Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Image

Artist Wants to Replace Lost Eyeball With Webcam Screenshot-sm 156

A one-eyed San Francisco artist, Tanya Vlach, wants to replace her missing eye with a Web cam. There has even been talk of her shooting a reality TV show using the video eye. "There have been all sorts of cyborgs in science fiction for a long time, and I'm sort of a sci-fi geek, with the advancement of technology, I thought, 'Why not?'" said Vlach. I'm a bit perplexed that the obvious things you'd want in a cyborg eye: range finder, infrared/lowlight vision, and a hypno-ray are not discussed in the article.

Comment Re:and the bios? (Score 1) 326

Yeah, what's the deal with that? I use RAID on Intel P35, and that thing takes an age (10+ secs) to scan 6 SATA ports to find 2 HD's. Every bit of hardware wants its piece of the boot-up-screen-time, first the GFX, then basic HW detection (the bit where it says your CPU and RAM), then the aforementioned Intel RAID, then Gigabyte RAID (some Gigabyte mobos have a chip which supplies an extra couple of SATA ports plus PATA), then finally it looks for boot media. Sheesh.
Toys

Google Founders Buy Fighter Jet 356

Ponca City, We love you writes "The NY Times reports that H211 LLC, a company controlled by Google's top executives, including billionaire founders Larry Page and Sergey Brin, appears to have added to its fleet a Dornier Alpha Jet, a light jet attack and advanced trainer aircraft manufactured by Dornier of Germany and Dassault-Breguet of France. The 1982 Alpha-Jet seats two and was originally used by European air forces, but is now being sold relatively cheaply to civilians. The jet has landing rights at Moffett Field, the NASA-operated airfield that is a stone's throw from the Google campus. It is not clear who exactly flies the fighter jet, although Google chief executive Eric Schmidt is an avid pilot. If the top Googlers indeed own the fighter jet, they would be following in the footsteps of Oracle chief executive Larry Ellison, who has owned several aircraft, including fighter jets."
Security

US Responsible For the Majority of Cyber Attacks 205

Amber G5 writes "SecureWorks published the locations of the computers from which the greatest number of cyber attacks were attempted against its clients in 2008. The United States topped the list with 20.6 million attempted attacks originating from computers within the country, and China ran second with 7.7 million attempted attacks emanating from computers within its borders. This was followed by Brazil with over 166,987 attempted attacks, South Korea with 162,289, Poland with 153,205, Japan with 142,346, Russia with 130,572, Taiwan with 124,997, Germany with 110,493, and Canada with 107,483."
Wireless Networking

Wi-Fi, Now Available On the ISS 142

Grant Henninger writes "Rejoice! The next time you have an extra $20 million and decide to visit the International Space Station you won't need to leave the window to tell all your friends how cool it is. The ISS now has a new Wi-Fi network, so all you'll need to do is fire up Twitterrific and announce how much better you are than your Earth-based friends."
Announcements

Mayor Orders Mandatory Evacuation of New Orleans 712

Pickens writes "City officials ordered everyone to leave New Orleans beginning Sunday morning — the first mandatory evacuation since Hurricane Katrina flooded the city three years ago — as Hurricane Gustav grew into what the city's mayor called 'the storm of the century' and moved toward the Louisiana coast. 'This is the real deal. This is not a test. For everyone thinking they can ride this storm out, I have news for you: that will be one of the biggest mistakes you can make in your life,' said New Orleans mayor, C. Ray Nagin. Already, hundreds of thousands of residents had begun streaming north from New Orleans and other Gulf Coast areas stretching from the Florida Panhandle to Houston. Bush administration officials took pains not to be caught as flatfooted as they were in Hurricane Katrina, announcing that President Bush had called governors in the region to assure them of assistance and that top federal emergency officials were in the region to guide the response. 'We could see flooding that is worse than what we saw with Katrina,' said Louisiana Governor Jindal." The US Geological Survey will be running a real-time "Map of Hydrologic Impacts" to monitor flood levels, and the National Weather Service has charted direction and wind-speed probabilities. Reader technix4beos points out the need for IRC transcription of FEMA and NOAA feeds.
Portables

