skade88 writes "LG has released an ultra wide monitor. It really is wide (WxHxD: 699.7 X 387 X 208.5 mm) — take a look at the thing! It looks like it would be good for movies shot in larger aspect ratios such as 2.20 for 70mm film or 2.39 for modern cinemascope films. But OS GUI designs need to catch up to the ever horizontally expanding waistline of our monitors."
Sign up for the Slashdot Daily Newsletter! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. ×
An anonymous reader writes "Contiki, the open source operating system for the Internet of Things, just got a regression test framework ported over from Thingsquare Mist that allows the Contiki developers to test the entire system on 9 platforms, 4 CPU architectures, and 1021 network nodes, for every new commit."
eldavojohn writes "Dr. Charles 'Chip' Groat, lead author of a study claiming there was no link between fracking and water contamination, has resigned at the University of Texas along with Dr. Raymond Orbach, the head of UT's Energy Institute. The reason is that Groat served on the board of a drilling company and received compensation totaling over $1.5 million from that entity over the last five years including time he spent writing the study. After the Public Accountability Initiative gave the UT report a thorough beating for failing to mention this it sparked UT to recommend the report's withdrawal. PAI said the original report was 'based on literature surveys, incident reports and conjecture' and criticized UT's press from downplaying the many caveats. PAI also said conclusions of the original report were 'tentative,' that the press coverage was 'inappropriately selective' and 'seemed to suggest that public concerns were without scientific basis and largely resulted from media bias.' This study was also covered by Slashdot via MSNBC quoting Groat and calling fracking safe in theory but not in practice."
MojoKid writes "Intel has been promising it for months, and now the company has officially announced the Intel Atom S1200 SoC. The ultra low power chip is designed for the datacenter and provides a high-density solution designed to lower TCO and improve scalability. The 64-bit, dual-core (four total threads with Hyper-Threading technology) Atom S1200 underpins the third generation of Intel's commercial microservers and feature a mere 6W TDP that allows a density of over 1,000 nodes per rack. The chip also includes ECC and supports Intel Virtualization technology. Intel saw a need for a processor that can handle many simultaneous lightweight workloads, such as dedicated web hosting for sites that individually have minimal requirements, basic L2 switching, and low-end storage needs. Intel did not divulge pricing, but regardless, this device will provide direct competition for AMD's SeaMicro server platform." Amazing that it supports ECC since Intel seems committed to making you pay through the nose for stuff like that.
Picking up work abandoned around Postgres 8.2, a patch recently hit the PostgreSQL 9.3 branch that adds SQL-92 automatically updatable views. For many common cases, you will no longer have to write hairy triggers to fake UPDATE support (e.g. if you have a view that hides a few internal columns). Limitations currently include only supporting views with at most one table in the FROM clause. This complements the under-advertised INSTEAD OF trigger support added in 9.1.
chicksdaddy writes with news of a remote exploit in Samsung Smart TVs, and a warning for those who got one with a built-in camera. From the article: "The company that made headlines in October for publicizing zero day holes in SCADA products now says it has uncovered a remotely exploitable security hole in Samsung Smart TVs. If left unpatched, the vulnerability could allow hackers to make off with owners' social media credentials and even to spy on those watching the TV using built-in video cameras and microphones. In an e-mail exchange with Security Ledger, the Malta-based firm said that the previously unknown ('zero day') hole affects Samsung Smart TVs running the latest version of the company's Linux-based firmware. It could give an attacker the ability to access any file available on the remote device, as well as external devices (such as USB drives) connected to the TV. And, in a Orwellian twist, the hole could be used to access cameras and microphones attached to the Smart TVs, giving remote attacker the ability to spy on those viewing a compromised set."
gbrumfiel writes "For years, physicists have been on the hunt for a material so weird, it might as well be what unicorn horns are made of. Topological insulators are special types of material that conduct electricity, but only on their outermost surface. If they exist, and that's a real IF, then they would play host to all sorts of bizarre phenomenon: virtual particles that are their own anti-particles, strange quantum effects, dogs and cats living together, that sort of thing. Now three independent teams think they've finally found the stuff that the dreams of theoretical physicists are made of: samarium hexaboride."
sfcrazy writes with news that Linus pulled a patch by Ingo Molnar to remove support for the 386 from the kernel. From Ingo's commit log: "Unfortunately there's a nostalgic cost: your old original 386 DX33 system from early 1991 won't be able to boot modern Linux kernels anymore. Sniff." Linus adds: "I'm not sentimental. Good riddance."
dstates writes "Retraction Watch reports that fake reviewer information was placed in Elsevier's peer review database allowing unethical authors to review their own or colleagues manuscripts. As a result, 11 scientific publications have been retracted. The hack is particularly embarrassing for Elsevier because the commercial publisher has been arguing that the quality of its review process justifies its restrictive access policies and high costs of the journals it publishes."
