szotz writes "You've got falling droplets of molten tin, bright lasers, and fancy evacuated optics. What's not to love about EUV light sources? The fact that we still don't have them in production lines producing chips. Light source maker ASML says it's 'more confident' that the technology's on track now, and that the machines should meet their target brightness by 2015, in time to help pattern the 10nm generation of chips — the next next generation. We'll see. Or then again maybe we won't. The light's outside the visible range."
Have you META-MODERATED today? Sign up for the Slashdot Daily Newsletter! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25.×
itwbennett writes "Brenda Koehler is a VMware-certified professional network engineer with a master's degree in information systems and 17 years of experience. You might think that would qualify her for a lead VMware/Windows administrator, but Indian outsourcing firm Infosys apparently didn't. And Koehler has filed a lawsuit against the company, alleging that Infosys ignored her qualifications and eventually hired a Bangladeshi worker to staff a position she was qualified for. Koehler and her lawyers are asking the U.S. District Court for the Eastern District of Wisconsin to allow a class-action lawsuit against Infosys, with 'thousands' of potential plaintiffs in the case, according to the lawsuit, filed Thursday."
Elliot Chang writes "IKEA's upcoming 2014 catalog will allow customers to preview products in their own homes using augmented reality via iOS and Android phones."
msm1267 writes "A serious attack against ciphertext secrets buried inside HTTPS responses has prompted an advisory from Homeland Security. The BREACH attack is an offshoot of CRIME, which was thought dead and buried after it was disclosed in September. Released at last week's Black Hat USA 2013, BREACH enables an attacker to read encrypted messages over the Web by injecting plaintext into an HTTPS request and measuring compression changes. Researchers Angelo Prado, Neal Harris and Yoel Gluck demonstrated the attack against Outlook Web Access (OWA) at Black Hat. Once the Web application was opened and the Breach attack was launched, within 30 seconds the attackers had extracted the secret. 'We are currently unaware of a practical solution to this problem,' said the CERT advisory, released one day after the Black Hat presentation."
schwit1 writes with word that Jeff Bezos decided to buy a news paper. Quoting the Washington Post: "The Washington Post Co. has agreed to sell its flagship newspaper to Amazon.com founder and chief executive Jeffrey P. Bezos, ending the Graham family's stewardship of one of America's leading news organizations after four generations. Bezos, whose entrepreneurship has made him one of the world's richest men, will pay $250 million in cash for The Post and affiliated publications to the Washington Post Co., which owns the newspaper and other businesses. Seattle-based Amazon will have no role in the purchase; Bezos himself will buy the news organization and become its sole owner when the sale is completed, probably within 60 days. The Post Co. will change to a new, still-undecided name and continue as a publicly traded company without The Post thereafter." The WaPo Labs team (including CmdrTaco) were not part of the deal, but from the sound of it they will remain part of The Post Co. and haven't been axed.
Nerval's Lobster writes "The U.S. Navy expects to save $20 million per year on its global logistics and transportation budget, thanks to technology that has been saving business travelers billions since 1996. The Navy is testing a system that consolidates information about freight and personnel travel schedules into a single database—the better to give individual decision-makers a choice of the quickest, cheapest options available using 'an Expedia-like' search capability, according to the Office of Naval Research, which developed the application. All that being said, the Transportation Exploitation Tool (TET) is a little more sophisticated than online-travel sites such as Expedia or Travelocity were in 1996: The system consolidates travel schedules and capacity reports for both military and civilian carriers to give logistics planners a choice of open spaces in ships, planes, trucks, trains or other means of travel, along with information about cost, estimated time of arrival and recommendations of the most efficient route. Previously, logistics planners trying to get an engine part to a Navy ship stranded in a foreign port, for example, might spend hours or days looking through separate databases to find a ship or plane able to carry the part that could deliver it within a limited window of time. 'This system is truly revolutionary,' Bob Smith, program manager at the Office of Naval Research (ONR), wrote in a statement announcing the system. 'TET uses advances in technology to provide outstanding optimization of available flights and ship routes, saving our logisticians enormous amounts of time—and that can literally mean saving lives.'"
An anonymous reader writes "The Curiosity rover celebrates one year on Mars today. 'The 1-ton robot has achieved a great deal in its 12 months on Mars, discovering an ancient streambed and gathering enough evidence for mission scientists to declare that the planet could have supported microbial life billions of years ago. And more big finds could be in the offing, as Curiosity is now trekking toward its ultimate science destination: the foothills of a huge and mysterious mountain that preserves, in its many layers, a history of Mars' changing environmental conditions.'"
