Space

China's First Spacewalk 148

Smivs writes "The BBC reports that China will launch its third manned space mission in late September, according to state-run news agency Xinhua. The Shenzhou VII flight will feature China's first-ever space walk, which will be broadcast live with cameras inside and outside the spacecraft. For the spacewalk, two crew members will go into the spacecraft's vacuum module. One yuhangyuan (astronaut) will carry out the spacewalk; the other is there to monitor the activity and assist in case of an emergency. Two types of spacesuits — one made in China, the other from Russia — will be carried up on the flight. It is unclear why China has opted for two different types of spacesuit. Spaceflight analyst Dr Morris Jones commented that China might want to test the suits against each other. Alternatively, he said, it might not be ready or willing to fly a mission exclusively with its own suits."
Privacy

Newark and the Future of Crime Fighting 172

theodp writes "Newark Mayor Cory Booker is betting that cutting-edge technology will reduce crime and spark an economic renaissance. From a newly opened Surveillance Operations Center, cops armed with joystick controllers monitor live video feeds from more than 100 donated cameras scattered across the crime-ridden city. The moves are drawing kudos from businesses like Amazon subsidiary Audible.com, which has moved its HQ to downtown Newark, where space is 50% cheaper than in Manhattan. But are citizens giving up too much privacy?"
Windows

Hostile ta Vista, Baby 663

Frequent Slashdot contributor Bennett Haselton adds his experience to the litany of woes with Microsoft Vista. Unlike most commentators who have a beef with the operating system, Bennett does a bit of surveying to bolster his points. Read his account by clicking on the magic link.
Movies

Impress Your Friends While Watching "Untraceable" 228

Frequent Slashdot contributor Bennett Haselton writes in today with a nerd-oriented review of "Untraceable," which opened in theaters last Friday. Read on for Bennett's take on what the movie gets right — a surprising amount as these movies usually go — but be warned, his review contains spoilers.
Power

Electricity Over Glass 187

guddan writes "Running a live wire into a passenger jet's fuel tank seems like a bad idea on the face of it. Still, sensors that monitor the fuel tank have to run on electricity, so aircraft makers previously had little choice. But what if power could be delivered over optical fiber instead of copper wire, without fear of short circuits and sparks? In late May, the big laser and optics company JDS Uniphase Corp., in San Jose, Calif., bought a small Silicon Valley firm with the technology to do just that."

Mobile Phones to Monitor Traffic Congestion 89

shas3n writes "In an interesting and innovative way Bangalore city, India, has come up with a way to monitor road traffic congestion by monitoring the density of mobile phones. This can give users quantitative and directional information of traffic flow without significant additional infrastructure investments. The congestion data is already available online."
Communications

The Shape of the Future 179

Last week, Sci-Fi writer Charlie Stross was invited to speak at a technology open day at engineering consultancy TNG Technology Consulting in Munich. He's posted a transcript of his discussion on his website, which features a fascinating analysis of where technology is going in the next 10-25 years. Instead of envisioning outlandish future developments, he looks at what the impact might be on society from very reasonable iterations of today's SOTA. "10Tb is an interesting number. That's a megabit for every second in a year -- there are roughly 10 million seconds per year. That's enough to store a live DivX video stream -- compressed a lot relative to a DVD, but the same overall resolution -- of everything I look at for a year, including time I spend sleeping, or in the bathroom. Realistically, with multiplexing, it puts three or four video channels and a sound channel and other telemetry -- a heart monitor, say, a running GPS/Galileo location signal, everything I type and every mouse event I send -- onto that chip, while I'm awake ... Add optical character recognition on the fly for any text you look at, speech-to-text for anything you say, and it's all indexed and searchable. 'What was the title of the book I looked at and wanted to remember last Thursday at 3pm?' Think of it as google for real life. "
Censorship

Censorware Not Good, Just Better Than COPA 146

Slashdot contributor Bennett Haselton writes in with with an essay that starts "On March 22nd, District Court Judge Lowell Reed ruled that the Child Online Protection Act was unconstitutional, partly because the judge called it 'vague and overbroad,' and partly because less restrictive means existed, such as Internet blocking software. I'll leave others to comment on the legal issues, but blocking software is something that I've studied, and it's important to make sure this decision is not seen as some kind of vindication for the 'censorware' industry." Tap that link below to read the rest of his story.
Role Playing (Games)

EVE Online Answers Your Questions 249

Last week at GDC I had the privilege of sitting down to speak with a representative from CCP, the folks who maintain EVE Online. The week before, we'd asked for questions to pass on. I had the chance to put them directly to Magnus Bergsson, CMO at CCP. He very directly tackles the recent scandal involving a CCP developer, the reason why EVE's hardcore gameplay is so appealing, the balance between casual and hardcore players, and some information on the future of the game. Read on for his answers to your questions in a transcript of the interview, as well as audio live from the GDC Expo floor.

The Warhammer Online Team Responds 220

Last month we asked you for questions for the makers of Warhammer Online. The tone of the response made it obvious that many readers were concerned about where the company was taking the Warhammer world. Their responses should, at least somewhat, put those of you frustrated by what you've seen so far at ease. The makers of the upcoming MMOG from Mythic have responded with detail and good humour to the insightful queries you put to them. They were also considerate enough to label their responses, so you know exactly who has answered each question. So, please, read on for the responses from Mythic's Warhammer Online team.

Wireless, Gaming Addiction, Spam, and More 45

Of the thousands of comments on yesterday's Slashdot page, gathered below are some of the ones that defined the conversations on the rise of wireless peripherals, the meaning of content-free spam, whether one can be truly addicted to online gaming, and Intel's move to open source some of its graphics adapter drivers. Read on for the Backslash summary.

