Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Graphics

Submission + - AMD Drives Cost Out of Pro Graphics Cards (hothardware.com) 2

MojoKid writes: "Workstation "pro" graphics cards are validated versions of standard desktop graphics cards but with specialized drivers for compatibility with the latest 3D rendering and CAD tools on the market. Typically these cards sell for a massive premium over their desktop counterparts but with very little, if any, difference in hardware. AMD has bolstered their ATI lineup with five different FirePro models recently at various price points and performance levels. In addition to the top of the line V8800, the new lineup consists of the high-end V7800, the mid-range V5800, an entry-level V4800, and the almost ridiculously affordable V3800. This detailed review covers performance and features of three of the more affordable cards in the FirePro lineup. It's safe to say that AMD is driving cost out of pro graphics finally and in some cases, prices have actually hit parity with standard desktop models."
The Internet

Submission + - New Northern Arizona Univ. Internet policy 2

An anonymous reader writes: I'm a student at NAU, and just today I told to use a software called SafeConnect that will monitor my computer for violations to the terms of Use (which follows)
"Internet Use Policy

All computers attached to the Campus Network must have appropriate software running on their machine to ensure a secure environment for all users. Campus Network will provide the monitoring software to ensure compliance with this policy. The software will assist students in maintaining their computer's in the manner prescribed by Campus Network . Software needed to ensure a secure environment will include:

                * Campus Network approved anti-virus software
                * The most current security patch software for your operating system(s).
                * Monitoring software to ensure that copyrighted files are not freely shared over the internet.
                *Other software as periodically deemed appropriate by Campus Network to ensure a safe and secure Internet and Intranet for all students and faculty.

In addition, bandwidth consumption is monitored to prevent inappropriate use of university resources (for example, setting up a public web site from a dormitory room). Students are asked not to exceed 1 GB of bandwidth use per week. No enforcement will occur at present, however we will be monitoring use and taking more affirmative action if there is wide violation of this policy.

The use of the Campus Internet Service is a privilege that may be revoked at any time for inappropriate behavior. Such behavior would include but not be limited to the use of obscene, abusive, or otherwise objectionable language and/or materials in either public or private messages.

The primary purpose of the Campus Network is to support students' educational goals. In support of these goals, the following activities are prohibited with express written consent of Campus Network . Participating in these activities may result in revocation of Campus Network without refund and possible University judicial action and/or criminal charges.

        * Setting up a router and building a private subnet.
        *Setting up any type of information server such as a web, gopher, e-mail, game, etc.
        *Propagating e-mail chain letters.
        *Forging mail.
        *Allowing unauthorized persons access to Campus Network .
        *Using Campus Network for personal financial gain.
        *Copying University-owned or licensed information to another computer without prior written approval.
        *Copyrighted files and software cannot be shared over the Campus Network .
        *Modifying or attempting to modify University-owned or licensed information including software and data.
        *Attempting to damage or disrupt networking services.
        *Using the Campus Network , the University'(TM)s campus-wide network, or related resources in the commission of a crime.
        *Using traffic intensive applications that may cause problems within the network or diluting the level of service to other users. No print servers, mail servers, FTP servers, etc. are allowed. The network sharing of any computer-related device or materials that may cause excessive network traffic is forbidden.

The user is not allowed to share her/his RJ45 Ethernet port with more than one computer/device at the same time. This prohibition includes any use of hubs and/or switches which would permit the user to connect more than one computer/device to the RJ45 Ethernet port and share the port with others or herself/himself.

The user will abide by all policies and statues included in the Computer Crimes Act. Crimes against this Act will result in University judicial action and/or investigation by the University Police Department for criminal offense. The Act includes offenses against intellectual property; offenses against computer equipment and supplies; and offenses against computer access. The Computer Crimes Act is available at each area office."

