A laser tool funded by the European Space Agency to measure carbon on Mars is now being used to help detect fake honey. By burning a few milligrams of honey the laser isotope ratio-meter can help determine its composition and origin. From the article: "According to a Food Safety News investigation, more than a third of honey consumed in the U.S. has been smuggled from China and may be tainted with illegal antibiotics and heavy metals. To make matters worse, some honey brokers create counterfeit honey using a small amount of real honey, bulked up with sugar, malt sweeteners, corn or rice syrup, jaggery (a type of unrefined sugar) and other additives—known as honey laundering. This honey is often mislabeled and sold on as legitimate, unadulterated honey in places such as Europe and the U.S."
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×
An anonymous reader writes "After a huge meteor recently exploded over Chelyabinsk (population 1,130,132), Russia, NASA has approved $5 million for funding for ATLAS project (Asteroid Terrestrial-impact Last Alert System). From the article: '"There are excellent ongoing surveys for asteroids that are capable of seeing such a rock with one to two days' warning, but they do not cover the whole sky each night, so there's a good chance that any given rock can slip by them for days to weeks. This one obviously did," astronomer John Tonry of the Institute for Astronomy at the University of Hawaii told NBC News Friday.'"
Four years after the last release, version 5.0 of Texinfo, the GNU documentation language, has been released. The primary highlight is a new implementation of makeinfo info in Perl rather than C. Although slower, the new version offers several advantages: cleaner code using a structured representation of the input document, Unicode support, and saner support for multiple output backends. There are over a dozen other improvements including better formatting of URLs, improved cross-manual references, and a program to convert Perl POD documentation to Texinfo.
sciencehabit writes "When it comes to hanging on tight, the lowly mussel has few rivals in nature. Researchers have sought the secrets behind the bivalve's steadfast grip on wet, slippery rock. Now, a researcher says he has used the mollusk's tricks to develop medical applications. These include a biocompatible glue that could one day seal fetal membranes, allowing prenatal surgeons to repair birth defects without triggering dangerous premature labor."
whoever57 writes "Patent trolls like to claim that patent laws provide a way that small inventors can create products and benefit financially from their invention. One such inventor faces selling his house, despite inventing a product that has sold tens of millions worldwide. From the article: 'Inventor Trevor Baylis says he faces having to sell his house after failing to make money from his wind up radio and is now calling for the government to step into to protect inventors. “I’ve got someone coming around in the next couple of weeks to do a valuation on my house,” says Trevor Baylis, as he walks into the sitting room of his home on Eel Pie Island, in Twickenham, south-west London. “I’m going to have to sell it or remortgage it – I’m totally broke. I’m living in poverty here.”'"
McGruber writes "The Chronicle of Higher Education has the news that Herbert Richardson, founder of Edwin Mellen Press is suing McMaster University and University Librarian Dale Askey for $3 Million over Mr. Askey's posts on a personal blog. In 2010 Mr. Askey wrote a blog post about Edwin Mellen Press on his personal Web site, Bibliobrary. Mr. Askey referred to the publisher as 'dubious' and said its books were often works of 'second-class scholarship.' For a few months afterward, several people chimed in in the blog's comments section, some agreeing with Mr. Askey, others arguing in support of the publisher. In a February 11 statement, the McMaster University Faculty Association (MUFA) stated that The Canadian Association of University Teachers (CAUT) 'and the MUFA Executive agree that this case represents a serious threat to the freedom of academic librarians (pdf) to voice their professional judgement and to academic freedom more generally.'"
hypnosec writes "Kevin Mitnick, who was one of the most wanted computer hacker in the US at one time, is now heading a security consultancy firm – Mitnick Security Consulting, and is entrusted with the task of securing Sunday's presidential elections in Ecuador. Mitnick tweeted, '18 years ago I was busted for hacking. I do the same thing today but with full authorization. How cool is that?' His company will focus on protecting the Net Lock computer system tasked with tabulating Ecuador's elections."
sfcrazy writes "KDE's Plasma Active team leader Aaron Seigo has raised some concerns around Ubuntu Phone. He says 'We can start with the obvious clue: Unity currently does not use QML at all; Ubuntu Phone is pure QML. So, no, it is not the same code, it is not the sort of seamless cross-device technology bridge that they are purporting.' He then concludes, 'If you're a Free software developer, user and/or supporter and buying into these claims, I don't know how else to put it other than this: you're being duped. Consider what supporting those who employ such tactics means for Free software.'"
parallel_prankster writes "Amazon users are addressing the drone controversy with sarcasm. Maisto International Inc.'s model Predator drones are selling out on Amazon.com Inc.'s website as parody reviews highlight how the toys can help children hone killing skills, mocking a controversial U.S. practice. The toy is a replica of the RQ-1 Predator, an unmanned aircraft that the U.S. Air Force has used in combat over Afghanistan, Pakistan, Serbia, Iraq and Yemen, according to the product description on Amazon. Only one of the $49.99 military-style toy jets is available for purchase on Amazon's site, which is brimming with assessments laced with dark humor. 'You can't spell slaughter without laughter,' one pithy joker wrote."
ptorrone writes "In a welcome turn of events, President Barack Obama spoke directly to the patent troll problem and the need for more comprehensive patent reform yesterday in a 'Fireside Hangout' — a live question and answer session (video) hosted in a Google+ hangout. The President was responding to a question by the prominent electrical engineer and entrepreneur Limor 'Ladyada' Fried of Adafruit Industries, who in 2009 won an EFF Pioneer Award for her work with free software and open-source hardware."
