Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Censorship

Australia To Block BitTorrent 674

Kevin 7Kbps writes "Censorship Minister Stephen Conroy announced today that the Australian Internet Filters will be extended to block peer-to-peer traffic, saying, 'Technology that filters peer-to-peer and BitTorrent traffic does exist and it is anticipated that the effectiveness of this will be tested in the live pilot trial.' This dashes hopes that Conroy's Labor party had realised filtering could be politically costly at the next election and were about to back down. The filters were supposed to begin live trials on Christmas Eve, but two ISPs who volunteered have still not been contacted by Conroy's office, who advised, 'The department is still evaluating applications that were put forward for participation in that pilot.' Three days hardly seems enough time to reconfigure a national network."
Communications

Mediterranean Undersea Cables Cut, Again 329

miller60 writes "Three undersea cables in the Mediterranean Sea have failed within minutes of each other in an incident that is eerily similar to a series of cable cuts in the region in early 2008. The cable cuts are already causing serious service problems in the Middle East and Asia. See coverage at the Internet Storm Center, Data Center Knowledge and Bloomberg. The February 2008 cable cuts triggered rampant speculation about sabotage, but were later attributed to ships that dropped anchor in the wrong place."
Communications

Hacked Business Owner Stuck With $52k Phone Bill 300

ubercam writes "A Canadian business man is on the hook for a $52,000 phone bill after someone hacked into his voice mail system and found a way to dial out. The hacker racked up the charges with calls to Bulgaria. The business owner noticed an odd message coming up on his call display (Feature 36), and alerted his provider, Manitoba Telecom Services. They referred him to their fraud department, who discovered the breach. MTS said that they would reverse the charges if the hacked equipment was theirs, but in this case it was customer owned. The ironic part is that the victim's company, HUB Computer Solutions, is in the business of computer and network security. They even offer to sell, configure and secure Cisco VoIP systems. Looks as though they even couldn't manage to secure their own system, which doesn't bode well for their customers." This certainly isn't the first time someone has exploited the phone system and stuck another with the bill. Maybe it's time for the phone company to get their fraud detection and prevention services at least on par with the credit card companies'.
Image

Trick or Treatment 713

brothke writes "The recent collapse of financial companies occurred in part because their operations were run like a black box. For many years, alternative medicine has similarly operated in the shadows with its own set of black boxes. In Trick or Treatment: The Undeniable Facts about Alternative Medicine, Simon Singh and Edzard Ernst, MD, break open that box, and show with devastating clarity and accuracy, that the box is for the most part empty." Keep reading for the rest of Ben's review.
Education

What Restrictions Should Student Laptops Have? 1117

An anonymous reader writes "We're a school district in the beginning phases of a laptop program which has the eventual goal of putting a Macbook in the hands of every student from 6th to 12th grade. The students will essentially own the computers, are expected to take them home every night, and will be able to purchase the laptops for a nominal fee upon graduation. Here's the dilemma — how much freedom do you give to students? The state mandates web filtering on all machines. However, there is some flexibility on exactly what should be filtered. Are things like Facebook and Myspace a legitimate use of a school computer? What about games, forums, or blogs, all of which could be educational, distracting or obscene? We also have the ability to monitor any machine remotely, lock the machine down at certain hours, prevent the installation of any software by the user, and prevent the use of iChat. How far do we take this? While on one hand we need to avoid legal problems and irresponsible behavior, there's a danger of going so far to minimize liability that we make the tool nearly useless. Equally concerning is the message sent to the students. Will a perceived lack of trust cripple the effectiveness of the program?"
Data Storage

New Datacenter In Underground Lair 109

lobo235 writes to tell us that a new underground data center designed by Sweden's largest ISP is fit for a classic supervillain, complete with greenhouses, waterfalls, German submarine engines, simulated daylight and can withstand a hit from a hydrogen bomb. "'Rather than just concentrating on technical hardware we decided to put humans in focus,' he said. 'Of course, the security, power, cooling, network, etc, are all top notch, but the people designing data centers often (always!) forget about the humans that are supposed to work with the stuff.'"
Linux Business

Fixstars Buys Terra Soft 20

sgt scrub writes "If you have put Yellow Dog Linux on a PS3 or a Pre X86 Apple, or have an interest in the Cell Broadband Engine, you will be pleased to know that Fixstars has purchased Terra Soft. '"A Cell/B.E. software developer and long-time user of Yellow Dog Linux, Fixstars has great faith in Yellow Dog Linux," said Satoshi Miki, CEO of Fixstars. "This business acquisition allows us to offer a reliable and stable Linux distribution with sense of ease for our customers. I have no doubt that in the expanding Cell/B.E. ecosystem we will offer the best Cell/B.E. solution of the High Performance Computing generation."' I can't think of any group of people better suited to expand the Cell horizon."
Power

Saving Energy Via Webcam-Based Meter Reading? 215

squoozer writes "Like many people, I am trying to cut down on the amount of energy my family and I use in order to save both the environment and my pay packet. Since I want to do this in as scientific a way as possible, I'm taking meter readings every day and recording them in a spreadsheet (OOo Calc naturally). Currently, in the UK at least, neither gas nor electricity meters can be hooked up to any sort of device that can query the meter for its current reading. Rather than climb down into the cellar every day to read the meters, it would be great if I could simply position a webcam in front of each meter and have the value logged automatically each day. The problem is that while I am a software developer (Java mostly) I have no experience in image processing (dials from the electricity meter) and don't really know where to start with this project." Does anyone have any advice for analyzing the visual data this reader would be gathering?
The Internet

