Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Cellphones

Palm Announces Killer New Phone 617

Posted by kdawson
from the j-phone dept.
Barence writes "At CES, Palm announced what promises to be the product that finally matches and even betters the Apple iPhone, and certainly looks to be the most important product announced at this year's Consumer Electronics Show. It's called the Palm Pre and it's based on a completely new operating system, called Palm webOS. Its key specs include a 3.1in 320x 480 touchscreen, 8GB of storage, UMTS HDSPA support (in the UK version of the phone), 802.11b/g WLAN, Bluetooth, and GPS. It also includes a slide-out Qwerty keyboard, 3.5mm headphone jack, and what Palm described as the 'fastest ever' Texas Instruments OMAP processor."
Media

The Technology Behind the Magic Yellow Line 261

Posted by timothy
from the don't-eat-the-yellow-line dept.
CurtMonash writes "Fandome offers a fascinating video explaining how the first-down line on football broadcasts actually works. Evidently, theres a lot of processing both to calculate the exact location being photographed on the field — including optical sensors and two steps of encoding — and to draw a line in exactly the right place onscreen. For those who don't want to watch the whole video, highlights are here."
Security

How to Save Mac OS X From Malware 222

Posted by timothy
from the endangered-species dept.
eXchange writes "Well-known hacker Dino Dai Zovi has written an article at ZDNet discussing last week's discovery of a critical threat to Mac OS X, and another announcement of a Trojan horse exploiting this discovery. He suggests that Snow Leopard, or Mac OS X 10.6, should integrate more robust means of preventing malware attacks. Some of the suggestions he has include mandatory code-signing for kernel extensions (so only certified kernel extensions can run), sandbox policies for Safari, Mail, and third-party applications (so these applications cannot do anything to the system), and some lower-level changes, such as hardware-enforced Non-eXecutable memory and address space layout randomization."
The Internet

Algorithm Rates Trustworthiness of Wikipedia Pages 175

Posted by CowboyNeal
from the getting-it-right dept.
paleshadows writes "Researchers at UCSC developed a tool that measures the trustworthiness of each Wikipedia page. Roughly speaking, the algorithm analyzes the entire 7-year user-editing-history and utilizes the longevity of the content to learn which contributors are the most reliable: If your contribution lasts, you gain 'reputation,' whereas if it's edited out, your reputation falls. The trustworthiness of a newly inserted text is a function of the reputation of all its authors, a heuristic that turned out to be successful in identifying poor content. The interested reader can take a look at this demonstration (random page with white/orange background marking trusted/untrusted text, respectively; note "random page" link at the left for more demo pages), this presentation (pdf), and this paper (pdf)."

If it happens once, it's a bug. If it happens twice, it's a feature. If it happens more than twice, it's a design philosophy.

Working...