Want I wonder is this legal, and is there any way to fight this new policy, i understand some of it but what I don't like is this gives them access to all my private messages and accounts
Medicine

Submission + - Xprize Wants AI Physician On Every Smartphone (singularityhub.com)

kkleiner writes: One of the exciting ideas being tossed around recently at the Xprize Foundation is the creation of an Artificial Intelligence physician that you could access from your smartphone. Want to know if that rash on your leg is poison ivy or smallpox? Take a photo of it with your phone and ask the AI! The possibilities are enormous. Especially for the billion plus people around the world who live more than a few hours walk or drive from the nearest doctor, the AI physician would represent a revolution in health care.

Submission + - Analysis by Joe Fleming on RI Governor Debate (wpri.com)

wpri writes: In part two of the gubernatorial debate, moderator Tim White asks the candidates for Rhode Island Governor the tough questions on a slew of topics including gay marriage, immigration bill, the healthcare reform act, full-scale casinos in the Ocean State and much more.
Security

Submission + - World's 101 hottest women clickjack Facebook users (sophos.com)

An anonymous reader writes: Facebook's users are being hit by another clickjacking worm that is spreading rapidly across the social network.

Messages are appearing on users' newsfeeds claiming that they like a webpage called

:|:| 101 Hottest Women in the World :D :|:|

Security researchers are reporting that clicking on the link takes user to a page which contains an image of X-Men actress Jessica Alba with the message "Click here to continue". However, the page has silently opened an invisible iFrame which means that wherever you click on the page you will be unknowingly clicking on a Facebook "Like" button.

Sophos claims that this is the latest in a series of widespread clickjacking attacks on Facebook, and provides information on how users can clean-up their accounts.

Communications

Submission + - Why video calling is a wasted feature in the UK

An anonymous reader writes: Technology affects the way we live but sociocultural influences also dictate what technology we absorb into our day to day lives. Take video calling on the iPhone 4 for example: it was pitched as an impressive feature but will people adopt it? According to one british writer, the UK is unlikely to start making lots of video calls because it's awkward and, well, not very British. "It's not the way we look when we say them, but the way we say them in order to inject the most bile into a negative statement. Or, on our more enthusiastic days, finding the most wryly witty way to say something while indicating that you couldn’t really care less about it. This is the reason we’ve taken so well to Twitter and are better at watching than creating YouTube videos, to put it in sweepingly generic Internet terms."
Social Networks

Submission + - Researchers create Social Engineering IRC Bot (irc-junkie.org)

An anonymous reader writes: Researchers of the Vienna University of Technology developed an IRC bot that acts as a "Man in the middle" between two unsuspecting users, modifies URLs passed between them and also is capable of steering the direction the conversation goes. Not only this works surprisingly well on IRC — 76,1% click rate at maximum — also 4 out of 10 persons clicked on links on Facebook Chat after complete strangers befriended them. This would have worked even better if the bot were to clone existing friends profiles and submitting friend requests from those, say researchers.
Networking

Submission + - iPhone 4 May Have Wi-Fi Driver Fault (arstechnica.com) 1

eggboard writes: After examining the WWDC video and talking to two veteran Wi-Fi experts, it seems likely that the iPhone 4 has a Wi-Fi driver flaw that was part of the trouble in making a network connection during Steve Job's WWDC keynote. The other problem was the massive congestion caused by so many independent access points. (Congestion may have triggered the iPhone 4's troubles, too.) With mobile hotspots proliferating on phones and in portable devices like the MiFi, we're going to see more trouble in the future.
Science

Submission + - How To Destroy A Black Hole (technologyreview.com) 1

KentuckyFC writes: The critical concept that makes a Black Hole black is the event horizon: a theoretical boundary in space through which light and other objects can pass in one direction but not the other. Since light cannot escape the event horizon, it must be black. The event horizon is a nuisance to astrophysicists because it hides the interesting new physics that must go on inside a black hole. What they would like is a way to get rid of the event horizon so that they can see what goes on behind it. It turns out that just such a thing may be possible, say physicists. According to the mathematics of general relativity, the event horizon should disappear if a black hole were fed enough charge and angular momentum relative to its mass. However the calculations are so fiendish that nobody knows whether the black hole would shed this extra angular momentum and charge before it could settle into a stable 'naked' state. However, the possibility that the event horizon could be destroyed raises the question of what astrophysicists would see behind this veil. According to some, black holes are regions of spacetime with infinite curvature called singularities. Many believe that 'naked' singularites cannot exist in nature. And yet there are enough questions marks to suggest that this mystery is far from settled.
Iphone