Bismillah writes "CAPTCHA may be popular with webmasters and others running different sites, but it's a source of annoyance to blind and partially sighted people — and dyslexic people and older ones — who often end up being locked out of important websites as they can't read wonky, obfuscated letters any more than spambots can. A campaign in Australia has started to rid sites of CAPTCHA to improve accessibility for everyone."
sciencehabit writes "Lying in bed, unable to move a muscle, so-called locked-in patients have few ways to communicate with the outside world. But researchers have now found a way to use the widening and narrowing of the pupils to send a message, potentially helping these patients break the silence. The trick is a webcam-like setup that tracks pupil dilation. When people focus on a hard problem--say a math problem--their pupils dilate. Employing the approach, some locked-in patients could answer 'yes' and 'no' questions just by dilating their eyes."
First time accepted submitter smaxp writes "Google Ventures is blazing a new trail for venture investors, delivering advice and services to its portfolio companies with in-house teams of experts in the fields of design, marketing, recruiting and engineering. I had a fascinating discussion with Google Ventures design partner Jake Knapp about how he and his four design partners help Google Ventures portfolio companies design better products and better businesses."
fangmcgee writes "The end may not be nigh, but with vicious storms, severe flooding, and rising temperatures becoming the new normal, the apocalypse might be closer than we think. In the case of a cataclysmic event that could displace thousands, if not millions, of people, the availability of emergency shelter becomes a pressing concern. Here are 10 'wearable shelters' that serve as protective all-weather garments in the day and insulating dwellings at night."
cylonlover writes "Given that icebreakers clear a path for other ships by traveling through the ice head-on (or sometimes butt-on), then in order for one of them to clear a wider path, it would have to be wider and thus larger overall ... right? Well, Finland's Arctech Helsinki Shipyard is taking a different, more efficient approach. It's in the process of building an asymmetric-hulled icebreaker that can increase its frontal area, by making its way through the ice at an angle of up to 30 degrees."
Rambo Tribble writes "Reuters is reporting on a secret effort by the Drug Enforcement Agency to collect data from wiretaps, informants, and other sources. Considered most troubling is a systematic campaign to hide this program from the courts, denying defendants their right to know how evidence against them was obtained. This agenda targets U.S. citizens directly, as it is mainly focused on drug trafficking. From the article: 'Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges. The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's Constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence - information that could reveal entrapment, mistakes or biased witnesses.'"
Velcroman1 writes "The group was down to Earth — but not for long, they hope. These folks want to go to Mars. 'I want off the planet – I want humanity off the planet,' declared Leila Zucker, 45, also known as 'Dr. Leila,' because she is, in fact, a doctor who works nearby in the emergency room at Howard University Hospital. She has yearned to be an astronaut — and a doctor — since the age of 3, she told FoxNews.com. 'One dream fulfilled, one to go,' she said happily. Zucker joined not a million, but 100 or so 'aspiring Martians' from across the country, one with green hair and costume antennae, for a 'Million Martian Meeting' held Saturday in Washington, D.C., which was sponsored by the Facebook page of the same name. The group came together as applicants of the Mars One project, an ambitious 10-year plan for a one-way trip to colonize the Red Planet."
symbolset writes "Researchers using the Hubble Space Telescope have imaged some evidence that the merger of neutron stars is responsible for producing a short-duration gamma ray burst. On June 3rd the Swift gamma-ray burst (GRB) mission detected GRB 130603B, a burst lasting only one tenth of a second nearly 4 billion light-years away. Imaging with Hubble, they located a small red dot which, over the course of the following two weeks, dimmed."
mikejuk writes "An open source project to combat 'stylometry,' the study of attributing authorship to documents based only on the linguistic style they exhibit, is proving that it is possible to change writing style to evade detection. Artificial Intelligence techniques are routinely used to detect plagiarism and recently were employed to reveal that Harry Potter author J. K. Rowling is indeed the author of The Cuckoo's Calling, which was published under the byline of Robert Galbraith. Now software is tackling the opposite problem — anonymizing writing style to protect the identity of the originator. The JStylo-Anonymouth (JSAN) framework is a work in progress at the Privacy, Security and Automation Lab (PSAL) at Drexel University. It analyzes a written text and detects features which could be used to identify the author. It then suggests changes that need to be made to avoid the author's stylistic fingerprint appearing in the work."
A while ago you had a chance to ask Jimmy Wales about the amazing growth of Wikipedia, and his role advising the UK government in making academic research available online. Below you'll find his answers to your questions.
