Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Google

Google's GeoEye-1 Takes Its First Pictures 152

Kev92486 writes "I was scanning through my RSS feeds today and happened upon an article about Google's GeoEye-1 imaging satellite which launched on Sept 6. Intrigued as to what the quality of the image was like, I decided to check it out only to find that the first picture was actually of my college campus, Kutztown University (Pennsylvania).
I had to make sure I was reading the article correctly as Kutztown is not a very large or well known campus. I'm not sure as to why they chose Kutztown for their first pictures. I would be interested if anybody could provide some sort of insight as to what process was used to select the first test location. Was the satellite simply in a convenient orbit to snap pictures of Kutztown?"
Update: 10/09 20:56 GMT by T : HotHardware has its own article up on GeoEye-1, if you'd like your words and pictures in the same place.
Privacy

Japan IDs All Its Citizens 382

Edis Krad writes "While RealID in the US is a threat whose implementation is a ways in the future, the Japanese long ago implemented something similar; and there has been very little complaint raised about it. The Juki Net (Residents Registration Network — link in Japanese) has been silently developing since 1992. The system involves an 11-digit unique number to identify every citizen in Japan, and the data stored against that ID covers name, address, date of birth, and gender. Many Japanese citizens seem to be oblivious that such a government-run network exists. Juki Net had a spotlight shone on it recently because a number of citizens around the country sued against it, citing concerns of information misuse or leakage. And while an Osaka court ruled against the system, the Japanese Supreme Court has just ruled it is not unconstitutional, on the grounds that the data will be used in a bona-fide manner and there's no risk of leakage. While there is a longstanding registration system for us foreigners in Japan, what astonishes me is how the government can secretly implement such a system for its citizens, and how little concern the media and Japanese citizens in general display about the privacy implications."
Programming

Submission + - Phone interview for my first programming job

An anonymous reader writes: So, I am a recent college drop-out, who had to move to another part of the country for family and financial reasons. I have applied to be an applications developer at a Fortune 500 company, who has their headquarters in the town I currently reside in. After submitting my resume, they called me a couple of weeks later asking me for a phone interview, which will take place early next week. Any advice, pitfalls to avoid, or general insights to the whole phone interview process? This will be my first "real" job, as well as my first programming job, if I get hired. Any thoughts or advice if I get the job?

Feed Schneier: Mysterious Refrigerators in Toronto (schneier.com)

Imagine if this happened in Boston? Empty fridges suddenly popped up in the financial district, causing puzzled looks from passersby. [...] Security personnel weren't impressed. When security got wind of the stunt, they arranged to have the fridges scooped up....
Microsoft

Submission + - Microsoft Starts Hackers MSDN Blog. Wait, What? (blogspot.com)

Manu writes: Microsoft just launched a new blog on their MSDN network (their network for developers) for hackers. Microsoft, of course, hires "white hat" hackers to come and work for them by throwing money at "talent," and having them test Microsoft products for security vulnerabilities and weaknesses. (Something tells us they need to throw more money at this problem.) In any case, despite being called and aimed at hackers, who knows whether actual hackers will get any use out of this blog. http://tech — info.blogspot.com/2007/09/microsoft-starts-hackers-msdn-blog-wait.html
Role Playing (Games)

Protecting Final Fantasy XI From the Gil-Sellers 116

At GDC Austin, the technical keynote for Thursday focused in on the challenging task of developing the online game Final Fantasy XI. We were treated to a broad but vaguely technical discussion from Hiromichi Tanaka, the producer of the half-a-million strong game world. He was joined by Sage Sundi, the global producer of the game, who gave a fascinating discussion about Square/Enix's battle against real money traders. Their successes have been hard-fought, and are illustrative of the problems facing anyone running one of these games. Read on for notes from the event.
Role Playing (Games)

Submission + - World of Warcraft Expansion Info Leaked

Tyrsenus writes: MMO-Champion is reporting that Germany's games rating board accidentally leaked the title of the second World of Warcraft expansion: "Wrath of the Lich King." Other sources confirm. It is believed that the expansion will open the icy continent of Northrend, where players last saw the Lich King in "The Frozen Throne." An official announcement is expected friday at Blizzard's second convention, Blizzcon.
Software

