Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
United States

Submission + - Senator Arlen Specter To Switch Parties (nytimes.com)

gollum123 writes: Senator Arlen Specter of Pennsylvania said on Tuesday he would switch to the Democratic party, presenting Democrats with a possible 60th vote and the power to break Senate filibusters as they try to advance the Obama administration's new agenda ( http://thecaucus.blogs.nytimes.com/2009/04/28/specter-will-run-as-a-democrat-in-2010/?hp ). In a statement issued about noon as the Capitol was digesting the stunning turn of events, Mr. Specter said he had concluded that his party had moved too far to the right, a fact demonstrated by the migration of 200,000 Pennsylvania Republicans to the Democratic Party. If Al Franken prevails in his ongoing court case in Minnesota and Mr. Specter begins caucusing with Democrats, Democrats would have 60 votes and the ability to deny Republicans the chance to stall legislation. Senator Olympia Snowe of Maine, who also supported the Obama administration's economic stimulus legislation, said Mr. Specter's decision reflected the increasingly inhospitable climate in the Republican party for moderates.
Republicans

Submission + - Senator Arlen Specter becomes a Democrat (washingtonpost.com)

Akido37 writes: Arlen Specter today announced that he's switching parties, and becoming a Democrat. This gives Democrats 59 seats in the Senate, and possibly 60 including Al Franken in Minnesota. While this comes as a surprise to many Republicans, it is not to moderate Republican Senator Olympia Snowe (ME), who said, "you haven't certainly heard warm encouraging words of how they [Republicans] view moderates. Either you are with us or against us."
The Internet

Submission + - US ISPs Using Push Polling to Stop Cheap Internet (zeropaid.com)

An anonymous reader writes: What happens when a new ISP is started somewhere in the United States that completely blows all the other ISPs out of the water in the area? Apparently, that question is being answered in North Carolina where Greenlight Inc., a company started by the city government, is trying to offer faster, more reliable and cheaper internet to the local residents. There's just one problem, Time Warner and Embarq can't compete and they are not only lobbying the state government to destroy the competition, but are now using push polling methods to gain support for the "Level the playing field" legislation they lobbied for in the government across the two cities that could get an additional ISP in their area.
Security

Submission + - Kaspersky: Govt snooping doesn't go far enough (pcpro.co.uk)

Barence writes: "Eugene Kaspersky has told PC Pro that governments should be monitoring the internet activity of their citizens more closely. The security firm boss, who was educated at the KGB-sponsored Institute of Cryptography, said that monitoring "the internet so closely would be a positive step" and that "the [UK] Government is not a Big Brother which wants to watch everyone — and taxation is not high enough to have such a budget.""
Handhelds

iPhone Jailbreaking Still Going Strong 166

snydeq writes "Despite the productivity promises of Apple's forthcoming 3.0 firmware update, jailbreaking should continue to push the iPhone's productivity envelope, as users increasingly demand the Holy Grail of smartphone power use: applications that run in the background, InfoWorld reports. Copy and paste, video recording and streaming, Internet tethering, and content search are just a few of the features over which iPhone users have sought to jailbreak their devices — a practice Apple itself has done little to crack down on. Jailbreak apps circumvent hardware and software restrictions that Apple says ensure a consistent, responsive user interface and optimal battery endurance. In particular, jailbroken phones can run apps in the background, a capability Apple reserves for its own apps but prohibits in third-party programs. Jay Freeman, creator of the Cydia iPhone installer and Cydia Store, however, believes a free-market approach is the best way to satisfy power users' demands for features without compromising the performance of their iPhones. And given Apple's App Store overcrowding, it seems likely that jailbroken phones and app venues like Cydia Store will continue to be popular with iPhone customers and developers, even after the 3.0 firmware ships."
Censorship

German Wikileaks Domain Suspended Without Warning 215

mb writes to mention that Germany has gone one step further in impeding access to Wikileaks. Germany's registration authority, DENIC, recently suspended Wikileaks.de without notice. "The action comes two weeks after the house of the German WikiLeaks domain sponsor, Theodor Reppe, was searched by German authorities. Police documentation shows that the March 24, 2009 raid was triggered by WikiLeaks' publication of Australia's proposed secret internet censorship list. The Australian Communications and Media Authority (ACMA) told Australian journalists that they did not request the intervention of the German government."
Government

