Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
Image

Crocodiles With Frickin' Magnets Attached to Their Heads 304

Brickwall writes "Florida, faced with a problem of crocodiles returning to residential neighborhoods after being relocated elsewhere, is trying to solve it by affixing magnets to the crocs' heads. The theory is the crocodiles use the Earth's magnetic field for navigation, and the magnets may interfere with that. What I'd like to know is, whose job is it to put the magnets on?" So far the magnet program appears to be working, unfortunately the crocs have started to collect huge amounts of take-out menus and child artwork.
The Courts

LANCOR v. OLPC Case Continues In Nigerian Court 281

drewmoney writes "According to an article on Groklaw: It's begun in a Nigerian court. LANCOR has actually done it. Guess what the Nigerian keyboard makers want from the One Laptop Per Child charitable organization trying to make the world a better place? $20 million dollars in 'damages,' and an injunction blocking OLPC from distribution in Nigeria."
Software

Arguing For Open Electronic Health Records 111

mynameismonkey writes "openEHR guru Tim Cook, writing in a guest blog at A Scanner Brightly, discusses why Electronic Health Record developers should use open standards. Why are so few doctors using EHR systems? And, as more and more hospital EHR systems come online across the country, what do we have to fear from proprietary databases? It's one thing to find out your social security number was stolen. Now add your mental health and STD results to those records."
Privacy

Adobe Quietly Monitoring Software Use? 304

henrypijames writes "For months, users of Adobe Creative Suite 3 have been wondering why some of the applications regularly connect to what looks like a private IP address but is actually a public domain address belonging to the web analytics company Omniture. Now allegations of user spying are getting louder, prompting Adobe Photoshop product manager John Nack to respond, though many remain unsatisfied with his explanation."
Google

The Man Behind the Google Phone 95

Hugh Pickens writes "The New York Times is running a story about Andy Rubin, Google's resident gadget guru, and one of the primary architects of the gPhone. You won't find any new technical details about the gPhone in the story, (Google is planning an announcement on Monday about its future mobile plans.) but the story about Rubin gives some clues that indicate that Google plans to do more than merely develop an operating system for cellular phones. One clue to the gPhone is that after Rubin left Apple he joined General Magic, the company co-founded with Mac pioneers Bill Atkinson and Andy Hertzfeld that developed Magic Cap in the 1990s, a PDA precursor years ahead of its time that included a cell phone and email. The Times speculates that Google may also be planning to replay the strategy that Microsoft used to bulldoze Netscape in the mid-1990s by 'cutting off' Microsoft's air supply by giving the gPhone away to handset makers and to put Microsoft Windows Mobile out of business. If the strategy works, it will be because Rubin and his team have successfully developed a vision of the smartphone of the future and a strategy for getting it accepted by the public and by the carriers."
Software

Stix Scientific Fonts Reach Beta Release 159

starseeker writes "At long last, the STIX project has posted a Beta release of their scientific fonts. The mission of the STIX project has been the 'preparation of a comprehensive set of fonts that serve the scientific and engineering community in the process from manuscript creation through final publication, both in electronic and print formats.' The result is a font set containing thousands of characters, and hopefully a font set that will become a staple for scientific publishing. Among other uses, it has long been hoped that this would make the wide scale use of MathML in browsers possible. Despite rather long delays the project has persisted and is now showing concrete results."
Security

Datacenter Robbed for the Fourth Time in Two Years 437

mariushm writes "According to the Register, the Chicago-based colocation datacenter C I Host was attacked by armed intruders recently, making it the the fourth time in two years that armed thugs have made off with data. According to a letter C I Host officials sent customers, 'At least two masked intruders entered the suite after cutting into the reinforced walls with a power saw ... During the robbery, C I Host's night manager was repeatedly tazered and struck with a blunt instrument. After violently attacking the manager, the intruders stole equipment belonging to C I Host and its customers.' Aggravating the situation, C I Host representatives took several days to admit the most recent breach, according to several customers who said they lost equipment, all the while reporting the problems as 'router failures'."
Power

