Forgot your password?
typodupeerror

Submission Summary: 0 pending, 12 declined, 4 accepted (16 total, 25.00% accepted)

Submission + - How the World's First Computer Was Rescued From the Scrap Heap (wired.com)

anavictoriasaavedra writes: Eccentric billionaires are tough to impress, so their minions must always think big when handed vague assignments. Ross Perot’s staffers did just that in 2006, when their boss declared that he wanted to decorate his Plano, Texas, headquarters with relics from computing history. Aware that a few measly Apple I’s and Altair 880’s wouldn’t be enough to satisfy a former presidential candidate, Perot’s people decided to acquire a more singular prize: a big chunk of ENIAC, the “Electronic Numerical Integrator And Computer.” The ENIAC was a 27-ton, 1,800-square-foot bundle of vacuum tubes and diodes that was arguably the world’s first true computer. The hardware that Perot’s team diligently unearthed and lovingly refurbished is now accessible to the general public for the first time, back at the same Army base where it almost rotted into oblivion.

Submission + - Adafruit launches educational show aimed at kids (hackaday.com)

anavictoriasaavedra writes: Adafruit Industries just posted the first episode in a new educational series aimed at teaching kids about electronics. The episode is entitled “A is for Ampere” and teaches the basic theory behind electrical current. The subject seems like a common one for A-to-Z themed electrical tutorials. And yes, that's Collin Cunnigham as André-Marie Ampère.
Security

Submission + - Real-Time Cyber-Attack Map (qz.com)

anavictoriasaavedra writes: In October, two German computer security researchers created a map that allows you to see a picture of online cyber-attacks as they happen. The map isn’t out of a techno-thriller, tracking the location of some hacker in a basement trying to steal government secrets. Instead, it’s built around a worldwide project designed to study online intruders. The data comes from honeypots. When the bots go after a honeypot, however, they’re really hacking into a virtual machine inside a secure computer. The attack is broadcast on the map—and the researchers behind the project have a picture of how a virus works that they can use to prevent similar attacks or prepare new defenses.

Slashdot Top Deals

10 to the minus 6th power mouthwashes = 1 Microscope

Working...