Submission + - What the kids really think about kids' games (pocketgamer.co.uk)

marcellizot writes: "For a hobby that's supposedly childish, real child gamers have quite a hard time of it. When they're not having every avenue of fun scrutinised for nasties and bad influences, they're often being sold game ideas that were boring and old even when the adults of today were young. Pocket Gamer asks, what do kids really make of today's kids games?"
Windows

Submission + - Vista restricts GNU GCC apps to 32 MB

An anonymous reader writes: Executable images created for the DOS/Wintel environment, using the GNU GCC compilers and language standards (but not linking to the Win32 API), are subject to failure (or performance degradation) when executed in Microsoft Windows Vista, because Vista arbitrarily restricts the memory space for the GCC executable to 32 MB (33,554,432 bytes). Attempts to allocate more memory than this using the malloc(...) function (or related functions, such as calloc(...)) will fail. This limitation applies whether the application is executed with the Run command, within a Command Prompt box (DOS box), or with the Start command. This limitation does not appear in Windows XP, Windows 98SE, or standalone DOS; the exact same executable, running under Windows XP SP2 or Win98SE, is capable of allocating several hundred megabytes of physical memory (if present on the machine). The limitation appears to apply to any compiler and linker not employing Microsoft's proprietary Win32 API.
Here is the complete story.
Mozilla

Submission + - Firefox 3 0.5a to be Released Tomorrow

dteichman2 writes: "According to the Firefox 3 Schedule (page down at time of writing, Google cache), the code was frozen last night and the official release announcement for Gran Paradiso alpha 5 will take place tomorrow. Of course, since the code's frozen, it's all ready to go for you bleeding-edgers (Mozilla pub FTP). At first glance, it seems relatively stable... just don't click an extension link twice."
Censorship

Submission + - Vigilante group wreaks havoc on LJ fandom

minkowski writes: "A mysterious group called Warriors for Innocence has approached Six Apart (the company which owns LiveJournal) demanding that certain journals and communities on LJ be terminated. The common trait shared by many of these journals and communities is that they contain fanfiction slash and incest. Of the blogs targeted for termination, most of them have been fandom related. The criteria for getting a journal deleted appears to be very broad. Many blogs have been deleted for merely mentioning the keyword "incest" in the list of interests. A post on this LJ users blog summarizes the rumors and accusations now flying between LJ users who feel betrayed — and Six Apart."
Music

Submission + - Apple hides account info in DRM-free music

Mike writes: "Songs sold by the Apple iTunes store without DRM still have a user's full name and account e-mail embedded in them, reports Arstechnica. After examining the files Arstechnica noticed their names and e-mail addresses in the files, and they've found corroboration of the find at TUAW, The Unofficial Apple Weblog. Since the entertainment industry is obsessed with the idea of "casual piracy," or the occasional sharing of content between friends it see,s likely that this information will be used to keep tabs on who buys what, and more importantly, where it ends up. Although spoofing the data is trivial, shouldn't the idea that your account name and email address are contained in the files make you uneasy, to say the least?"
Businesses

Submission + - CDW to be acquired by Madison Dearborn Partners LL

Justin Michael writes: Madison Dearborn Partners LLC, a private equity firm, has agreed to acquire CDW. The price offered is a significant rise on the May 25 price and CDW stock is reacting to the news. CDW sells via the Internet and retail stores, which distinguishes it from many of its Internet only or big-box only competitors. CDW has done its own acquisitions, including Berbee Information Networks and MicroWarehouse.
Books

Submission + - Putting Captcha's to good use.

Drewsk writes: "A story in CNN suggests that worldwide, we are wasting a total of 150,000 hours per day typing in the useless CAPTCHA's that webservers want in order to ensure we're humans and not robots. A new project underway, dubbed "reCAPTCHA" is an effort to put all that time to good use in much the same way that SETI likes to use our computer's spare time. In essence, all of the worlds books that are being scanned in to the Internet cannot all be read by OCR. Some have to be typed manually and others need passages clarified as words are unclear. The project wants to send those passages (words) out as Captcha's so we can all contribute to the world's online libraries... Read more."

Slashdot Top Deals

This file will self-destruct in five minutes.

Working...