Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment But, backup solutions are there (Score 1) 250

The data in the cloud doesn't have to stay in the cloud. Web technology is sufficiently advanced that cloud services can backup other cloud services. There are startups filling the need for this type of backup already - check out http://lifestreambackup.com/ - They're adding services as customers request them. "Hotel California" is a catchy phrase for this article, but the open nature of the web helps to insure that there are no "Hotel California" services.

Space

Intermediate-Mass Black Hole Found In Omega Centauri 89

esocid sends us to the European Space Agency's site for news of a new discovery that appears to resolve the long-standing mystery surrounding Omega Centauri, the largest and brightest globular cluster in the sky. The object is 17,000 light-years distant and is located just above the plane of the Milky Way. Seen from a dark rural area in the southern hemisphere, Omega Centauri appears almost as large as the full moon. What the researchers discovered is a black hole of 40,000 solar masses in the cluster's center. From the press release: "Images obtained with the Advanced Camera for Surveys onboard the NASA/ESA Hubble Space Telescope and data obtained by the GMOS spectrograph on the Gemini South telescope in Chile show that Omega Centauri appears to harbor an elusive intermediate-mass black hole in its center... Exactly how Omega Centauri should be classified has always been a contentious topic. It was first listed in Ptolemy's catalog nearly two thousand years ago as a single star. Edmond Halley reported it as a nebula in 1677. In the 1830s the English astronomer John Herschel was the first to recognize it as a globular cluster. Now, more than a century later, this new result suggests Omega Centauri is not a globular cluster at all, but a dwarf galaxy stripped of its outer stars. According to scientists, these intermediate-mass black holes could turn out to be baby supermassive black holes."
Education

Submission + - Alabama school to be first in US to get XO laptop (al.com)

CountryGeek writes: "Birmingham city schools will be the first in the nation to receive laptop computers designed for children in third-world countries under an agreement completed over the weekend, Mayor Larry Langford announced Monday. Langford signed a purchase agreement for 15,000 laptops from One Laptop Per Child, a nonprofit foundation whose goal is to provide every child in the world with access to technology."
Privacy

Submission + - Eavesdropping Helpful Against Terrorist Plot (nytimes.com)

AcidPenguin9873 writes: The New York Times reports that the U.S. government's ability to eavesdrop on personal communications helped break up a terrorist plot in Germany. The intercepted phone calls and emails revealed a connection between the plotters and a breakaway cell of the terrorist group Islamic Jihad Union. What does this mean for the future of privacy in personal communications? From the article:

[McConnell's] remarks also represent part of intensifying effort by Bush administration officials to make permanent a law that is scheduled to expire in about five months. Without the law, the Foreign Intelligence Surveillance Act, Mr. McConnell said the nation would lose "50 percent of our ability to track, understand and know about these terrorists, what they're doing to train, what they're doing to recruit and what they're doing to try to get into this country."

How To Manage a Security Breach? 183

Salvance writes, "A friend of mine has recently been stressed over a security breach at the company he consults for. The company maintains dozens of Windows 98 desktops to support legacy software that cannot be easily replaced. Due to the inherent lack of security in Win98, a worm was able to infiltrate almost every computer and send gigabytes of data (possibly including sensitive company data) to a 'redirector' in Eastern Europe. My friend was working on other security projects at this company and stumbled across this massive hole. He quickly convinced company executives to remove Internet access from all Win98 machines, purchase better firewalls, and implement other data protection strategies. However, the sticking point was client notification. Due to the nature of the legacy systems, there was no way to know what data was transferred. For this reason the company wanted to play it safe and disclose nothing. Of course, my friend is all for disclosure and preventing harmful use of the potentially leaked data. My friend doesn't know what to do, so I'd like to know what others here think."
AMD/OSTG

Journal Journal: Dell does its first AMD laptop

The Inspirion 1501 is the first laptop from Dell not powered by an Intel chip. "The Inspiron 1501 offers buyers a choice between AMD's entry-level Sempron, the mobile-centric Turion 64, and the dual-core Turion 64 X2 processors. Other than its prominent position on Dell's home page for notebook PCs, the 1501 was launched with no fanfare. Aimed at consumers and small businesses, the newest in the Inspiron line starts

Slashdot Top Deals

Real Programs don't use shared text. Otherwise, how can they use functions for scratch space after they are finished calling them?

Working...