Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Submission + - SpaceX to try a first stage recovery again on April 13

schwit1 writes: In its next launch on Monday, SpaceX will once again try to safely land its first stage on an ocean barge, allowing it to reuse that stage on later flights.

Monday afternoon is certainly going to be an exciting day for space cadets. First, at 4 pm (Eastern) the head of ULA will reveal the design of that company's new rocket. Then, at 4:33 pm (Eastern), SpaceX will launch Dragon to ISS while attempting to return the first stage safely.

Comment Native JSON fields (Score 2) 283 283

Submission + - Red Hat Prevails Against Patent Troll Acacia->

walterbyrd writes: Red Hat, Inc., the world's leading provider of open source solutions, announced that today a jury in federal court in Marshall, Texas, returned a verdict in favor of Red Hat, Inc. and Novell, Inc. in a case alleging patent infringement brought by IP Innovation LLC, a subsidiary of Acacia Research Corporation and Technology Licensing Corporation. The patents at issue were found to be invalid and worthless.
Link to Original Source

Comment Fight not over yet (Score 4, Informative) 308 308

While it is true that a mandatory filtering proposal is likely to require legislation to implement (especially without the support of the Internet Industry Association and a voluntary code of conduct), it is not clear that any future legislation is dead in the water just yet.

http://www.efa.org.au/2009/02/26/xenophon-opposes-mandatory-isp-filtering-but-fight-not-over-yet/

Government

Submission + - Icelandian calls White House, labelled a terrorist-> 3 3

An anonymous reader writes: A 16-year-old boy in Iceland called a secret government phone number, which he thought was Bush's private number, and posed as the president of Iceland. After passing some impromptu security questions, such as President Ólafur Ragnar Grímsson's birth date (which he answered with Wikipedia), Bush's secretary told him to expect a call back. Instead, police surrounded his house and interrogated him on where he got the number, threatening to put him on a no-fly list if he didn't tell. He claims he can't remember where he got the number, but says "I must have gotten it from a friend when I was about 11 or 12."
Link to Original Source
Education

Submission + - The Dangerous Wealth of the Ivy League 1 1

theodp writes: "BusinessWeek reports that higher education is increasingly a tale of two worlds, with elite schools getting richer and buying up all the talent. Thanks to endowments like the one that netted Harvard $5.7B in investment gains just last year, the Ivy Plus colleges — which account for less than 1% of students — have been able to lift their spending into the stratosphere, including extravagances like $272,000-a-bed-dorms and even a $4M student-horse-housing rehab. 'People used to look at every penny,' says a Yale Dean. 'The mind-set is different now.' Meanwhile, reports BW, public colleges and universities struggle to educate 75% of the country's students in an era when most states are devoting a dwindling share of their budgets to higher ed."
User Journal

Journal Journal: Google Quietly Adds HTTPS Support to GMail 4 4

This may be old news, but I just noticed myself and thought I'd report it. I've been using the "New Version" of GMail for a couple of weeks (I hardly notice the difference from the "Old Version"), and happened to notice today that the inbox URL still used "http://", even after all the complaints that they didn't maintain "https://" after login. I decided a quick test was in order, and added the all-important "s" to the protocol indicator. It worked fine. After clicking around some, openin

Security

Submission + - Penn student at center of worldwide hacking invest->

An anonymous reader writes: When a suspicious computer server crash at the University of Pennsylvania last year denied service to 4,000 students, faculty and staff, technicians called the FBI — triggering a case that would take agents around the world and lead to the arrest of a brilliant but brash Penn junior. Ryan Goldstein, a 20-year-old bioengineering major, conspired with a New Zealand hacker known as AKILL to use Penn's computer system as a staging ground for a 50,000-computer attack against several online chat networks, authorities said. The FBI and Secret Service are expected to announce indictments today against Goldstein, a Florida man, and three others. Police recently executed related raids in New Zealand, Florida, California and Pennsylvania. The latest came Tuesday near Philadelphia. An FBI agent from the region is in New Zealand this week, and more arrests are possible. "We've been executing search warrants all over the world in this case," said Assistant U.S. Attorney Michael Levy. View article for more.
Link to Original Source
The Military

Submission + - Wired: How Tech Almost Lost the War 1 1

An anonymous reader writes: Blame the geeks for the mess in Iraq? Wired says so. Networked troops were supposed to be so efficient, it'd take just a few of 'em to wipe out their enemies. But the Pentagon got their network theory all wrong, with too few nodes and a closed architecture. Besides, a more efficient killing machine is the last thing you want in an insurgency like Iraq.
Government

Submission + - Kevin Rudd wins Australian Election ->

gunny01 writes: "Kevin Rudd, the head of the Australian Labor Party, has defeated the Liberal Party incumbent John Howard in Saturday's federal election, with a 5.8% swing. This ends Howard's eleven year term in office, and it also appears at this stage that he has lost his seat. If this turns out to be correct, Peter Costello will be the Opposition leader in the new government.

Rudd, among other things, has promised to scrap the current governments unpopular industrial relations reforms and give Australians access to access to 100Mbs broadband and free laptops to every senior school student."

Link to Original Source
Encryption

Submission + - First use of RIPA to demand encryption keys->

kylehase writes: The Regulation of Investigatory Powers Act (RIPA) is being used for the first time to force an animal activist to reveal encryption keys for encrypted files she claims to have no knowledge of. According to the article, she could face up to two years if she doesn't comply.
Link to Original Source

1000 pains = 1 Megahertz

Working...