Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
Politics

Submission + - Internet-based political party opens doors (nytimes.com)

AlamedaStone writes: New York Times Op-Ed Columnist Thomas L. Friedman writes (edited for brevity):

"If [...] idiocy by elected officials [...] leaves you wishing that we had more options today [...] not only are you not alone, but help may be on the way.

Thanks to a quiet political start-up that is now ready to show its hand, a viable, centrist, third presidential ticket, elected by an Internet convention, is going to emerge in 2012. "

Currently it looks like more liberal-inclined individuals are registering, but it would make for a healthier system if more viewpoints were represented.

Android

Submission + - Uh oh! Android password data stored in plain text. (thehackernews.com)

jampola writes: "So The Hacker News is reporting that Android password data is being stored as plain text in it's SQlite database. The Hackers news says that "The password for email accounts is stored into the SQLite DB which in turn stores it on the phone's file system in plain text.Encrypting or at least transforming the password would be desirable." — I'm sure most would agree encrypted password data in at least SHA or MD5 would be kind of a good idea!"
Censorship

Submission + - Online Call to Shoot President Ruled Free Speech

Hugh Pickens writes writes: "USA Today reports that the 9th U.S. Circuit Court of Appeals has reversed the conviction of a man who threatened to shoot President Obama, saying his Internet message board comments amounted to free speech and ruled that prosecutors "failed to present sufficient evidence to establish beyond a reasonable doubt" that the man "had the subjective intent to threaten a presidential candidate." Walter Bagdasarian was found guilty two years ago of making threats against the presidential candidate in comments he posted on a Yahoo.com financial website after 1 am on Oct. 22, 2008, as Obama's impending victory in the race for the White House was becoming apparent. Bagdasarian told investigators he was drunk at the time. The observation that Obama "will have a 50 cal in the head soon" and a call to "shoot the [racist slur]" weren't violations of the law under which Bagdasarian was convicted because the statute doesn't criminalize "predictions or exhortations to others to injure or kill the president," said the majority opinion written by Judge Stephen Reinhardt. "On a practical level, it's a very thin line between Bagdasarian's free speech and the guy who doesn't just spew threats online but actually carries them out," writes journalist Paul Whitefield. "It's remarkable how inconvenient the law can be at times, isn't it?""
Security

Submission + - Heathrow To Install Facial Recognition Scanners (itworld.com)

itwbennett writes: "Slashdot readers will recall that back in February, Heathrow airport required full body scanning for select individuals. Now we learn that the airport is installing facial recognitions scanners. The scanners will be used to capture passengers' faces before entering security checks and again before boarding. The stated goal is to prevent illigal immigration."
Networking

Submission + - Google+ Suspending User Accounts Enmass? (zdnet.com)

ideonexus writes: "Reports of Google+ deleting user accounts all over, including Limor Fried — AKA Lady Ada / Adafruit Industries recently featured in Wired Magazine and former Google employee Kirrily “Skud” Robert for violating Google's identity ToS. Other users are finding themselves locked out of their accounts without an explanation of how they violated the ToS. The worst part for these individuals is that a lock-out of Google+ includes being locked out of all Google services, including email, calendar, and documents."
Programming

Submission + - 'The Code Has Already Been Written'

theodp writes: John D. Cook points out there's a major divide between the way scientists and programmers view the software they write. Scientists see their software as a kind of exoskeleton, an extension of themselves. Programmers, on the other hand, see their software as something they will hand over to someone else, more like building a robot. To a scientist, the software soup's done when they get what they want out of it, while professional programmers give more thought to reproducibility, maintainability, and correctness. So what happens when the twain meet? 'The real tension,' says Cook, 'comes when a piece of research software is suddenly expected to be ready for production. The scientist will say 'the code has already been written' and can't imagine it would take much work, if any, to prepare the software for its new responsibilities. They don't understand how hard it is for an engineer to turn an exoskeleton into a self-sufficient robot.'

Submission + - Victory for evolution in Texas (ncse.com) 1

An anonymous reader writes: Pop the champagne corks. The Texas Board of Education has unanimously come down on the side of evolution. In an 8-0 vote, the board today approved scientifically accurate high school biology textbook supplements from established mainstream publishers--and did not approve the creationist-backed supplements from International Databases, LLC.
Medicine

Submission + - Personal DNA Sequencing Machine One Step Closer

oxide7 writes: A new, low cost semiconductor-based gene sequencing machine has been developed and may unlock the door to advanced medicines and life itself. A team led by Jonathan Rothberg of Ion Torrent in Guilford, Conn is working on a system which uses semiconductors to decode DNA, dramatically reducing costs and taking them closer to being able to reach the goal of a $1000 human genome test. The current optical based system costs around $49000 and is already on the market and being used in over 40 countries.
Communications

Submission + - Undersea Cables Damaged by Earthquake (gigaom.com)

ColoradoAuthor writes: "The horrific earthquake and the ensuing tsunami in Japan have caused widespread damage to undersea communications, according to data collected by telecom industry sources. Initially, it was thought that the damage to the cables that connect Japan and Asia to each other and other parts of the world was limited, but new data shows the extent of the problems."
Science

Submission + - Physicists Develop Quantum Public Key Encryption (technologyreview.com)

KentuckyFC writes: "Public key cryptography allows anybody to encrypt a message using a public key but only those with another private key can decrypt the message. That's possible because of certain mathematical functions that are easy to perform in one direction but hard to do in reverse. The most famous example is multiplication. It's easy to multiply two numbers together to get a third but hard to start with the third number and work out its factors. Now Japanese researchers have discovered a quantum problem that is hard to solve in one direction but easy to do in reverse. This asymmetry, they say, could form the basis of a new kind of quantum public key cryptography. Their system is based on the problem of distinguishing between two ensembles of quantum states. This is similar to the problem of determining whether two graphs are identical, ie whether they correspond vertex-for-vertex and edge-for-edge. Increasing the complexity of the graph can always make this problem practically impossible for a quantum computer to solve in a reasonable time. But knowing the structure of a subset of the graph makes this problem easy, so this acts as a kind of private key for decrypting messages."
Cloud

Submission + - IsoHunt To Court: Google Is The Bigger Problem (techspot.com)

Krystalo writes: isoHunt is still fighting its legal battle with the MPAA. In the latest episode, the torrent website filed a reply brief to the US Court of Appeals in which it suggests that Google, and not IsoHunt, is the largest BitTorrent search engine on the Internet.

Slashdot Top Deals

And on the seventh day, He exited from append mode.

Working...