Become a fan of Slashdot on Facebook


Forgot your password?

Submission + - 3D Printing Technique Uses Ultrasound To Produce Complex Composites (

An anonymous reader writes: A research team has designed a new style of 3D printing which is able to print combined materials using ultrasonic waves. The engineers demonstrated the novel method in which ultrasound is used to position millions of microscopic glass fibres into a reinforcement framework. The layer is then placed using a focused laser beam, which cures the epoxy resin and prints the object. The researchers showed the ability to build a plane of fibres into a reinforcement framework, and precisely orientate the fibres by switching the ultrasonic standing wave pattern during the printing process. This technique, the team argues, allows for the creation of almost any type, size or shape of fibre, including complex fibrous architectures, such as those required in high-performing products (tennis rackets, golf clubs, aerospace components, and fishing rods etc.)

Submission + - Don't Fall for Drone Registration Scams, Warns FAA ( 1

itwbennett writes: It's not exactly news that there's an abundance of confusion over what owners of consumer drones can do, can't do, and need to pay for. And it doesn't help matters that the FAA and Department of Transportation in early November said they intend to set up a registry that will likely cover many small consumer drones, but it's yet to happen. Because while the government is notoriously slow, scammers are notoriously fast. 'At least one company is already offering to help people register their drones for a fee,' the FAA said. 'Owners should wait until additional details about the forthcoming drone registration system are announced later this month before paying anyone to do the work for them.'

Submission + - Edward Snowden: Clinton private email server jeopardized national security ( 1

An anonymous reader writes: The Huffington Post reports, "Edward Snowden argues ... that Hillary Clinton’s use of a private email server while serving as secretary of state jeopardized national security secrets, and calls Clinton’s claims to the contrary “completely ridiculous.” ... “When the unclassified systems of the United States government, which has a full-time information security staff, regularly gets hacked, the idea that someone keeping a private server in the renovated bathroom of a server farm in Colorado is more secure is completely ridiculous,” the National Security Agency whistleblower told Mehdi Hasan ..." The Free Beacon adds, "“If an ordinary worker at the State Department or the Central Intelligence Agency [] were sending details about the security of embassies, which is alleged to be in her email, meetings with private government officials, foreign government officials and the statements that were made to them in confidence over unclassified email systems, they would not only lose their jobs and lose their clearance, they would very likely face prosecution for it,” Snowden asserted. The FBI is investigating the security of Clinton’s private server, which she was forced to hand over to the Justice Department amid the probe."

Submission + - Why There is Too Much New Programming on TV writes: John Koblin writes in the NYT that there’s a crisis in television programming that’s felt among executives, viewers and critics, and it’s the result of one thing: There is simply too much on television. John Landgraf, chief executive of FX Networks, reported at the Television Critics Association Summer Press Tour that the total number of original scripted series on TV in 2014 was 371 and will surpass 400 in 2015. The glut, according to Landgraf, has presented “a huge challenge in finding compelling original stories and the level of talent needed to sustain those stories.” Michael Lombardo, president of programming at HBO.says it is harder than ever to build an audience for a show when viewers are confronted with so many choices and might click away at any moment. “I hear it all the time,” says Lombardo. “People going, ‘I can’t commit to another show, and I don’t have the time to emotionally commit to another show.’ I hear that, and I’m aware of it, and I get it.” Another complication is that shows not only compete against one another, but also against old series that live on in the archives of Amazon, Hulu or Netflix. So a new season of “Scandal,” for example, is also competing against old series like “The Wire.” "The amount of competition is just literally insane," says Landgraf.

Others point out that the explosion in programming has created more opportunity for shows with diverse casts and topics, such as “Jane the Virgin,” “Transparent” and “Orange Is the New Black.” Marti Noxon, the showrunner for Lifetime’s “UnREAL” and Bravo’s “Girlfriends’ Guide to Divorce,” says there has been a “sea change” in the last five years. “I couldn’t have gotten those two shows on TV five years ago,” says Noxon. “There was not enough opportunity for voices that speak to a smaller audience. Now many of these places are looking to reach some people — not all the people. That’s opened up a tremendous opportunity for women and other people that have been left out of the conversation.”

