Forgot your password?
typodupeerror
Biotech

E. Coli Can Be Used To Clean Up Nuclear Waste 102

jerryjamesstone writes "Researchers have found that E. coli can be used to recover uranium from tainted waters and can even be used to clean up nuclear waste. Using the bacteria along with inositol phosphate, the bacteria breaks down the phosphate — also called phytic acid — to free the phosphate molecules. The phosphate then binds to the uranium forming a uranium-phosphate precipitate on the cells of the bacteria. Those cells can then be harvested to recover the uranium." What has made this 14-year-old process economically feasible is the use of inositol phosphate, which is a cheap waste material from the production feedstock from plant material.
Communications

US Cell Phone Plans Among World's Most Expensive 827

Albanach writes "An OECD report published today has shown moderate cell phone users in the United States are paying some of the highest rates in the world . Average US plans cost $52.99 per month compared to an average of $10.95 in Finland. The full report is available only to subscribers, however Excel sheets of the raw data are available to download." (You'll find those Excel sheets — which open just fine in OpenOffice — on the summary page linked above.)

Comment Your spouse is the most important (Score 1) 1146

Your marriage will work, so long as both of you remember this one, simple fact:

Your spouse's happiness is more important than your own.

If you both work hard to make the other happy, then both of you will have a wonderful marriage. Seriously--it is that simple. It doesn't matter if you are a jock, or not; or if she is a submissive cheerleader, or not. What matters is that you are happy. Period.
Good luck in the future with your marriage!

Tron Legacy Exposed 320

KingofGnG writes "Disney has chosen the San Diego Comic-Con International to present its new sci-fi project: the sequel to Tron. The classic movie from 1982 dealt with video games, virtual reality and 3D graphics when none of those things were widely popular. The new movie has got an official title and synopsis now, and they've released the very first trailer from the movie (this time without silly censorship) together with some concept art and the teaser poster." No matter how silly the movie is, they'll at least get my money for sheer nostalgia.
Microsoft

Microsoft's Code Contribution Due To GPL Violation 508

ozmanjusri writes "While Microsoft presented its recent embrace of the GPL as 'a break from the ordinary,' and the press spoke of them as going to great lengths to engage the open source community,' as is often the case with Microsoft, it turns out they had an ulterior motive. According to Stephen Hemminger, an engineer with Vyatta, Microsoft's Hyper-V used open-source components in a network driver and the company released the code to avoid legal action over a GPL violation. Microsoft's decision to embrace the GPL was welcomed by many in the open source community, but their failure to honestly explain the reason behind the release will have squandered this opportunity to build trust, something which is sadly lacking in most people's dealings with Microsoft."
Censorship

China's Green Dam, No Longer Compulsory, May Have Lifted Code 116

LionMage writes "Much has been made previously of how China's Green Dam software must be installed on all new PCs in China, and of more recent revelations that the software may create exploitable security vulnerabilities or even provide the Chinese government with a ready-made botnet to use for potentially nefarious purposes. (One of those prior articles even discusses how Green Dam incorporates blacklists from CyberSitter.) Now the BBC is reporting that Solid Oak's CyberSitter software may have had more than just a compiled blacklist lifted from it. Solid Oak is claiming that actual pieces of their code somehow ended up in Green Dam. From PC Magazine's article: 'Solid Oak Software, the developer of CyberSitter, claims that the look and feel of the GUI used by Green Dam mimics the style of CyberSitter. But more damning, chief executive Brian Milburn said, was the fact that the Green Dam code uses DLLs identified with the CyberSitter name, and even makes calls back to Solid Oak's servers for updates.'" Relatedly, reader Spurious Logic writes that Green Dam won't be mandatory after all, according to an unnamed official with China's Ministry of Industry and Information Technology.
Security

Windows 7 Users Warned Over Filename Security Risk 613

nandemoari writes "Would-be Windows 7 users have been warned to change a default setting which could leave them vulnerable to attack via bogus files. As a result, Microsoft is taking flak for failing to correct a problem found in previous editions of Windows. The issue involves the way Windows Explorer displays filenames. In all editions of Windows after Windows 98, the default setting hides the filename extension (which identifies what type of file it is). This means that a Word file titled 'partyinvite.doc' will show up in Windows Explorer as simply 'partyinvite'. The only exception to this rule is if Windows does not recognize the file type. The reason for this setting is that it makes for a less cluttered look and avoids filling the screen with redundant detail. However, a flaw in the way it works leaves it liable to exploitation by hackers. They can take an executable file (which can do much more damage to a computer when opened) and disguise it by calling it 'partyinvite.doc.exe.'"
Microsoft

Office 2007SP2 ODF Interoperability Very Bad 627

David Gerard writes "Microsoft Office 2007 SP2 claims support for ODF 1.1. With hard work and careful thinking, they have successfully achieved technical compliance but zero interoperability! MSO 2007sp2 won't read ODF 1.1 from any other existing application, and its ODF is only readable by the CleverAge plugin. The post goes into detail as to how it manages this so thoroughly."
GNU is Not Unix

RMS Says "Software As a Service" Is Non-free 715

BillyG noted an RMS interview where he says "'Software as a service' means that you think of a particular server as doing your computing for you. If that's what the server does, you must not use it! If you do your computing on someone else's server, you hand over control of your computing to whoever controls the server. It is like running binary-only software, only worse: it's even harder for you to patch the program that's running on someone else's server than it is to patch a binary copy of a program running on your own computer. Just like non-free software, 'software as a service' is incompatible with your freedom."
Businesses

Why Republicans Won't Retake Silicon Valley 445

An anonymous reader writes "Republican consultant Patrick Ruffini, who counts Google as one of his clients, sketches out a way that the GOP could 'win back' Silicon Valley — but he gets smacked down by tech businessman Francis Cianfrocca. 'Patrick's basic thesis is that the VC firms that fund the Valley will rebel at being regulated by [Treasury Secretary] Tim Geithner, who is talking about increasing reporting requirements for both private equity and venture capital. Assuming I understand them both correctly, something tells me that neither Geithner nor Ruffini understand deeply what venture capital is all about.'"
The Courts

Conviction of Sen. Ted Stevens Is Thrown Out 440

A federal judge has thrown out the conviction of the senator who educated us all about the true nature of the Internet. Ted Stevens had been convicted last fall of lying about free home renovations that he received from an oil contractor, 8 days before he lost his Senate re-election bid. The judge blasted the US Department of Justice prosecutors for mishandling the case in ways that might rise to the level of criminality. "In 25 years on the bench, I have never seen anything approach the mishandling and misconduct in this case," Judge Emmet G. Sullivan said. He called the allegations "shocking and disturbing." According to the article, "Several jurors have told The Washington Post that the evidence against Stevens was overwhelming during a month-long trial that ended in October."

Comment Re:Not acceptable (Score 2, Informative) 149

XHTML has the additional advantage that it is text, and even if 50 years from now, nobody remembers how to render XHTML, they can get the content by reading the file in a text editor.

Also, don't forget that ODF is really little more than XML files zipped together in a single container. Try unzipping an ODF or ODS file—you will find several XML files for formatting, content, etc in there. Personally, I would prefer XHTML or XML files to PDF, simply because I can use vi to read them, if I had to.

Slashdot Top Deals

Beware of all enterprises that require new clothes, and not rather a new wearer of clothes. -- Henry David Thoreau

Working...