Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re:Profit? (Score 2, Interesting) 216

Also my bet is that these machines will only be deployed in very high traffic areas inside high profit machines; not at the the gumball machine beside a bus stop in the middle of nowhere.

This and because it is also a massive animated billboard when people aren't using it.

Comment Nothing to see here. Move along. (Score 3, Insightful) 31

They're just saying it may potentially enter the consumer market just for something to say. The fact it has general purpose IO lines on it means it is aimed specifically at the embedded device market like SBCs.

The connector is physically bigger than the equivalent one in a mini PCI Express system. Manufacturers aren't going to switch to this new interface if it means allocating more space inside their laptop/tablet/netbook. It doesn't add anything extra that would be useful in those situations.

Input Devices

Project Natal Release Details Emerge 173

scruffybr writes "Today the first information about the pricing and launch of Microsoft’s Project Natal has emerged. The pricing for the hardware will be much much lower than many had anticipated, coming in at around £50 when sold separately from the console. The idea being that it’s low enough that people will purchase on impulse."
Power

Whistleblower Claims IEA Is Downplaying Peak Oil 720

Yesterday the Guardian ran a story based on two anonymous sources inside the International Energy Agency who claimed that the agency had distorted key figures on oil reserves. "The world is much closer to running out of oil than official estimates admit, according to a whistleblower at the [IEA] who claims it has been deliberately underplaying a looming shortage for fear of triggering panic buying. The senior official claims the US has played an influential role in encouraging the watchdog to underplay the rate of decline from existing oil fields while overplaying the chances of finding new reserves." Today the IEA released its annual energy outlook and rejected the whistleblowers' charges. The Guardian has an editorial claiming that the economic establishment is too fearful to come clean on the reality of oil suppplies, and makes an analogy with the (marginalized, demonized) economists who warned of a coming economic collapse in 2007.
Hardware Hacking

Feds Bust Cable Modem Hacker 658

Several readers noted the indictment of hardware hacker Ryan Harris, known as DerEngel. Harris wrote the 2006 book Hacking the Cable Modem, explaining how to get upgraded speed or even free Internet service by bypassing the firmware locks on Motorola Surfboard modems. He has run a profitable business at tcniso.net since 2003, selling unlocked cable modems. (The site is now offline.) Harris has been charged with conspiracy, aiding and abetting computer intrusion, and wire fraud. Wired quotes Harris's reaction: "I read the indictment — it's complete bull****. I'll tell you right now I'm not going to plead guilty."
Sun Microsystems

Submission + - SPAM: ZFS gets inline built-in deduplication

elREG writes: Sun's Zettabyte File System (ZFS) now has built-in deduplication, making it probably the most space-efficient file system there is.

There's a discussion of ZFS deduplication in a Sun blog, which says that chunks of data, such as a byte range or blocks or files, are checksummed with a hash function and any duplicate chunks will not be stored but instead reference this master chunk.

Link to Original Source
The Internet

Interview With Jeremy Howard of FastMail.fm 135

Siker writes "In a world of giants such as Gmail and Rackspace, email service provider FastMail.fm is somehow doing great, with signups above the million mark and reliability above four 9s. Email Service Guide interviews Jeremy Howard, founder of FastMail.fm, to find out how. Also covered are the company's contributions to Open Source software such as Cyrus-IMAP and Thunderbird. Jeremy discusses the future of IMAP, how open protocols help FastMail.fm, and why he thinks SLAs from email providers are a con."
Privacy

Facebook's New Terms of Service 426

An anonymous reader writes "Chris Walters writes about Facebook's new terms of service. 'Facebook's terms of service (TOS) used to say that when you closed an account on their network, any rights they claimed to the original content you uploaded would expire. Not anymore. Now, anything you upload to Facebook can be used by Facebook in any way they deem fit, forever, no matter what you do later. Want to close your account? Good for you, but Facebook still has the right to do whatever it wants with your old content. They can even sublicense it if they want.'" Oh no! Now they'll be able to license your super flair goblin poke 25 tag history!
Privacy

Utah Mulls a Database of Bar Customers 623

sundancing alerts us to a political dustup in the state of Utah, which doesn't have bars like the rest of the country does. Instead, "private clubs" require you to fill out an application and pay a fee if you want to have a drink outside the home. While there is pressure to reform this arrangement — one argument is that it's bad for tourism — the head of the state senate recently floated a proposal to create a database of every bar patron's visits. Now Utah's governor has called that idea "almost Orwellian," adding that "it's very difficult to legislate adulthood," and its supporters seem to be backing off. The idea of requiring bar patrons to swipe their drivers licenses as proof of age is still on the table, though.

C# Memory Leak Torpedoed Princeton's DARPA Chances 560

nil0lab writes "In a case of 20/20 hindsight, Princeton DARPA Grand Challenge team member Bryan Cattle reflects on how their code failed to forget obstacles it had passed. It was written in Microsoft's C#, which isn't supposed to let you have memory leaks. 'We kept noticing that the computer would begin to bog down after extended periods of driving. This problem was pernicious because it only showed up after 40 minutes to an hour of driving around and collecting obstacles. The computer performance would just gradually slow down until the car just simply stopped responding, usually with the gas pedal down, and would just drive off into the bush until we pulled the plug. We looked through the code on paper, literally line by line, and just couldn't for the life of us imagine what the problem was.'"

Meet the 5-Watt, Tiny, fit–PC 310

ThinSkin writes "Meet the fit-PC, a tiny 4.7 x 4.5 x 1.5-inch PC that only draws 5-watts, consuming in a day less power than a traditional PC consumes in one hour. By today's standards, the fit-PC has very little horsepower, which makes it apt for web browsing and light applications; today's games need not apply. Loyd Case over at ExtremeTech reviews the fit-PC and puts it through its paces, noting that performance is not this PC's strength, but rather its small size and price tag of $285."
The Internet

Wikipedia Infiltrated by Intelligence Agents? 428

An anonymous reader writes "International Humanitarian Law professor Ludwig Braeckeleer thinks so. In an article published yesterday in the Korean newspaper OhMyNews, he reveals a discovery he made while researching a story on the bombing of Pan Am Flight 103 over Scotland. It turns out that a Wikipedia administrator named SlimVirgin is actually Linda Mack, a woman who as a young graduate in the 1980s was hired by investigative reporter Pierre Salinger of ABC News to help with the investigation. Salinger later came to believe that Mack was actually working for Britain's MI5 on a mission to investigate the bombing and to infiltrate and monitor the news agency. Shortly after her Wikipedia identity was uncovered, many of her edits to articles related to the bombing were permanently removed from the database in an attempt to conceal her identity. This discovery comes only months after another Wikipedia admin was caught lying about his credentials to the press. What can Wikipedia do about those who would use it for their own purposes?"
Security

Submission + - Embarrassing Solaris 0-day vulnerability

philos writes: "According to SANS ISC, there's a vulnerability in Solaris 10 and 11 telnet that allows anyone to remotely connect as any account, including root, without authentication. Remote access can be gained with nothing more than a telnet client. More information and a Snort signature can be found at riosec.com. Worse, this is almost identical to a bug in AIX and Linux rlogin from way back in 1994."

Slashdot Top Deals

The trouble with opportunity is that it always comes disguised as hard work. -- Herbert V. Prochnow

Working...