Excerpt from Kessler's 'The End of Medicine' 116

The same technology and silicon and 3D algorithms we play around with every day are about to invade medicine. The following is an excerpt from Andy Kessler's new book, The End of Medicine: How Silicon Valley (and Naked Mice) Will Reboot Your Doctor.

Portable, Non-Proprietary Streaming Hardware? 44

bandini asks: "My job occasionally has me running encoders for live webcasts in locations that demand a high degree of portability and flexibility. It's usually required that we provide redundant encoders, so my current setup consists of two rack-mounted WinXP machines and a KVM tray/switch in a very large, heavy, awkward case. In this age of powerful, small-form-factor computers, what kind of new configuration can I seek to relieve myself of some of the headaches of hauling around this giant case?"

Ubuntu Hacks 138

Ravi writes "I recently got hold of a very nice book on Ubuntu called Ubuntu Hacks co-authored by three authors - Kyle Rankin, Jonathan Oxer and Bill Childers. This is the latest of the hack series of books published by O'Reilly. They have made available a rough cut version of the book online ahead of schedule which was how I got hold of the book but as of now you can also buy the book in print. Put in a nutshell, this book is a collection of around 100 tips and tricks which the authors choose to call hacks, which explain how to accomplish various tasks in Ubuntu Linux. The so called hacks range from down right ordinary to the other end of the spectrum of doing specialised things." Read on for the rest of Ravi's review.
Biotech

Juiced 381

AdamBa (Adam Barr) writes "Juiced is not a great book. The writing is workmanlike but not particularly entertaining, none of the stories are more than slightly amusing, and its protagonist projects an unappealing mixture of vanity and whining. There is a bit of dirt on players, and a couple of nuggets about Madonna and the sex lives of baseball players (and the intersection of those two), but as a baseball autobiography, it pales besides better competition. And yet, Juiced may be one of the most important baseball books ever written." Specifically, the book provides an insider's account of one aspect of biotech that has achieved widespread use, if not acceptance. Read on for the rest of Barr's review.
OS X

Mac OS X Server Panther 155

norburym (Mary Norbury-Glaser) writes "Mac OS X Server 10.3 Panther is one of the latest in Peachpit Press' Visual QuickPro guides (not to be confused with the beginner "QuickStart" series) and is written by one of the best IT/Mac trainers in the industry, Schoun Regan, with assistance by his devoted sidekick and co-trainer at itinstruction.com, Kevin White. Peachpit and the authors have produced a book with excellent content and delivery; the installation and setup of Mac OS X Server and Web services is explained with clarity and precise detail." Read on for the rest of Norbury-Glaser's review.
Privacy

This Call May Be Monitored ... 443

Iphtashu Fitz writes "We've all heard it. The recorded message when you call technical support or your bank or credit card company: 'This call may be monitored for quality assurance purposes.' But has it ever occurred to you that people actually DO listen in? Approximately 2 percent of these calls are listened to either live or after the fact, and it may come as a surprise that Big Brother even listens to what you may say while you are on hold. The people who monitor these calls routinely hear arguments between spouses or parents and children, people yelling at pets, and all sorts of other domestic disputes."
Books

Running Mac OS X Panther 288

sympleko (Matthew Leingang) writes with his review of Running Mac OS X Panther, by James Duncan Davidson. "The Macintosh has come a long way in twenty-plus years. Much has been said of Mac OS X being the perfect union of a rock-solid operating system with a beautiful and functional user interface. Since the iMac, Apple's market share has been steadily increasing, and since OS X, Unix users have been making the switch. My last computer was a dual-boot box that I kept finding excuses to keep from booting to Windows. My PowerBook is literally the best of both worlds. I can run the older unix-based apps I need to for work, and use Microsoft programs and play fancy games when I want. It's also essentially two different computers. This book is about using that second computer, the workhorse behind the scenes." Read on for the rest.
Books

Windows Forensics and Incident Recovery 142

dba599 (Mark McKinnon) submits this review of Harlan Carvey's Windows Forensics and Incident Recovery, writing "This book takes an unusual approach to computer forensics in that it deals only with live analysis of the system: the compromised computer is left powered on and everything is running. (Compare to a dead analysis, for which the computer is powered off and the hard drive's contents are then analyzed.)" Read on for the rest of McKinnon's review.
Operating Systems

Xen 2.0 Virtual Machine Monitor Released 199

An anonymous reader writes "The Xen team are pleased to announce the release of Xen 2.0, the open-source Virtual Machine Monitor. Xen enables you to run multiple operating systems images concurrently on the same hardware, securely partitioning the resources of the machine between them. Xen uses a technique called 'para-virtualization' to achieve very low performance overhead -- typically just a few percent relative to native. This new release provides kernel support for Linux 2.4.27/2.6.9 and NetBSD, with FreeBSD and Plan9 to follow in the next few weeks. Xen 2.0 runs on almost the entire set of modern x86 hardware supported by Linux, and is easy to 'drop-in' to an existing Linux installation. The new release has a lot more flexibility in how guest OS virtual I/O devices are configured. For example, you can configure arbitrary firewalling, bridging and routing of guest virtual network interfaces, and use copy-on-write LVM volumes or loopback files for storing guest OS disk images. Another new feature is 'live migration', which allows running OS images to be moved between nodes in a cluster without having to stop them. Visit the Xen homepage for downloads and documentation."

Slashdot Top Deals