Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
Math

Fermilab Detects "Doubly Strange" Particle 36

DynaSoar writes "While its cousin/competitor site, the Large Hadron Collider at CERN, remains offline, Fermilab's Digital Hadron Calorimeter continues to produce significant results. Recently Fermilab announced discovery of the Omega-sub-b baryon, a 'doubly-strange' particle. This baryon, containing two strange quarks and one bottom quark, has six times the mass of a proton. 'The Omega-sub-b is the latest entry in the "periodic table of baryons." Baryons are particles formed of three quarks, the most common examples being the proton and neutron. ... The observation of this "doubly strange" particle, predicted by the Standard Model, is significant because it strengthens physicists' confidence in their understanding of how quarks form matter. In addition, it conflicts with a 2008 result announced by CDF's sister experiment, DZero. In August 2008, the DZero experiment announced its own observation of the Omega-sub-b based on a smaller sample of Tevatron data. This result contradicted some predictions of the Standard Model, suggesting a "new physics." The new result leads to the possibility that the prior results are not accurate.'"
Censorship

Bill Would Declare Your Blog a Weapon 780

Mike writes "Law prof Eugene Volokh blogs about a US House of Representatives bill proposed by Rep. Linda T. Sanchez and 14 others that could make it a federal felony to use your blog, social media like MySpace and Facebook, or any other Web media 'to cause substantial emotional distress through "severe, repeated, and hostile" speech.' Rep. Sanchez and colleagues want to make it easier to prosecute any objectionable speech through a breathtakingly broad bill that would criminalize a wide range of speech protected by the First Amendment. The bill is called The Megan Meier Cyberbullying Prevention Act, and if passed into law (and if it survives constitutional challenge) it looks almost certain to be misused."
Games

Brave New World of Open-Source Game Design 105

Greg Chudecke writes "The New York Times recently ran an article on game companies that get design input from gamers. The article is branded as 'The Brave New World of Open-source Game Design.' The title may be a little misleading as it isn't exactly like the game design is open source for editing, however it is interesting that gamers are getting an opportunity to shape the games they play."
Government

Cuba Launches Own Linux Variation 494

willclem writes "According to Reuters, it seems that Cuba has launched its own variation of Linux in order to fulfill its government's desire to replace Microsoft operating systems. 'Getting greater control over the informatic process is an important issue,' said Communications Minister Ramiro Valdes, who heads a commission pushing Cuba's migration to free software."
Television

NFL's IT Chief Gears Up For His 25th Super Bowl 82

BobB-nw writes with this excerpt from NetworkWorld: "NFL IT guru David Port claims he doesn't have a favorite football team, but on Sunday he'll be working his 25th Super Bowl. As the league's vice president of information technology, Port and his IT staff are responsible for building a temporary network to support NFL staff and thousands of journalists during Super Bowl week. Port starts preparing for each Super Bowl two years in advance, working with the city and venues where IT operations and media professionals will be based. More intensive planning starts about 11 months before the big game. Port explained that the NFL essentially built a small data center with IBM blade servers at the temporary headquarters in a local Marriott near the Super Bowl site. 'We built out an infrastructure with approximately 300 computers, PCs and laptops, and wired and wireless networks that are used for NFL core operations, for game production and business operations. Much of it is also for media,' Port said." CNet is running a related story about the technology behind the Super Bowl, focusing on some of the visual effects viewers will see, as well as the hardware that makes everything happen.
Programming

Balancing Performance and Convention 171

markmcb writes "My development team was recently brainstorming over finding a practical solution to the problem that's haunted anyone who's ever used a framework: convention vs. customization. We specifically use Rails, and like most frameworks, it's great for 95% of our situations, but it's creating big bottlenecks for the other 5%. Our biggest worry isn't necessarily that we don't know how to customize, but rather that we won't have the resources to maintain customized code going forward; it's quite simple to update Rails as it matures versus the alternative. What have your experiences been with this problem? Have you found any best practices to avoid digging custom holes you can't climb out of?"
Security