12,000 Laptops Lost Weekly At Airports 236

kthejoker writes "Apparently companies are even worse about losing our data than we suspected. From the article: 'According to a study of 106 major US airports and 800 business travelers published by the Ponemon Institute and Dell Computer, about 12,000 laptops are lost in airports each week. Only 30 percent of travelers ever recover the lost devices. Nearly half of the travelers say their laptops contain customer data or confidential business information.' Kinda scary..."
Microsoft

Microsoft Prefers Flash To Silverlight 306

An anonymous reader writes "Microsoft still has not adopted Silverlight, and uses Flash all over its websites. 'Despite all the controversy over Microsoft using Silverlight to take over the rich internet market from Adobe Flash, the software giant seems to be not even trying. In fact, even most Microsoft web sites are using Flash instead of Silverlight.'"
Mozilla

Firefox Vietnamese Language Pack Infected With Trojan 200

An anonymous reader writes "Wired.com is reporting that the Firefox browser has been unknowingly distributing a trojan with the Firefox Vietnamese language pack. Over 16,000 downloads of the pack occurred since being infected. This highlights a risk on relying on user-submitted Firefox extensions, or a lack of peer-review of the extensions, many of which receive frequent upgrades."
Communications

Dan Rutter Suggests Tossing Some Wi-Fi At the Neighbors 225

A few days ago, Dan Rutter (the Dan in "Dan's Data") published an interesting idea for extending the sort of philanthropic technical pranksterism that spawned throwies by applying the same approach to Wi-Fi. That means, looking what he hopes is not too far down the road, creating Wi-Fi repeaters that are cheap enough to deploy on the sly and frugal enough with power to run on solar power or cheaply replaceable batteries. But as he says, "If you've got a lot of spare money, a ladder and no respect for private property, though, you could already be stealthily deploying Open-Mesh or other such gadgets all over your neighbourhood." In some cities at least, you'd be hard pressed to ever avoid at least one available wireless access point, but that's not the experience for most people, most places -- which bears correction.
Power

Focused Microwaves Could Enable Wireless Power Transfer 180

esocid alerts us to news out of the University of Michigan, where physics researchers have found a way to focus microwaves to a point 20 times smaller than their wavelength using a new 'superlens'. Such resolution was thought to be impossible until recent years, and it could bring about the capability to transfer power wirelessly. "No matter how powerful a conventional lens, it cannot focus light down to more than about half its wavelength, the 'diffraction limit'. This limits the amount of data that can be stored on a CD, and the size of features on computer chips. The new lens is a 127-micrometer-thick plate of teflon and ceramic with a copper topping. 'The beauty of these is that they're planar,' Grbic says, 'they're easy to fabricate.' The lenses can be made through a single step of photolithography, the process used to etch computer chips."
Google

A New Tool From Google Worries Brand-Name Sites 168

Google has quietly introduced a new feature, called search-within-search, that is alarming some big-name Web publishers and retailers. They worry that users will be siphoned away through ad sales to competitors. What Google is doing is offering a secondary search option if the user initially searches explicitly for one of the brand-name destinations that Google has identified, such as "Best Buy." This secondary search lets users refine their query entirely within the pages of the desired site — but using Google's search, not the site's, and showing Google ads on the result pages, quite possibly ads from competitors. "Analysts generally praise the feature as helping users save steps, but for Web publishers and retailers, there are trade-offs... 'Google is showing a level of aggressiveness with this that's just not needed,' said [one Internet consultant]... Take, for instance, a [test where] users of Google searched The Washington Post and were given a secondary search box. Those who typed 'jobs' into that second box saw related results for The Post's employment pages, but the results were bordered by ads for competing employment sites like CareerBuilder or Monster.com. So even though users began the process by stating their intention to reach The Post, Google's ads steered at least some of them to competitors. Similar situations arose when users relied on Google to search nytimes.com."
The Internet

Mass Website Hack Compromises 200,000 Sites 153

Stony Stevenson writes "Hot on the heels of a recent hack in which 10,000 sites were compromised, researchers have disclosed a new large-scale attack. Researchers at McAfee estimated that the attack has been active for roughly one week, and in that time frame has managed to place itself on roughly 200,000 web pages. Most of the infected pages are running the phpBB forum software, said McAfee. The compromised pages are embedded with a Javascript file that links to the site hosting the attack."

Slashdot Top Deals

FORTRAN is not a flower but a weed -- it is hardy, occasionally blooms, and grows in every computer. -- A.J. Perlis

Working...