Gary Phebus wants to donate his heart, lungs, and liver. The problem is he wants to donate them before he dies. Gary was diagnosed with amyotrophic lateral sclerosis, better known as Lou Gehrig's disease, in 2008. Phebus says he'd like to be able to donate his organs before they deteriorate, and doesn't consider his request suicide because he's "dead anyway."
Qubert writes: Was D-Wave's quantum computer demo last week the real thing? Ars Technica takes a look inside the cold, black box and concludes that whatever was in there, it probably wasn't a 'pure' quantum computer: 'Jumping off the fence, we will say that we think D-Wave demonstrated a real device; however, we think their device is going to set off a debate in the physics community over where the boundary between classical and quantum computation is. At present, quantum computers are "globally phase coherent," which means that every qubit's state is entangled (and therefore correlated) with every other qubit... The D-wave system, however, is certainly not globally phase coherent, which raises the question of whether it is a quantum computer.'
An anonymous reader writes: One of the fastest growing trends in consumer electronics is what some people have started to call tech luxury. These are goods that are all about style and performance and don't really concern themselves with the price. One of the best examples of this is Logitech's new diNovo Edge keyboard. It's looks great, has a big price tag, and has lots of innovative features, but has no mouse or numberpad. From the article, "Keyboards don't have to be boring. They don't have to be blocky, beige tools that are tethered to the back of your computer. Companies like Logitech have made it so that keyboards can be comfortable, wireless, stylish, interesting, and, maybe even cool."
An anonymous reader writes: Ajax code loaded in browser can have entry points to XSS and it is the job of the security analyst to identify these entry points. It is difficult to decisively conclude that possible entry points to an application can be exploited. One may need to do a trace or debug to measure the risk of these entry points. This paper introduces you to a quick way to identify XSS entry points in an application.
linkedlinked writes: While looking for some old backups with a friend, we started talking about storage space, and how so many of our random files wind up in obscure places. We realized that each of us has "access" to a pretty sizable heap of storage (for college kids). I would guess that, between ftp accounts on friends' servers, random school storage space, root access to a few work servers, and my own half-dozen computers and servers, I probably have near 5-6 TB of usable storage. Out of curiosity, we decided to ask Slashdot- legality aside, how much storage space could you feasibly dominate on a whim?
LetterRip writes: "Blender 2.43 the free 3d animation suite has been released. There are a number of amazing new features including sculpting (which was supported by Googles Summer of Code) — you can now sculpt huge poly counts (6.5 million!) on Linux; fast 3D texture painting and numerous animation tool improvements."