Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - Eggs from Skin Cells? Why the Next Fertility Technology Will Open Pandora's Box (technologyreview.com)

schwit1 writes: Imagine you are Brad Pitt. After you stay one night in the Ritz, someone sneaks in and collects some skin cells from your pillow.

But that’s not all. Using a novel fertility technology, your movie star cells are transformed into sperm and used to make a baby. And now someone is suing you for millions in child support.

Such a seemingly bizarre scenario could actually be possible, say three senior medical researchers who today have chosen to alert the public to the social risks of in vitro gametogenesis, a technique they say could allow any type of cell to be reprogrammed into a sperm or egg.

Submission + - Carbon nanotube-based memory poised for commercialization in 2018 (computerworld.com)

Lucas123 writes: Nano-RAM, which is based on carbon nanotubes and is claimed to have virtually a limitless number of write cycles and can achieve up to 3.2 billion data transfers per second or 2.4Gbps — more than twice as fast as NAND flash — is now being produced in seven fabrication plants around the world. Fujitsu plans to develop a custom embedded storage-class memory module using a DDR4 interface by the end of 2018, with the goal of expanding its product line-up into a stand-alone NRAM product family. A new report from BCC Research states the NRAM will likely challenge all other memory types for market dominance and is expected to be used in everything from IoT sensors to smartphone memory and embedded ASICS for automobiles.

Submission + - Enigma encryption machines could help create fraud-proof bank cards

randomErr writes: German's Enigma ciphering machines technology will be used to create ultra-secure encryption cards. The digital Enigma machines inside the cards will replace the existing three-digit CVV security number and could remove the need for a PIN. These new credit and debit cards will have a complex Enigma-based machine integrated into them that will regularly create new three digit number combinations. This new system will hopefully add an extra step for would-be fraudsters. Near Field Communication (NFC) and possibly WiFi aerial or Bluetooth may be integrated as well.

Submission + - T-Mobile Announces Digits: One Phone Number For All Your Devices (theverge.com)

An anonymous reader writes: T-Mobile just revealed its answer to AT&T’s NumberSync technology, which lets customers use one phone number across all their connected devices. T-Mobile’s version is called Digits and it will launch in a limited, opt-in customer beta beginning today before rolling out to everyone early next year. “You can make and take calls and texts on whatever device is most convenient,” the company said in its press release. “Just log in and, bam, your call history, messages and even voicemail are all there. And it’s always your same number, so when you call or text from another device, it shows up as you.” When it leaves beta, Digits will cost an extra monthly fee, but T-Mobile isn’t revealing pricing today. “This is not going to be treated as adding another line to your account,” said COO Mike Sievert. “Expect us to be disruptive here.” And while its main feature is one number for everything, Digits does offer T-Mobile customers another big perk: multiple numbers on the same device. This will let you swap between personal and work numbers without having to maintain separate lines and accounts. You can also give out an “extra set” of Digits in situations where you might be hesitant to give someone your primary number; this temporary number forwards to your devices like any other call. You can have multiple numbers for whatever purposes you want, based on T-Mobile’s promotional video.

Submission + - Tor Phone Is Antidote To Google 'Hostility' Over Android, Says Developer (arstechnica.com)

An anonymous reader writes: The Tor Project recently announced the release of its prototype for a Tor-enabled smartphone—an Android phone beefed up with privacy and security in mind, and intended as equal parts opsec kung fu and a gauntlet to Google. The new phone, designed by Tor developer Mike Perry, is based on Copperhead OS, the hardened Android distribution profiled first by Ars earlier this year. "The prototype is meant to show a possible direction for Tor on mobile," Perry wrote in a blog post. "We are trying to demonstrate that it is possible to build a phone that respects user choice and freedom, vastly reduces vulnerability surface, and sets a direction for the ecosystem with respect to how to meet the needs of high-security users." To protect user privacy, the prototype runs OrWall, the Android firewall that routes traffic over Tor, and blocks all other traffic. Users can punch a hole through the firewall for voice traffic, for instance, to enable Signal. The prototype only works on Google Nexus and Pixel hardware, as these are the only Android device lines, Perry wrote, that "support Verified Boot with user-controlled keys." While strong Linux geekcraft is required to install and maintain the prototype, Perry stressed that the phone is also aimed at provoking discussion about what he described as "Google's increasing hostility towards Android as a fully Open Source platform." Copperhead OS was the obvious choice for the prototype's base system, Perry told Ars. "Copperhead is also the only Android ROM that supports verified boot, which prevents exploits from modifying the boot, system, recovery, and vendor device partitions," said Perry in his blog post. "Copperhead has also extended this protection by preventing system applications from being overridden by Google Play Store apps, or from writing bytecode to writable partitions (where it could be modified and infected)." He added: "This makes Copperhead an excellent choice for our base system." The prototype, nicknamed "Mission Improbable," is now ready to download and install. Perry said he uses the prototype himself for his personal communications: "E-mail, Signal, XMPP+OTR, Mumble, offline maps and directions in OSMAnd, taking pictures, and reading news and books." He suggests leaving the prototype in airplane mode and connecting to the Internet through a second, less-trusted phone, or a cheap Wi-Fi cell router.

