Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Hardware Hacking

Making a Child Locating System 1092

celtic_hackr writes "Well, I never thought I'd be an advocate for placing GPS devices on people. However, since it took less than three days for my local school district to misplace my daughter, I have decided that something needs to be done. By the school district's own admission it has a recurring problem of placing children on the wrong buses. Fortunately, my daughter was located, with no thanks to the local school district. Therefore, I would like input on a way to be able to keep track of my child. I know there are personal tracking devices out there. I have nothing against these systems. But I want more than this. My specification are: 1) a small unobtrusive device I can place on my daughter, 2) an application to pull up on any computer, a map with a dot indicating the real-time position of my child, 3) a handheld device with the equivalent information, 4) [optional] a secure web application/plug-in I can install on my own domain allowing me to track her from anyplace in the world, 5) a means of turning it all off, 6) a Linux based solution of the above. I believe all the pieces for making such a system are out there. Has anyone built anything like this? Is there an open source solution? How would I go about building my own? Has anyone hacked any of these personal trackers before, to serve their own purposes? How does a tinfoil hat wearer engineer such a device to make sure Big-Brother isn't watching too? Can these devices be locked down so only certain devices can pick up the GPS location of an individual locator? What other recommendations do you have?"
The Courts

Judgement Against Microsoft Declares XML Editing Software To Be Worth $98? 230

Many people have written to tell us about the patent infringement lawsuit that resulted in a $200 million judgement against Microsoft by a small Toronto firm called i4i. Techdirt has a line on the details of the suit where the patent in question is for "separating the manipulation of content from the architecture of the document." i4i argues that this covers basic XML editing to the tune of $98 per application. "It's quite troubling that doing something as simple as adding an XML editor should infringe on a patent, but what's even more troubling is that the court somehow ruled that such an editor was worth $98 in the copies of Microsoft Word where it was used. An XML editor. $98. And people say patent awards aren't out of sync with reality?"

Comment Re:missing option (Score 1) 549

I have no problems with my kids' sleeping hours, nor do I care if they run around the house (maybe because they are good kids); but their (unintentional, I admit) volume makes me run for the missing mute button every time. Covering their mouths and hushing them until I'm frothing (in no particular order) has very limited and short-term results. So mute it is, even for childfull /.ers.
Music

20-Year Copyright Extensions Coming To Europe 268

unlametheweak points out a story at Ars Technica which begins: "After a UK government-led commission said that the current 50-year term for musical copyrights was fine, and the government last year publicly agreed that there was no need to extend the term, culture minister Andy Burnham yesterday made the logical follow-up announcement that yes, the government would now push for a 20-year extension on copyright. Turns out, it's the moral thing to do. Actually, by framing the issue as a 'moral case,' Burnham gets to sidestep the entire issue of logic. Critics have already begun to charge that he is ignoring actual evidence and the well-regarded conclusions of the Gowers Report (PDF), not to mention previous government policy. But when the issue becomes a moral one and the livelihood of aging performers is at stake, it's suddenly easier to avoid cost/benefit analysis."
Hardware Hacking

Photos of the Damage To the Large Hadron Collider 106

holy_calamity writes "CERN have released images of the damage done to the world's most powerful machine, the Large Hadron Collider, when an electrical fault caused a helium leak. New Scientist has posted them, along with explanations of what you can see. The sudden burst of gas shifted some of the huge superconducting magnets by half a meter, causing at least $21 million in damage."
The Media

Reuters Pulls Out of Second Life, Army Heads In 77

A little over two years ago, Reuters made headlines by setting up a reporter as a go-between for Second Life and the real world. Now, they've evidently decided that the buzz is no longer there, so they've ended the virtual-reporting experiment. The reporter, Eric Krangel, offered his own take on the situation, and what he thinks Linden Labs could do to make Second Life a better place. Whether or not the advice is taken, the US Army has decided to carve out its own presence in the virtual world by setting up a pair of islands that will function as recruiting tools. An article at Massively suggests that interest in Second Life is still high among a variety of organizations, saying, "at present it appears that more businesses are coming in than going out."
Programming

Political and Technical Implications of GitTorrent 208

lkcl writes "The GitTorrent Protocol (GTP) is a protocol for collaborative git repository distribution across the Internet. Git promises to be a distributed software management tool, where a repository can be distributed. Yet, the mechanisms used to date to actually 'distribute,' such as ssh, are very much still centralized. GitTorrent makes Git truly distributed. The initial plans are for reducing mirror loading, however the full plans include totally distributed development: no central mirrors whatsoever. PGP signing (an existing feature of git) and other web-of-trust-based mechanisms will take over from protocols on ports (e.g. ssh) as the access control 'clearing house.' The implications of a truly distributed revision control system are truly staggering: unrestricted software freedom. The playing field is leveled in so many ways, as 'The Web Site' no longer becomes the central choke-point of control. Coming just in time for that all-encompassing Free Software revolution hinted at by The Rebellion Against Vista, this article will explain more fully some of the implications that make this quiet and technically brilliant project, GitTorrent, so important to Software Freedom, from both technical and political perspectives."
Education

