Forgot your password?
typodupeerror
Google

Google To Drop Support For H.264 In Chrome 765

Posted by CmdrTaco
from the shot-in-the-air dept.
Steve writes "Google just made a bold move in the HTML5 video tag battle: even though H.264 is widely used and WebM is not, the search giant has announced it will drop support for the former in Chrome. The company has not done so yet, but it has promised it will in the next couple of months. Google wants to give content publishers and developers using the HTML5 video tag an opportunity to make any necessary changes to their websites."
Image

Icelandic Company Designs Human Pylons 142

Posted by samzenpus
from the anthropomorphic-power dept.
Lanxon writes "An architecture and design firm called Choi+Shine has submitted a design for the Icelandic High-Voltage Electrical Pylon International Design Competition which proposes giant human-shaped pylons carrying electricity cables across the country's landscape, reports Wired. The enormous figures would only require slight alterations to existing pylon designs, says the firm, which was awarded an Honorable mention for its design by the competition's judging board. It also won an award from the Boston Society of Architects Unbuilt Architecture competition."
Security

+ - Attackers Gain Full Control of iPhone

Submitted by i_like_spam
i_like_spam (874080) writes "The NYTimes is running a story about an iPhone flaw that has been found and documented by researchers from Independent Security Evaluators. Attackers were able to gain full control of the iPhone either through WiFi or by visiting a website with malicious code. The exploit will be demostrated at BlackHat on Aug. 2nd at 4:45pm. Until then,

Details on the vulnerability, but not a step-by-step guide to hacking the phone, can be found at www.exploitingiphone.com, which the researchers said would be unveiled today.
"
Security

+ - New Iphone Hole Allows Full Control

Submitted by i_like_spam
i_like_spam (874080) writes "The NYTimes is running a story about a new Iphone flaw that has been found and documented by researchers from Independent Security Evaluators. Attackers can gain full control of the Iphone either through WiFi or by visiting a website with malicious code. From the article:

Details on the vulnerability, but not a step-by-step guide to hacking the phone, can be found at www.exploitingiphone.com, which the researchers said would be unveiled today.
"
The Internet

+ - Where to go with big ideas 2

Submitted by
rockwood
rockwood writes "Looking for hope, I've decided to come to Slashdot; as the client base seem to be diverse enough to provide pro and cons in regards to "selling and idea/concept".
I have been researching and working on a concept that for all purposes the business model I put together for it not only compliments the current internet trends, but also fills a huge gap. A gap so large that I cannot understand why it has not been implemented before (something similar to what the first person who made the phonebook most likely felt like) "This idea is so obvious that everyone would use it, but why hasn't anyone done it before"
My dilemma is that with literally no additional funds to put toward a lawyer, patent/copyrights etc.. I'm fearful of mentioning it to anyone.
I've been sending correspondence to both Google and to News Corp; though proceeding cautiously as I'm afraid of someone stealing the idea; which would produce revenue on a global scale, internet users, mobile and pda, everyone would use it.

So my question — what resources are readily available to help someone in my situation protect themselves and also profit from this? I'd love to implement the idea and watch it grow, though my estimate bandwidth for usage would run 25k to 50k monthly (remember I can't even afford the lawyer at this point). But I'm also open to selling the idea outright — though I'd only be open to an offer that was of a substantial amount.
I've considered contacting my local S.C.O.R.E, though previous dealings with them didn't seem to provide the information and guidance I was hoping for — and again, I'm fearful that if they here something they like they could do it themselves. I know most of you might say "NDA", but I feel that isn't worth the paper it is on, a mere call and a tipoff to a friend 2000 miles away would be something I'd never be able to prove.

Just to bring things into light, I'm estimating initial investment of 4 to 10 million dollars with a return of approximately 5 to 15 million a month! — With that type of return investment you can see why I am leery of mentioning anything to anyone.

