Forgot your password?
typodupeerror
Power

Trash-To-Fuel Process Validated By US Military 64

An anonymous reader writes "After going through all kinds of grief, including being shut down by the Washington State Ecology Department, classifying them as an 'incinerator,' it looks like Green Power Inc is finally ready to shine. The Air Force, Navy, Army, and Marines, in a joint effort, validated their technology in November, and the results are now being published for the first time. For every 100 tons of municipal solid waste feedstock processed each day, the plant produces 1240 gallons of Naphtha, 3700 gallons of Kerosene, 6900 gallons of Diesel and 3000 gallons of Fuel Oil. And even the ash can be used for cement or asphalt. They generate 1 MW of electricity to sell to the grid 24/7, running three shifts per day to keep the plant going, employing approximately five people per shift. Sticker price is $25 million. ROI, 3.5 years. Maybe with this announcement, the trend of no sales in the US will change, compared to the 72 foreign contracts backed by letters of credit."
Biotech

Researchers Modify T-Cells, Make Them HIV Resistant 171

DieNadel writes to share that naturally occurring proteins called "zinc fingers" are being used in a new approach to AIDS treatment. Using modified T-Cells with the zinc fingers, researchers at the Pennsylvania School of Medicine have shown a reduction in viral load in mice. "'By inducing mutations in the CCR5 gene using zinc finger proteins, we've reduced the expression of CCR5 surface proteins on T cells, which is necessary for the AIDS virus to enter these immune system cells,' explains first author Elena Perez, MD, PhD, Assistant Professor of Pediatrics at Penn. 'This approach stops the AIDS virus from entering the T cells because it now has an introduced error into the CCR5 gene.'"
Networking

Encrypted Traffic No Longer Safe From Throttling 268

coderrr writes "New research could allow ISPs to selectively block or slow down your encrypted traffic even if they cannot snoop on your transmitted data. Italian researchers have found a way to categorize the type of traffic that is hidden inside an encrypted SSH session to around 90% accuracy. They are achieving this by analyzing packet sizes and inter-packet intervals instead of looking at the content itself. Challenges remain for ISPs to implement this technology, but it's clear that encrypting your traffic inside an SSH session or VPN connection is not a solution to protect net neutrality."
Data Storage

Best Way To Store Digital Video For 20 Years? 805

An anonymous reader writes "My kid is now 1 year old and I already have 100G of digital video (stored on DVDs, DVD quality) and photos. How should I store it so that it's still readable 10 to 20 years from now? Will DVDs stil be around, and readable, 10 years from now? Should I plan for technology changes every 5 to 10 years (DVD->Blue-ray->whatever)? Is optical storage better, or should I try to use hard drives (making technology changes automatic)? And, if the answer is optical, how do you store optical disks so that they last?"
The Almighty Buck

The Impact of Low Salaries At Apple 782

orenh writes "Recent data indicate that Apple engineers have significantly lower salaries than their Silicon Valley peers: $89,000 at Apple, versus $105,000 at Yahoo and $112,000 at Google. Paying lower salaries had a major impact on Apple's bottom line when it was struggling in the market up until 2004. But now that Apple is highly profitable, these lower salaries are no longer a factor in Apple's success. Will Apple have to raise salaries to match the market rate, or face defections?"
Privacy

EFF To Fight Border Agent Laptop Searches 324

snydeq writes "The EFF and the Association of Corporate Travel Executives have filed an amicus brief with the 9th Circuit Court of Appeals requesting that the full court rehear and reverse a three-judge ruling (PDF) that empowers border agents routinely to search files on laptops and mobile devices. The case in question involves US citizen Michael Arnold, who, returning from the Philippines in July 2005, had his laptop confiscated at LAX by custom officials after they opened files in folders marked 'Kodak Pictures' and 'Kodak Memories' and found photos of two naked women. Later, when Arnold was detained, officials uncovered photo files on Arnold's laptop that they believed to be child pornography. In addition to raising Fourth Amendment issues, the amicus brief (PDF) reiterates the previous District Court ruling on Arnold's case regarding the difference between computers and gas tanks, suitcases, and other closed containers, 'because laptops routinely contain vast amounts of the most personal information about people's lives — not to mention privileged legal communications, reporters' notes from confidential sources, trade secrets, and other privileged information.'"
Space

Study Hints At Time Before Big Bang 408

canadian_right informs us that scientists from Caltech have found hints of a time before the Big Bang while studying the cosmic microwave background. Not only does the study hint at something pre-existing our universe, the researchers also postulate that everything we see was created as a bubble pinched off from a previously existing universe. This conjecture turns out to shed light on the mystery of the arrow of time. Quoting the BBC's account: "Their model suggests that new universes could be created spontaneously from apparently empty space. From inside the parent universe, the event would be surprisingly unspectacular. Describing the team's work at a meeting of the American Astronomical Society (AAS) in St Louis, Missouri, co-author Professor Sean Carroll explained that 'a universe could form inside this room and we'd never know.'"
Security

How Would You Prefer To Send Sensitive Data? 542

sprkltgr writes "Our HR department is implementing new software. The HR Director has tasked me with sending our data out of our network to the consultant that's loading it in to the new package. Obviously this data includes items such as SSN, name, birth date, etc. Upon being told that I would not email this data to her, the consultant asked what my security requirements were for sending the data. What would be on your wishlist for the best way to send sensitive data to someone outside your firewall?"
Security