Submission + - Tesla's solar roof will cost less than a regular roof (electrek.co)

DirkDaring writes: Elon Musk, during the special shareholders meeting to approve the merger with SolarCity, said that he now feels confident that they could deliver their solar roof at a lower cost than a regular roof – even before energy production. The solar roof, according to Musk, would last twice as long a as a normal roof and cost less — including the labor installation costs and without subsidies. If true, it could be a shake-up of the multi-billion dollar roofing industry.

Submission + - Chinese Scientists Become First To Use CRISPR Gene-Editing On Humans (popularmechanics.com)

An anonymous reader writes: A team of Chinese scientists from Sichuan University in Chengdu have become the first to inject a person with cells modified with the gene-editing tool CRISPR-Cas9. The trial involved modifying a patient's own immune system cells to make them more effective at combating cancer cells and then injecting them back into the patient. The Chinese trial was approved back in July, and United States medical scientists also plan to use CRISPR as an experimental treatment for cancer patients in early 2017. The CRISPR-Cas9 "tool" is a DNA construct that can be injected into any organism—in this case, human immune system T cells—to modify the genome of that organism. It works in three steps: an RNA sequence guides the CRISPR construct to the correct part of the organism's DNA, the Cas9 enzyme "cuts out" that segment of DNA, and then, as an optional third step, a new DNA sequence can be inserted to replace the deleted segment of the genome. In the case of the Chinese trial, conducted October 28 at the West China Hospital in Chengdu, only the first two steps of the CRISPR-Cas9 process were carried out. Immune system cells were extracted from a patient with metastatic lung cancer, and then the gene code that produces a protein called PD-1 was deleted by the Cas9 enzyme. PD-1 instructs T cells to stop or slow an immune system response, and cancer cells can take advantage of this protein to trick the body into responding to the ailment with less than full force. Once the PD-1 protein was removed with CRISPR, the edited cells were cultivated to increase their numbers and then injected back into the patient. This is the first of two injections for the patient, and an additional nine patients in the trial will receive between two and four injections of edited cells, depending on their individual conditions.

Submission + - How Stephen Wolfram Figured Out Interstellar Travel in One Night (backchannel.com)

mirandakatz writes: "Arrival" hits theaters tomorrow, and it's heavy on the science. So how might an interstellar spacecraft actually work? Just ask Stephen Wolfram: he was deputized to figure it out. At Backchannel, he writes: "For the movie, I wanted to have a particular theory for interstellar travel. And who knows, maybe one day in the distant future it’ll turn out to be correct. But as of now, we certainly don’t know. In fact, for all we know, there’s just some simple “hack” in existing physics that’ll immediately make interstellar travel possible." Click through for the full (and lengthy) read.

Submission + - Facebook Achieves 20Gbps Data Rate Over MMW Radio Spectrum (thestack.com)

An anonymous reader writes: Facebook’s Connectivity Lab has announced that it has achieved data transmission rates of 20Gbps over the millimetre-wave (MMW) section of the radio spectrum; however, the transceiving stations need to be incredibly tightly calibrated to each other, with the team describing the margin for error as equivalent to ‘a baseball pitcher aiming for a strike zone the size of a quarter’.

