Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Palm Announces Killer New Phone 617

Barence writes "At CES, Palm announced what promises to be the product that finally matches and even betters the Apple iPhone, and certainly looks to be the most important product announced at this year's Consumer Electronics Show. It's called the Palm Pre and it's based on a completely new operating system, called Palm webOS. Its key specs include a 3.1in 320x 480 touchscreen, 8GB of storage, UMTS HDSPA support (in the UK version of the phone), 802.11b/g WLAN, Bluetooth, and GPS. It also includes a slide-out Qwerty keyboard, 3.5mm headphone jack, and what Palm described as the 'fastest ever' Texas Instruments OMAP processor."

The Technology Behind the Magic Yellow Line 261

CurtMonash writes "Fandome offers a fascinating video explaining how the first-down line on football broadcasts actually works. Evidently, theres a lot of processing both to calculate the exact location being photographed on the field — including optical sensors and two steps of encoding — and to draw a line in exactly the right place onscreen. For those who don't want to watch the whole video, highlights are here."

How to Save Mac OS X From Malware 222

eXchange writes "Well-known hacker Dino Dai Zovi has written an article at ZDNet discussing last week's discovery of a critical threat to Mac OS X, and another announcement of a Trojan horse exploiting this discovery. He suggests that Snow Leopard, or Mac OS X 10.6, should integrate more robust means of preventing malware attacks. Some of the suggestions he has include mandatory code-signing for kernel extensions (so only certified kernel extensions can run), sandbox policies for Safari, Mail, and third-party applications (so these applications cannot do anything to the system), and some lower-level changes, such as hardware-enforced Non-eXecutable memory and address space layout randomization."
The Internet

Algorithm Rates Trustworthiness of Wikipedia Pages 175

paleshadows writes "Researchers at UCSC developed a tool that measures the trustworthiness of each Wikipedia page. Roughly speaking, the algorithm analyzes the entire 7-year user-editing-history and utilizes the longevity of the content to learn which contributors are the most reliable: If your contribution lasts, you gain 'reputation,' whereas if it's edited out, your reputation falls. The trustworthiness of a newly inserted text is a function of the reputation of all its authors, a heuristic that turned out to be successful in identifying poor content. The interested reader can take a look at this demonstration (random page with white/orange background marking trusted/untrusted text, respectively; note "random page" link at the left for more demo pages), this presentation (pdf), and this paper (pdf)."

Slashdot Top Deals

Wishing without work is like fishing without bait. -- Frank Tyger