Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Music

Submission + - Mari Kimura SUBHARMONICS violin String Theory (makeahistory.com)

An anonymous reader writes: In April 1994, at a solo recital given by Mari Kimura in New York City, subharmonics were introduced to the musical community as a revolutionary bowing technique to extend the violin's range by a full octave below on the open G string without changing the tuning. Subharmonics require precise control of the bow pressure and speed, in order to freely utilize this extended bowing technique. Subharmonics can be used as a musical element for composers to explore additional possibilities for the violin and other string instruments. As the technique has grown significantly since the initial discovery more than 15 years ago, it was apparent that Subharmonics needed a closer look in the most controlled environment. ....
Microsoft

Submission + - Will Microsoft release its own Windows 8 tablet? (extremetech.com)

An anonymous reader writes: Microsoft isn't exactly known for its hardware prowess. Sure, it's churned out plenty of nice mice, keyboards, and game controllers over the years, but success with actual devices has been mixed. The Xbox 360 has exceeded all expectations, while the Zune and Kin hardware have been monumental failures. According to industry sources in Taiwan, however, Microsoft is working on a Windows 8 tablet that will be powered by Texas Instrument's next-generation 1.8GHz dual core processor.

Submission + - Kino.to Raided In Massive Police Operation, Admins (torrentfreak.com)

freedumb2000 writes: Europe just witnessed one of the largest piracy-related busts in history with the raid of the popular movie streaming portal Kino.to. More than a dozen people connected to the site were arrested after police officers in Germany, Spain, France and the Netherlands raided several residential addresses and data centers. Kino.to hosted no illicit content itself, but indexed material stored on file-hosters and other streaming services.
The Almighty Buck

Submission + - Senator Complains That Bitcoin Is Money Laundering (techdirt.com) 1

An anonymous reader writes: In a followup to the earlier story about Bitcoin being used for Narcotics, Senator Schumer has already come out condemning Bitcoin itself, claiming that it's a form of money laundering, because there's no way to trace the history. Apparently Senator Schumer is unaware of the untraceable nature of "cash."
Windows

Submission + - WINDOWS 8 PREVIEW REVEALS MAJOR UI METAMORPHOSIS (blogspot.com)

martty writes: "Microsoft began its Windows 8 publicity blitz in earnest Wednesday, previewing an operating system that appears to break from the norm in more ways than one.
It has a tile interface similar to that of Windows Phone 7, it will run on PCs and tablets, and it will support both touchscreen and mouse-and-keyboard interactions."

Sony

Submission + - Sony Europe Hacked: 150 Accounts Compromised (winbeta.org)

BogenDorpher writes: "Yet another hack directed towards Sony. Is anyone keeping count? According to Sopho's Naked Security blog, a hacker was able to attain 120 usernames, passwords, phone numbers, work email addresses, and websites from a user database on Sony Europe's website."

Submission + - Strong Aurora Borealis show visible in N-Hemi. (spaceweather.com)

An anonymous reader writes: An unusually strong aurora borealis show is occuring due to a geomagnetic storm related to solar activity from a few days ago.
Currently many somewhat dark locations that are often unable to see auroral activity are now able to do so — north-eastern canada, north-eastern USA, and parts of north-western Europe are currently possible viewing locations for the show. As time progresses, semi-dark areas in the west coast area of North Amreica may be able to see the show as night falls in those areas unless the show subsides, though it may also grow in magnitude at any time over night.
http://www.swpc.noaa.gov/pmap/pmapN.html
http://www.swpc.noaa.gov/Aurora/globeNW.html
http://www.spaceweather.com/

Idle

Submission + - Dr. J.T. Kirk. Shatner Accepts D.Litt Degree (google.com)

theshowmecanuck writes: William Shatner was granted a Doctor of Letters Degree at his alma mater, McGill University in Montreal. One of the more interesting parts of his speech involved his high school principal's car which was set on fire. An other interesting tidbit is that he doesn't really like the idea of going into space himself. An interesting short read on what made and continues to make one of our favourite former 'star ship captains' tick.

Submission + - Integrating Capacitors into Car Frames 1

necro81 writes: It has long been recognized that adding capacitors in parallel with batteries can improve the performance of hybrid and electric vehicles by accepting and supplying spikes of power, which reduces stress on the battery pack, extending range and improving cycle life. But where to put them, when batteries already compete for space? A new research prototype from Imperial College London has integrated them into the body panels and structural frame of the vehicle itself. In their prototype, carbon fiber serves as both the structure for the vehicle and electrode for the energy storage sandwiched within.

Submission + - Is SHA-512 the way to go?

crutchy writes: When I was setting up my secure website I got really paranoid about SSL encryption, so I created a certificate using OpenSLL for SHA-512 encryption. I don't know much about SHA (except bits that I can remember from Wikipedia), but I figure that if you're going to go to the trouble (or expense) of setting up SSL, you may as well go for the best you can get, right? Also, what would be the minimum level of encryption required for say online banking? I've read about how SHA-1 was "broken", but from what I can tell it still takes many hours. What is the practical risk to the real internet from this capability? Would a sort of rolling key be a possible next step, where each SSL-encrypted stream has its own private/public key pair generated on the fly, and things like passwords and bank account numbers were broken up and sent in multiple streams with different private/public key pairs? This would of course require more server grunt to generate these keys (or we could take a leaf from Google's book and just have separate server clusters designed solely for that job), but then if computing performance was a limiting factor, the threat to security of these hashes wouldn't be a problem in the first place. I guess with all security infrastructure, trust becomes a more important factor than technical abilities. Can I trust that my SSL provider hasn't been hacked (or at least snooped)? How do I know some disgruntled IT admin hasn't sold the private key of his company's root CA to the same organisation that developed the conficker virus? It would certainly make for a more profitable payload. I've read some of Bruce Schneier's work (I'm subscribed to Cryptogram) and he tends to highlight the FUD that surrounds internet security, and I agree that there is a lot of FUD, but complete ignorance and blase attitude toward security can also be taken advantage of. Where is the middle ground?
Graphics

Submission + - New MSI graphics card is self-dusting (pcauthority.com.au)

An anonymous reader writes: If you take care of your PC, you might avoid a dust problem. If you don’t, all sorts of bad things might happen — chiefly, your graphics card could overheat. Now MSI has a graphics card with "dust removal" listed as a feature, alongside things like CUDA cores and HDMI outputs. As the MSI web site explains, the fan on the N580GTX Lightning Xtreme Edition, "will rotate in the opposite direction for 30 seconds. By running in reverse, the fan helps to remove dust from the heatsink fins." Given that this is being billed as the "most powerful graphic card on the planet", it's no surprise MSI's marketing is listing cooling features heavily.
Privacy

Submission + - EFF Publishes Study on Browser Fingerprinting (eff.org)

Rubinstien writes: The Electronic Frontier Foundation investigated the degree to which modern web browsers are susceptible to "device fingerprinting" via version and configuration information transmitted to websites. They implemented one possible algorithm, and collected from a large sample of browsers visiting their test site, http://panopticlick.eff.org/ . According to the PDF describing the study, browsers that supported Flash
or Java on average supplied at least 18.8 bits of identifying information, and 94.2% of those browsers were uniquely identifiable in their sample. My own browser was uniquely identifiable from both the list of plugins and available fonts, among 1,557,962 browsers tested so far.

Slashdot Top Deals

Work is the crab grass in the lawn of life. -- Schulz

Working...