How to Deal With an Aging Brain? 684

An anonymous reader writes "I'm sure this is something all older Slashdotters are aware of: as I get older my once-sharp brain is, well, getting worse. In particular, I'm not able to remember things as well as I once did. As a geek my capacity in this area was always what defined me as a geek. Nowadays things seem to go in OK, but then leak out. A few weeks later I've mostly forgotten. So, I ask Slashdot: how do you cope with your mind getting older? What's your trick? Fish-oil? Brain Training on the DS? Exercise? Or just trying harder to remember things?"
Image

Researchers Discover How To Make the Perfect Phone Call 85

Having made amazing discoveries such as how to make the perfect cheese sandwich, linking heavy caffeine use to sleeplessness, and figuring out where all the teaspoons have gone, science has made the greatest breakthrough yet. They have uncovered the secrets of making the perfect phone call. The perfect phone call clocks in at a mere 9 minutes and 36 seconds, easily 11 minutes shorter than any conversation I've ever had with my mom. Unlike a call to mom, the perfect phone call is almost devoid of any gossip about her divorced neighbor and her heavily tattooed daughter. Instead three minutes should be spent catching up with news about family and friends, one minute on personal problems, a minute on work/school, 42 seconds on current affairs, 24 seconds on the weather, and 24 seconds talking about the opposite sex. What's left of your 9 mins 36 secs is a free for all.
NASA

NASA Draws On Open Source For Shuttle Bug-Tracking 83

thefickler writes "NASA has built a new software package to track problems with the Space Shuttle using open source tools from Mozilla. '[Alonso Vera, the lead of the Ames Human-Computer Interaction Group] wouldn't say exactly how much the new systems cost to build, but he said they were an order of magnitude cheaper than what was being used before, closer to $100,000 than the $1 million it would have cost in the past.' The Space Shuttle Endeavor launched successfully on Friday, so the new system is being used to track any problems which may crop up in the current mission. As one commentator pointed out, 'A system like this could save more than money; it could save lives.'"
Medicine

VR Snow Game Functions As Pain Management 27

eldavojohn writes "Burn victims — especially soldiers from war — have been proven to deal with therapy and pain better when immersed in a calm, cold virtual world. The game Snow World lets players hit targets with snowballs in a winter wonderland. The results of the study show unarguably that victims handle treatment and healing much better when their mind, eyes & ears are occupied — mind over matter, indeed."
The Military

Northrop Grumman Markets Weaponized Laser System 246

stephencrane writes "Northrop Grumman is making available for sale the FIRESTRIKE weaponized laser system. The solid-state laser unit weighs over 400lbs, sends/receives instructions and data via an RJ-45 jack and can be synchronized with additional units to emit a 100 kW beam. It looks like some piece of stereophonic amplification equipment out of the '50s. Or Fallout 3. The press release suggests that FIRESTRIKE 'will form the backbone of future laser weapon systems.'"
Image

Dead Parrot Sketch Is 1,600 Years Old 276

laejoh writes "Monty Python's 'Dead Parrot sketch' — which featured John Cleese — is some 1,600 years old. A classic scholar has proved the point, by unearthing a Greek version of the world-famous piece. A comedy duo called Hierocles and Philagrius told the original version, only rather than a parrot they used a slave. It concerns a man who complains to his friend that he was sold a slave who dies in his service. His companion replies: 'When he was with me, he never did any such thing!' The joke was discovered in a collection of 265 jokes called Philogelos: The Laugh Addict, which dates from the fourth century AD. Hierocles had gone to meet his maker, and Philagrius had certainly ceased to be, long before John Cleese and Michael Palin reinvented the yarn in 1969."
Editorial

Doctorow On Copyright Reform & Culture 243

super-papa sends us to Locus Magazine for an article by Cory Doctorow discussing the conflicts between copyright law and modern culture, and arguing against the perception that copying media is still unusual. Quoting: "Copyright law valorizes copying as a rare and noteworthy event. On the Internet, copying is automatic, massive, instantaneous, free, and constant. Clip a Dilbert cartoon and stick it on your office door and you're not violating copyright. Take a picture of your office door and put it on your homepage so that the same co-workers can see it, and you've violated copyright law, and since copyright law treats copying as such a rarified activity, it assesses penalties that run to the hundreds of thousands of dollars for each act of infringement. There's a word for all the stuff we do with creative works — all the conversing, retelling, singing, acting out, drawing, and thinking: we call it culture."
IT

Exchanging Pictures To Generate Passwords 123

Roland Piquepaille writes "Today, Ileana Buhan, a Romanian computer scientist, is presenting her PhD Thesis at the University of Twente in the Netherlands. She is using biometrics to protect confidential information when it is exchanged between two mobile devices. This is a very innovative approach to security. Buhan's biometric application will generate almost unbreakable passwords from photos taken by the connected users. Here is how it works. 'To do this, two users need to save their own photos on their PDAs. They then take photos of each other. The PDA compares the two photos and generates a security code for making a safe connection.'"

Slashdot Top Deals

And on the seventh day, He exited from append mode.

Working...