Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Education

OLPC To Be Distributed To US Students 338

eldavojohn writes "The One Laptop Per Child Project plans to launch OLPC America in 2008 , to distribute the low-cost laptop computers originally intended for developing nations to needy students here in the United States. Nicholas Negroponte is quoted as saying, 'We are doing something patriotic, if you will, after all we are and there are poor children in America. The second thing we're doing is building a critical mass. The numbers are going to go up, people will make more software, it will steer a larger development community.'"
Math

Mathematician Theorizes a Crystal As Beautiful As A Diamond 302

Roland Piquepaille writes "Why are diamonds so shiny and beautiful? A Japanese mathematician says it's because of their unique crystal structure and two key properties, called 'maximal symmetry' and 'strong isotropic property.' According to the American Mathematical Society (AMS), he found that out of all the crystals that are possible to construct mathematically, just one shares these two properties with the diamond. So far, his K4 crystal exists only as a mathematical object. And nobody knows if it exists — or if it can be synthesized."
Mozilla

Weave... Mozilla Is Trying To Be More Social 156

Cassanova writes "Weave is the newest Mozilla Labs project. It allows the user to save browser settings on Mozilla servers (Favorites, sessions, passwords, etc.) and load them from anywhere. With this project, Mozilla is trying to be an online services provider, which is an important step. But can Mozilla labs get over the privacy issues?"
Communications

A Look Back at One of the Original Phreaks 98

tmalone writes "The New York Times is running an end of year piece about the most interesting people who have died this year. One of their picks is Joybubbles, also known as Josef Engressia, or 'Whistler.' He was born blind and discovered at the age of 7 that he could whistle 2600 hertz into a phone to make free long-distance calls. He was one of the original phone phreaks, got arrested for phone fraud, and was even employed by the phone company. The article deals more with his personal life than with his technical exploits, but is a very interesting story."
Biotech

Hospitals Look to a Nuclear Tool to Fight Cancer 163

The feed points us to a NYTimes article about hospitals using particle accelerators to treat cancer. While expensive, proponents say that the proton beams generated by the accelerators are more precise than conventional X-ray radiation therapy. This results in fewer side effects and reduced irradiation of surrounding tissue. The technology's critics say that the cost is not justified by a measurable increase in the level of care given to the patients. Nevertheless, this is an excellent example of "pure scientific research" leading to a useful, unrelated technique. From the NYTimes: "Tumors in or near the eye, for instance, can be eradicated by protons without destroying vision or irradiating the brain. Protons are also valuable for treating tumors in brains, necks and spines, and tumors in children, who are especially sensitive to the side effects of radiation."
Security

Thousands of Adult Website Accounts Compromised 167

Keith writes "Tens of thousands — or maybe more — accounts to adult websites were recently declared compromised and apparently have been that way since some time in October 2007. The break occurred when the NATS software used to track and manage sales and affiliate revenues was accessed by an intruder. The miscreant apparently discovered a list of admin passwords residing on an unsecured office server at Too Much Media, which makes and maintains NATS installations for adult companies. It would appear that Too Much Media knew of the breach back in October, and rather than fixing the issue tried to bury it by threatening to sue anyone in the adult industry who talked about it." The article gives suggestions for anyone who opened an account at any adult website in the last several months.
Government

China Anti-Corruption Web Site Crashes On First Day 169

An anonymous reader tips us to news out of China that the Web site of the National Bureau of Corruption Prevention crashed on Tuesday, just hours after its launch, as droves of people logged on to complain about corruption among officials. "The number of visitors was very large and beyond our expectations," an anonymous NBCP official said.
Transportation

How We Might Have Scramjets Sooner than Expected 674

loralai writes "Recent breakthroughs in scramjet engines could mean two-hour flights from New York to Tokyo. This technology, decades in the making, could redefine our understanding of air travel and military encounters. 'To put things in context, the world's fastest jet, the Air Force's SR-71 Blackbird spy plane, set a speed record of Mach 3.3 in 1990 when it flew from Los Angeles to Washington, D.C., in just over an hour. That's about the limit for jet engines; the fastest fighter planes barely crack Mach 1.6. Scramjets, on the other hand, can theoretically fly as fast as Mach 15--nearly 10,000 mph.'"
United States

Copy That Floppy, Lose Your Computer 766

Over the weekend we posted a story about a new copyright bill that creates a new govt. agency in charge of copyright enforcement. Kevin Way writes "In particular, the bill grants this new agency the right to seize any computer or network hardware used to "facilitate" a copyright crime and auction it off. You would not need to be found guilty at trial to face this penalty. You may want to read a justification of it, and criticism presented by Declan McCullagh and Public Knowledge." Lots of good followup there on a really crazy development.
Data Storage

New Seagate Drives Have Real Difficulties With Linux 361

wtansill writes "Seagate's Free Agent series of drives are not intended to be compatible with the Open Source operating system Linux. The Inquirer reports on the problem: an unhelpful power saving mode. 'The problem is to do with the power-saving systems on Seagate's latest range of drives and the fact that it is shipped already formatted to NTFS. The NTFS is only a slight hurdle to Linux users who have a kernel with NTFS writing enabled or can work mkfs. But the "power saving" timer is a real bugger. It will shut the drive off after several minutes of inactivity and helpfully drop the USB connection. When the connection does come back it returns as USB1 which is apparently as useful as a chocolate teapot.' Via Engadget, though, there is a solution!
Power

Helium Leads to Geothermal Energy Resources 317

Roland Piquepaille writes "When we think about alternative sources of energy, we often forget the potential of geothermal energy resources. In fact, it has been estimated that accessible geothermal energy in the U.S. represents 90 quadrillion kilowatt-hours or 3,000 times the country's total annual energy consumption. So far, it has been difficult and expensive to locate good sources of geothermal energy. But now, two U.S. researchers have found a new method which doesn't require drilling. They are using the ratio of helium isotopes in surface waters to point to the best sources of geothermal energy."
Privacy

Questionable Data Mining Concerns IRC Community 306

jessekeys writes "Two days ago an article on TechCrunch about IRSeeK revealed to the community that a service logs conversations of public IRC channels and put them into a public searchable database. What is especially shocking for the community is that the logging bots are very hard to identify. They have human-like nicks, connect via anonymous Tor nodes and authenticate as mIRC clients. IRSeeK never asked for permission and violates the privacy terms of networks and users. A lot of chatters were deeply disturbed finding themselves on the search engine in logs which could date back to 2005. As a result, Freenode, the largest FOSS IRC network in existence, immediately banned all tor connections while the community gathered and set up a public wiki page to share knowledge and news about IRSeeK. The demands are clear: remove all existing logs and stop covert operations in our channels and networks. Right now, the IRSeeK search is unavailable as there are talks talking place with Freenode Staff."
Programming

How to Deal With Stolen Code? 799

greenrom writes "I work for a small company as a software developer. While investigating a bug in one of our products, I found source code on a website that was nearly identical to code used in our product. Even the comments were the same. It's obvious that a developer at our company found some useful code on the web and copied it. The original author didn't attach any particular license to the code. It's just 200 lines of code the author posted in a forum. Is it legitimate to use source code that's publicly available but doesn't fall under any particular license? If not, what's the best way to deal with this kind of situation? Since I'm now the only person working on this code, there's no practical way to report the situation confidentially. I'm new to the company, and the developer who copied the code is the project lead. Reporting him to management doesn't seem like a good career move. I could rewrite the copied code without reporting him, but since the product is very close to release it would be difficult to make a significant change without providing some justification."

Slashdot Top Deals

Math is like love -- a simple idea but it can get complicated. -- R. Drabek

Working...