A New Way To Make Water, And Fuel Cells 107

Roland Piquepaille writes "You probably know that it is easy to combine hydrogen and oxygen to make water. After all, this chemical reaction is known for more than two centuries. But now, researchers at the University of Illinois at Urbana-Champaign (UIUC) have discovered a new way to make water. As states the UIUC report, 'not only can they make water from unlikely starting materials, such as alcohols, their work could also lead to better catalysts and less expensive fuel cells.' But be warned: don't read the technical paper itself. It could win an obfuscated contest — if such a contest existed for scientific papers." Yet another advance in fuel cell technology; we discussed a different one just the other day.
Books

Ten Strangely Cruel Science Experiments 357

aalobode writes "The Times of London has a current story based on the review of a book by Alex Boase, Elephants on Acid and Other Bizarre Experiments. There they list the top science experiments — including the one from which the book gets its name — that were conducted by otherwise sane humans who tragically or otherwise ignored the effect of their research on the subjects themselves. Nowadays, most institutions have a review board for research on human subjects which would flag most proposals that could lead to harm for the subjects, but not so in the past. 'Another 1960s experiment, in which ten soldiers on a training flight were told by the pilot that the aircraft was disabled, and about to ditch in the ocean. They were then required to fill in insurance forms before the crash -- ostensibly so the Army was not financially liable for any deaths or injuries. They were actually unwitting participants in an experiment: the plane was not crippled at all. It revealed that fear of imminent death indeed causes soldiers to make more mistakes than usual when filling in forms.'"
The Internet

ICANN Elects Peter Dengate-Thrush as New Chairman 28

An anonymous reader writes "Peter Dengate-Thrush, a New Zealand lawyer, has been elected unanimously as the new Chairman of the Board of the Internet Corporation for Assigned Names and Numbers. "I am delighted that my colleagues have placed their confidence in me for this challenging and important role," Dengate Thrush said. Peter practices civil litigation, specializing in intellectual property, competition, and Internet law. He has been involved in ICANN since its inception. As a member of the Boston Working Group, he provided comment in 1998 on the early drafts of the ICANN bylaws, and he co-chaired one of the pre-formation meetings of the Intellectual Property Constituency in Wellington, New Zealand."
Intel

Intel's 45nm Patch Machinery Exposed 78

Roboticles writes "Tweakers.net paid a visit to Intel's laboratories in the California town of Folsom, the birthplace of the 45nm CPU. We spoke to lead architect Stephen Fisher about the development of the Penryn chip and the day the first A0 version arrived. We were shown the machinery used to test and patch the 45nm processor, which is currently being manufactured in Arizona for release next month."
Internet Explorer

Submission + - AntiVirus Products fail to find Simple IE malware (beskerming.com) 4

SkiifGeek writes: "Didier Stevens recently took a closer look at some Internet Explorer malware that he had uncovered and found that most antivirus products that it was tested against (courtesy of VirusTotals) failed to identify the malware through one of the most basic and straight forward obfuscation techniques — the null-byte. With enough null-bytes between each character of code, it is possible to fool all antivirus products (though additional software will trap it), yet Internet Explorer was quite happy to render the code.

Whose responsibility is it to fix this behaviour? Both the antivirus / antimalware companies and Microsoft's IE team have something to answer for."

Java

Netbeans 6 Dual-Licensed Under GPLv2, CDDL 239

Lally Singh writes "Interested in the new Netbeans 6, but didn't trust Sun's (already OSI-approved) CDDL? Sun just Dual-Licensed it under the GPL (v2) with Classpath Exception. Keep your karmic license purity and mix in all the (now compatible) GPL code you want. If you've been using Eclipse, Netbeans 6 is really worth a look. Lean, well-featured, and fast."

Slashdot Top Deals

This process can check if this value is zero, and if it is, it does something child-like. -- Forbes Burkowski, CS 454, University of Washington

Working...