Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Technology

Smart Contact Lenses 109

Iddo Genuth writes "Scientists at the University of California, Davis, have recently designed a contact lens prototype with a built-in pressure sensor using a novel process that etches tiny electrical circuits within a soft polymer material. The new development could help glaucoma patients to measure their current risk factor, thus replacing the current methods which require constant visits to a clinician."
Censorship

YouTube Yanks Free Tibet Video After IOC Pressure 482

RevWaldo writes "The International Olympic Committee filed a copyright infringement claim yesterday against YouTube for hosting video of a Free Tibet protest at the Chinese Consulate in Manhattan Thursday night. The video depicts demonstrators conducting a candlelight vigil and projecting a protest video onto the consulate building; the projection features recent footage of Tibetan monks being arrested and riffs on the Olympic logo of the five interlocking rings, turning them into handcuffs. YouTube dutifully yanked the video, but it can still be seen on Vimeo. (Be advised; there is some brief footage of bloody, injured monks.)"
It's funny.  Laugh.

BSOD Makes Appearance at Olympic Opening Ceremonies 521

Whiteox writes "A BSOD was projected onto the roof of the National Stadium during the grand finale to the four-hour spectacular at the Olympics. Lenovo chairman Yang Yuanqing chose to go with XP instead of Vista because of the complexity of the IT functions at the Games. His comment on Vista? 'If it's not stable, it could have some problems,' he said. Evidently Bill Gates attended the opening ceremony, so he must have witnessed it."
Bug

Massive VMware Bug Shuts Systems Down 410

mattmarlowe writes "Imagine if Red Hat released a version of Linux, and after it was deployed, customers noticed that any processes with a start date of today would refuse to run? Well, that's what happened to VMware — a company that wants nearly all server applications running in virtual machines within a matter of years." Supposedly a fix will be available ... in 36 hours.
Supercomputing

Simple Mod Turns Diodes Into Photon Counters 118

KentuckyFC writes "The standard way to detect single photons is to use an avalanche photodiode in which a single photon can trigger an avalanche of current. These devices have an important drawback, however. They cannot distinguish the arrival of a single photon from the simultaneous arrival of two or more. But a team of physicists in the UK has found a simple mod that turns avalanche photodiodes into photon counters. They say that in the first instants after the avalanche forms, its current is proportional to the number of photons that have struck. All you have to do is measure it at this early stage. That's like turning a Fiat 500 into a Ferrari. Photon counting is one of the enabling technologies behind optical quantum computing. A number of schemes are known in which it is necessary to count the arrival of 0, 1 or 2 photons at specific detectors (abstract). With such a cheap detector now available (as well as decent photon guns), we could see dramatic progress in this field in the coming months."
Media

Your Mashup Is Probably Legal 149

TV Barn writes "We've been conditioned to think that if you pull something off the web and use it, you're committing some sort of copyright infringement. But increasingly, the law is moving in the opposite direction. Provided you are making a truly new use of the content, you are free to make money off those copyrighted images and video and sound. On Monday the Center for Social Media released 'Code of Best Practices for Fair Use in Online Video,' which reflects the latest changes in copyright law that has expanded the understanding of fair use to include 'transformational effect.' Already Miro has endorsed the guidelines, as have several public broadcasters. The Center has a good track record, having issued guidelines for documentary filmmakers that have greatly reduced copyright claims in that area. The website has plenty of resources for mashers and mixers; I interviewed the Center's director in this podcast that summarizes the most important findings of the report." On the other hand, says reader kaliphonia, your guitar tablature sites may not fare so well.
Encryption

TrueCrypt 6.0 Released 448

ruphus13 writes "While most of the US was celebrating Independence Day, the true fellow geeks over at TrueCrypt released version 6.0 of TrueCrypt over the long weekend. The new version touts two major upgrades. 'First, TrueCrypt now performs parallel encryption and decryption operations on multi-core systems, giving you a phenomenal speedup if you have more than one processor available. Second, it now has the ability to hide an entire operating system, so even if you're forced to reveal your pre-boot password to an adversary, you can give them one that boots into a plausible decoy operating system, with your hidden operating system remaining completely undetectable.' The software has been released under the 'TrueCrypt License,' which is not OSI approved."
The Courts

User Charged With Felony For Using Fake Name On MySpace 931

Recently a user, Lori Drew, was charged with a felony for the heinous crime of pretending to be someone else on the Internet. Using the Computer Fraud and Abuse Act, Lori was charged for signing up for MySpace using a fake name. "The access to MySpace was unauthorized because using a fake name violated the terms of service. The information from a "protected computer" was the profiles of other MySpace users. If this is found to be a valid interpretation of the law, it's really quite frightening. If you violate the Terms of Service of a website, you can be charged with hacking. That's an astounding concept. Does this mean that everyone who uses Bugmenot could be prosecuted? Also, this isn't a minor crime, it's a felony punishable by up to 5 years imprisonment per count. In Drew's case she was charged with three counts for accessing MySpace on three different occasions."
Security

Indiana Data Theft Compromises 700,000 52

palewook writes "A Midwest collection company, Central Collection Bureau, admits a server and eight PCs stolen contain over 700,000 individuals' personal data. Central Collection Bureau acts as a collection contractor for doctors and utility companies. The Indiana based company admits the stolen info consists of addresses, social security numbers, and medical codes."
Communications

An IM Patent for the iPhone? 71

Ian Lamont writes "Apple has filed a patent for IM on portable devices, which could mean that it's getting ready to launch an IM client for the iPhone. The filing is titled 'Portable Electronic Device for Instant Messaging', and covers methods for sending, receiving, and viewing ongoing conversations. The proposed GUI is similar to Apple's current interface for SMS. As for why iChat wasn't enabled for the iPhone earlier, there's some interesting background and analysis here, which also includes a discussion of AIM for the iPhone. IM also came up in the discussions last year about the most-wanted features in iPhone 2.0."
Data Storage

Fujitsu HDD with AES 256-bit Encryption 220

An anonymous reader writes "Fujitsu today updated its 2.5" 320GB hard disk drive with automatic hardware-based encryption to effectively secure data against theft or loss. According to Fujitsu, the MHZ2 CJ series is the first hard disk drive in the world to support the 256-bit Advanced Encryption Standard (AES). The drive implements the AES hardware encryption directly into the processor chip of the hard disk drive, resulting in more robust security and faster system performance than software-based encryption."
Security

FBI Concerned About Implications of Counterfeit Cisco Gear 273

SpicyBrownMustard writes "An FBI PowerPoint presentation provides details about a criminal investigation into counterfeit CISCO hardware originating from China, and sold by Gold/Silver partners to numerous US government, military, and intelligence agencies. The concern of the article's author and the FBI is that the counterfeit equipment may be state-sponsored to aid in accessing otherwise secure systems (slides 46+47). Says the article author: 'The threat is real. Compromised hardware of potentially hostile foreign origin sits within secure networks of the US government, military, and intelligence services. And as you now see, the FBI has been concerned about it.'" We've mentioned the seizure of some of this equipment before, but this presentation adds quite a bit of detail, and highlights the FBI's concern of Chinese government involvement.
Biotech

Cloned Sniffer Dogs Begin Training 44

H0D_G writes "The Australian Broadcasting Corporation reports that the world's first cloned sniffer dogs have begun their training in South Korea. The dogs, cloned from a successful golden retriever sniffer dog, were the result of a $320,000 AUD project."

Slashdot Top Deals

I've noticed several design suggestions in your code.

Working...