Forgot your password?
typodupeerror
Portables

Is Intel Killing 12-Inch Displays On Netbooks? 297

Posted by timothy
from the 12"-seems-a-bit-easier-on-the-eyes dept.
HangingChad writes "Dell has retired their 12-inch Intel Atom-powered netbooks, they said today. The official reason — 'It really boils down to this: for a lot of customers, 10-inch displays are the sweet spot for netbooksLarger notebooks require a little more horsepower to be really useful.' Or is the real reason that 12-inch displays on netbooks cut into Intel's more profitable dual-core market and Dell's profit margins on higher-end machines?"

Comment: Re:summarizing the article for you... (Score 1) 461

by Brieeyebarr (#28021995) Attached to: Special Effects Lessons From JJ Abrams' Star Trek

Also, the Hyperion quartet has a major plot point that the Matrix hinged on. And while we're at it they can give Gibson a dollar for the name. And the jacking in. And the skill-downloads. And...

So you're admitting that the Wachowski brothers drew their inspiration for the matrix from multiple sources? Not just from Ubik? Huh, that's exactly what I was saying. Woah.

The Military

+ - Military, defensive technology, cloaking->

Submitted by Anonymous Coward
An anonymous reader writes "Science fiction is getting closer to science fact according to an article posted at NineMSN.

British researchers have unveiled new technology that renders army tanks invisible to observers in the battle field, a British newspaper reports.

At top secret trials last week the Ministry of Defence demonstrated how the clever use of cameras and projectors can beam images of the surrounding landscape onto a tank."

Link to Original Source
Software

+ - Vista 64-Bit Review - x86 vs x64, Worth It?->

Submitted by
Cameron Butterfield
Cameron Butterfield writes "Some of the rumors and myths going around about 64-bit are scary and are slowing the migration of many users to the 64-bit playground. Why do we all have 64-bit processors these days that aren't being put to use? In this review we will analyse Vista Ultimate 64-bit edition in terms of practicality and performance. We pitt 32-bit Vista against 64-bit Vista. See the surprising Conclusion."
Link to Original Source
Upgrades

+ - Ultracapacitors soon to replace many batteries?->

Submitted by
einhverfr
einhverfr writes "According to an article in the IEEE Spectrun, the synergy between batteries and capacitors — two of the sturdiest and oldest components of electrical engineering — has been growing, to the point where ultracapacitors may soon be almost as indispensable to portable electricity as batteries are now.

Some researches expect to soon create capacitors capable of storing 50% as much energy as a lithium ion battery of the same size. Such capacitors could revolutionize many areas possibly from mobile computing (no worries about battery memory), electricity-powered vehicles, and more."

Link to Original Source
Google

+ - Google's OpenSocial Platform Releases 3

Submitted by
shadowmage13
shadowmage13 writes "Google just announced that starting tonight, developers can start writing applications using the social API for Orkut, MySpace, Engage.com, Friendster, hi5, Hyves, imeem, LinkedIn, Ning, Oracle, Plaxo, Salesforce.com, Six Apart, Tianji, Viadeo, and XING at http://code.google.com/apis/opensocial. Will Facebook give in?"
The Internet

+ - Social Networks Are More Popular Than Porn->

Submitted by
biohack
biohack writes "An analysis of site-visit statistics offered by a TIME columnist points to a surprising reshaping of online landscape. The 18- to 24-year-olds today are apparently too busy chatting with friends to look at online skin.

Currently, for web users over the age of 25, Adult Entertainment still ranks high in popularity, coming in second, after search engines. Not so for 18- to 24-year-olds, for whom social networks rank first, followed by search engines, then web-based e-mail — with porn sites lagging behind in fourth. If you chart the rate of visits to social-networking sites against those to adult sites over the last two years, there appears to be a strong negative correlation (i.e., visits to social networks go up as visits to adult sites go down).
"

Link to Original Source
Communications

+ - RIP, Washoe the signing chimp->

Submitted by Anonymous Coward
An anonymous reader writes "Washoe the first chimp to be taught American Sign Language has passed away aged 42. She taught us much about communications at a fundamental level and led to endless debate among linguists."
Link to Original Source
The Courts

+ - U.of Oregon Says No to RIAA; ID no good

Submitted by
NewYorkCountryLawyer
NewYorkCountryLawyer writes "The University of Oregon has filed a motion to quash the RIAA's subpoena for information on student identities, in what is believed to be the first such motion made by the university itself, rather than by the students, and the first instance of a State Attorney General bringing a motion to quash an RIAA subpoena. The motion (pdf) explains that it is impossible to identify the alleged infringers from the information the RIAA has presented: "Five of the seventeen John Does accessed the content in question from double occupancy dorm rooms at the University. With regard to these Does, the University is able to identify only the room where the content was accessed and whether or not the computer used was a Macintosh or a PC.... The University cannot determine whether the content in question accessed by one occupant as opposed to another, or whether it was accessed instead by a visitor. Two of the seventeen John Does accessed the content in question from single occupancy dorm rooms....No login or personally identifiable information, i.e. authentication, was used by the Does to access the university's network because none is required. The University cannot determine whether the content was accessed by the room occupant or visitor. Nine of the seventeen John Does accessed the content in question from the University's wireless network or a similar system called the "HDSL Circuit." These systems do record a user name associated with the access. For these John Does, the University can determine the identity of the individual who bas been assigned the user name, however, it is unable to determine whether the content was accessed by the individual assigned that user name or by someone else using the computer associated with the user name. In the case of sixteen of the seventeen John Does, .... it is not possible for the University to identify the alleged infringers without conducting interviews and a forensic investigation of the computers likely involved." The AG's motion further argues (pdf) that "Plaintiffs' subpoena is unduly burdensome and overbroad. It seeks information that the University does not readily possess. In order to attempt to comply with the subpoena, the University would be forced to undertake an investigation to create discovery for Plaintiffs — an obligation not imposed by Rule 45. As the University is unable to identify the alleged infringers with any accuracy, it cannot comply with its federal obligation to notify students potentially affected by the subpoena." One commentator has likened the AG's argument to saying, in effect, that the RIAA's evidence is "rubbish"."
Security

+ - MSFT and NSA have backdoored your phone ...->

Submitted by isbeen
isbeen (1123559) writes "According to a recent post on Bugtraq, researchers have posted information regarding an agreement between the NSA and MSFT which provides backdoors to microsoft products, including phones running the windows mobile platform, where they can apparently tap and monitor phones.

From the original post:

"According to the post National Security Agency has access both stand-alone systems and networks running Microsoft products.

The post states the following: "This includes wireless wiretapping of "smart phones" running Microsoft Mobile. Microsoft remote administrative privileges allow "backdooring" into Microsoft operating systems via IP/TCP ports 1024 through 1030.

According to the Cryptome's source this is typically triggered when devices visit Microsoft Update servers.

Cryptome.org: http://cryptome.org/nsa-ip-update11.htm

SecuriTeam Blogs: http://blogs.securiteam.com/?p=1028"

Link to Original Source

You can not win the game, and you are not allowed to stop playing. -- The Third Law Of Thermodynamics

Working...