Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Handhelds

Asus DR-570 E-Reader To Bring OLED Display 70

MojoKid writes "Reportedly, Asus will be introducing the DR-570 color eReader by the end of 2010, but it won't be just another one in the crowd. In fact, it just might be a game-changer. The reader will supposedly have a 6" screen, but rather than using e-ink like every other reader out there, this one will utilize a color OLED screen. Word is the unit will last a whopping 122 hours on a full charge. It should also be able to run Flash applications, download books over 3G to Wi-Fi, and most likely surf the web, unlike any other reader out there." Asus will be rolling out two other ebook reader models this year as well.
Image

Mexico Wants Payment For Aztec Images 325

innocent_white_lamb writes "Starbucks brought out a line of cups with prehistoric Aztec images on them. Now the government of Mexico wants them to pay for the use of the images. Does the copyright on an image last hundreds of years?"
Cellphones

iPhone-Controlled Helicopter With AR Games 51

andylim writes "Parrot has unveiled a remote-controlled helicopter that boasts augmented reality games. The helicopter is controlled using an iPhone or iPod Touch's accelerometer and touchscreen. There's a camera on the front of the helicopter, which you can use to navigate and to play augmented reality games, including a game that involves fighting a gigantic robot."
Privacy

Facebook Masks Worse Privacy With New Interface 446

An anonymous reader writes "Facebook launched new privacy settings this week. Cosmetically, this means that the settings are explained more clearly and are marginally easier to manage. Unfortunately, some of the most significant changes actually make preserving privacy harder for its users: profile elements that could previously be restricted to 'Only Friends' are now designated as irrevocably publicly available: 'Publicly available information includes your name, profile picture, gender, current city, networks, friend list, and Pages.' Where you could previously preserve the privacy of this information and remain publicly searchable only by name, Facebook now forces you to either give up this information (including your current city!) to anyone with a Facebook account, or to restrict your search visibility — which of course limits the usefulness of the site far beyond how not publicly sharing your profile picture would. That Facebook made this change while simultaneously rolling out major changes to the privacy settings interface seems disingenuous."
Nintendo

Mega Man 10 Confirmed For WiiWare 104

The upcoming issue of Nintendo Power revealed that Capcom is working on Mega Man 10 for a release via WiiWare sometime in the future. "Like Mega Man 9 (released for WiiWare in 2008), Mega Man 10 remains true to the series's roots with 8-bit-style graphics and sound, and tried-and-true Mega Man gameplay." According to the early look at Nintendo Power's article, the game may include an easier difficulty mode, likely inspired by complaints that the previous game was too hard. It also previews one of the new bosses, who is apparently called "Sheep Man." Make of that what you wool.
Security

Malware Found Hidden In Screensaver On Gnome-Look 611

AndGodSed writes "OMG! UBUNTU! Reports the following: 'Malware has been found hidden inside an innocuous 'waterfall' screensaver .deb file made available on popular artwork sharing site Gnome-Look.org. The .deb file installs a script with elevated privileges designed to perform a DDoS attack as well as keep itself updated via downloads. The dodgy screensaver in question has since been removed from gnome-look, and this incident was a very basic, if potentially successful, attempt.'" A similar report at Digitizor.com says that similar malware was also found in a theme called Ninja Black. For those affected, both sites also provide instruction on cleansing your system.
Games

Copyright and the Games Industry 94

A recent post at the Press Start To Drink blog examined the relationship the games industry has with copyright laws. More so than in some other creative industries, the reactions of game companies to derivative works are widely varied and often unpredictable, ranging anywhere from active support to situations like the Chrono Trigger: Crimson Echoes debacle. Quoting: "... even within the gaming industry, there is a tension between IP holders and fan producers/poachers. Some companies, such as Epic and Square Enix, remain incredibly protective of their Intellectual Property, threatening those that use their creations, even for non-profit, cultural reasons, with legal suits. Other companies, like Valve, seem to, if not embrace, at least tolerate, and perhaps even tacitly encourage this kind of fan engagement with their work. Lessig suggests, 'The opportunity to create and transform becomes weakened in a world in which creation requires permission and creativity must check with a lawyer.' Indeed, the more developers and publishers that take up Valve's position, the more creativity and innovation will emerge out of video game fan communities, already known for their intense fandom and desire to add to, alter, and re-imagine their favorite gaming universes."
Security

Malware Could Grab Data From Stock iPhones 127

Ardisson writes "Swiss iPhone developer Nicolas Seriot presented last night a talk on iPhone Privacy in Geneva. He showed how a malicious application could harvest personal data on a non-jailbroken iPhone (PDF) and without using private APIs. It turns out that the email accounts, the keyboard cache content and the WiFi connection logs are fully accessible. The talk puts up several recommendations. There is also a demo project on github."

Comment EFIT-V (Score 1) 84

My name is Dr Matthew Maylin, I developed this software at the university of Kent during my PhD, and continue to develope it as the sole software engineer for the company. The algorithm used is an evolutionary algorithm, implementing random mutations, but no cross-over or mutation. Although the user does have the option to 'bred'/combine certain faces within the software. The method uses a statistical model of the human face (Cootes et el 2001), and at anyone time is restricted to a sample to a single ethnicity and gender. The are however, many databases of face statistcs that are used. Here is a movie of the process: http://www.visionmetric.com/images/stories/EFIT-V_demo.htm I believe here is the original slashdot post: http://slashdot.org/articles/04/05/17/1042231.shtml?tid=133&tid=152&tid=185&tid=186 There have been many controlled studies on this system, it has been trialled by the forces in the UK over 3 years ago, and now is actively sold across the world. Psychological studies have been made by Dr Graham Pike (seen in the video) at the Open University. The quality of the images vary and are ultimately limited by the users ability to recall the face - some users are better than others - but generally composites are produced more quickly - to a higher quality - than 'jigsaw' based methods.

Slashdot Top Deals

There are two ways to write error-free programs; only the third one works.

Working...