Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Businesses

The Go-Anywhere Cyber Cafe In a Shipping Container 145

nk497 writes "UK IT charity Computer AID has come up with a clever idea to use shipping containers to house thin-client-based, solar-powered cyber cafes, which can be used to bring connectivity to rural communities in Africa. The £20,000 boxes use a single Pentium 4 PC split out using thin client devices to offer computing to 10 people via local wireless access or mobile broadband. The solar power created from a single panel is enough to power the PC, 10 monitors, lighting, and also to charge mobile phones. Computer Aid founder Tony Roberts notes, 'The power of this idea is that we can drop that container anywhere in the world, literally in the middle of the Sahara desert.'"
Image

Life-size Eva Unit 01 Being Built In Japan 80

JoshuaInNippon writes "Japan has gone life-size anime model crazy. Last year there was the robotic 1:1 Gundam model that guarded Tokyo for a few months in the summer to mark the series' 30th anniversary, and then there was the giant Gigantor moment that opened in Kobe in the fall in honor of the city's rejuvenation from the devastating 1995 earthquake. Now, an amusement park near Mt. Fuji named Fuji-Q Highland is building an Eva Unit 01 from the popular Neon Genesis Evangelion series, or at least a bust of it, in conjunction with the series' recent movies. The bust will sit in a replica hanger, and reportedly stand around 9 meters tall. Visitors will have the chance, for a little extra money, to have their photo taken in the unit's cockpit, where the series' protagonist-of-sorts Shinji Ikari normally sits. The attraction is set to a cost of over US$1.6 million to build, and open on July 23 of this year. It will also undoubtedly be swamped by crazed fans looking the opportunity to bring their anime dreams to life."

Comment spice (Score 1) 411

The only "spice" you'll get from me is a 'usage' summary if you pass args incorrectly.

If the script is interactive I will woo you with such things as vague prompts when input is required.

Walk without rhythm and you won't attract the worm.

Comment What you do... (Score 1) 1

...is get into computers and be interested in them from a young age and nobody will question you and think you're cheating when you know what the write protect tabs on floppies do and understand the concept that everything is a file. At this point you will probably have a job doing computer support and service/repair. You can save up the money earned at your job so that you and get a degree so you can get a job in computer support and service/repair when you're done with the two year program for computer support, service/repair.

Hardware Hacking

Submission + - Apple issues warning on iPhone unlocking

daveschroeder writes: "Today Apple issued a statement which says, "Apple has discovered that many of the unauthorized iPhone unlocking programs available on the Internet cause irreparable damage to the iPhone's software, which will likely result in the modified iPhone becoming permanently inoperable when a future Apple-supplied iPhone software update is installed." This does not include "hacking" the phone to install third party applications or ringtones, only unlocking the phone. This is because unlocking changes the baseband radio firmware, which is expected to be updated along with the next iPhone update to address other issues. Apple adds, "This has nothing to do with proactively disabling a phone that is unlocked or hacked. It's unfortunate that some of these programs have caused damage to the iPhone software, but Apple cannot be responsible for...those consequences." While unlocking a phone is legal for an end user under a current DMCA exemption, the vendor is under no obligation to guarantee the phone will remain as such when official software updates are applied; many users of unlocked handsets simply never update the phone, but the iPhone is in a different category. It is likely that since the current unlocking mechanisms use a broader buffer overflow condition, this will also be fixed in the next software update.

Note to editors: the already-submitted story in the firehose is remarkably incorrect (has NOTHING to do with "hacking", just unlocking), so please don't accept it."
Music

Submission + - Music industry wants credit card nums in ID3 tags (michaelrobertson.com)

An anonymous reader writes: In an obituary for AnywhereCD which closes in one week, MP3.com founder Michael Robertson chronicles how at least one record label wanted him to put credit card numbers of buyers into songs. Fascinating story about how at least some of the labels still don't get it and why AnywhereCD is about to buried.
Operating Systems

Submission + - Apple Leopard Won't support G4 or G3 processors

goombah99 writes: According to AppleInsider, apple is about to announce that Leopard will not support G4 power PC processors. Previously developers had been told that it would require at least an 800 MHZ G4. But AppleInsider alleges only G5 and higher will now be supported because of speed issues, and testers have been told that the new os "cannot be installed" on lesser machines. This cutoff in minimum requirements means that all those original imac flat screens and titanium powerbooks are now forked to the Tiger (10.4) Update Path. Since much of Leopards advances came in the form of either under-the-hood changes (e.g. 64 bits) or added capabilities (e.g. time machine) but don't seem to substantially change the UI or API for core capabilities this may turn out to be less of a blow than it will initially be perceived as. While this apparently means there will be now two-flavors of the apple OS in widespread us, it's worth noting that Apple has also had a long standing mechanism for fat-binaries that allows a single application to transparently hold code for many different OS's and Architectures.
Microsoft

Submission + - Microsoft offers downgrade from Vista to XP (redoracle.com)

An anonymous reader writes: Finally, Microsoft decided to offer to users who buy a computer with Windows Vista the possibility to downgrade their operative systems, passing to Windows XP. However the offer seems to be available only for Windows Vista users who have Business and Ultimate versions. But PC producers can implement the offer, selling their computers with the operative systems at issue.
United States

Submission + - Habeas Corpus is GONE (senate.gov) 2

Khyber writes: "In a vote of 56 yeas to 43 nays, with one abstaining, the Cloture Motion to restore Habeas Corpus has been halted, with a 3/5 majority vote unable to be attained. Article 6 states their oath to uphold the constitution, Article 4 states that habeas corpus shall not be suspended unless in cases of rebellion and invasion when the public safety may require it. It's becoming a very dark age, indeed."
Encryption

Submission + - aacs la 'builds house' on consumer land

member.09f9 writes: "09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 Michael Ayers, the chairman of the AACS LA has drawn the following analogy on the attack on the aacs implementation of drm through the publishing of the aacs processing key: "If the local neighborhood gang is throwing rocks at your house, some people might tell you not to call the police because they will just throw bigger rocks," He concludes that you must call the police to protect yourself. However i think that it is important here to extend the analogy that he uses, when we do we can see that the civil disobedience surrounding the publishing of this number and aacs la's issuing of cease and desist communiques are only part of a bigger picture. The analogy should be extended as follows, that although the house may belong to aacs la the they have built it on land that does not belong to them, it's land that belongs to the consumers (i.e. fair use: backups, format changes (e.g. tx to a hard drive),compatibility with software (Linux) and other hardware) one can argue that the occupation of the land is immoral and probably illegal considering fair use rights. The DMCA is protecting an illegal /immoral occupation. The people "throwing rocks" are the oppressed who have been turned into refugees of their own media. The publication of the processing key achieves two things for the oppressed: 1. It is a protest to the occupation in the form of civil disobedience. 2. It allows one to regain ones fair use rights (by removing the restrictions on the media). To quote and by no means to diminish a greater more profound struggle, the day consumers overthrow DRM is the day on which we can proclaim: "Free at last! Free at last! Thank God Almighty, we are free at last!""

Slashdot Top Deals

2.4 statute miles of surgical tubing at Yale U. = 1 I.V.League

Working...