theodp writes "On September 13, 2010, President Obama called A123 Systems from the Oval Office to congratulate them on opening the nation's first manufacturing facility to mass-produce electric vehicle batteries, which the White House noted was made possible by a $249 million Recovery Act grant the company received the prior August. 'When folks lift up their hoods on the cars of the future,' the President said, 'I want them to see engines and batteries that are stamped: Made in America. And that's what you guys are helping to make happen.' But on Saturday, the assets of A123 Systems were auctioned off to the Wanxiang Group, a large Chinese auto parts maker. Wanxiang agreed to pay $256 million for A123's automotive and commercial operations, including its three factories in the United States. Forbes reports that A123's stock, which closed at 7 cents a share on Friday, is now worthless."
#NetNeutrality is STILL in danger - Click here to help. DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Check out the new SourceForge HTML5 Internet speed test. ×
An anonymous reader writes "After more than a decade of research, and a proof of concept in 2010, IBM Research has finally cracked silicon nanophotonics (or CMOS-integrated nanophotonics, CINP, to give its full name). IBM has become the first company to integrate electrical and optical components on the same chip, using a standard 90nm semiconductor process. These integrated, monolithic chips will allow for cheap chip-to-chip and computer-to-computer interconnects that are thousands of times faster than current state-of-the-art copper and optical networks. Where current interconnects are generally measured in gigabits per second, IBM's new chip is already capable of shuttling data around at terabits per second, and should scale to peta- and exabit speeds."
ShipLives writes "Researchers have tested Google's app verification service (included in Android 4.2 last month), and found that it performed very poorly at identifying malware in apps. Specifically, the app verification service identified only ~15% of known malware in testing — whereas existing third-party security apps identified between 51% and 100% of known malware in testing."
SternisheFan writes "As Syria's rebels work to overthrow the tank-equipped Assad regime, they've learned that it helps to have tanks of their own. They deserve bonus points for integrating video game technology. This is no exaggeration. Have a look at the opposition forces' "100 percent made in Syria" armored vehicle, the Sham II. Named for ancient Syria and assembled out of spare parts over the course of a month, the Sham II is sort of rough around the edges, but it's got impressive guts. It rides on the chassis of an old diesel car and is fully encased in light steel that's rusted from the elements. Five cameras are mounted around the tank's outside, and there's a machine gun mounted on a turning turret. Inside, it kind of looks like a man cave. A couple of flat screen TVs are mounted on opposite walls. The driver sits in front of one, controlling the vehicle with a steering wheel, and the gunner sits at the other, aiming the machine gun with a Playstation controller."
An anonymous reader writes "A new study looks at the behavior of birds and found the hatching order of birds influences how they behave in adulthood. The study was conducted by Dr. Ian Hartley and Dr. Mark Mainwaring (LEC), researchers at the University of Lancaster Environment Center. The researchers noticed that the youngest members of the zebra finch broods were more adventurous than their older siblings in later life."
judgecorp writes "Russia, China and other nations have withdrawn proposals to take control over the Internet within their borders. The proposals, handed to the World Conference on International Telecommunications (WCIT) on Friday, caused widespread dismay and protest. The WCIT event in Dubai, run by the UN agency ITU, is working on new International Telecommunications Regulations (ITRs) which are due for their first revision since the emergence of the mass Internet. The line-up of nations wanting to formalize their power to restrict the Internet included Russia, China, UAE, Saudi Arabia, Algeria, Sudan and Egypt. Their proposal has been withdrawn without explanation, an ITU spokesperson confirmed."
First time accepted submitter iggymanz writes "More precise modeling has changed some long term climate predictions: sea levels to rise almost a meter more than present over the next century, but past dire warnings of stronger storms or more frequent droughts won't pan out. Instead there will be less strong storms, but peak winds in the tropics might be slightly higher. Temperature rise of global average will be about 3 degree C total, including the 1 degree C rise over the 20th century. In places where precipitation is frequent, it will become even more frequent; in arid areas, the tendency will be to become even drier. Some new arid areas are expected to appear in the south of N. America, South Africa and Mediterranean countries. Overall, hardly a doomsday scenario."