Submission + - Video Games can Improve Terror Attack Preparedness, even if you don't play them

vrml writes: A study just published by the Computers in Human Behavior journal explores the potential of video games as terror attack preparedness materials for the general public. In the video game that participants tried (screenshots can be seen in the paper), players started a normal day going to a train station and performing actions such as purchasing a ticket and finding a train. Then, they suddenly found themselves in a bombing scenario that they had to survive. In addition to showing that playing the game greatly increased players’ knowledge about preparedness, the study also considered a second group of participants who did not play the game but watched instead a video of the game play. Results indicate that passively watching someone else play the game is as effective as actively playing the game in terms of learning preparedness knowledge. However, they also point out a significant difference concerning psychological effects on threat appraisal: general perception of personal vulnerability to terror attacks and their severity increased more in those who actively played the game rather than those who passively watched game play.

Submission + - E3 2015: A Lot of Nostalgia for Old Games

_xeno_ writes: E3 2015 saw a lot of game companies banking on nostalgia, but much less hype for new games. While the biggest thing coming out of Microsoft's press conference was undoubtedly the Hololens, the biggest buzz from E3 was probably Sony's announcement of Square Enix's announcement of a remake of a two decade old game (Final Fantasy VII), seconded by the announcement of a sequel to a fifteen year old game (Shenmue). Nintendo announced mostly new sequels as well. Ultimately, though, it isn't surprising that the biggest buzz is around old games. Old games are a known quantity, while truly new games are — well, new. Who knows if they're going to be the next classic or not?

Submission + - Privately Owned Armored Trucks Raise Eyebrows After Dallas Attack writes: Manny Fernandez writes in the NYT that the scores of military and police-style vans, trucks and cars offered for sale on Craigslist and eBay have raised concerns for some law enforcement officials particularly after the Dallas attack on a police headquarters but officials say the vehicles appear to be legal for the most part, so there is little they can do. Jeff Funicello, for example, is selling his black 1975 GMC armored truck on Craigslist. The body is armored, and the windows are bulletproof. It has sliding portholes to point rifles from and a sprinkler system inside. Long ago, it transported money, and it was once the target of a shootout in the 1980s. Of course, people have been driving reinforced cars long before the Dallas attack on a police headquarters. But the celebrities and executives who install bulletproof windows and other types of armor on their vehicles often do not want it noticed. Celebrity clients generally demand that the exteriors of their luxury armored vehicles look normal so they blend in. However those who buy and sell armored vans want people to look. And the popularity of apocalyptic movies and television shows has put a new twist and added a macabre cachet to such vehicles “This is America,” says Funicello. “I should be able to have a howitzer or a bazooka if I want one. If I wanted to buy a fire truck, I could.”

Submission + - Ask Slashdot: Are there any search engines left that don't try to think for me? (

An anonymous reader writes: As a programmer especially, I'm becoming increasingly unhappy with Google searches. They try very hard to present me with what they THINK I'm searching for instead of what I'm actually searching for. This issue mostly shows up when searching error messages, obscure type and function names and stuff like that.
What I think though, is that I only notice the issue when searching for stuff I know a lot about, namely programming, but my queries get distorted when I'm searching for just about anything, I just don't know enough about the subject to notice.
Are there any alternative search engines left that don't think they know better than me what I'm looking for and just search for my phrase, like in the 2000s?

Submission + - AskSlashdot: Company name snipers... What should I do? 1

PurdueThumbs writes: So... I decided to start my own business, "ArborLink." Somebody already had, so I grabbed Submitted my paperwork to the county to do business as "ArborLink" and checked state filings and registered for an EIN, all clear. Turns out the day I booked the domain in the TLD, somebody filed for the LLC the same day. The filings can be viewed here: ( The ArborLink LLC filings are the other guy. I have had a website and e-mail presence up and have been conducting business as at the time there was no state registration. The registration itself from them was very bland, ie "we comply with llc" vs mine which is "Technology services and products". Any advise on how to stand my ground?