Submission + - Samsung Is Cutting the Note 7's Access To Mobile Networks In New Zealand (techcrunch.com)

An anonymous reader writes: No one can claim there hasn’t been ample warning. The Samsung Galaxy Note 7 saga dragged out over multiple months, encompassing two recalls, several travel bans and then, ultimately, the untimely end for the troubled handset. Even still, some people just have trouble letting go. Starting November 18, Note 7 owners will not be able to connect to mobile networks in New Zealand, courtesy of a joint effort by Samsung and the The New Zealand Telecommunications Forum (TCF) to “blacklist” the device. No calls, no texts, no mobile data. Users will still be able to access WiFi, but the device will essentially be turned into a big Samsung iPod Touch. Samsung New Zealand added that it will work to contact all remaining Note 7 owners twice prior to the shut down, “to ensure they have received adequate notice.” It remains to be seen whether the company will take similar action in other markets.

Submission + - US Government Releases Federal Code On Open Source Code.Gov

Mickeycaskill writes: The US government has decided to place all Federal source code online in a single repository called Code.gov so that Americans can check out the “people’s code”.

The idea is the brain child of US chief information officer Tony Scott, the former CIO of VMware hired by the Obama administration in February 2015, and follows the publication of the Federal Source Code Policy in August.

In a nutshell, this policy requires any code developed by or for the US federal government, must be released a permissive open source licence, and that the source code must be made publicly available.

“The code for these platforms is, after all, the People’s Code – and today we’re excited to announce that it’ll be accessible from one place, Code.gov, for the American people to explore, improve, and innovate,” said Scott.

It seems that so far the Code.gov repository already contains the source code to nearly 50 open source projects from over 10 agencies.

Submission + - Why Udacity and EdX Want to Trademark the Degrees of the Future (edsurge.com)

jyosim writes: No one owns the term “master’s degree.” But upstart education providers dream of getting a lock on the words for the next generation of online graduate certifications. In April, the nonprofit edX, founded by MIT and Harvard University to deliver online courses by a consortium of colleges, applied for a trademark on the word MicroMasters. Udacity owns the trademark for Nanodegree. And MicroDegree? Yep, that’s trademarked too, by yet another company.
  If every new credential gets its own trademarked name, that could create confusion for employers and students.
And some observers say that old rules may still apply to these new education services. “These people are running headlong into violating state authorization regulations in many states, and I think they’re in denial about that,” argues Russ Poulin, director of policy and analysis for WCET, a nonprofit promoting e-learning programs. “Each state has the ability to say who can and who can’t offer postsecondary education in their state,” he says. “I have to imagine that some state is going to go after them soon.” Officials for Udacity and edX did not respond to requests for comment on that issue.

Submission + - SPAM: Researchers Demo How Adjacent IoT Devices Can Infect Each Other and Spread

penciling_in writes: A team of researchers have released a report detailing a new type of threat in which adjacent IoT devices, such as Internet-connected light bulbs, will infect each other with a worm that will spread explosively over large areas in a kind of nuclear chain reaction. The research group from Israel's Weizmann Institute of Science and Dalhousie University in Halifax, Nova Scotia, Canada in their paper 'IoT Goes Nuclear' show video footage of their experiment taking control of building lights using an attack kit mounted on a drone flown near the building. They also provide extensive detail of the threat in their paper.
Link to Original Source

Submission + - SPAM: This search engine remembers literally everything that's been on your computer

schwit1 writes: Our brains often forget where we saw something among the countless tabs and documents on our computers each day.

To make it easier to find things, Seattle-based Atlas Informatics launched Atlas Recall, which lets you search for anything you've ever looked at on your computer.

Atlas Informatics founder and CEO Jordan Ritter calls the software "a photographic memory for your digital life." In a demonstration to CNNMoney, that proved to be a fairly accurate assessment.

Once installed, Atlas Recall displays personalized search results from the app, desktop search, or Google ,search. This includes web pages, emails, Slack chats, Netflix films, Spotify songs, or anything else that's appeared in front of your eyes on your screen.

How does it work? Once installed on your hard drive and browser, Atlas Recall runs in the background and begins collecting your activity. The company captures all the content you've looked at and stores it on its servers.

Governments and lawyers the world over are salivating.

Link to Original Source

Submission + - Researchers make a high-performance battery from junkyard scraps (vanderbilt.edu)

Science_afficionado writes: A team of engineers and materials scientists at Vanderbilt University have discovered how to make high-performance batteries using scraps of metal from the junkyard and common household chemicals. The researchers believe their innovation could provide the large amounts of economical electrical storage required by the grid to handle alternative energy sources and may ultimately allow homeowners to build their own batteries and disconnect entirely from the grid.

Slashdot Top Deals

Beware of all enterprises that require new clothes, and not rather a new wearer of clothes. -- Henry David Thoreau

Working...