nbauman writes "WW2 veteran 'Big Hy' Strachman, 92, pirated 300,000 DVD movies and sent them to soldiers in Afghanistan and Iraq, where they were widely distributed and deeply appreciated. Soldiers would gather around personal computers for movie nights, with mortars blasting in the background. 'It's reconnecting to everything you miss,' said one. Strachman received American flags, appreciative letters, and snapshots of soldiers holding up their DVDs. He spent about $30,000 of his own money. Strachman retired from his family's window and shade business in Manhattan in the 1990s. After his wife Harriet died in 2003, he spent sleepless nights on the Internet, and saw that soldiers were consistently asking for movie DVDs. He bought bootlegged disks for $5 in Penn Station, and then found a dealer at his local barbershop. He bought a $400 duplicater that made 7 copies at once, and mailed them 84 at a time, to Army Chaplains. The MPAA said they weren't aware of his operation. The studios send reel-to-reel films to the troops."
Sign up for the Slashdot Daily Newsletter! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Help SAVE NET NEUTRALITY! ×
Ogi_UnixNut writes "The Skylon spaceplane is an ambitious project to develop a single-stage-to-orbit craft that can take off and land like a normal airplane. Part of this project requires an engine that can work both as a rocket engine and a normal air-breathing engine (a hybrid approach, essentially). This would reduce the amount of oxidizer required to send stuff into space, and thus greatly reduce the cost. Now, some key experimental parts of the engine have been built, and are to be tested in public at the Farnborough Air Show in the UK in July. The BBC has video of the cooling system being tested."
MrSeb writes "According to reports from various industry sources, the Chinese government has begun the process of picking a national computer chip instruction set architecture (ISA). This ISA would have to be used for any projects backed with government money — which, in a communist country such as China, is a fairly long list of public and private enterprises and institutions, including China Mobile, the largest wireless carrier in the world. The primary reason for this move is to lessen China's reliance on western intellectual property. There are at least five existing ISAs on the table for consideration — MIPS, Alpha, ARM, Power, and the homegrown UPU — but the Chinese leadership has also mooted the idea of defining an entirely new architecture. What if China goes the DIY route and makes its own ISA or microarchitecture with silicon-level censorship and monitoring, or an always-open backdoor for the Chinese intelligence agencies?"
suraj.sun writes "Microsoft quietly fixed a flaw in Hotmail's password reset system that allowed anyone to reset the password of any Hotmail account last Friday. The company was notified of the flaw by researchers at Vulnerability Lab on April 20th and responded with a fix within hours — but not until after widespread attacks, with the bug apparently spreading 'like wild fire' in the hacking community. Hotmail's password reset system uses a token system to ensure that only the account holder can reset their password — a link with the token is sent to an account linked to the Hotmail account — and clicking the link lets the account owner reset their password. However, the validation of these tokens isn't handled properly by Hotmail, allowing attackers to reset passwords of any account. Initially hackers were offering to crack accounts for $20 a throw. However, the technique became publicly known and started to spread rapidly with Web and YouTube tutorials showing the technique popping up across the Arabic-speaking Internet."
judgecorp writes "The UK government's consultation about the use of open source in public sector IT has been sent back to square one, with discussion results scrapped because the facilitator, Andy Hopkirk, is involved with Microsoft. Hopkirk is well regarded, but the open source community feels the debate dismissed RF (royalty free) standards in favor of the FRAND definition, which is more favorable to proprietary vendors."
Freshly Exhumed writes "A new University of British Columbia study finds that analytic thinking can decrease religious belief, even in devout believers. The study, which will appear in tomorrow's issue of Science (abstract), finds that thinking analytically increases disbelief among believers and skeptics alike, shedding important new light on the psychology of religious belief."
angry tapir writes "Australian researchers are getting ready to test a bionic eye on patients in 2013. The eye consists of 98 electrodes that stimulate nerve cells in the retina, which is a tissue lining the back of the eye that converts light into electrical impulses necessary for sight, and allow users to better differentiate between light and dark. With the bionic eye, images taken by a camera are processed in an external unit, such as a smartphone, then relayed to the implant's chip. This stimulates the retina by sending electric signals along the optic nerve into the brain where they are decoded as vision."
techfun89 writes "There is a BOLD new plan for detecting signs of microbial life on Mars. The nickname is BOLD, which stands for Biological Oxidant and Life Detection Initiative, would be a follow-up to the 1976 Mars Viking life-detection experiments. 'We have much better technology that we could use,' says BOLD lead scientist Dirk Schulze-Makuch, with Washington State University. He elaborates, 'Our idea is to make a relatively cheap mission and go more directly to characterize and solve the big question about the soil properties on Mars and life detection.' To help figure out the life-detection mystery, Schulze-Makuch and his colleagues would fly a set of six pyramid-shaped probes that would crash land, pointy end down, so they embed themselves four to eight inches into the soil. One of the instruments includes a sensor that can detect a single molecule of DNA or other nucleotide."
