Become a fan of Slashdot on Facebook


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment Too risky (Score 2) 118

It really doesn't make sense for large organizations who are supporting mission critical apps. There probably aren't any managers on the planet who will willingly make the decision to support it themselves because one critical issue and it's their job. Instead, they'd much rather have a 3rd party to strangle if and when they have a critical issue

Comment Re:Okay, so this has what to do with fracking then (Score 1) 154

Shearing load results in the slab foundation separating from the slab in a non-uniform matter (which is a very, very bad thing) while the dimensions of both the slab and house remaining constant. You can also get cracks inside the house that are the result of one portion of the house moving in a different direction, than the rest (i.e. more shear load).

Comment Re:Okay, so this has what to do with fracking then (Score 5, Interesting) 154

A majority of them are too small to be felt, but we have had 5.9's and 4.0's before. Even a 3.5 can easily be felt if the epicenter is close enough (of which, my house is only about 3-4 miles away from the epicenter of quite a few of them). The big deal is that it's starting to damage buildings. My house is developing a few cracks here and there, and some people are even getting serious enough as to having some foundational issues. When did it all start? When they started fracking. When did it stop? When they paused fracking for a while. When did it start up again? When they started fracking again. I know correlation does not equal causation but damn if that doesn't provide at least some necessitation to investigate.

Comment Re:OK, I'll bite. (Score 0, Redundant) 685

Ok, I'm going to be a buzz kill and respond with a non-sarcastic idea, but maybe it was a device that communicates via quantum entanglement. Technically those could communicate without regard to time as well, and entanglement communications is dirt simple compared to the massive effort of time travel.

Comment Re:OK, I'll bite. (Score 1) 685

Ok, I'm going to be a buzz kill and respond with a non-sarcastic idea, but maybe it was a device that communicates via quantum entanglement. Technically those could communicate without regard to time as well, and entanglement communications is dirt simple compared to the massive effort of time travel.

Submission + - Cyber-warfare: fact or fantasy?

smellsofbikes writes: This week's New Yorker magazine has an investigative essay by Seymour Hersh about the USA and its part in cyber-warfare that makes for interesting reading. Hersh talks about the financial incentives behind many of the people currently pushing for increased US spending on supposed solutions to network vulnerabilities and the fine and largely ignored distinction between espionage and warfare. Two quotes that particularly stood out: one interviewee said "Current Chinese officials have told me that [they're] not going to attack Wall streat, because [they] basically own it", and Whitfield Diffie, on encryption, "I'm not convinced that lack of encryption is the primary problem [of vulnerability to network attack]. The problem with the Internet is that it's meant for communication among non-friends." The article also has some interesting details on the Chinese disassembly and reverse-engineering of a Lockheed P-3 Orion filled with espionage and eavesdropping hardware that was forced to land in China after a midair collision.

Submission + - Ask Slashdot: Induction cooktop fun

fishfrys writes: Besides generating heat quickly and efficiently in ferromagnetic pans, what sorts of fun things can you do with an induction cooktop? This seems like a pretty serious piece of electromagnetic equipment — boiling water can't be the only thing it's good for. I went to youtube expecting to find all sorts of crazy videos of unsafe induction cooktop shenanigans, but only found cooking. What sort of exciting, if not stupid, physics experiments can be performed with one? Hard drive scrubber... DIY Tesla coil? There's got to be something. Thanks.

Submission + - TFETs as an alternative to MOSFTs in CMOS chips (

angry tapir writes: "A number of chip manufacturers and European research institutions have banded together to figure out how redesign microprocessors so that they consume less energy when in use and leak less energy when in stand-by mode. Called Steeper, the three-year research project will explore an alternative design to the standard CMOS (complementary metal-oxide-semiconductor) designs used to build virtually all commercially available computer chips today. The new approach will use nanowire-based TFETs (tunnel field effect transistors), as an alternative to the MOSFTs (metal--oxide-semiconductor field-effect transistors) used in CMOS chips."

Submission + - China Reverse Engineered Classified NSA OS 2

Pickens writes: "Seymour M. Hersh writes in the New Yorker that China has managed to reverse-engineered a Classified NSA operating system, estimated at between thirty and fifty million lines of computer code, giving China a road map for decrypting the US Navy’s classified intelligence and operational data. The story begins after an American EP-3E Aries II reconnaissance plane on an eavesdropping mission collided with a Chinese interceptor jet over the South China Sea in 2001 and landed at a Chinese F-8 fighter base on Hainan Island, the 24 member crew were unable to completely disable the plane’s equipment and software. Hersh writes that crew of the EP-3E managed to erase the hard drive—“zeroed it out”—but did not destroy the hardware, which left data retrievable: “No one took a hammer.” The Navy’s experts didn’t believe that China was capable of reverse-engineering the plane’s NSA-supplied operating system, but over the next few years the US intelligence community began to “read the tells” that China had gotten access to sensitive traffic and in early 2009, Admiral Timothy J. Keating, then the head of the Pacific Command, brought the issue to the new Obama Administration. "If China had reverse-engineered the EP-3E’s operating system, all such systems in the Navy would have to be replaced, at a cost of hundreds of millions of dollars," writes Hersch. "After much discussion, several current and former officials said, this was done.""

Submission + - Boonana Trojan Cross Platform Trojan for Mac OS X (

An anonymous reader writes: SecureMac has discovered a new cross-platform trojan horse in the wild that affects Mac OS X, including Snow Leopard (OS X 10.6), the latest version of OS X. The trojan horse, trojan.osx.boonana.a, is spreading through social networking sites, including Facebook, disguised as a video. The trojan is currently appearing as a link in messages on social networking sites with the subject "Is this you in this video?" The advisory for boonana includes full details and analysis as well as removal instructions and tool for Mac OS X.

HP Reports Memory Resistor Breakthrough 141

andy1307 writes "Hewlett-Packard scientists on Thursday will report advances demonstrating significant progress in the design of memristors, or memory resistors. The researchers previously reported in The Proceedings of the National Academy of Sciences that they had devised a new method for storing and retrieving information from a vast three-dimensional array of memristors. The scheme could potentially free designers to stack thousands of switches on top of one another in a high-rise fashion, permitting a new class of ultra-dense computing devices even after two-dimensional scaling reaches fundamental limits."

Slashdot Top Deals

Prototype designs always work. -- Don Vonada