Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Patents

The MPEG-LA's Lock On Culture 457

jrepin writes in to recommend a piece by Eugenia from OSNews, which explores the depths of the MPEG-LA's lock on video. One part of the problem is that almost all video cameras, including ones that cost more than $12,000, declare in their manuals that they are for "personal use and non-commercial" purposes only. "We've all heard how the h.264 is rolled over on patents and royalties. Even with these facts, I kept supporting the best-performing 'delivery' codec in the market, which is h.264. 'Let the best win,' I kept thinking. But it wasn't until very recently when I was made aware that the problem is way deeper. No, my friends. It's not just a matter of just 'picking Theora' to export a video to Youtube and be clear of any litigation. MPEG-LA's trick runs way deeper!""
Privacy

Hacking Big Brother With Help From Revlon 71

skids writes "All those futuristic full-face eyeliner jobs in dystopian cyberpunk fiction might not be that far off the mark. A New York University student spent his thesis time exploring computer vision technology (OpenCV) for ways in which one could confound first-stage algorithms that initially lock onto faces. Then he mixed in a bit of fashion sense to predict future geek chic. Now, whether you want to go for the coal-miner look just to stay out of the data mine, that's up to you."
The Media

China's Research Ambitions Hurt By Faked Results 338

Hugh Pickens writes "AP reports that plagiarizing or faking results is so rampant in Chinese academia that some experts worry it could hinder China's efforts to become a leader in science. China's state-run media recently rejoiced over reports that China publishes more papers in international journals than any other country except the US; but not all the research stands up to scrutiny. In December, a British journal retracted 70 papers from a Chinese university, all by the same two lead scientists, saying the work had been fabricated, and expressing amazement that a fake crystal structure would be submitted for publication. 'Academic fraud, misconduct and ethical violations are very common in China,' said professor Rao Yi, dean of the life sciences school at Peking University. 'It is a big problem.' Last month the Education Ministry released guidelines for forming a 35-member watchdog committee and has asked universities to get tough but Rao remains skeptical. Government ministries are happy to fund research but not to police it, Rao says. 'The authorities don't want to be the bad guy.'"
Microsoft

Microsoft Mice Made in Chinese Youth Sweatshops? 481

An anonymous reader writes "The National Labor Committee offers an in-depth look into working conditions in Chinese sweatshops producing hardware (mice, etc.) for Microsoft, complete with pictures. Apparently, so called 'work study students,' 16 and 17 years of age, work 15-hour shifts, six and seven days a week, for around 65 cents per hour. Microsoft said it is taking the claims seriously and has 'commenced an investigation.'"
Idle

The Neo-Geo Song 70

At least 50% of my paychecks would be converted into tokens and put into one of many Neo-Geo machines at the arcade when I was in high school. It's good that my favorite old games finally have an anthem.
Medicine

High Fructose Corn Syrup Causes Bigger Weight Gain In Rats 542

krou writes "In an experiment conducted by a Princeton University team, 'Rats with access to high-fructose corn syrup gained significantly more weight than those with access to table sugar, even when their overall caloric intake was the same.' Long-term consumption also 'led to abnormal increases in body fat, especially in the abdomen, and a rise in circulating blood fats called triglycerides.' Psychology professor Bart Hoebel commented that 'When rats are drinking high-fructose corn syrup at levels well below those in soda pop, they're becoming obese — every single one, across the board. Even when rats are fed a high-fat diet, you don't see this; they don't all gain extra weight.'"
Displays

The Movie Studios' Big 3D Scam 532

An anonymous reader writes "There's a lot of things wrong with 3D movies. Avatar's 3D was well executed, but Alice's 3D was really bad, like all 2D-to-3D conversions. And yet, studios are reconverting 2D movies—including classics—into 3D to milk this fad. On top of that, the theaters are not prepared for 3D, with bad eyeglass optics and dark projections. In this article, a top CG supervisor in a prominent visual effects studio in Los Angeles calls it as it is: it's all a big scam by the movie studios."
Communications

Major ISPs Help Fund BitTorrent User Tracking Research 190

An anonymous reader writes "I was scanning conference proceedings to come up with ideas for a reading group I run at my workplace, and I noticed an interesting paper from the new IEEE WIFS forensics conference. Researchers from the University of Colorado have published a technique for tracking BitTorrent users (PDF) by joining and actively probing torrent swarms using low-cost cloud computing services. They claim their methods allowed them to monitor the entire Pirate Bay torrent set for as little as $13/mo using EC2. But that's not even the interesting part. Their work appears to have been 'funded in part through gifts from PolyCipher' — a broadband ISP consortium. That's right; three major national ISPs funded this round of BitTorrent tracking research, not the MPAA/RIAA. Could this be evidence of ISP support for ACTA and a global three-strikes law?"
Earth

Gas Wants To Kill the Wind 479

RABarnes writes "Scientific American has posted an article about the political efforts of natural gas and electric utilities to limit the growth of wind-generated electricity. Although several of the points raised by the utilities and carbon-based generators are valid, the basic driver behind their efforts is that wind-generation has now successfully penetrated the wholesale electricity market. Wind was okay until it became a meaningful competitor to the carbon dioxide-producing entities. Among the valid points raised by the carbon-based generators are concerns about how the cost of electricity transmission are allocated and how power quality can be improved (wind generation — from individual sites — is hopelessly variable). But there are fixes for all of the concerns raised by the carbon-based entities and in almost all cases they have been on the other side of the question in the past."
OS X

