Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Is Your Mood a Result of Where You Live? 364

Ed writes "Apparently, the Centers for Disease Control released a study indicating that geography can have a significant impact on mood. You may not be surprised to learn that Kentucky is more depressing than Hawaii. However, ranking up there with Hawaii are Minnesota, the Dakotas and Wisconsin. Frustratingly, they have not yet published the study on the web, so it is left as an exercise for the reader to find the original study and post a link for the rest of us."
Operating Systems

Cinder Mobile OS Lets Users Send More Power To Slow Apps 92

alphadogg writes with this excerpt from Network World: "Stanford University researchers are designing an operating system from the ground up to handle the power and security requirements of mobile devices. The Cinder operating system is already working on an Arm chip, and members of the team are working on making it run on the HTC G1 handset, according to Philip Levis, a Stanford assistant professor. Levis spoke about Cinder at the Stanford Computer Forum on Tuesday. If an application isn't running as fast as the user wants, a Cinder-based phone could include a button to boost the energy allocated to that application, Levis said. Cinder also could allow users to download any code and run it safely on their phones in a 'sandbox' mode."

Visualizing Data Inside the 30-ft Allosphere 131

TEDChris writes "The Allosphere, being created at UC Santa Barbara, is the most ambitious attempt yet at creating powerful 3d visualizations of raw scientific data, such as the structure of a crystal, or how quantum effects take place. Researchers watch from a bridge inside the 30-foot sphere, looking at data projected 360 degrees around them and listening to 3D sound. The first major public demo of the facility has just been posted at Optimists would argue that many of the greatest scientific breakthroughs happened through a new visual way of imagining data. Penicillin and relativity come to mind. So this is either a killer new research vehicle, an incredible toy, or just an insanely expensive art project."

Build an Open Source SSL Accelerator 136

Amin Zelfani writes "SSL accelerators like Big-IP 6900 from F5 Networks typically carry a $50k or more price tag. An article over at shows you how to build an SSL accelerator that's on par with the commercial solutions, using Open Source projects. SSL Accelerators offload the encryption / decryption process from web servers, reducing load and reducing the number of certificates needed."
The Almighty Buck

Time Warner Broadband Cap Trial Rescheduled In Texas 353

jcrousedotcom writes "Time Warner cable apparently has heard that folks aren't too happy with their plan to meter their unlimited connections. From the first paragraph of the article: 'Time Warner Cable's proposed trials of consumption-based billing were originally slated to begin in several markets this summer, where customers would be a part of a tiered pricing scheme. Pricing would have started at 1 GB per month for $15, and go up to 100 GB per month for $75, and include a per-gigabyte overage fee. The public's reaction was less than favorable, and the trials in Texas have been rescheduled.'"

Energy Secretary Chu Endorses "Clean Coal" 464

DesScorp writes "The Wall Street Journal is reporting that Energy Secretary Steven Chu is endorsing 'clean coal' technology and research, and is taking a pragmatic approach to coal as an energy supply. '"It absolutely is worthwhile to invest in carbon capture and storage because we are not in a vacuum," Mr. Chu told reporters Tuesday following an appearance at an Energy Information Administration conference. "Even if the United States or Europe turns its back on coal, India and China will not," he said. Mr. Chu added that "quite frankly I doubt if the United States will turn its back on coal. We are generating over 50% of our electrical energy from coal."' The United States has the world's largest reserves of coal. Secretary Chu has reversed his positions on coal and nuclear power, previously opposing them, and once calling coal 'My worst nightmare.'"

Human Ear Could Be Next Biometric System 154

narramissic writes "A team of researchers at the University of Southampton, UK, has received funding from the UK's Engineering and Physical Sciences Research Council to learn whether otoacoustic emissions (OAE), the ear-generated sounds that emanate from within the spiral-shaped cochlea in the inner ear, can be used as a viable biometric technology like fingerprints and IRIS recognition. According to a report in New Scientist, someday instead of asking for passwords or pin numbers, a call center or bank would simply use a device on their telephone to produce a brief series of clicks in the recipient's ear to confirm the person is who they say they are." Try faking that with gummy bears.

