Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - 'Archetype' – New Short Film on Robots With Memories (singularityhub.com)

kkleiner writes: "In Aaron Sims‘ exciting new short film Archetype, RL7 is a devastatingly powerful military robot that seems to be remembering its past lifeas a human and loving father. Running under seven minutes, the brief movie grabs its audience with stunning visual effects and an immersive futuristic world. That’s no surprise considering Sims’ impressive credentials – his visual effects and design can be seen in Rise of the Planet of the Apes, Transformers: Dark Side of the Moon, Green Lantern, and dozens of other blockbusters. Archetype is Sims’ breakout project, a self-produced short film that is aimed at attracting the right attention so that it can be extended into a full length feature."

Submission + - Is Venus Slowing Down? (sciencemag.org)

sciencehabit writes: Venus, our closest planetary neighbor, has the slowest rotational period of any world in our solar system—and according to data recently gathered by the European Space Agency's Venus Express orbiter, it's getting slower. In the 1990s, NASA's Magellan probe measured the Venusian day, the length of time needed for the planet to complete one rotation, to be 243.0185 Earth days. But new measurements by Venus Express, which has been orbiting the cloud-shrouded planet since 2006, reveal the current rotational period to be about 6.5 minutes slower.

Submission + - 30% of All US Military Aircraft are Now Drones (singularityhub.com) 1

kkleiner writes: "The American era of drone warfare has clearly arrived. According to a recent report from the Congressional Research Service, nearly one in three US warplanes are drones and those machines are changing the way the world wages war. From short range surveillance craft like the Raven to missile packing hunter-killers like the infamous Predator, the US military is awash with unmanned aerial vehicles (UAV)."

Submission + - Huge Crack In Antarctic Glacier Gives Rise To Iceberg Bigger Than Manhattan! (techie-buzz.com)

An anonymous reader writes: NASA’s Terra satellite saw a huge crack in the Pine Island Glacier in Antarctica and it is all set to give rise to an iceberg the size of Manhattan! The huge gash in the snow is 30 kilometers (or 19 miles) long and nearly 100 meters wide, and is widening every passing minute. This is expected to create an iceberg more than 900 square kilometer in area, as compared to the 785 square kilometer area of Manhattan, Brooklyn, Staten Island and Bronx combined, said NASA.

Submission + - The Dark Side of Apple's Mobile Dominance (infoworld.com)

GMGruman writes: "Although it sold just 9 percent of mobile phones globally last quarter, Apple made 75 percent of all the mobile phone profits. Android sales stalled, allowing the iPhone 4S to outsell all Android phone sales in the same period. And each iPhone sale costs the carriers more due to higher iPhone subsidies, hurting their bottom lines. It's a nightmare scenario for many not he mobile industry: Apple is sucking the money out of the market, much as we saw with iTunes and iPods. Apple's success is due to its own innovations, as well as to the continual stumbles of others, but the result is nonetheless a discomforting dominance by a company users love but that has a dark side tendency to control and obstinance. The joke "It's Steve Jobs' world and we just live in it" may not turn out to be so funny."

Submission + - Biological computer decrypts images stored in DNA (extremetech.com)

MrSeb writes: "Californian and Israeli researchers have created a biological computer — a machine made from biological molecules — that has successfully decoded two images stored and encrypted within DNA. We’re not talking about a molecular computer that’s comparable to the CPU in your PC, though; rather, the scientists created a simple Turing machine-like finite state automaton. 'Our biological computing device is based on the 75-year-old design by the English mathematician, cryptanalyst, and computer scientist Alan Turing,' says Ehud Keinan who led the research. Basically, Keinan and co have created a mixture of molecules that acts in a very specific and repeatable way on DNA that stores image data. Pour in the DNA, wait a few moments while the molecules decode the DNA helix in a massively parallel way, and then — thanks to fluorescent-tagged DNA — marvel as the decoded image appears."

Submission + - Linaro releases Ice Cream Sandwich builds for iMX5 (linaro.org)

b0101101001010000 writes: "We've just released preview ICS builds of Freescale's iMX53, ST Ericsson's Snowball, Samsung's Origen and TI's Panda boards (AOSP supports Panda out of the box, this just contains a kernel that based on Linus' HEAD). This should give Android platform developers on these platforms a good base to work from."

Submission + - IBM illuminates solar power system aimed at data c (networkworld.com)

coondoggie writes: "IBM said today that is rolling out a solar-power array system designed to run high-voltage data centers. IBM has installed the first iteration of the system on the 6,000 square-feet of rooftop of its India Software Lab in Bangalore. The solar array is capable of providing a 50-kilowatt supply of electricity for up to 330 days a year, for an average of five hours a day."

Submission + - China detains Internet users for spreading rumors (networkworld.com)

alphadogg writes: Chinese authorities have started to detain Internet users for allegedly spreading online rumors, in its latest measure to control the country's social media sites. China's State Internet Information Office said it determined several online Internet rumors were fabricated, and instructed relevant departments to prosecute the offenders, according to a Tuesday report from China's state-run press agency Xinhua. The so-called rumors include a case where a user spread alleged misinformation about income tax provisions by forging state documents. The user was detained for 15 days. In another case, a Chinese college student from the province of Yunnan was detained after spreading what the government called a rumor on blogs and forums, about an incident where a man killed eight officials in his village. The "rumor" had said the man killed the officials because of pollution generated from a cement factory.

Submission + - Browser Security - Looking Beyond Vulnerability Co (esecurityplanet.com)

darthcamaro writes: Every so often, a browser vendor (or a paid research group) come out with some kind study that says IE is the best because it does better malware scanning. Other times the which browser is best debate is all about who had the most vulnerabilities. As it turns out, both methods are inadequate ways to measure which browser is the most secure

In general, our conclusion is that the best browser is the one that is the most hostile to a payload being successful," Shawn Moyer managing principal research consultant with Accuvant told the audience at the recent SecTOR security conference in Toronto.


Submission + - XML Encryption Broken, Need to Fix W3C Standard (ruhr-uni-bochum.de)

gzipped_tar writes: Researchers from Ruhr University Bochum demonstrated the insecurity of XML encryption standard at ACM Conference on Computer and Communications Security in Chicago this week. "Everything is insecure", is the uncomfortable message from Bochum.

As pointed out by the Ars Technica article, XML Encryption is used widely as part of server-to-server Web services connections to transmit secure information mixed with non-sensitive data, based on cipher-block chaining. But it is apparently too weak, as demonstrated by Juraj Somorovsky and Tibor Jager. They were able to decrypt data by sending modified ciphertexts to the serve by gathering information from the received error messages. The attack was tested against a popular open source implementation of XML Encrytion, and against the implementations of companies that responded to the responsible disclosure — in all cases the result was the same: the attack worked.

Fixing the vulnerability will require a revision of the W3C XML encryption standard, Somorovsky said. The researchers informed all possibly affected companies through the mailing list of W3C, following a clear responsible disclosure process.

Slashdot Top Deals

You scratch my tape, and I'll scratch yours.