Forgot your password?
typodupeerror
Mars

4-Billion-Pixel Panorama View From Curiosity Rover 101

Posted by samzenpus
from the take-a-look dept.
SternisheFan points out that there is a great new panorama made from shots from the Curiosity Rover. "Sweep your gaze around Gale Crater on Mars, where NASA's Curiosity rover is currently exploring, with this 4-billion-pixel panorama stitched together from 295 images. ...The entire image stretches 90,000 by 45,000 pixels and uses pictures taken by the rover's two MastCams. The best way to enjoy it is to go into fullscreen mode and slowly soak up the scenery — from the distant high edges of the crater to the enormous and looming Mount Sharp, the rover's eventual destination."
Google

+ - Google given more time to prove to Brussels it's NOT 'abusive' in search->

Submitted by
iComp
iComp writes "The two-year long competition probe of Google's search business in Europe is poised to continue at least into the second half of this year, commissioner Joaquin Almunia has confirmed.

"We can reach an agreement after the summer break. We can envisage this as a possible deadline," he said on Friday, according to Reuters.

The Register asked the commissioner's office what this meant in practice. A spokeswoman told us:

Vice President Almunia only gave an indication of what the possible timing could be if the proposals by Google address our concerns. We are still analysing these proposals, as the VP said."

Link to Original Source

Comment: US Government Announces National Day of Civic Hack (Score 5, Informative) 248

Interesting timing ; not quite the same.
One is Defensive Planning; One is about New ways to use things.
US Government Announces National Day of Civic Hacking
http://yro.slashdot.org/story/13/01/23/1823208/us-government-announces-national-day-of-civic-hacking

Comment: Re:A truly ridiculous idea. (Score 1) 166

by JS_RIDDLER (#41651995) Attached to: A Supercomputer On the Moon To Direct Deep Space Traffic
Maybe we can re-use some parts from the Ark.
The Ark, a Cybertronian spacecraft, crash lands on the dark side of Earth's Moon.
http://en.wikipedia.org/wiki/Transformers:_Dark_of_the_Moon
http://4.bp.blogspot.com/-4LNd6xGAnII/TgqIiaIn4xI/AAAAAAAAByk/M1Rc35s_BsQ/s1600/transformers-dark-of-the-moon-original.jpg
Microsoft

+ - Microsoft blasts IBM in open letter

Submitted by carlmenezes
carlmenezes (204187) writes "Arstechnica has an article on Microsoft's open letter to IBM that adds fresh ammunition to the battle of words between those who support Microsoft's Open XML and OpenOffice.org's OpenDocument file formats. Microsoft has strong words for IBM, which it accuses of deliberately trying to sabotage Microsoft's attempt to get Open XML certified as a standard by the ECMA. In the letter, general managers Tom Robertson and Jean Paol write: "When ODF was under consideration, Microsoft made no effort to slow down the process because we recognized customers' interest in the standardization of document formats." In contrast, the authors charge that IBM "led a global campaign" urging that governments and other organizations demand that International Standards Organization (ISO) reject Open XML outright.
Could MS actually be getting a taste of their own medicine?"
Security

+ - Malicious Websites Can Subvert Personal Routers

Submitted by Apro+im
Apro+im (241275) writes "PCWorld is reporting: "If you haven't changed the default password on your home router, do so now. That's what researchers at Symantec and Indiana University are saying, after publishing the results of tests that show how attackers could take over your home router using malicious JavaScript code."

The root of the problem seems to stem from routers allowing GET requests to have side-effects, allowing attackers to change settings and then perform man-in-the middle attacks. Though the story and the linked paper (PDF) claim that routers with changed passwords are immune, a quick experiment shows that routers which use HTTP Authentication can be compromised the same way, if the user has logged into their router earlier in the browser session. Also, though the article says this is a Javascript exploit, it can actually be executed by any tag which allows the inclusion of a "src" element from another domain (e.g., "img")."

I have ways of making money that you know nothing of. -- John D. Rockefeller

Working...