the internet. I remember being stoked when i upgraded the 9600 baud modem to a USR 33.6k modem for

Privacy

Senate Passes USA Freedom Act 294

schwit1 points out that the U.S. Senate has passed the USA Freedom Act by a vote of 67-32, sending it on to President Obama, who is expected to sign it into law. The bill removes mass metadata collection powers from the NSA, but also grants a new set of surveillance powers to replace them. Telecoms now hang on to that data, and the government can access it if they suspect the target is part of a terrorism investigation and one of the call's participants is overseas. "The second provision revived Tuesday concerns roving wiretaps. Spies may tap a terror suspect's communications without getting a renewed FISA Court warrant, even as a suspect jumps from one device to the next. The FISA Court need not be told who is being targeted when issuing a warrant. The third spy tool renewed is called "lone wolf" in spy jargon. It allows for roving wiretaps. However, the target of wiretaps does not have to be linked to a foreign power or terrorism."
Hardware

Fabs Now Manufacturing Carbon Nanotube Memory, Which Could Replace NAND and DRAM 67

Lucas123 writes: Nantero, the company that invented carbon nanotube-based non-volatile memory in 2001 and has been developing it since, has announced that seven chip fabrication plants are now manufacturing its Nano-RAM (NRAM) wafers and test chips. The company also announced aerospace giant Lockheed Martin and Schlumberger Ltd., the world's largest gas and oil exploration and drilling company, as customers seeking to use its chip technology. The memory, which can withstand 300 degrees Celsius temperatures for years without losing data, is natively thousands of times faster than NAND flash and has virtually infinite read/write resilience. Nantero plans on creating gum sticks SSDs using DDR4 interfaces. NRAM has the potential to create memory that is vastly more dense that NAND flash, as its transistors can shrink to below 5 nanometers in size, three times more dense than today's densest NAND flash. At the same time, NRAM is up against a robust field of new memory technologies that are expected to challenge NAND flash in speed, endurance and capacity, such as Phase-Change Memory and Ferroelectric RAM (FRAM).
Microsoft

Microsoft To Support SSH In Windows and Contribute To OpenSSH 285

An anonymous reader writes: Microsoft has announced plans for native support for SSH in Windows. "A popular request the PowerShell team has received is to use Secure Shell protocol and Shell session (aka SSH) to interoperate between Windows and Linux – both Linux connecting to and managing Windows via SSH and, vice versa, Windows connecting to and managing Linux via SSH. Thus, the combination of PowerShell and SSH will deliver a robust and secure solution to automate and to remotely manage Linux and Windows systems." Based on the work from this new direction, they also plan to contribute back to the OpenSSH project as well.

Comment Re:Memory erased by cosmic rays (Score 5, Interesting) 258

Oh, god, space technology is full of brilliant hacks. For example, New Horizons' radio. It has two amps connected to one dish, designed as a primary and a backup. But while it was en route, an engineer hit upon an idea to have them both transmit at the same time through the same dish, doubling the bandwidth. Normally that wouldn't make sense, except that the amplifiers have signals with different polarization, and these can be separated back out on Earth.

Great, except for one problem. The second radio was designed as a backup, they weren't planned for simultaneous operation - so there's not enough power to run them both and everything else at the same time. There's barely enough power to run just the radios - and I mean, it's not like you can just shut off the flight computer to free up more power. Well... actually, that's exactly what they do. When have a ton of data accumulated that they want to get to Earth and no critical science to do, they spin the craft up like a bullet to keep it stable and the dish pointing at Earth. Then they shut down the whole guidance and control system and pretty much everything else on the craft not essential for reading and transmitting data. It stays in this mode for days for a week or two, until all of the onboard data is transmitted, then they spin it back down so that they can do things like take pictures once again.

Slashdot Top Deals

Genetics explains why you look like your father, and if you don't, why you should.

Working...