First time accepted submitter jsherring writes "Police in Victoria, Australia warn that Apple's glitch-filled Maps app could get someone killed, after motorists looking for the Victorian city of Mildura were instead guided to a wilderness area. Relying on Apple Maps to navigate through rural Australia seems rather foolish but it has become common practice to rely on GPS navigation. Besides reverting to google maps, perhaps Apple should provide strong warnings to use other navigation sources if navigating to remote locations."
Press2ToContinue writes "Scientists have found a relatively straightforward way to persuade the cells discarded in human urine to turn into valuable neurons. The technique, described online in a study in Nature Methods this week (abstract), does not involve embryonic stem cells. These come with serious drawbacks when transplanted, such as the risk of developing tumors. Instead, the method uses ordinary cells present in urine, and transforms them into neural progenitor cells — the precursors of brain cells. Researchers routinely reprogram cultured skin and blood cells into induced pluripotent stem cells, which can go on to form any cell in the body. But urine is a much more accessible source."
TrueSatan writes "Pirate bay founder Gottfrid Svartholm is set to be released from solitary confinement but is still to serve the remainder of a one-year sentence relating to Pirate Bay activities. Five months remain of that sentence and they are to be served in a normal prison with far fewer restrictions on his confinement — assuming no new charges are brought against him. He had been accused of involvement in the hacking of Swedish IT firm Logica, but no charges have been substantiated in that case. He was later implicated in a second case but, once more, no charges have been substantiated against him."
mask.of.sanity writes "Researchers have developed attacks capable of crippling Global Positioning System infrastructure critical to the navigation of a host of military and civilian technologies including planes, ships and unamed drones. The novel remote attacks can be made against consumer and professional-grade receivers using $2500 worth of custom-built equipment. Researchers from Carnegie Mellon University and Coherent Navigation detailed the attacks in a paper. (pdf)"
paysonwelch writes "John McAfee, famed antivirus software pioneer and human rights advocate, today announced that he will host a news conference to ask the world for its protection against the Government of Belize. On his official blog, whoismcafee.com, Mr. McAfee has accused the Belize government of widespread corruption. Because of this, Mr. McAfee feels that he will be in grave danger if he were to be returned to there."
angry tapir writes "Security researchers have identified a botnet controlled by its creators over the Tor anonymity network. It's likely that other botnet operators will adopt this approach, according to the team from vulnerability assessment and penetration testing firm Rapid7. The botnet is called Skynet and can be used to launch DDoS (distributed denial-of-service) attacks, generate Bitcoins — a type of virtual currency — using the processing power of graphics cards installed in infected computers, download and execute arbitrary files or steal login credentials for websites, including online banking ones. However, what really makes this botnet stand out is that its command and control (C&C) servers are only accessible from within the Tor anonymity network using the Tor Hidden Service protocol."
Hugh Pickens writes "Defense Tech reports that several F-16 engines weighing 3,700 pounds each have been stolen from a base in a central part of the country. Israeli officials played down the loss, saying the engines were old or retired and likely stolen for scrap. U.S. security and aviation experts contacted were not so dismissive of the missing engines and said that some countries would see value in having them and taking them apart. 'They're still more modern than anything in the Iranian air force inventory, and they would even be helpful to China in their jet engine development,' says Richard Aboulafia, noting that modern technology engine design remains 'a black art' and that competitors would love the opportunity to study them. This is not the first time jet engines have gone missing. In June 2011, Israel reported the loss of eight F-15 and F-16 fighter engines from a base at Tel Nof near Jerusalem when investigators found the engines had been taken away on large trucks, prompting speculation that the thieves had help from inside the base. In 2009, two F-5 engines were stolen from an airbase in Malaysia, tracked to Argentina and ultimately located in Uruguay."
spacenet writes "As a response to RMS speaking out against Ubuntu about its privacy-violating integrated Amazon search results, which he considers to be spyware, Ubuntu Community Manager Jono Bacon has addressed RMS's statements. In his reply, Jono claims that Stallman's views on privacy do not align with Canonical's, that some of his statements are worded in order to 'generate fear, uncertainty, and doubt about Ubuntu' and that 'it just seems a bit childish to me.' The comments on the post itself are well worth a read."