Slashdot Mentioned In Virginia Terrorism Report 779

megamerican alerted us to a leaked document (PDF) from a Virginia Fusion Center titled "2009 Virginia Terrorism Threat Assessment." The document is marked as "Law Enforcement Sensitive," not to be shown to public. Citizens for Legitimate Government has a write-up. Slashdot gets a mention on page 45 — not as a terrorist organization itself, but as one of the places that members of Anonymous may hang out: "A 'loose coalition of Internet denizens,' Anonymous consists largely of users from multiple internet sites such as 4chan, 711chan, 420chan, Something Awful, Fark, Encyclopedia Dramatica, Slashdot, IRC channels, and YouTube. Other social networking sites are also utilized to mobilize physical protests. ... Anonymous is of interest not only because of the sentiments expressed by affiliates and their potential for physical protest, but because they have innovated the use of e-protests and mobilization. Given the lack of a unifying creed, this movement has the potential to inspire lone wolf behavior in the cyber realms." According to the report, cell phones and digital music players have been used to transfer plans related to criminal activity, and therefore presumably could be grounds for suspicion. Podcasting is also suspicious.
Earth

Powerful Sonar Causes Deafness In Dolphins 323

Hugh Pickens writes "Mass strandings of dolphins and whales could be caused because the animals are rendered temporarily deaf by military sonar, experiments have shown. Tests on a captive dolphin have demonstrated that hearing can be lost for up to 40 minutes on exposure to sonar and may explain several strandings of dolphins and whales in the past decade. Most strandings are still thought to be natural events, but the tests strengthen fears that exercises by naval vessels equipped with sonar are responsible for at least some of them. For example, in the Bahamas in March, 2000, 16 Cuvier's beaked whales and Blainville's beaked whales and a spotted dolphin beached during a US navy exercise in which sonar was used intensively for 16 hours (PDF). 'The big question is what causes them to strand,' says Dr. Aran Mooney, of the University of Hawaii. 'What we are looking at are animals whose primary sense is hearing, like ours is seeing. Their ears are the most sensitive organ they have.' In the experiment, scientists fitted a harmless suction cup to the dolphin's head, with a sensor attached that monitored the animal's brainwaves, and when the pings reached 203 decibels and were repeated, the neurological data showed the mammal had become deaf, for its brain no longer responded to sound. 'We definitely showed that there are physiological and some behavioral effects [from repeated, loud sonar], but to extrapolate that into the wild, we don't really know,' said Mooney."
Medicine

New Discovery May End Transplant Rejection 201

mmmscience writes with this excerpt from the Examiner: "Big news in the medical world: scientists in Australia have found a way to stop the body from attacking organ transplants, greatly decreasing the possibility of organ rejection. ... When a new tissue is introduced, one's immune system kicks into overdrive, sending out cells known as killer T cells to attack and destroy the unknown tissue. ... Professor Jonathan Sprent and Dr. Kylie Webster from Sydney's Garvan Institute of Medical Research focused on a different type of T cells — known as regulatory T cells (Treg) — in this study. Tregs are capable of quieting the immune system, stopping the killer T cells from seeking out and attacking foreign objects."

Comment Saccadian movements (Score 0) 114

I don't think the guy is thinking about Saccades

These are tiny, quick movements that the eye makes that keep "refreshing" our field of view.

Here's the explanation from Wikipedia:

Humans and other animals do not look at a scene in a steady way. Instead, the eyes move around, locating interesting parts of the scene and building up a mental 'map' corresponding to the scene. One reason for saccades of the human eye is that the central part of the retina, the fovea, plays a critical role in resolving objects. By moving the eye so that small parts of a scene can be sensed with greater resolution, body resources can be used more efficiently.

In addition, the human eye is in a constant state of vibration, oscillating back and forth at a rate of about 30-70 Hz. These microsaccades are tiny movements, roughly 20 arcseconds in excursion and are completely imperceptible under normal circumstances. They serve to refresh the image being cast onto the rod cells and cone cells at the back of the eye. Without microsaccades, staring fixedly at something would cause the vision to cease after a few seconds since rods and cones only respond to a change in luminance.