Cubicle Security For Laptops, Electronics? 532

kamikasee writes "I recently found out that I'm going to be moved from an office to a cubicle. The cubicle area is not very secure, and I'm worried about things wandering off. My boss has offered to buy some equipment to help me secure things, but so far I haven't found anything that fits my requirements. Google and Amazon searches are overwhelmed by lockable key cabinets and larger pieces of furniture. Here are some of the requirements: The main issue with traditional solutions (e.g. locking things in a drawer) is convenience. I use a laptop with a second LCD monitor. There's also an external keyboard and mouse and a USB hard drive. I leave my laptop on at night so I can remote-desktop into it, so I'm not really happy about putting it in a drawer (no ventilation), plus I don't like the idea of having to 'unharness' everything every time I want to put it away. I don't trust cable locks. Besides, cable locks won't help me secure my the USB drive and other electronics that might wander off. The solution I imagine is a lockable, ventilated metal box that would sit under the monitor and house most of the electronics. If it was big enough, I could stick my laptop into it at night (while leaving it running) and feel confident that it would still be there in the morning. I'd be open to other types of solutions. Surely someone else must have dealt with this problem."
Google

Google Funds Work for Photoshop on Linux 678

S point 2 writes "Google has announced that they have hired Codeweavers, maker of the popular Wine software to make Photoshop run better on Linux. 'Photoshop is one of those applications that desktop Linux users are constantly clamoring for, and we're happy to say they work pretty well now...We look forward to further improvements in this area.' It is unknown whether or not the entire Creative Suite will be funded for support, but for the time being it seems Photoshop-on-Linux development is getting a new priority under Google."
The Internet

The World Wide Computer, Monopolies and Control 129

Ian Lamont writes "Nick Carr has generated a lot of discussion following his recent comments about the IT department fading away, but there are several other points he is trying to make about the rise of utility computing. He believes that the Web has evolved into a massive, programmable computer (the "World Wide Computer") that essentially lets any person or organization customize it to meet their needs. This relates to another trend he sees — a shift toward centralization. Carr draws interesting parallels to the rise of electricity suppliers during the Industrial Revolution. He says in a book excerpt printed on his blog that while decentralized technologies — the PC, Internet, etc. — can empower individuals, institutions have proven to be quite skilled at reestablishing control. 'Even though the Internet still has no center, technically speaking, control can now be wielded, through software code, from anywhere. What's different, in comparison to the physical world, is that acts of control become harder to detect and those wielding control more difficult to discern.'"
Social Networks

Parents To Block Kids From Joining MySpace 337

Reservoir Hill writes "A New York Times blog notes that attorneys general of 49 states are announcing a partnership with MySpace to fight sexual predators on social networks by letting parents submit the e-mail addresses of their children, so the company can prevent anyone from using that address to set up a profile. MySpace will also set up a 'closed' section for users under age 18 so only their established online friends can visit their pages. MySpace also promises to hire a contractor to identify and delete pornographic images on the site. 'This set of principles is a landmark and milestone because it involves an acknowledgment of the importance of age and identity authentication,' said Connecticut attorney General Richard Blumenthal." Blumenthal also actually said "If we can put a man on the moon..."
Christmas Cheer

New Years Resolutions - An Engineering Approach 144

Hugh Pickens writes "Four out of five people who make New Year's resolutions will eventually break them and a third won't even make it to the end of January says the NY Times. But experts say the real problem is that people make the wrong resolutions. The typical resolution often reflects a general desire. To engineer better behavior, it is more productive to focus on a specific goal. '"Many clients make broad resolutions, but I advise them to focus the goals so that they are not overwhelmed," says Lisa R. Young. "Small and tangible one-day-at-a-time goals work best."' Here are some resolutions that experts say can work: To lose weight, resolve to split an entree with your dining partner when dining out. To improve your fitness, wear a pedometer and monitor your daily activity. To improve family life, resolve to play with your kids at least one extra day a week. To improve your marriage, find a new activity you and your spouse both enjoy such as taking a pottery class. On a lighter note: What was Steve Jobs' New Year's Resolution?"
Google

Dvorak Says gPhone is Doomed 454

drewmoney writes "Speaking with his usual frustrated crankiness John Dvorak rants his way through an article explaining why the gPhone will never work. 'First of all, it wants to put Google search on a phone. It wants to do this because it is obvious to the folks at Google that people need to do Web searches from their phone, so they can, uh, get directions to the restaurant? Of course, they can simply use the phone itself to call the restaurant and ask! I've actually used various phones with Web capability. They never work right. They take forever to navigate. It's hard to read the screens ... I also hope that people note the fact that the public has not been flocking to smartphones of any sort.' "
The Almighty Buck

Is SETI Worth It? 806

njdube sent in this Space.com story about the money behind SETI that opens, "It's a risky long shot that burns up money and might never, ever pay off. So is searching for intelligent creatures on unseen worlds worth the candle? After all, aren't there better ways to use our monies and technical talents than trying to find something that's only posited to exist: sentient beings in the dark depths of space?"

Slashdot Top Deals

"Here comes Mr. Bill's dog." -- Narrator, Saturday Night Live

Working...