Submission + - How to convert Linux into an embedded system (

Hallie Siegel writes: Experienced roboticist David Kohanbash takes you through the steps you should take when converting Linux to an embedded system for your robotics project, and goes over questions such as whether you really need a real-time system. Gives a pretty thorough overview, and offers follow up links as well in case you need more detail. nice resource!

Submission + - FCC Nixes PayPal's Forced Robocalls Plan

jfruh writes: As part of a new user agreement created in preparation for its spinoff from eBay as an independent company, PayPal told users that the only way to avoid advertising robocalls from PayPal and its 'partners' was to stop using the service. This caused something of a firestorm, and now the FCC is saying the policy may violate Federal law, which requires an explicit opt-in to receive such messages.

Submission + - Microsoft's Skype Drops Modern App In Favour Of Old Fashioned Win32 App (

mikejuk writes: Microsoft, after putting a lot of effort into persuading us that Universal Apps are the way of the future pulls the plug on Skype modern app to leave just the desktop version. The split in Windows apps created by the launch of Windows 8 still persists today and Microsoft is currently trying to fix this huge blunder by creating a true Windows 10 Universal App that can run on desktop, phone and mobile.Microsoft's argument is that any WinRT apps that you have or old style Windows 8 Universal apps can easily be converted to a Windows 10 Universal app with a single code base for all platforms.
Skype is one of Microsoft's flagship products and it has been available as a desktop Win32 app and as a Modern/Metro/WinRT app for some time. You would think that Skype would support Universal Apps, there are few enough of them — but no. According to the Skype blog:
"Starting on July 7, we’re updating PC users of the Windows modern application to the Windows desktop application, and retiring the modern application."
Microsoft is pushing Windows 10 Universal Apps as the development platform for now and the future but its Skype team have just disagreed big time. What ever this is not a good example of dog fooding and puts in doubt any decision programmer might have made about being an early adopter of Windows 10 Universal Apps — if Microsoft can't get behind the plan why should developers?

Submission + - How do I turn off Video Bytes? ( 2

gatzke writes: Is there any way to turn off Video Bytes? Any option to get rid of them? I don't want them and they don't have comments attached to them. They are a waste of bandwidth to me.

Submission + - I talk too much, but so do you (

An anonymous reader writes: ... and all of it is based on Science

Humans, being social animals, are programmed to use communication as a vital tool to survive and thrive. Our brains are wired to reward us for talking about ourselves

People spend 60% of their conversations talking about themselves, 80% when chatting on social media. The reason, researchers found, was that it just feels good. So much so that Harvard psychologists discovered that individuals were willing to give up money for the opportunity to disclose information about themselves

This propensity to pontificate, unfortunately, is at odds with our collectively dwindling attention spans, which have been measured between as many as 59 seconds, to as few as eight seconds, thanks to a barrage of information from both verbal and digital sources

As Bregman says, "We all know how to be silent. The question is: Can we withstand the pressure to speak?"

Submission + - How to develop effective honeypots (

Errorcod3 writes: Honeypots — decoy systems used for learning cyber attackers' capabilities and potential objectives — can be very useful to organizations, businesses, and individuals.

  In this podcast recorded at the Hack in the Box conference recently held in Amsterdam, Pedram Hayati, the founder of Smart Honeypot, talks about the most effective use cases for honeypots.

  But, he notes, publicly known honeypot systems are not the way to go, as attackers will easily spot them.

  While developing his own custom honeypot intelligence system, he pinpointed three principles that are essential to making an effective honeypot. He explains these rules in this podcast, along with a few tips about honeypot deployment.

Slashdot Top Deals

Never buy what you do not want because it is cheap; it will be dear to you. -- Thomas Jefferson