Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Lidar Finds Overgrown Maya Pyramids 169

AlejoHausner writes "A team of archaeologists scanned the jungle of Belize with lidar. Although most of the reflections came from the jungle canopy, some light reflected off the ground surface. Using this, suddenly hidden pyramids, agricultural terraces, and ancient roads are revealed, at 6-inch resolution. The data allowed the archaeologists to bolster their theory that the ancient city of Caracol covered more than 70 square miles of urban sprawl and supported a population of over 115,000."

Comment Re:Meh. (Score 2, Informative) 327

Amazon does allow publishers to provide books without DRM, though there is no indication to the buyer of this... I've only noticed it trying to strip the DRM and discovering that there was none to strip.

So, yes, if it's on Amazon with DRM, that's the publisher's choice.


City Laws Only Available Via $200 License 411

MrLint writes "The City of Schenectady has decided that their laws are copyrighted, and that you cannot know them without paying for an 'exclusive license' for $200. This is not a first — Oregon has claimed publishing of laws online is a copyright violation." This case is nuanced. The city has contracted with a private company to convert and encode its laws so they can be made available on the Web for free. While the company works on this project, it considers the electronic versions of the laws its property and offers a CD version, bundled with its software, for $200. The man who requested a copy of the laws plans to appeal.

Comment Re:Sometimes just user error (Score 1) 454

A shipping product shouldn't suck right out of the box with a problem that needs a firmware or driver update to fix. Sure, its easy for those who know how to fix these things to fix them, but for one who doesn't, the product is bad.

If the person spends hours and hours and never tries to contact the seller or manufacturer for assistance then proclaims the item junk, I shake my head. The vendor should get an opportunity to make it right before they are condemned, especially since it may very well be pilot error on the part of the buyer.


Submission + - Tweenbots Test NYC Pedestrian-Robot Relations (

MBCook writes: "Kacie Kinzer seems to have come up with the idea to see if people in New York City would help a cute little robot get where it's going, and thus created tweenbots.

Tweenbots are human-dependent robots that navigate the city with the help of pedestrians they encounter. Rolling at a constant speed, in a straight line, Tweenbots have a destination displayed on a flag, and rely on people they meet to read this flag and to aim them in the right direction to reach their goal.



Submission + - Fraudulent Netflix Ratings

Nom du Keyboard writes: For not the first time I notice a new film that hasn't yet even reached the theaters with hundreds of positive votes and/or reviews recorded on Netflix. This time the move is Inkheart. For a movie that doesn't even hit the theaters until January 23 it already has 428 votes and a rating of 4.3 (out of five) on Netflix. Seems more than a bit fraudulent to me. Also it has a review that doesn't even review the movie, but instead says the books are great therefore the movie should be too. Does the word "shills" come to mind? With millions spent just to promote a movie are a few hundred of that going to phony voters, or have that many people actually seen the film and just can't wait to rush home and log onto Netflix to vote? Just what is the responsibility here to provide honest ratings?

Solution Against Cold Boot Attack In the Making 260

Bubba writes "I just discovered this blog: Frozen Cache. It describes a concept for preventing cold boot attacks by saving the encryption key in the CPU cache. It is claimed that by disabling the CPU cache the key will remain in cache and won't be written to memory. The blog says they're working on a proof-of-concept implementation for Linux. Could this really turn out to be a working solution?" Update: 01/19 20:26 GMT by KD : Jacob Appelbaum, one of the authors of the cold boot attack paper, wrote in with this comment: "It's not a solution. It simply seeks to make it more obscure but an attacker would certainly still be able to pull off the attack. From what is on that blog, there's still a full keyschedule in memory at this time. This is how we reconstruct the key, the redundant information in memory; it's not just the 128/256 bit key itself. For older methods, they needed the actual specific key bits but we don't need them because we recreate them. Basically, the CPU is acting as a ghetto crypto co-processer. Emphasis on ghetto. It's a nice suggestion but the devil is in the details and sadly the details in this case aren't really up to snuff. It's a bogus solution."
United States

Submission + - Top 10 IT priorities for Obama (

Slatterz writes: Tuesday's swearing-in will be a landmark not only for its cultural and social implications, but also for its impact on technology. Obama has promised to be more in touch with the cutting edge of the internet and tech world than any previous President. He's already said that the nation will get its first chief technology officer and has started making appointments that put people with technological knowledge in the driving seat rather than politically reliable hacks. As the nation gets ready for the end of the Bush era and the beginning of the Obama one we thought it right to suggest a few IT priorities that the new president might like to address. From webcasting to the DMCA to net neutrality — a list of top ten IT priorities for the new president.

Submission + - What should I ask Slashdot?

TodMinuit writes: "Dearest Slashdot: Recently, I've wanted to ask Slashdot something. Unable to come up with a question myself, I thought who better to ask what I should ask Slashdot than Slashdot itself? Surely the very people answering the question are quite capable of coming up with one. So, Slashdot, what should I ask Slashdot?"

Slashdot Top Deals

Don't tell me how hard you work. Tell me how much you get done. -- James J. Ling