Hugh Pickens writes writes "A suspected terrorist has been taped planning a deadly attack and the police want to use this evidence in court, or someone has been captured on CCTV threatening an assault. Increasingly, recordings like these are playing a role in criminal investigations, but how can the police be sure that the audio evidence is genuine and has not been cleverly edited? Now Rebecca Morelle writes on BBC that a technique known as Electric Network Frequency (ENF) analysis is helping forensic scientists separate genuine, unedited recordings from those that have been tampered with and the technique has already been used in court. Any digital recording made near an electrical power source will pick up noise from the grid that will be embedded throughout the audio. This buzz is an annoyance for sound engineers trying to make the highest quality recordings, but for forensic experts, it has turned out to be an invaluable tool in the fight against crime. Due to unbalances in production and consumption of electrical energy, the ENF is known to fluctuate slightly over time rather than being stuck to its exact set point so if you look at the frequency over time, you can see minute fluctuations and the pattern of these random changes in frequency is unique over time providing a digital watermark on every recording. Forensic Scientist Philip Harrison has been logging the hum on the national grid in the UK for several years. 'Even if [the hum] is picked up at a very low level that you cannot hear, we can extract this information,' says Dr. Harrison. 'If we have we can extract [the hum] and compare it with the database, if it is a continuous recording, it will all match up nicely.'"
An anonymous reader writes "Darren Nix works for 42Floors, a business that uses its website to help people find office space. He recently received a marketing email for a service that offered to identify visitors to his website. After squeezing some information out of the marketer and playing around with a demo account, he now explains exactly how sketchy companies track your presence across multiple websites. The marketer offered to provide Nix with 'tracking code that would sit in your web site' which would 'grab a few key pieces of data from each visitor.' This includes IP addresses and search engine data. The marketer's company would then automatically analyze the data to try to identify the user and send back whatever personal information they've collected on that user from different websites. Thus, it's entirely possible for a site to know your name, email address, and company on your very first visit, and without any interaction on your part. Nix writes, 'A real-world analogue would be this scenario: You drive to Home Depot and walk in. Closed-circuit cameras match your face against a database of every shopper that has used a credit card at Walmart or Target and identifies you by name, address, and phone. If you happen to walk out the front door without buying anything your phone buzzes with a text message from Home Depot offering you a 10% discount good for the next hour. Farfetched? I don't think so. ... All the necessary pieces already exist, they just haven't been combined yet.'"
An anonymous reader writes "Sources tell All Things D that Apple and Microsoft are at loggerheads over the cut Apple is expected to take of Office 365 subscriptions sold through Microsoft Office for iOS, which is expected to launch sometime next year. An update to Microsoft's SkyDrive app has been rejected after the company was 'pushing Apple to adjust the 70/30 revenue split in its developer license agreement. Predictably, Apple has refused to comply. It’s not yet clear what sort of concession Microsoft is seeking, but whatever it is, Apple’s evidently not willing to consider it.'"
TCPALaw writes "ccAdvertising, a company purported to have 'a long, long, long history of pumping spam out of every telecommunications orifice, and even boasting of voter suppression' has asked the FCC to declare spam filters illegal. Citing Free Speech rights, the company claims wireless carriers should be prohibited from employing spam filters that might block ccAdvertising's political spam. Without stating it explicitly, the filing implies that network neutrality must apply to spam, so the FCC must therefore prohibit spam filters (unless political spam is whitelisted). In an earlier filing, the company suggests it is proper that recipients 'bear some cost' of unsolicited political speech sent to their cell phones. The public can file comments with the FCC on ccAdvertising's filing online."
pigrabbitbear writes "Farming, logging, and strip mining has long altered much of the Amazon rainforest, with slash-and-burn land-clearing techniques turning large portions of the forest into patchworks of pastures, second-growth forest, and degraded land. Now, rural people are increasingly moving to booming Amazonian cities; paradoxically, the land they're leaving behind is being ravaged by wildfires. A new paper published in PNAS shows that in the Peruvian Amazon, land use changes and depopulation have let large wildfires fly through converted land. It puts a damper on those optimistic that the urbanization of the Amazon may allow parts of the forest to recover, by centralizing populated areas and leaving old converted land to be slowly gobbled up by the encroaching forest."