Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
Slashdot Deals: Deal of the Day - Pay What You Want for the Learn to Code Bundle, includes AngularJS, Python, HTML5, Ruby, and more. ×

JBI's Plastic To Oil Gets Operating Permit 223

Whammy666 writes "JBI, Inc. announced that it has entered into a formal Consent Order with the New York State Department of Environmental Conservation (DEC) Region 9, which will allow the Company to immediately run its Plastic2Oil (P2O) process commercially and begin construction of an additional processor at its Niagara Falls, New York P2O facility. JBI has developed a process that takes waste plastic destined for landfills and converts it into diesel fuel, gasoline, and natural gas with very little residue. The process is said to be very efficient thanks to a special catalyst developed by JBI and an attention to process optimization. That plastic water bottle you tossed in the trash could soon be fueling your car instead of sitting in a landfill for 1000 years."

Data Retention Proven to Change Citizen Behavior 261

G'Quann writes "A new survey shows that data retention laws indeed do influence the behavior of citizens (at least in Germany). 11% had already abstained from using phone, cell phone or e-mail in certain occasions and 52% would not use phone or e-mail for confidential contacts. This is the perfect argument against the standard 'I have nothing to hide' argumentation. Surveillance is not only bad because someone might discover some embarrassment. It changes people. 11% at least."

Researchers Tout New Network Worm Weapon 101

coondoggie writes "Can Internet worms be thwarted within minutes of their infection? Researchers at Ohio State University believe they can. The key, researchers found, is for software to monitor the number of scans that machines on a network send out. When a machine starts sending out too many scans — a sign that it has been infected — administrators should take it off line and check it for viruses. In a nutshell, the researchers developed a model that calculated the probability that a virus would spread, depending on the maximum number of scans allowed before a machine was taken off line.'The difficulty was figuring out how many scans were too many,' researchers said."

Drive-By Contributors to the Linux Kernel 61

eldavojohn writes "There's an interesting post over at the Kernel Trap that focuses on a man's attempt to find out how many one-time contributors Linux averages per release. Although imperfect due to some obvious unavoidable flaws, he got a few dirty numbers of 'never seen from agains' in the commits from patches 2.6.11 through 2.6.25 and the numbers are: {63, 148, 128, 92, 96, 122, 137, 140, 135, 95, 136, 153, 179, 179, 304}. This makes sense as another reader, Greg KH, pointed out that the distribution curve is tilted towards one-hit contributions, 'the distribution of all of our users are: 50% only contributed 1 patch; 25% contributed 2; 12% contributed 3; 6% contributed 4 and so on ...'"

McCain Supports Warrantless Domestic Surveillance 650

I Don't Believe in Imaginary Property writes "While there have been shifting reports about McCain's view on warrantless wiretapping, nothing could be clearer than the latest comment by McCain adviser Doug Holtz-Eakin, who said, 'We do not know what lies ahead in our nation's fight against radical Islamic extremists, but John McCain will do everything he can to protect Americans from such threats, including asking the telecoms for appropriate assistance to collect intelligence against foreign threats to the United States as authorized by Article II of the Constitution.' Article II, of course, is what Bush has argued gives the President virtually unlimited power during war, and McCain has already voted in favor of Telecom Immunity, though he sometimes mentions, to those asking for accountability, wanting to hold hearings about what the telecoms did."