Suggestions?"
United States

+ - Full spectrum solar cells-> 1

Submitted by
Diego Manuel
Diego Manuel writes "BERKELEY, CA — Researchers in the Materials Sciences Division (MSD) of Lawrence Berkeley National Laboratory, working with crystal-growing teams at Cornell University and Japan's Ritsumeikan University, have learned that the band gap of the semiconductor indium nitride is not 2 electron volts (2 eV) as previously thought, but instead is a much lower 0.7 eV. The serendipitous discovery means that a single system of alloys incorporating indium, gallium, and nitrogen can convert virtually the full spectrum of sunlight — from the near infrared to the far ultraviolet — to electrical current"
Link to Original Source
The Internet

+ - Senate Majority Whip asking for advice online->

Submitted by
Sayhar
Sayhar writes "Dick Durbin, Senate Majority Whip, put up a post online, asking American citizens, "What should be America's national broadband strategy?"

This is a pretty unique opportunity. He wants to accomplish these three goals: universal and affordable broadband, "preserving an online environment for innovation," and "broadband technology that enables more voices to be heard." What should the ideal bill contain?"

Link to Original Source
Businesses

+ - Ending the switching of names on utilities 2

Submitted by
An anonymous reader writes "So one of my roommates is moving out and he has three utilities under his name. I will be picking up these utilities but we have to pay an installation fee for some of the accounts or restart service for other accounts. This is frustrating since all we're doing is changing the name on the account. We started discussing various options since the house has an average rollover rate (1-2 people a year in a 4 person house) and paying the fees every time just gets to be a waste of money.

One of the options that was discussed was to create a fake business at our address and just change the "account manager" as needed for the business account. Unfortunately, none of us really know what would be required to establish this business or prove its existence.

So I ask two questions: 1) Is this a reasonable option? 2) If so, what would we need to do to prove the existence of our company? If not, what would be required for your proposed solution?"
Enlightenment

+ - Rolling my own parental controls in Linux

Submitted by ZekeSMZ
ZekeSMZ (874386) writes "It's been a year since I made the switch from windows to Ubuntu, and I can safely say I'm never going back. One of the best things I've done is to set up an Edubuntu system for my kids — ages 4 and 2. With applications such as Supertux, TuxPaint, G Compris, Stellarium and even Kolf, they amuse themselves for hours with the machine and can't damage it like they can a Windows box.

Now that my 4 year old is learning to read and type, I'd like to set up some form of parental controls on my network. I consider myself a moderately competant Linux user, but I do not have anything approaching the skills of the talented sysadmins I've worked with over the years. So, I'd like to reach out to the Slashdot community for advice on how to lock down my network so that they won't accidentally bump into the seedier side of the web.

What are the best firewall apps to use for internal filtering? Do (or could) any of them support pro-active whitelisting, where I could get an email with a blocked URL that my kids tried to visit, and in response — I set up a rule to allow or deny access to the URL. This is a fairly mainstream feature of various parental control software out there, how could a similar solution be set up in Linux?

I'm going to assume that my kids are smarter than me and will one day figure out how to own the network. You get bonus points if you can give pointers on setting up a dual system, one that they can hack, and one that is running in the background in silent or stealth mode to monitor activity. My intent here is not to be big brother, but rather a responsible parent."
Networking

+ - Timewarner DNS Hijacking

Submitted by
Exstatica
Exstatica writes "It looks like Timewarner is taking botnets into their own hands. They've hijacked dns for a few irc servers. The latests being irc.vel.net, irc.mzima.net, and irc.nac.net all part of EFNet. Using ns1.sd.cox.net the lookup returns an ip for what looks to be a script that forces the user into a channel and issues a set of commands to clean the drones. There have been different reports of other irc networks being hijacked and other dns servers involved. Is this the right way to handle this? Is hijacking DNS illegal?"

IF I HAD A MINE SHAFT, I don't think I would just abandon it. There's got to be a better way. -- Jack Handley, The New Mexican, 1988.

Working...