Submission + - O2 says 'heavy' mobile users download 65GB a month (pcpro.co.uk)

Barence writes: British phone network O2 has sparked controversy by scrapping unlimited data tariffs on the iPhone 4 and other smartphones. In a blog post defending the new policy, O2's CEO claimed 0.1% of the network's users were consuming almost a third of the traffic. By PC Pro's calculations, that means those 26,000 heavy users are consuming an average of 65GB per month over a 3G connection. "Instead of punishing the few to protect the many, O2 has done the exact opposite: it’s put a 500MB cap on previously “unlimited” accounts to ward off the data hogs," PC Pro claims.
Encryption

Submission + - The Beginnings of Encrypted Computing on the Cloud (technologyreview.com)

eldavojohn writes: A method of computing from a 2009 paper allows computing data without ever decrypting it. With cloud computing on the rise, this may be the holy grail of keeping private data private on the cloud. It's called Fully Homomorphic Encryption and if you've got the computer science/mathematics chops you can read the PDF thesis here. After reworking it and simplifying it, researchers have moved it away from being true fully homomorphic encryption but it is now a little closer to being ready for cloud usage. The problem is that the more operations performed on your encrypted data, the more likely it has become 'dirty' or corrupted. To combat this, Gentry developed a way to periodically clean the data by making it self correcting. The article notes that although this isn't prepared for usage in reliable systems, it is a quick jump to implementation in just one year after the paper was published — earlier encryption papers would take as much as half a decade until they were implemented at all.
Businesses

Submission + - Why No Billion-Dollar Open Source Companies? (computerworlduk.com)

superapecommando writes: Glyn Moody says:

Last week, I met up with Jim Whitehurst, Red Hat's CEO. He gave a very fluent presentation to a group of journalists that ran through Red Hat's business model, and explained why – unsurprisingly – he was optimistic about his company's future growth.
Somewhat unkindly, I reminded him of an interview he gave a couple of years ago, in which he said:
When I look at the quality of our existing technology, and the incredible brand that we have and the markets we play in, we should be a $5 billion company or more. If you just look at operating systems and middleware--that's nearly a $100 billion business. We're a $500 million business. We have barely scratched the surface.
Well, today Red Hat is a $750 million business according to Whitehurst. But when, I wanted to know, would Red Hat reach that $5 billion turnover – and why was it taking so long?

Pretty interesting analysis, although it rapidly strays from the original thesis into a discussion of the relative local benefits of proprietary vs open source software companies.

Displays

Submission + - PS3 3D HowTo - No Older 3D Ready TVs (playstation.com) 1

CyberNigma writes: Many PlayStation 3 owners have found out that they are not able to play the new PS3 3D activated games with their 3D Ready TVs. Unlike James Cameron's Avatar 3D (which outputs in various 3D formats without support of the SDK), the PlayStation 3 only appears to output in one format — most likely the Full 3DHD format its new Bravias will support. Older Mistubishi and Samsung DLP HDTVs that are 3D Ready do not work with the PS3 in 3D mode. These televisions require the 3D Checkerboard format (which Avatar outputs on its own) which does not appear to be supported by the PS3. Owners of these televisions will need a converter kit from their manufacturer unless Sony decides to patch in support for other formats.

For those with brand new 3D HDTVs that work with the PS3, the link provides instructions on how to activate 3D gaming on the PlayStation 3.

Submission + - Google letter "sorry" for Spy-Fi, downplays harms

An anonymous reader writes: Exclusive: Google letter to lawmakers says "sorry" for Wi-Fi breach, downplays harms. Google is determined to "learn all the lessons we can" from a major privacy breach in which it may have collected users' personal information from unencrypted Wi-Fi networks, the company said in a letter to House Energy and Commerce leaders on Tuesday. http://bit.ly/d8HgS5

Slashdot Top Deals

Those who can, do; those who can't, write. Those who can't write work for the Bell Labs Record.

Working...