Do the SSL Watchmen Watch Themselves? 171

StrongestLink writes "In an intriguing twist on the recent Comodo CA vulnerability discussed here last week, security researcher Mike Zusman today revealed that three days prior to StartCom's disclosure of a flaw in a Comodo reseller's registration process, he discovered and disclosed an authentication bypass flaw to StartCom in their own registration process that allowed an attacker to submit an authorized request for any domain. During a month which was marked by the continuing paradigm shift to SSL-verified holiday shopping, the Chain of Trust continues to run off the gears, and Bruce Schneier is even commenting publicly that SSL's site validation mission isn't even relevant. What lies ahead for the billion-dollar CA industry?"
Microsoft

Windows 7 Leaked To Pirates By Microsoft? 236

nandemoari writes "The beta version of Windows 7 has been widely distributed through torrents and other file sharing systems. But now some commentators claim Microsoft deliberately allowed the package to get into the hands of pirates. 'I'm not being critical here, as some Microsoft Watch commenters will surely claim. It's rather smart marketing. Microsoft fills a big news void with something bloggers and journalists will write about. The suspense of stealth downloads from torrents and races to post the best screenshots first make the Windows 7 leak buzz all the more exciting. For other people, there is delight in seeing Microsoft squirm because Seven leaked early. Not that I see much squirming going on.'"
Bug

Tales From the Support Crypt 855

An anonymous reader writes "Talking viruses, infected physical devices, and lights that go out are some of the 'problems' Panda Security's tech support service has had to face. Many of them were not a result of computer viruses, but of confused users. This proves once again, that antivirus manufacturers must make a special effort to increase user knowledge regarding computer security and malware effects." For anyone who's been on the receiving end of such questions, now's a good time to tell your cathartic tale.
Programming

Rails and Merb Ruby Web Frameworks Merge 80

An anonymous reader writes "The Merb and Rails Core Teams today announced a major merger; the two projects will become one, and be released some time in Q2 of 2009 as Rails 3. This is great news for lots of folks who worried about the potential community fracture, as well as great news for all the developers who will now have an all-around better option for programming Ruby. Read more about the details in Yehuda's blog post, or at the Ruby on Rails blog."
Medicine

Why Climbers Die On Mount Everest 417

Science Daily reports that researchers have conducted the first detailed analysis of deaths during expeditions to the summit of Mt. Everest. They found that most deaths occur during descents from the summit in the so-called "death zone" above 8,000 meters, and also identified factors that appear to be associated with a greater risk of death, particularly symptoms of high-altitude cerebral edema. The big surprise that the data indicate those deaths aren't primarily from avalanches or falling ice, as had long been believed.
Input Devices

Nintendo Slapped With Wiimote Strap Lawsuit Once Again 356

GameCyteSean writes "GameCyte is reporting that a new class-action lawsuit has challenged Nintendo's Wiimote straps once more. Interestingly, the suit was filed by the same lawyer who led the original 2006 attempt, and now argues that Nintendo hid records of broken TVs from the Consumer Product Safety Commission. From the article: 'This doesn't seem like a spurious accusation, either. Attached to the court filing (PDF) as a matter of public record is the very evidence Nintendo allegedly tried to hide: actual, internal Nintendo documents (PDF) where customer service reps received complaints of cracked televisions and broken Wiimote straps — and the corresponding Monthly Reports that Nintendo was compelled to file with the CPSC as part of their agreement.'"
Transportation

Bay Area To Install Electric Vehicle Grid 388

Mike writes "Recently San Francisco, San Jose, and Oakland unveiled a massive concerted effort to become the electric vehicle capitol of the United States. The Bay Area will be partnering with Better Place to create an essential electric vehicle infrastructure, marking a huge step towards the acceptance of electric vehicles as a viable alternative to those that run on fossil fuels." Inhabitat.com has some conceptual illustrations and a map showing EV infrastructure, such as battery exchange stations, stretching from Sacramento to San Diego — though this is far more extensive than the Bay Area program actually announced, which alone is estimated to cost $1 billion.
Image

Dojo: Using the Dojo JavaScript Library 85

stoolpigeon writes "The number and functionality of web based applications has exploded recently. Many of these applications rely heavily on AJAX to provide a more desktop-like experience for users. As the number of people using JavaScript grew, libraries were developed to assist with commonly encountered issues. Jim Harmon's new book Dojo: Using the Dojo JavaScript Library to Build Ajax Applications aims to introduce readers to one of those libraries, the Dojo Toolkit." Keep reading for the rest of JR's review.

Slashdot Top Deals

Kill Ugly Processor Architectures - Karl Lehenbauer

Working...