First Look at Microsoft Exchange Server 2010 Beta 274

snydeq writes "InfoWorld's Martin Heller takes a first look at Microsoft's Exchange Server 2010 Beta, noting several usability, reliability, and compliance improvements over Exchange 2007. Top among Exchange 2010's new features are OWA support for Firefox 3 and Safari 3; improved storage reliability; conversation views; mail federation between trusted companies; and MailTips, a sort of Google Mail Goggles for the corporate environment. 'Database availability groups give you redundant mail stores with continuous replication; database-level failover gives you automatic recovery. I/O optimizations make Exchange less "bursty" and better suited to desktop-class SATA drives; JBOD support lets you concatenate disks rather than stripe them into a redundant array.' Exchange 2010 will, however, require shops to upgrade to Windows Server 2008, as support for Windows Server 2003 has been dropped. Microsoft will release technical previews of other products in the suite, including Office 2010, SharePoint Server 2010, Visio 2010, and Project 2010, in the third calendar quarter."

The Ecological Impact of Spam 176

krou writes "A new study entitled 'The Carbon Footprint of Spam' (PDF) published by ICF International and commissioned by McAfee claims that spam uses around 33 billion kilowatt hours of energy annually, which is approximately enough to power 2.4 million US homes (or roughly 3.1 million cars) for a year. They calculated that the average CO2 emission for a spam email is around 0.3 grams. Interestingly, the majority of energy usage (around 80%) comes from users viewing and deleting spam, and searching for legitimate emails within spam filters. They also claim that 'An individual company can find that one fifth of the energy budget of its email system is wasted on spam.' One of the report's authors, Richi Jennings, writes on his blog that 'spam filtering actually saves an incredible amount of energy.' He continues, 'Imagine if every inbox were protected by a state-of-the-art spam filter. We could save about 75% of the spam energy used today — 25 TWh per year; that's like taking 2.3 million cars off the road.""

Subverting PIN Encryption For Bank Cards 182

An anonymous reader sends in a story at Wired about the increasingly popular methods criminals are using to bypass PIN encryption and rack up millions of dollars in fraudulent withdrawals. Quoting: "According to the payment-card industry ... standards for credit card transaction security, [PINs] are supposed to be encrypted in transit, which should theoretically protect them if someone intercepts the data. The problem, however, is that a PIN must pass through multiple HSMs across multiple bank networks en route to the customer's bank. These HSMs are configured and managed differently, some by contractors not directly related to the bank. At every switching point, the PIN must be decrypted, then re-encrypted with the proper key for the next leg in its journey, which is itself encrypted under a master key that is generally stored in the module or in the module's application programming interface, or API. 'Essentially, the thief tricks the HSM into providing the encryption key,' says Sartin. 'This is possible due to poor configuration of the HSM or vulnerabilities created from having bloated functions on the device.'"

Submission + - Will The Mozilla Fuzzer Break The Web?

darthcamaro writes: Will Mozilla's Fuzzer Break The Web? Or will it make it better? It all depends on who you ask. The new fuzzing tool is set to be released on Wednesday at Black Hat and asked a few people what they think about it. At least one other browser vendor thinks it will be a real risk to the security of the internet.
From the article:
"Any tool given to the public to find ways of exploiting a piece of software is at risk of being misued," Christen Krogh, vice president of engineering at Opera Software said. "When an organization publishes such tools, it must consider whether that tool can be a disservice to millions of innocent bystanders."

Submission + - Is HD DVD Trying to Lose? (

mrnomas writes: "Clint over at Audioholics is on the HD DVD bashing bandwagon again. This time he's charging that HD DVD is trying to lose. With hybrid HD DVD/DVD discs costing more than their Blu-ray counterparts, maybe he's got a point.

"Why won't consumers want these hybrid discs? Because no one likes to spend 3x the cost of a regular DVD just to have a disc available in the eventuality they decide to buy a high definition DVD player whose format may or may not exceed niche status let alone "win" the current format war.""


Submission + - The Technology behind the search for Jim Gray (

krow writes: "Wired has published an article on the technology behind the search for Jim Gray. It is a good set of highlights of his career and the people he worked with during it, and how they applied technology to solve the problem of trying to find him. Greasemonkey scripts, private jets, Ocean going robots, etc were used. Its an amazing read on what can be done with "human" search technology."

Slashdot Top Deals

It is masked but always present. I don't know who built to it. It came before the first kernel.