Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment Had a glass of water at Lake Tahoe CA? (Score 5, Informative) 404

The waste water treatment industry has 3 levels of treatment here on Earth. Primary was what was done in the 60's and before (if any treatment). Solids were ground and held to allow bacteria to digest it (the septic tank method) and it was dumped in the river to dilute it for downstream, with a shot of Chlorine. Then secondary treatment came online in the 70's and later, which is what most municipalities do today, where the solids are filtered out by vacuum or pressure filters and burned or buried, but you'd still be able to tell that the chlorine treated effluent was far from potable.

Finally there is tertiary treatment, which yields water so pure you could drink it (disgusting as it might seem), and this is what is implemented at locations such as Lake Tahoe CA. The water flowing out of the waste water treatment is cleaner than that in the lake itself, after the calcium filtration, etc. There are also de-nitrogenation and de-phosphoration processes to "scrub" the effluent of excess Nitrogen and Phosphorus.

How did you think the Mission to Mars was going to supply water to the crew? Certainly could not tanker enough fresh water to make the multi-year trip to Mars AND BACK.

Privacy

Researchers Find Problems With RFID Passport Cards 172

An anonymous reader writes "Researchers at the University of Washington have found that RFID tags used in two new types of border-crossing documents in the US are vulnerable to snooping and copying. The information in these tags could be copied on to another, off-the-shelf tag, which might be used to impersonate the legitimate holder of the card." You can also read the summary of the researchers' report.
Encryption

New State Laws Could Make Encryption Widespread 155

New laws that took effect in Nevada on Oct. 1 and will kick in on Jan. 1 in Massachusetts may effectively mandate encryption for companies' hard drives, portable devices, and data transmissions. The laws will be binding on any organization that maintains personal information about residents of the two states. (Washington and Michigan are considering similar legislation.) Nevada's law deals mostly with transmitted information and Massachusetts's emphasizes stored information. Between them the two laws should put more of a dent into lax security practices than widespread laws requiring customer notification of data breaches have done. (Such laws are on the books in 40 states and by one estimate have reduced identity theft by 2%.) Here are a couple of legal takes on the impact of the new laws.
Moon

Geminid Explosions On Moon Visible To Amateurs 28

saskboy writes "The ET scanning project SETI@Home was wildly popular, and the mock project Yeti@Home much less so, but soon there will be a chance for the enthusiastic amateur astronomer to combine those two scanning techniques and spot explosions on the moon with simple telescope and camera equipment at home." From the article: "'On Dec. 14, 2006, we observed at least five Geminid meteors hitting the Moon,' reports Bill Cooke of NASA's Meteoroid Environment Office in Huntsville, AL. Each impact caused an explosion ranging in power from 50 to 125 lbs of TNT and a flash of light as bright as a 7th-to-9th magnitude star... 'The amazing thing is,' says Cooke, 'we've [caught explosions] using a pair of ordinary backyard telescopes, 14-inch, and off-the-shelf CCD cameras. Amateur astronomers could be recording these explosions, too.'... [NASA will] soon release data reduction software developed specifically for amateur and professional astronomers wishing to do this type of work. The software runs on an ordinary PC equipped with a digital video card. 'If you have caught a lunar meteor on tape, this program can find it.'"

Slashdot Top Deals

No one gets sick on Wednesdays.

Working...