Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re:I actually think this is a good idea (Score 1) 599

Since climate science really is a science, it's going to have to make predictions. It's good to put consensus predictions on record and then see how good they are. I have enough faith in climate science to think that they will be quite good. Of course they will have big error bars, but that's unavoidable. Also, it's not uninformative. I think it will be important in 5 years to say: We've got a climate model that's made correct predictions for the last five years, so you should trust that model as a good guide to the future. It's not a perfect argument, but I think it will be more persuasive than what we can say now.

Your optimism is no doubt fueled by all the most recent publicity the rigor of their scientific method has garnered.

Comment Payback (Score 1) 418

How many REAL trees could you plant for the cost of one of these stupid artificial trees? Real trees absorb carbon dioxide using NO electricity, there's no carbon storage problem they produce oxygen and beautify the surroundings to boot! This whole "artificial tree" solution sounds more like some business with a politician in their pocket.

Comment Re:hmmm (Score 1) 693

so what happens when you send it to someone else in a "hey check out this song" kind of way, then that person is stupid and sticks it in their lime wire folder?

That sounds like file sharing to me. Why wouldn't you just send them a link to the song on lala.com where they can listen once for free?

Cellphones

An App Store For iPhone Software 531

Steve Jobs demonstrated a new "App Store" that will be pushed out to all iPhones in June. It's available now in beta. This will be the exclusive avenue developers will use to get their iPhone apps, written to the newly released SDK, to customers. Developers will get 70% of the proceeds from sales of their goods on the App store, with no further charges for hosting, credit-card processing, etc. Jobs called this "the best deal going to distribute applications in the mobile space."
Transportation

Underground Freight Networks 284

morphovar writes "The German Ruhr University of Bochum is conducting experiments with a large-scale model for an automated subterranean transport system. It would use unmanned electric vehicles on rails that travel in a network through pipelines with a diameter of 1.6 meters, up to distances of 150 kilometers. Sending cargo goods through underground pipelines is anything but new — see this scan of a 1929 magazine article about Chicago's underground freight tunnel network (more details). Translating this concept to the 21st century would be something like introducing email for things: you could order something on the Internet and pick it up through a trapdoor in your cellar the next morning."
Robotics

A Modular Snake Robot 103

StCredZero writes "Researchers at CMU are working on a Modular Snake Robot. A video from this site is up on YouTube. In addition to being able to traverse a wide variety of terrain, the robot can also climb poles, the inside of pipes and conduits, small grooves in walls, and probably more. It can also swim. Many robots can do one of those tasks. This one can do them all. That's quite an accomplishment. This has tremendous potential for the maintenance of fiber optic networks, pipelines, and plumbing in large buildings; and also as a spy device. (I wonder how loud it is?)"
Hardware Hacking

Submission + - Can cryptography prevent printer-ink piracy? 1

Zack Melich writes: Cryptography Research Inc. (CRI), a San Francisco company, is developing chip technology aimed at helping printer manufacturers protect this primary source of profit. The company's chips use cryptography designed to make it harder for printers to use off-brand and counterfeit cartridges. CRI plans to create a secure chip that will allow only certain ink cartridges to communicate with certain printers. CRI also said that the chip will be designed that so large portions of it will have no decipherable structure, a feature that would thwart someone attempting to reverse-engineer the chip by examining it under a microscope to determine how it works. Its chip generates a separate, random code for each ink cartridge, thus requiring a would-be hacker to break every successive cartridge's code to make use of the cartridge. "You can see 95 percent of the [chip's] grid and you still don't know how it works," said Kit Rodgers, CRI's vice president of business development.

iPhone Doesn't Surf Fast Enough for Jobs 436

ElvaWSJ writes with a link to a Wall Street Journal interview with Steve Jobs and AT&T's CEO Randall Stephenson. As you can imagine, they're pretty enthusiastic. Just the same, they address the possibility that the iPhone will slow internet access on Ma Bell's cell network. "Mr. Jobs acknowledged that the company's new iPhone won't surf the Internet as fast as he would like on the network, called "Edge," but added that the device's ability to connect to Wi-Fi hotspots would give consumers a speedier alternative for Web browsing. For his part, Mr. Stephenson said the iPhone represents a broader push by AT&T into Wi-Fi services, including, potentially, mobile Internet calling. The two men also discussed the iPod's "halo effect" and reflected on the origins of their corporate partnership."
Security

Submission + - New Zealand banks demand a peek at PCs (computerworld.com)

Montgomery Burns III writes: "Banks in New Zealand are seeking access to customer PCs used for online banking transactions to verify whether they have enough security protection. Under the terms of a new banking Code of Practice, banks may request access in the event of a disputed transaction to see if security protection in is place and up to date. Liability for any loss resulting from unauthorized Internet banking transactions rests with the customer if they have "used a computer or device that does not have appropriate protective software and operating system installed and uptodate, [or] failed to take reasonable steps to ensure that the protective systems, such as virus scanning, firewall, antispyware, operating system and antispam software on [the] computer, are uptodate.""

Slashdot Top Deals

"Flattery is all right -- if you don't inhale." -- Adlai Stevenson

Working...