First time accepted submitter Daniel_Stuckey writes "Bam! For anyone that's paid a speck of attention to the tedium of political redistricting, which happens while a state grows unevenly, (and must dynamically respond to density, electorate disparity, natural resources and ridgelines, etc.), this is straight out of some psychedelic dream. For Democrats, it could be straight out of a nightmare. That's because Freeman's map necessitates 50 equally populous United States. His methods for creating the map are explained thusly: 'The algorithm was seeded with the fifty largest cities. After that, manual changes took into account compact shapes, equal populations, metro areas divided by state lines, and drainage basins. In certain areas, divisions are based on census tract lines... The suggested names of the new states are taken mainly from geographical features.'"
Hugh Pickens writes writes "Suzanne Goldenberg reports that conservative billionaires used a secretive funding route to channel nearly $120 million to more than 100 groups casting doubt about the science behind climate change, helping build a vast network of think tanks and activist groups working to redefine climate change from neutral scientific fact to a highly polarizing 'wedge issue' for hardcore conservatives. 'We exist to help donors promote liberty which we understand to be limited government, personal responsibility, and free enterprise,' says Whitney Ball, chief executive of the Donors Trust. Ball's organization assured wealthy donors that their funds would never by diverted to liberal causes with a guarantee of complete anonymity for donors who wished to remain hidden. The money flowed to Washington think tanks embedded in Republican party politics, obscure policy forums in Alaska and Tennessee, contrarian scientists at Harvard and lesser institutions, even to buy up DVDs of a film attacking Al Gore. 'The funding of the denial machine is becoming increasingly invisible to public scrutiny. It's also growing. Budgets for all these different groups are growing,' says Kert Davies, research director of Greenpeace, which compiled the data on funding of the anti-climate groups using tax records. 'These groups are increasingly getting money from sources that are anonymous or untraceable.'"
imac.usr writes "The Huffington Post is reporting that The Washington Post has gone through yet another round of layoffs, but this time instead of cutting editorial positions, they're apparently cutting IT positions, specifically in the mobile applications department. According to Washington, DC media blog FishbowlDC, 54 people, including the General Manager of Mobile and Director of Mobile Products, were given the axe on Valentine's Day. A particularly damning quote from the FishbowlDC article: '"[CIO and VP Shaliesh] Prakash thinks these are 'inefficiencies' – that is the exact word he uses for human beings who are not useful according to him," said a source who spoke only on condition of anonymity. "Get rid of experienced people to save money, under the garb of streamlining is the new trend inside the Post."' Given that mobile products seem somewhat more likely to succeed than printed newspapers, this seems a strange decision at best."
Frosty Piss writes "Despite earning more than $1 billion in profits last year, social media juggernaut Facebook paid zilch when it came to federal and state taxes in 2012. In fact, the website will actually be getting a refund totaling $429 million thanks to a tax reduction for executive stock options. In the coming years, Facebook will continue to get monster tax breaks, totaling about $3 billion. 'The employees cash in stock options, and at that point there is tax deduction for the company,' Robert McIntyre, of watchdog group Citizens for Tax Justice, said. 'Because even though it doesn't cost Facebook a nickel, the government treats it as wages and they get a deduction for it.'" (That's not to say that Facebook employees' salaries didn't get taxed.)
An anonymous reader writes "Kim Dotcom knows how to stir up a storm on Twitter. On Saturday, he announced Bitcoin support for his cloud storage service and also sent out a slew of tweets suggesting Mega is going to become much more than just the successor to Megaupload."
First time accepted submitter trellz writes "My sister and brother-in-law are self employed, and run a small business with a storefront. It was broken into about a year ago, and since then they have reinforced physical security; bars on the doors and windows, better locks, etc. Unfortunately, their store was broken into and vandalized again last week, in spite of the added security measures. Being technically savvy, I'm trying to come up with inexpensive ways to add deterrence, monitoring, and alerting to their business. They run an extremely lean lifestyle and profit margin, so the solution needs to be almost free. They do have an internet connection at the store, so motion detection, web cameras, Arduino devices, and the like are certainly an option. Ideally I would like a rock-solid alerting method. Something like an email or text to a laptop at home, or a dedicated prepaid phone, but without the pitfalls of such a solution (i.e. random wrong numbers, solicitors, email spam, etc). I'd also prefer not to poke holes in their firewall at the shop if at all possible. I was considering an email with some sort of long code or hash in the body, and then could white list that on the receiving end to key off of. The goal is to never have a false alarm based on the transmission/reception method." What advice, beyond ZoneMinder?