So while this happens naturally in all of our eyes, our brains compensate for it automatically and we don't notice anything is happening.

On video, though, this would probably make the video unwatchable and/or cause dizziness and nausea for anyone viewing it. It might be help in researching eye-movement patterns, though.

Comment Gun Control == aid to authoritarian governments (Score -1, Flamebait) 600

"Like China, authoritarianism works on a population accustomed to it and enjoying a rapidly rising standard of living.">

This is surely incorrect. The USSR functioned for almost seven decades. The people of the Ukraine clearly had a falling standard of living as Stalin starved them but failed to successfully revolt or change the system. Likewise in China, the cultural revolution was not something associated with a huge rise in living standards but Communism survived.

Many people attribute Stalin's success in starving the 10 million + Ukrainians to death in the 1930's to gun control laws enacted earlier when the Communists came to power, and the success of the Chinese Cultural Revolution to the previous government's gun control laws enacted over ten years earlier. If you have guns and the population doesn't, then it doesn't matter whether their standard of living is rising or falling.

FOR gun control; Adolf Hitler, Josef Stalin

"For the first time, a civilized nation has full gun registration! Our streets will be safer, our police more efficient and the world will follow our lead to the future!"

-- Adolf Hitler, 1935

The most foolish mistake we could possibly make would be to permit the conquered Eastern peoples to have arms. History teaches that all conquerors who have allowed their subject races to carry arms have prepared their own downfall by doing so.

Adolf Hitler, 1941

AGAINST gun control; Mahatma Gandhi

"Among the many misdeeds of the British rule in India, history will look upon the act of depriving a whole nation of arms, as the blackest."

-- Mahatma Gandhi (he was against violence, but appreciated the ability of the gun to deter violence - the British did not treat the Indians well at all)

   

The Internet

Submission + - SPAM: YouTube Outage Underscores Big Internet Problem

narramissic writes: "Pakistan's blocking of YouTube Sunday may be old news, but it reveals a significant Internet design problem, namely the way ISPs share Border Gateway Protocol (BGP) routing information. Now, the accidental denial of service attack that took out YouTube has happened before and will likely happen again, but what if next time it's not accidental? If criminals were able to send BGP information to a larger service provider that didn't properly check its BGP data, they could cause serious problems, says Danny McPherson, chief research officer with Arbor Networks. 'The reality is that if you wanted to cause global instability, you simply compromise one of those people who have access to a BGP-speaking router.'"
Link to Original Source
Software

Submission + - Secrets of how tech vendors determine prices

BobB writes: Ever wonder why a software license costs as much as it does? If you suspect vendors charge as much as they can get, you wouldn't be far from the truth. http://www.networkworld.com/news/2007/082807-prici ng-network-vendors.html Though one CTO says he has figured out vendors' weaknesses and shares how he exploits them http://www.networkworld.com/news/2007/082807-prici ng-cto-side.html
United States

Submission + - General Strike Called For 9/11/2007 In U.S.

cybermage writes: Organizers around the U.S. are working to coordinate a General Strike for 9/11/2007. Their reasoning is as follows: "Since the tragic events of 9/11/01, America has fallen under a spell of fear and deception. The government peddles lies and steadily chips away at our democratic rights. Hundreds of thousands have been killed in the Iraq war — mostly civilians. Torture, surveillance, tyranny, empire. Many of us can recognize the fascistic direction of this government. But what do we do?"
Networking

Submission + - How do you save your IT info?

randoms writes: I manage a number of small, very heterogeneous network environments. For each site I have to keep information on isps, mail and web hosts, equipment inventory, ip configs, vpn setups, server configs and passwords, router configs and passwords, client desktop configs and passwords, etc.

My "system," or lack there of, is a hodgepodge of word, text, and excel docs. It's mostly worked so far, but is outdated, fragile, not redundant, not available if my notebook is not by my side, and so on.

What do you guys and gals use to store and maintain all this diverse, and sometimes very sensitive data?

Slashdot Top Deals

We are not a loved organization, but we are a respected one. -- John Fisher

Working...