When completitors complete, conslumers win!
A one-eyed San Francisco artist, Tanya Vlach, wants to replace her missing eye with a Web cam. There has even been talk of her shooting a reality TV show using the video eye. "There have been all sorts of cyborgs in science fiction for a long time, and I'm sort of a sci-fi geek, with the advancement of technology, I thought, 'Why not?'" said Vlach. I'm a bit perplexed that the obvious things you'd want in a cyborg eye: range finder, infrared/lowlight vision, and a hypno-ray are not discussed in the article.
The Living Fractal writes: "So I'm reading Century Rain, a great SF book by Welsh author Alastair Reynolds, and at about page 80 or so I stumble onto a hidden Slashdot reference. Reynolds' character "Niagara" runs a finger diagonally across his chest then 'dots' next to the slash, then goes on to talk about a community of progressive thinkers on one of the earliest computer networks (today's internet) who eventually founded his society. They're even called Slashers! Maybe old news to some of you, but a nice surprise for me nevertheless.
Does anyone else have
/. easter eggs they've found that they can share with us?"
Does anyone else have
mgh02114 writes: The new US stealth fighter, the F-22 Raptor, was deployed for the first time to Asia earlier this month. The first flight from Hawaii to Japan was forced to turn back when a software glitch crashed the F-22 on-board computers as they crossed the international date line. The delay in arrival in Japan was previously reported here and here, with rumors of problems with the software. CNN television, however, this morning reported that all every fighter completely lost all navigation and communications when they crossed the international date line. They reportedly had to turn around and follow their tankers by visual contact back to Hawaii. According to the CNN story, if they had not been with their tankers, or the weather had been bad, this would have been serious. CNN has not put up anything on their website yet. This follows previous reports that a software bug in the F-16, caught in simulation before the plane ever flew, that would have caused the fighter to flip upside down when flying over the equator.
ctwxman writes: "I grew up on Devil Dogs. Alas, there's no Devil Dog book, but now there is one about Twinkies — nature's perfect food thanks to the miracle of modern science and advanced chemistry! "Why is it you can bake a cake at home with as few as six ingredients, but Twinkies require 39? And why do many of them seem to bear so little resemblance to actual food?" Pure goodness doesn't come easy. Steve Ettlinger is the author of "Twinkie, Deconstructed," the definitive Twinkie story... even without the official help of the keepers of the Twinkie secret. It's all summarized on MSNBC. Before clicking, make sure you have a glass of milk handy."
hcmtnbiker writes: Internet Explorer 7 and Firefox 2.0 share a logic flaw. The issue is actually more severe, as the two versions of the Microsoft and Mozilla browsers are not the only ones affected. The vulnerability impacts Internet Explorer 5.01, Internet Explorer 6 and Internet Explorer 7, and Firefox 18.104.22.168. "In all modern browsers, form fields (used to upload user-specified files to a remote server) enjoy some added protection meant to prevent scripts from arbitrarily choosing local files to be sent, and automatically submitting the form without user knowledge. For example, ".value" parameter cannot be set or changed, and any changes to
.type reset the contents of the field," said Michal Zalewski, the person that discovered the IE7 flaw.
There are Proof of concepts for both IE7 and firefox
CowboyRobot writes: "ACM Queue's current issue on Open Source Security includes a short article by Eric Allman of Sendmail on how to handle security bugs in your code. "Patch with full disclosure. Particularly popular in the open source world (where releasing a patch is tantamount to full disclosure anyway), this involves opening the kimono and exposing everything, including a detailed description of the problem and how the exploit works... Generally speaking, it is easier to find bugs in open source code, and hence the pressure to release quickly may be higher.""
An anonymous reader writes: The place where I work has blocked web access and I've been reduced to using an email to web service for web browsing. The biggest downsides to this are the dearth of servers as well as the slow response times of the ones that are available. I've considered setting up my own www4mail http://www.www4mail.org/ server but I've read that My provider (ATT) won't allow an email server on a home account. There are free hosting services that will allow tou to run scripts but again the email restriction applies there as well. Are there any other options I am missing?
nomoreself writes: "According to a story over on Physics Web, a team of scientists in Jerusalem have come up with a method for creating self-assembling 3-dimensional models from a single sheet of paper. The "Chemical origami" is created by etching a pattern of monomer onto the paper, then heating it. The chemical's reaction to the heat causes bends of varying size in the paper, molding the sheet into the patterned model. A professor in the States with no apparent ties to the study whatsoever says in the article that the technique could be used to create self-assembling prototypes, or even a printer that prints 3-D objects."