New Search Engine Takes "Dyve" Into the Dark Web 55

CWmike writes "DeepDyve has launched its free search engine that can be used to access databases, scholarly journals, unstructured information and other data sources in the so-called 'Deep Web' or 'Dark Web,' where traditional search technologies don't work. The company partnered with owners of private technical publications, databases, scholarly publications and unstructured data to gain access to content overlooked by other engines. Google said earlier this month that it was adding the ability to search PDF documents. In April, Google said it was investigating how to index HTML forms such as drop-down boxes and select menus, another part of the Dark Web."
Handhelds

VMware Promises Multiple OSs On One Cellphone 90

superglaze writes to tell us that VMware has announced a large effort behind their Mobile Virtualization Platform, promising the possibility of multiple operating systems on mobile devices. "The company described MVP as a 'thin layer of software' that will be embedded in handsets and 'be optimized to run efficiently on low-power-consuming and memory-constrained mobile phones.' Asked whether MVP would offer something different from the abstraction already provided by mobile Java, VMware's European product director Fredrik Sjostedt told ZDNet UK that MVP would require less recoding. 'If you want to have an application run on a Java-specific appliance, you need to code it for Java,' Sjostedt said. 'What we're introducing with MVP is an [embedded] abstraction layer below that, between the physical hardware and the software layer.'"
Medicine

German Doctor Cures an HIV Patient With a Bone Marrow Transplant 639

reporter writes "HIV is the virus that causes Acquired Immune Deficiency Syndrome (AIDS). Until now, HIV has no cure and has led to the deaths of over 25 million people. However, a possible cure has appeared. Dr. Gero Hutter, a brilliant physician in Germany, replaced the bone marrow of an HIV patient with the bone marrow of a donor who has natural immunity to HIV. The new bone marrow in the patient then produced immune-system cells that are immune to HIV. Being unable to hijack any immune cell, the HIV has simply disappeared. The patient has been free of HIV for about 2 years. Some physicians at UCLA have developed a similar therapy and plan to commercialize it."
Displays

The Pocket-Sized Projector Has Arrived 220

mallumax writes "David Pogue of New York Times has reviewed the Pico, which is a pocket projector from Optoma. The review is quite entertaining (Pogue projects the images on to a plane's ceiling, leaving passengers baffled) and detailed. The highlights are: It is a pocket-sized projector which runs on batteries and can project images and videos from a variety of sources like iPhone, iPod and DVD players with a 480x320px resolution, with a maximum screen size of 65 inches at 8.5 feet. It uses a non-replaceable 10,000 hour LED lamp and a DLP chip from Texas Instruments. The battery lasts for 90 minutes and can be recharged through USB or with its own power cord. The device weighs 115g and comes with an inbuilt speaker which is practically useless. If you want one, it will set you back by $430."
The Internet

How To Supplement Election Coverage? 241

An anonymous reader asks "What information sources and social networking sites will you be using to supplement the election coverage on TV next Tuesday? I am ready with a big HDTV with Comcast, a Mac mini, and and an Xbox 360. I also have two laptops (one good for websites and one for streaming video), an old-school Blackberry, a 'regular' cell phone, a Nokia N810, a Squeezebox, and finally Sirius Satellite Radio. Which websites should I watch for live county results? I already know about the Twitter Vote Report for tracking and reporting voting issues and I already watch 'CNN Reporters' on Friendfeed for the national flair. What other Twitter accounts should I follow? Which urgent ones should I send to my phones? Which YouTube accounts or keywords I should subscribe to in Miro? What are the most popular sites for posting 'on-scene' videos — iReport, Flickr, something else? I know most local Fox affiliates are great about streaming, but is there a page that lists all of the streams, in case I need to quickly focus on one city or area? Basically, how would you configure all those gadgets?" This reader might find some guidance in what to focus on from a video produced by reader (and data modeler) Bruce Nash that lays out a predicted timeline for when the media will call each state, depending on when the polls close and how tight each race is expected to be.
Businesses

Tech Giants In Human Rights Deal 97

Ostracus writes "Microsoft, Google and Yahoo have signed a global a code of conduct promising to offer better protection for online free speech and against official intrusion." Anyone want to know what this means for China & Australia? I bet it means even less to all of us in America where every major data center has a secret room where the government sniffs our packets.
Hardware Hacking

Where to Find Axles, Gears For Kinetic Sculpture? 267

sneakyimp writes "My brother is an architect and sculptor and wants to create kinetic sculptures powered by wind, steam, and sun. He wants to avoid electrical systems and keep this mechanical. He's prepared to cast metals for custom parts if necessary, but is hoping to find a cheap source of gears, axles, and bearings for the internal mechanical workings of these contraptions. We'll need things like miter/bevel/spur/helical gears, standard and thrust bearings, and axles." Read on below for more on the details of what sneakyimp is looking for — dismembered Capsela units won't do it.

Slashdot Top Deals

If you want to put yourself on the map, publish your own map.

Working...