Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment POV toys (Score 1) 256

Persistence-of-vision toys are fun and easy to make. They're a great way to learn how to solder. (You, the teacher, would need to download messages into them.) Kids quickly see the results of their work and it piques their interest for more technology.
POV Kits are available at many places online for $10-$20 each, probably less in bulk. One place I know is http://adafruit.com/

Comment Follow the leader (Score 5, Funny) 228

Oh, it's so cute. First they were just Baby Apple, playing nice with the other kiddies and corporations. Then they took their first steps - their first lock-in schemes, their first anticompetitive business practices. It was sooo adorable!

Now they just did the darndest thing - they're finally lying to government investigators. Awww. They're growing up to be just like their big brother Microsoft!
The Internet

Submission + - Unique Identifiers for Baby Geeks?

brownsteve writes: My wife and I are expecting a new addition to our family soon. Perhaps the greatest impact we, as parents, can make is naming our baby. There are lots of things to consider, but I wondered how the Internet age might impact naming children. Is it better to have a common name, like John Smith, and retain the ability to disappear into the crowd? Or is it better to have a globally unique identifier, so that others can easily Google you? What have been your experiences with your name on the Web? If you could change something, what would you change and why?

Is That "Sexting" Pic Illegal? A Scientific Test 711

Frequent Slashdot contributor Bennett Haselton writes " Amid the latest 'sexting' controversy, here is a proposal for a scientifically objective method to determine whether a picture constitutes child pornography. This is a harder problem than it seems, but not for the reasons you'd think. And it raises questions about how the same scientific principles could be applied to other matters of law." Hit the link below to read the sextiest story on Slashdot today.
The Military

US Nuclear Sub Crashes Into US Navy Amphibious Vessel 266

Kugrian writes "Showing that it's not just the British and the French who have trouble seeing each other on the high seas, a US Nuclear submarine yesterday crashed into a US Navy heavy cruiser. The USS Hartford, a nuclear-powered attack submarine, was submerged as it crashed into the USS New Orleans in the strait of Hormuz, resulting in the spillage of 95,000 litres of diesel fuel. Both vessels were heading in the same direction when the collision occurred in the narrow strait and were subsequently heading to port for repairs. A spokesman for the 5th Fleet said that the USS Hartford suffered no damage to its nuclear propulsion system." According to the USS New Orleans' Wikipedia page, it's actually an amphibious transport dock.
Internet Explorer

Microsoft Says IE Faster Than Chrome and Firefox 532

An anonymous reader writes "According to its own speed tests, Microsoft's Internet Explorer loads most websites faster than both Chrome and Firefox when looking at the top 25 websites on the Internet. 'As you can see, IE8 outperforms Firefox 3.05 and Chrome 1.0 in loading 12 websites, Chrome 1.0 places second by loading nine sites first, and Firefox brings up the rear by loading four sites faster than the other two browsers. Also, in case you missed it, IE loads mozilla.com faster than Firefox, and Firefox loads microsoft.com faster than IE, just for kicks.'"

FAA Network Hacked 110

coondoggie writes "The Federal Aviation Administration has joined the growing list of government agencies that have had their supposedly safe systems hacked. The agency this week notified about 45,000 employees that one of its servers was hacked into and employee personal identity information was stolen. The FAA was quick to say the server that was accessed was not connected to the operation of the air traffic control system or any other FAA operational system. It did say two of the 48 files on the breached computer server contained personal information about more than 45,000 FAA employees and retirees who were on the FAA's rolls as of the first week of February 2006."

Comment Use caution (Score 1) 468

Many corporate execs seem to think that whole-disk encryption alone will save their butts in case their laptop ever gets stolen. They use it as a kind of insurance against carelessness. Not quite.

It's worth noting that encryption by itself does not stop a data breach from happening. It only mitigates the short-term consequences. To truly protect your company, you still need a full-service security deployment, and all the inconveniences that come with it.

