Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment But there was no ice in the 1500's (Score 1) 145

Forgive me for the attention-seeking headline, but I've read very interesting things about Antarctica and its ice sheets.

Primarily, there were maps made in the 1500's that closely resemble an ice-free Antarctica. They document mountains we've detected in the 1900's by sonar, and reflect the Antarctic coastline closely.

If these maps are correct, and there was no ice in the 1500's... how were these ice cores found?

If the ice cores were found, and they date back to 1000 AD, how were these maps made with knowledge of Antarctica having no ice?

I'm very curious. One good article I found is here:
http://www.diegocuoghi.it/Piri_Reis/PiriReis_Hoye-Lunde.htm

Quite plausibly, it seems that the maps are, in fact, not maps of Antarctica. I wonder how that affects the arguments given... thoughts?

Microsoft

Submission + - Technology Antiquates Most Tech Positions (seventhknight.com)

Luke writes: "Technology created and refined for DoD use makes its way into scalable solutions for any size business or agency. Applications repair themselves automatically, executable code operates on self-managing white\black lists, and all user and machine events are stored centrally to create complete history reports. IT departments will be slow to adopt, since manpower could be reduced. Give your thoughts... Will this help or hinder the average IT professional?"
User Journal

Journal SPAM: Does the iPhone have a built-in spyware module? 2

The underground hacker team "web-Hack" from Russia released a whitepaper with results of iPhone firmware research where they reverse-engineered embedded functions. They claim discovery of a built-in function which sends all data from an iPhone to a specified web-server. Contacts from a phonebook, SMS, recent calls, history of Safari browser - all your personal information - can be stolen. Researchers as

Security

Submission + - Security Researcher chases virus maker off the Net

An anonymous reader writes: I just saw a writeup on CNET that that covers the pursuit of a virus writer who created a fake Grand Theft Auto game, crippling PCs by causing them to endlessly reboot. Despite the police apparently not being very interested, a security researcher pursued his man anyway, culminating in a teary eyed "I'm leaving the internet" post from the virus writer himself. Awesome stuff, and one in the eye for the bad guys (for once).

Slashdot Top Deals

UNIX is hot. It's more than hot. It's steaming. It's quicksilver lightning with a laserbeam kicker. -- Michael Jay Tucker

Working...