Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Is Intel Killing 12-Inch Displays On Netbooks? 297

HangingChad writes "Dell has retired their 12-inch Intel Atom-powered netbooks, they said today. The official reason — 'It really boils down to this: for a lot of customers, 10-inch displays are the sweet spot for netbooksLarger notebooks require a little more horsepower to be really useful.' Or is the real reason that 12-inch displays on netbooks cut into Intel's more profitable dual-core market and Dell's profit margins on higher-end machines?"

Comment Re:summarizing the article for you... (Score 1) 461

Also, the Hyperion quartet has a major plot point that the Matrix hinged on. And while we're at it they can give Gibson a dollar for the name. And the jacking in. And the skill-downloads. And...

So you're admitting that the Wachowski brothers drew their inspiration for the matrix from multiple sources? Not just from Ubik? Huh, that's exactly what I was saying. Woah.

The Military

Submission + - Military, defensive technology, cloaking (ninemsn.com.au)

An anonymous reader writes: Science fiction is getting closer to science fact according to an article posted at NineMSN.

British researchers have unveiled new technology that renders army tanks invisible to observers in the battle field, a British newspaper reports.

At top secret trials last week the Ministry of Defence demonstrated how the clever use of cameras and projectors can beam images of the surrounding landscape onto a tank.


Submission + - Vista 64-Bit Review - x86 vs x64, Worth It? (exoid.com)

Cameron Butterfield writes: "Some of the rumors and myths going around about 64-bit are scary and are slowing the migration of many users to the 64-bit playground. Why do we all have 64-bit processors these days that aren't being put to use? In this review we will analyse Vista Ultimate 64-bit edition in terms of practicality and performance. We pitt 32-bit Vista against 64-bit Vista. See the surprising Conclusion."

Submission + - Ultracapacitors soon to replace many batteries? (ieee.org)

einhverfr writes: "According to an article in the IEEE Spectrun, the synergy between batteries and capacitors — two of the sturdiest and oldest components of electrical engineering — has been growing, to the point where ultracapacitors may soon be almost as indispensable to portable electricity as batteries are now.

Some researches expect to soon create capacitors capable of storing 50% as much energy as a lithium ion battery of the same size. Such capacitors could revolutionize many areas possibly from mobile computing (no worries about battery memory), electricity-powered vehicles, and more."


Submission + - Google's OpenSocial Platform Releases 3

shadowmage13 writes: "Google just announced that starting tonight, developers can start writing applications using the social API for Orkut, MySpace, Engage.com, Friendster, hi5, Hyves, imeem, LinkedIn, Ning, Oracle, Plaxo, Salesforce.com, Six Apart, Tianji, Viadeo, and XING at http://code.google.com/apis/opensocial. Will Facebook give in?"
The Internet

Submission + - Social Networks Are More Popular Than Porn (time.com)

biohack writes: "An analysis of site-visit statistics offered by a TIME columnist points to a surprising reshaping of online landscape. The 18- to 24-year-olds today are apparently too busy chatting with friends to look at online skin.

Currently, for web users over the age of 25, Adult Entertainment still ranks high in popularity, coming in second, after search engines. Not so for 18- to 24-year-olds, for whom social networks rank first, followed by search engines, then web-based e-mail — with porn sites lagging behind in fourth. If you chart the rate of visits to social-networking sites against those to adult sites over the last two years, there appears to be a strong negative correlation (i.e., visits to social networks go up as visits to adult sites go down).


Submission + - RIP, Washoe the signing chimp (google.com.au)

An anonymous reader writes: Washoe the first chimp to be taught American Sign Language has passed away aged 42. She taught us much about communications at a fundamental level and led to endless debate among linguists.
The Courts

Submission + - U.of Oregon Says No to RIAA; ID no good

NewYorkCountryLawyer writes: "The University of Oregon has filed a motion to quash the RIAA's subpoena for information on student identities, in what is believed to be the first such motion made by the university itself, rather than by the students, and the first instance of a State Attorney General bringing a motion to quash an RIAA subpoena. The motion (pdf) explains that it is impossible to identify the alleged infringers from the information the RIAA has presented: "Five of the seventeen John Does accessed the content in question from double occupancy dorm rooms at the University. With regard to these Does, the University is able to identify only the room where the content was accessed and whether or not the computer used was a Macintosh or a PC.... The University cannot determine whether the content in question accessed by one occupant as opposed to another, or whether it was accessed instead by a visitor. Two of the seventeen John Does accessed the content in question from single occupancy dorm rooms....No login or personally identifiable information, i.e. authentication, was used by the Does to access the university's network because none is required. The University cannot determine whether the content was accessed by the room occupant or visitor. Nine of the seventeen John Does accessed the content in question from the University's wireless network or a similar system called the "HDSL Circuit." These systems do record a user name associated with the access. For these John Does, the University can determine the identity of the individual who bas been assigned the user name, however, it is unable to determine whether the content was accessed by the individual assigned that user name or by someone else using the computer associated with the user name. In the case of sixteen of the seventeen John Does, .... it is not possible for the University to identify the alleged infringers without conducting interviews and a forensic investigation of the computers likely involved." The AG's motion further argues (pdf) that "Plaintiffs' subpoena is unduly burdensome and overbroad. It seeks information that the University does not readily possess. In order to attempt to comply with the subpoena, the University would be forced to undertake an investigation to create discovery for Plaintiffs — an obligation not imposed by Rule 45. As the University is unable to identify the alleged infringers with any accuracy, it cannot comply with its federal obligation to notify students potentially affected by the subpoena." One commentator has likened the AG's argument to saying, in effect, that the RIAA's evidence is "rubbish"."

Submission + - MSFT and NSA have backdoored your phone ... (securiteam.com)

isbeen writes: According to a recent post on Bugtraq, researchers have posted information regarding an agreement between the NSA and MSFT which provides backdoors to microsoft products, including phones running the windows mobile platform, where they can apparently tap and monitor phones.

From the original post:

"According to the post National Security Agency has access both stand-alone systems and networks running Microsoft products.

The post states the following: "This includes wireless wiretapping of "smart phones" running Microsoft Mobile. Microsoft remote administrative privileges allow "backdooring" into Microsoft operating systems via IP/TCP ports 1024 through 1030.

According to the Cryptome's source this is typically triggered when devices visit Microsoft Update servers.

Cryptome.org: http://cryptome.org/nsa-ip-update11.htm

SecuriTeam Blogs: http://blogs.securiteam.com/?p=1028

Slashdot Top Deals

Duct tape is like the force. It has a light side, and a dark side, and it holds the universe together ... -- Carl Zwanzig