Hugh Pickens writes "Jacob Heilbrunn reports in The Atlantic that Germany is taking a new step toward what is often called 'normalization' as the state of Bavaria has announced that in 2015 it will publish Hitler's Mein Kampf, banned in Germany since World War II. In announcing the publication of the book, Bavarian finance minister Markus Soeder says that he wants to contribute to the 'demystification' of it. In 2015, the Bavarian state's copyright to the book will expire and the idea is to publish a scholarly version that will help stem its appeal for commercial publishers. The book is not banned by law in Germany, but Bavaria has used ownership of the copyright to prevent publication of German editions since 1945. Copyright restrictions stop at the end of 2015, 70 years after Hitler's death. By publishing in 2015 before the expiry of the copyright, Bavaria hopes to make future German editions as 'commercially unattractive' as possible. 'We want to make clear what nonsense is in there,' says Soeder and to show 'what a worldwide catastrophe this dangerous body of thought led to.'"
judgecorp writes "Although ISPs protests failed to stop Britain's Digital Economy Act — which applies measures against illegal file sharing — they have succeeded in delaying it till 2014. As a result of the appeal a new impact assessment has to be carried out secondary legislation needs to be approved."
benfrog writes "According to a blog posting on the New York Times site, Microsoft tried to sell the perpetual money-losing Bing to Facebook 'over a year ago' (the article cites 'several people with knowledge of the discussions who didn't want to be identified talking about internal deliberations'). Steve Ballmer, apparently, was not involved or consulted. Facebook politely declined. Neither Microsoft or Facebook would comment on the rumors."
MrSeb writes "When we think of computer networks, we think of routers and servers and fiber optic cables and laptops and smartphones — we think of the internet. In actuality, though, the visible internet is just the tip of the iceberg. There are secret military networks, and ad hoc wireless networks, and utility companies have sprawling, cellular networks that track everything from the health of oil pipelines and uranium enrichment machines through to the remaining capacity of septic tanks — and much, much more. What if we connected all of these networks to the internet, to form an internet of things? What if we then put a massive computer at the middle of this internet of things and used this wealth of data to power smart cars, smart homes, smart supermarkets, and smart cities? Unsurprisingly, IBM and Cisco are already working on such smart cities. For nearly two years, Rio de Janeiro's utilities, traffic systems, and emergency services has been managed by a single 'Ops Center,' a huge hub of technologies provided by both IBM and Cisco. With 300 LCD screens spread across 100 rooms, connected via 30,000 meters of fiber optic cable, Ops Center staff monitor live video from 450 cameras and three helicopters, and track the location of 10,000 buses and ambulances via GPS. Other screens output the current weather, and simulations of tomorrow's weather up to 150 miles from the city — and yet more screens display heatmaps of disease outbreaks, and the probability of natural disasters like landslides. There's even a Crisis Room, which links the Ops Center to Rio's mayor and Civil Defense departments via a Cisco telepresence suite. This sounds awesome — but is it really a good idea to give a computer company (IBM is not an urban planner!) so much control over one of the world's biggest cities?"
First time accepted submitter a90Tj2P7 writes "Apple is building a 21,468 square foot private restaurant in Cupertino so employees can talk shop over lunch without being overheard. Apple's director of real estate facilities, Dan Wisenhunt, stated that: 'We like to provide a level of security so that people and employees can feel comfortable talking about their business, their research and whatever project they're engineering without fear of competition sort of overhearing their conversations.'"
gbrumfiel writes "The battle over whether to publish research into mutant bird flu got editors over at Nature News thinking about other potentially dangerous lines of scientific inquiry. They came up with a non-definitive list of four technologies with the potential to do great good or great harm: Laser isotope enrichment: great for making medical isotopes or nuclear weapons. Brain scanning: can help locked-in patients to communicate or a police state to read minds. Geoengineering: could lessen the effects of climate change or undermine the political will to fight it. Genetic screening of embryos: could spot genetic disorders in the womb or lead to a brave new world of baby selection. What would Slashdotters add to the list?"
wiedzmin writes "The House approved Cyber Intelligence Sharing and Protection Act with a 248 to 168 vote today. CISPA allows internet service providers to share Internet 'threat' information with government agencies, including DHS and NSA, without having to protect any personally identifying data of its customers, without a court order. It effectively immunizes ISPs from privacy lawsuits for disclosing customer information, grants them anti-trust protection on colluding on cybersecurity issues and allows them to bypass privacy laws when sharing data with each other."