Valve Confirms Mac Versions of Steam, Valve Games 541

An anonymous reader writes with this excerpt from Gamasutra: "Valve will release a version of its Steam digital distribution service for Mac next month, along with Mac-native versions of its own games, the company confirmed today after days of hints — and owners of Valve games will have access to both platform versions. The Source engine, which Valve uses to develop all its internal titles and also licenses to third-party developers, will incorporate OpenGL in addition to DirectX, to allow Mac support for all Source developers. ... 'We are treating the Mac as a tier-1 platform, so all of our future games will release simultaneously on Windows, Mac, and the Xbox 360,' said Cook. 'Updates for the Mac will be available simultaneously with the Windows updates.'"
Power

MIT Produces Electricity Using Thermopower Waves 157

MikeChino writes "MIT scientists have discovered a never-before-known phenomenon wherein carbon nanotubes can be used to harness energy from 'thermopower waves.' To do this they coated the nanotubes with a reactive fuel and then lit one end, causing a fast-moving thermal wave to speed down the length of the tube. The heat from the fuel rises to a temperature of 3,000 kelvins, and can speed along the tube 10,000 times faster than the normal spread of this chemical reaction. The heat also pushes electrons down the tube, which creates a substantial electrical current. The system can output energy (in proportion to its weight) about 100x greater than an equivalent weight lithium-ion battery, and according to MIT the discovery 'opens up a new area of energy research, which is rare.'"
AMD

Game Devs Only Use PhysX For the Money, Says AMD 225

arcticstoat writes "AMD has just aimed a shot at Nvidia's PhysX technology, saying that most game developers only implement GPU-accelerated PhysX for the money. AMD's Richard Huddy explained that 'Nvidia creates a marketing deal with a title, and then as part of that marketing deal, they have the right to go in and implement PhysX in the game.' However, he adds that 'the problem with that is obviously that the game developer doesn't actually want it. They're not doing it because they want it; they're doing it because they're paid to do it. So we have a rather artificial situation at the moment where you see PhysX in games, but it isn't because the game developer wants it in there.' AMD is pushing open standards such as OpenCL and DirectCompute as alternatives to PhysX, as these APIs can run on both AMD and Nvidia GPUs. AMD also announced today that it will be giving away free versions of Pixelux's DMM2 physics engine, which now includes Bullet Physics, to some game developers."
Encryption

Theoretical Breakthrough For Quantum Cryptography 116

KentuckyFC writes "Quantum cryptography uses the quantum properties of photons to guarantee perfect secrecy. But one of its lesser known limitations is that it only works if Alice and Bob are perfectly aligned so that they can carry out well-defined polarization measurements on the photons as they arrive. Physicists say that Alice and Bob must share the same reference frame. That's OK if Alice and Bob are in their own ground-based labs, but it's a problem in many other applications, such as ground-to-satellite communications or even in chip-to-chip communications, because it's hard to keep chips still over distances of the order of the wavelength of light. Now a group of UK physicists have developed a way of doing quantum cryptography without sharing a reference frame. The trick is to use entangled triplets of photons, so-called qutrits, rather than entangled pairs. This solves the problem by embedding it in an extra abstract dimension, which is independent of space. So, as long as both Alice and Bob know the way in which all these abstract dimensions are related, the third provides a reference against which measurements of the other two can be made. That allows Alice and Bob to make any measurements they need without having to agree ahead of time on a frame of reference. That could be an important advance enabling the widespread use of quantum cryptography."
The Courts

Facebook Founder Accused of Hacking Into Rivals' Email 261

An anonymous reader notes a long piece up at BusinessInsider.com accusing Facebook founder Mark Zuckerberg of hacking into the email accounts of rivals and journalists. The CEO of the world's most successful social networking website was accused of at least two breaches of privacy. In a two-year investigation detailing the founding of Facebook, Nicholas Carlson, a senior editor at Silicon Alley Insider, uncovered what he claimed was evidence of the hackings in 2004. "New information uncovered by Silicon Alley Insider suggests that some of the complaints [in a court case ongong since 2007] against Mark Zuckerberg are valid. It also suggests that, on at least one occasion in 2004, Mark used private login data taken from Facebook's servers to break into Facebook members' private email accounts and read their emails — at best, a gross misuse of private information. Lastly, it suggests that Mark hacked into the competing company's systems and changed some user information with the aim of making the site less useful. ... Over the past two years, we have interviewed more than a dozen sources familiar with aspects of this story — including people involved in the founding year of the company. We have also reviewed what we believe to be some relevant IMs and emails from the period. Much of this information has never before been made public. None of it has been confirmed or authenticated by Mark or the company." The single-page view doesn't have its own URL; click on "View as one page" near the bottom.
Encryption

Ubisoft's New DRM Cracked In One Day 678

Colonel Korn writes "Ubisoft's recent announcement that upcoming games would require a constant internet connection in order to play has been discussed at length on Slashdot ('The Awful Anti-Pirate System That Will Probably Work'). Many were of the opinion that this new, more demanding DRM would have effectiveness to match its inconvenience, at least financially justifying its use. Others assumed that it would be immediately cracked, as is usually the case, leaving the inconvenience for paying customers and resulting in a superior product for pirates. As usual, the latter group was right. Though Ubisoft won't yet admit it, Skid-Row managed to crack the new DRM less than a day after it was first released."

Slashdot Top Deals

The key elements in human thinking are not numbers but labels of fuzzy sets. -- L. Zadeh

Working...