Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:Yeah right. (Score 1) 442

Except that these barriers are all really nothing more than a chicken-and-egg problem. Nobody builds a phone that can do all the HSDPA bands, but that's not because it's hard. The only customers who care about the 1700 MHz band are in the U.S. and Canada on carriers that don't sell unlocked phones, and there are no laws requiring unlocking. As a result, those customers don't expect to be able to move from one carrier to another without unlocking. As a result, the handset manufacturers don't need to build phones that allow this. As a result, the chipset vendors largely haven't bothered to design the chips to make this possible.

If you can build a 5-band handset, a 6-band handset is really only incrementally harder. Even a 12-band handset is only incrementally harder when you factor in electronically tunable antennas into the mix.

Nokia does.

N8 supports the following bands:
GSM/EDGE 850/900/1800/1900
WCDMA 850/900/1700/1900/2100

Security

Two Unpatched Flaws Show Up In Apple iOS 171

Trailrunner7 writes "The technique that the Jailbreakme.com Web site is using to bypass the iPhone's security mechanisms and enable users to run unapproved apps on their phones involves exploiting two separate vulnerabilities. One of the vulnerabilities is a memory-corruption flaw that affects the way that Apple's mobile devices, including the iPad and iPod Touch, display PDFs. The second weakness is a problem in the Apple iOS kernel that gives an attacker higher privileges once his code is on a targeted device, enabling him to break out of the iOS sandbox. The combination of the two vulnerabilities — both of which are unpatched at the moment — gives an attacker the ability to run remote code on the device and evade the security protections on the iPhone, iPad or iPod Touch. The technique became public earlier this week when the Jailbreakme.com site began hosting a set of specially crafted PDF files designed to help users jailbreak their Apple devices and load apps other than the ones approved by Apple and offered in its official App Store."
Technology

Submission + - Deal finalised on fusion reactor (bbc.co.uk)

An anonymous reader writes: The European Union and six member states have reached a deal on the financing and timetable for an experimental nuclear fusion reactor.
Power

Submission + - Unlimited fusion a step closer with ITER funding

goG writes: The European Union and six other states agreed on an updated plan to finance and establish a timetable for the ITER project, an experimental fusion reactor which could lead towards the development of unlimited and clean fusion energy. The parties hammered out a deal at the future site of the project in Cadarache, France at Wednesday.Together with the International Space Station and CERN, ITER is probably the most extensive and complex international project ever undertaken.
Education

Khan Academy Delivers 100,000 Lectures Daily 213

eldavojohn writes "Working from the comfort of his home, Salman Khan has made available more than 1,500 mini-lectures to educate the world. Subjects range from math and physics to finance, biology, and current economics. Kahn Academy amounts to little more than a YouTube channel and one very devoted man. He is trying to provide education in the way he wished he had been taught. With more than 100,000 video views a day, the man is making a difference for many students. In his FAQ he explains how he knows he is being effective. What will probably ensure his popularity (and provide a legacy surpassing that of most highly paid educators) is that everything is licensed under Creative Commons 3.0. He only needs his time, a $200 Camtasia Recorder, an $80 Wacom Bamboo Tablet, and a free copy of SmoothDraw3. While the lecturing may not be quite up to the Feynman level, it's a great augmenter for advanced learners, and a lifeline for those without much access to learning resources."

Comment Re:Apple-haters in 3,2,1,... (Score 5, Informative) 284

Because despite the fact that FoxConn make stuff for all sorts of people in the consumer electronics world, all the bile and invective seems to fall on Apple's shoulders.

No doubt, Apple actually trying to help will be seen negatively too - let's see if any of the subsequent comments say so (my money's on yes...). Honestly, the anyone-but-apple brigade make the fanboys look calm, collected, and sane.

Simon

In Finland, all these Foxconn suicides have been reported as happening at a "Nokia contractor", no word of Apple in any of the news posts.

Comment Re:HDDs are Done When Google Says They Are Done (Score 1) 646

Seriously. Google is (believed to be) the largest single user of consumer hard drives. When they start replacing hard drives with SSDs, I will consider HDDs to be done. I wonder what price differential the power savings (don't forget the power for cooling) will cover?

They started planning that, 2 years ago?

http://www.informationweek.com/news/storage/systems/showArticle.jhtml?articleID=207602745

Comment Re:What about UFO's (Score 1) 457

In the literal sense, light aircraft not equiped with GPS, (Drug or people smugglers), and of course aircraft that have been hijacked and their transponders disabled.

Or some kid in a baloon (hoax or not, its probably not going to do an engine any good if it sucks it in...

And if the pilots are too busy playing with their laptops to even look out of the window...

It doesnt sound safe to me, especially in a post 911 world.

Does it matter? GPS is passive, it only figures out its current location via the satellite signals, it does not broadcast it onwards.

To replace radars on the ground for tracking aircraft, you need something in addition to the GPS (what is that, it's not mentioned in the summary?)

Comment why bother with airplanes (Score 3, Insightful) 821

All that these new security measures are doing, is moving the target from the "protected" airplane, to the unprotected queues of people at the airports.

Looking from an attacker PoV, which "mission" sounds better:
A) a high risk bomb smuggling operation to blow up ~200 people in an airplane with minimal explosives.

B) fit as much explosives as you can to your luggage and queue to the airport security check line at the most active time.

Scenario B has almost no chance of you getting caught before you can blow things up.

Comment Re:why is this even in question? (Score 1) 184

if your employer owns a device, and allows you to use it, you are not to ever use it for personal reasons, nor should you ever expect even the slightest amount of privacy for communications using the device. Even (and probably especially) if they give you permission for personal use. That goes for cell phones, pagers, computers, slide rules, everything. That means you do not log into personal Facebook, Google, or Hotmail at work. You do not use the company phone to call home. If you do any of these, you've 1) probably violated the terms of your employment and 2) have given the company/government permission to peer into all personal communications made with your employer's equipment.

You have explicit rights (in most cases) to privacy and use of the property that you actually own. That's it, the line is drawn there. I can't believe there is any controversy over this.

After reading this, I'm damn glad that i'm living and employed in Finland and not in USA.

Slashdot Top Deals

One can search the brain with a microscope and not find the mind, and can search the stars with a telescope and not find God. -- J. Gustav White

Working...