Once the data has left your hands, encrypted or not, the damage has been done and there's nothing you can do to stop it. A bad guy could copy it, keep it on the shelf, and wait 15 years until we have quantum computers that can break RSA. Then he knows all your old secrets which could still be very damaging 15 years later.

A few months ago, someone stole a local hospital's backup tapes from a courier van. Although the tapes were properly encrypted, the hospital still freaked out about it, with good reason. They even paid for credit monitoring for everyone on the tapes. Once the cops recovered the stolen tapes, they sent them to the FBI to assess whether the tapes had been accessed by the thief.


PowerBeam Demos Wireless Electricity At CES 109

JadedApprentice writes "Caught a mention of this startup yesterday on CNBC while they were reviewing the latest gadgets at CES. In the off chance that there was anything remotely feasible or safe about the wireless power prototypes PowerBeam had on display, I took a quick google and found this nice little write-up on the technology (along with some priceless comments for those that scroll down, and I'm not talking about those on the page below). Bottom line: while it's possibly safe, it may not be efficient and it sure as hell won't power your 1200W gaming rig, the guys at PowerBeam are hoping the convenience of wireless power delivered through directed IR lasers will not only give you the coolest living room in town, but make them very rich in the process" This may be the only one using lasers, but there's a fair gaggle of wireless power schemes on the floor at CES. Besides several chargers limited to charging the controllers of specific game consoles, I walked through a working high-concept demo put on by PowerMat (also mentioned in that PC Magazine article), which relies on dedicated per-device sleeves and dongles to power cameras, phones, and other necessary pocket-fillers; the sleeve-equipped devices then sit to charge on one of the PowerMat induction mats. That means that if your gizmo isn't one for which a sleeve or dongle is available, you're out of luck, unless it uses AA or AAA batteries (there's a charger made to fit on the mat) or can be powered by USB (for which the company has hockey-puck sized USB-power sources, which, Yes, sit on the induction mat). Impressive, but at $30 a pop, that would mean a fair outlay to convert many gadgets to use such a system.

Tooth Regeneration Coming Soon 289

Ponca City, We love you writes "For thousands of years, losing teeth has been a routine part of human aging. Now the Washington Post reports that researchers are close to growing important parts of teeth from stem cells, including creating a living root from scratch, perhaps within one year. According to Pamela Robey of the NIH. 'Dentists say, "Give me a root and I can put a crown on it."' In a few years dentists will treat periodontal disease with regeneration by using stem cells to create hard and soft tissue; they will take out a tooth that is about to fall, and reconnect it firmly to the regenerated tissue. Although nobody is predicting when it will be possible to grow teeth on demand, in adults, to replace missing ones, a common guess is five to ten years. Baby and wisdom teeth are sources of stem cells that could be 'banked' for future health needs, says Robey. 'When you think about it, the teeth children put under their pillows may end up being worth much more than the tooth fairy's going rate. Plus, if you still have your wisdom teeth, it's nice to know you're walking around with your own source of stem cells.'"

Apple Says Macs Are Safe, No Antivirus Needed 449

lobridge writes "Over the last two days multiple news feeds (and Slashdot) have been reporting that Apple has been quietly recommending antivirus software for their machines. It appears now that Apple has deleted an entry on their forums that suggested this and are saying that Mac computers are 'safe out of the box.'"

Silverlight On the Way To Linux 475

Afforess writes "For the past two years Microsoft and Novell have been working on the 'Moonlight' project. It is a runtime library for websites that run Silverlight. It should allow PCs running Linux to view sites that use Siverlight. Betanews reports 'In the next stage of what has turned out to be a more successful project than even its creators envisioned, the public beta of Moonlight — a runtime library for Linux supporting sites that expect Silverlight — is expected within days.' Moonlight 2.0 is already in the works."

Slashdot Top Deals

"The Avis WIZARD decides if you get to drive a car. Your head won't touch the pillow of a Sheraton unless their computer says it's okay." -- Arthur Miller