Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment obligatory xkcd reference (Score 1) 377

"The developers, a team at Michigan State University, hope to have this engine on the market in the next two/three years."

Oh no! Two/three years falls suspiciously close to the forth quarter of next year or, in other words, the project will be canceled in six months! Oh well.. it was a good run.

http://xkcd.com/678/
Networking

7Gbps Wi-Fi Networking Kit Could Launch In 2010 156

Mark.JUK writes "Wireless Local Area Networking (WLAN 802.11) adapters capable of speeds 'up to' 7Gigabits per second could be in stores by the end of this year. The Wireless Gigabit Alliance (WiGig), which seeks to advance the worldwide adoption and use of 60GHz wireless networking technology, has published a unified specification for its approach and opened an Adopter Program. The move means that WiGig members can now begin developing a Wi-Fi kit that uses the unlicensed 60GHz spectrum."
Programming

Is HTML5 Ready To Take Over From Flash? 468

The Flash platform has been taking body blows lately. First Apple, then Scribd, publicly abandon it; now ARM's marketing VP is blaming a delay in ARM smartbooks on the continuing unsuitability of Flash for the subnotebook market. But how ready is HTML5 to take over from Flash? Tim Bray offers a cautionary appraisal of the not-yet-a-standard's state of grace. While Flash may be on the way out (or so legions of its detractors hope), it is still important in many corners of the Web. Here a branding expert demonstrates that the sites of 10 out of 10 leading worldwide brands don't display on the iPad — because they're coded in Flash, of course.
NASA

Voyager 2 Speaking In Tongues 260

dangle sends in an update from the borderland of Sol. "Voyager 2's flight data system, which formats information before beaming it back to Earth, has experienced a hiccup that has altered the pattern in which it sends updates home, preventing mission managers from decoding the science data beamed to Earth from Voyager 2. The spacecraft, which is currently 8.6 billion miles (13.8 billion km) from Earth, is apparently still in overall good health, according to the latest engineering data received on May 1. 'Voyager 2's initial mission was a four-year journey to Saturn, but it is still returning data 33 years later,' said Voyager project scientist Ed Stone of the California Institute of Technology in Pasadena. 'It has already given us remarkable views of Uranus and Neptune, planets we had never seen close-up before. We will know soon what it will take for it to continue its epic journey of discovery.' The space probe and its twin Voyager 1 are flying through the bubble-like heliosphere, created by the sun, which surrounds our solar system."
AMD

AMD Undercuts Intel With Six-Core Phenom IIs 361

EconolineCrush writes "As Slashdot readers are no doubt aware, Intel's latest 'Gulftown' Core i7-980X is an absolute beast of a CPU. But its six cores don't come cheap; the 980X sells for over a grand, which is more than it would cost to build an entire system based on one of AMD's new six-core CPUs. The Phenom II X6 line starts at just $200 and includes a new Turbo capability that can opportunistically raise the clock speed of up to three cores when the others are idle. Although not as fast as the 980X, the new X6s are quick enough to offer compelling value versus even like-priced Intel CPUs. And the kicker: the X6s will work in a good number of older Socket AM2+ and AM3 motherboards with only a BIOS update."
Google

Google Releases a Web-App Case Study For Hackers 95

Hugh Pickens writes "The San Francisco Chronicle reports that Google has released Jarlsberg, a 'small, cheesy' web application specifically designed to be full of bugs and security flaws as a security tutorial for coders, and encourages programmers to try their hands at exploiting weaknesses in Jarlsberg as a way of teaching them how to avoid similar vulnerabilities in their own code. Jarlsberg has multiple security bugs ranging from cross-site scripting and cross-site request forgery, to information disclosure, denial of service, and remote code execution. The codelab is organized by types of vulnerabilities." (Read on for more.)

Comment Re:One step toward active botnet fighting? (Score 1) 381

I find this to be a great step to fighting botnets legally. More security companies should follow this path and get legal court orders to fight malicious code.

I find it quite ludicrous that many botnets are well-known as are how they operate their C&C's but the hands of those who can fix it are tied by the laws that are meant to catch these botnet herders.
First Person Shooters (Games)

Quake 3 For Android 137

An anonymous reader writes "Over the last two months I ported Quake 3 to Android as a hobby project. It only took a few days to get the game working. More time was spent on tweaking the game experience. Right now the game runs at 25fps on a Motorola Milestone/Droid. 'Normally when you compile C/C++ code using the Android NDK, the compiler targets a generic ARMv5 CPU which uses software floating-point. Without any optimizations and audio Quake 3 runs at 22fps. Since Quake 3 uses a lot of floating-point calculations, I tried a better C-compiler (GCC 4.4.0 from Android GIT) which supports modern CPUs and Neon SIMD instructions. Quake 3 optimized for Cortex-A8 with Neon is about 15% faster without audio and 35% with audio compared to the generic ARMv5 build. Most likely the performance improvement compared to the ARMv5 build is not that big because the system libraries of the Milestone have been compiled with FPU support, so sin/cos/log/.. take advantage of the FPU.''
Security

GoDaddy Wants Your Root Password 236

Johnny Fusion writes "The writer of the Securi Security Blog had an alarming awakening when a honeypot on port 22 on a GoDaddy-hosted VPS recorded login attempts using his GoDaddy username and password and even an attempt to login as root. It turns out the attempt was actually from within GoDaddy's network. Before he could 'alert' GoDaddy about the security breach, he got an email from GoDaddy Demanding his root login credentials. There is an update where GoDaddy explains itself and says they will change policy."
Image

The Smashing Book 51

Michael J. Ross writes "Of all the online resources devoted to assisting Web designers and developers, Smashing Magazine is one of the most highly regarded, primarily because of the depth and consistent quality of the articles that appear on its website. This apparently motivated many of its readers to encourage the magazine's editors to develop and release a book on Web design, which the company did in 2009, appropriately titled The Smashing Book." Read below for Michael's review.
Security

US Unable To Win a Cyber War 327

An anonymous reader writes "The inability to deflect even a simulated cyber attack or mitigate its effects shown in an exercise that took place some six days ago at Washington's Mandarin Oriental Hotel doesn't bode well for the US. Mike McConnell, the former Director of National Intelligence, said to the US Senate Commerce, Science, and Transportation Committee yesterday that if the US got involved in a cyber war at this moment, they would surely lose. 'We're the most vulnerable. We're the most connected. We have the most to lose,' he stated. Three years ago, McConnell referred to cybersecurity as the 'soft underbelly of this country' and it's clear that he thinks things haven't changed much since then."

Slashdot Top Deals

On the eighth day, God created FORTRAN.

Working...