Hugh Pickens DOT Com writes "John Naughton writes in the Guardian that the insight that seems to have escaped most of the world's mainstream media regarding the revelations from Edward Snowden is how the US has been able to bend nine US internet companies to its demands for access to their users' data proving that no US-based internet company can be trusted to protect our privacy or data. 'The fact is that Google, Facebook, Yahoo, Amazon, Apple and Microsoft are all integral components of the US cyber-surveillance system,' writes Naughton. 'Nothing, but nothing, that is stored in their "cloud" services can be guaranteed to be safe from surveillance or from illicit downloading by employees of the consultancies employed by the NSA.' This spells the end of the internet as a truly global network. 'It was always a possibility that the system would eventually be Balkanised, ie divided into a number of geographical or jurisdiction-determined subnets as societies such as China, Russia, Iran and other Islamic states decided that they needed to control how their citizens communicated. Now, Balkanisation is a certainty.' Naughton adds that given what we now know about how the US has been abusing its privileged position in the global infrastructure, the idea that the western powers can be allowed to continue to control it has become untenable. 'Why would you pay someone else to hold your commercial or other secrets, if you suspect or know they are being shared against your wishes?' writes Neelie Kroes, vice-president of the European Commission. 'Front or back door – it doesn't matter – any smart person doesn't want the information shared at all. Customers will act rationally, and providers will miss out on a great opportunity.'"
An anonymous reader writes "Dinosaurs evolved the brain power for flight long before they took to the air, new evidence presented in the journal Nature suggests. Contrary to the cliche, a 'bird brain' describes a relatively enlarged brain with the capacity required for flight. However, based on high-resolution X-ray computed tomographic (CT) scans, researchers found that at least a few non-avian dinosaurs had brains as large or larger than Archaeopteryx, one of the earliest known birds, indicating that some dinosaurs already suspected of flight capability would have had the neurological tools to do so."
Sparrowvsrevolution writes "At the Def Con hacker conference Saturday, MIT students David Lawrence and Eric Van Albert released a piece of code that will allow anyone to create a 3D-printable software model of any Schlage Primus key, despite Schlage's attempts to prevent the duplication of the restricted keys. With just a flatbed scanner and their software tool, they were able to produce precise models of Primus keys that they uploaded to the 3D-printing services Shapeways and i.Materialise, who mailed them working copies of the keys in materials ranging from nylon to titanium. Primus high-security locks are used in government facilities, healthcare settings, and detention centers, and their keys are coded with two distinct sets of teeth, one on top and one on the side. That, along with a message that reads 'do not duplicate' printed on the top of every key, has made them difficult to copy by normal means. With Lawrence and Van Albert's software, anyone can now scan or take a long-distance photo of any Primus key and recreate it for as little as $5."
vikingpower writes "Today, at 14:00 Western European Time (9:00 am Eastern), Professor Mark Post of Maastricht University (the Netherlands) will present a world first: he will cook and serve a burger made from Cultured Beef in front of an invited audience in London. The event will include a brief explanation of the science behind the burger. You can watch the event live, online. The project's fact sheet is to be found here (pdf)." The BBC is reporting that Sergey Brin is the mystery backer behind the project.
schwit1 writes "The National Security Agency's dominant role as the nation's spy warehouse has spurred frequent tensions and turf fights with other federal intelligence agencies that want to use its surveillance tools for their own investigations, officials say. Agencies working to curb drug trafficking, cyberattacks, money laundering, counterfeiting and even copyright infringement complain that their attempts to exploit the security agency's vast resources have often been turned down because their own investigations are not considered a high enough priority, current and former government officials say. Intelligence officials say they have been careful to limit the use ... for fear they could be misused in ways that violate Americans' privacy rights."
An anonymous reader writes "The Old Reader, a popular RSS service and alternative to Google Reader, last week revealed it would be closing its service to the public in two weeks. Soon after the backlash, there was hint of a stance reversal, and now it's happened: The Old Reader will remain open to the public, thanks to a bigger team and 'significantly more' resources, both provided by a new corporate entity located in the US. While details about this 'corporate entity' are indeed scarce, we do know the announcement was authored by an individual named Ben Wolf. He promises his team consists of 'big fans and users' of The Old Reader who want to help it 'grow and improve for years to come' and who will be introduced properly in the coming weeks."
An anonymous reader writes "YouTube has added a new play icon to its video pages that only appears when content is playing. The icon disappears when you hit pause, allowing you to quickly see which tabs are making noise. The new feature is a very minor tweak that will be very useful for YouTube users. Because the service auto-plays content when you open a video, if you have multiple YouTube tabs it is often tedious to figure out which ones need to be paused or closed."