Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:Obligatory question (Score 4, Informative) 123

Here is the quick and dirty from their website:

The Raspberry Pi Foundation is a UK registered charity (Registration Number 1129409) which exists to promote the study of computer science and related topics, especially at school level, and to put the fun back into learning computing.

We plan to develop, manufacture and distribute an ultra-low-cost computer, for use in teaching computer programming to children. We expect this computer to have many other applications both in the developed and the developing world.

Our first product is about the size of a credit card, and is designed to plug into a TV or be combined with a touch screen for a low cost tablet. The expected price is $25 for a fully-configured system.

Provisional specification

        700MHz ARM11
        128MB or 256MB of SDRAM
        OpenGL ES 2.0
        1080p30 H.264 high-profile decode
        Composite and HDMI video output
        USB 2.0
        SD/MMC/SDIO memory card slot
        General-purpose I/O
        Optional integrated 2-port USB hub and 10/100 Ethernet controller
        Open software (Ubuntu, Iceweasel, KOffice, Python)

Electronic Frontier Foundation

Submission + - Warrantless wiretapping cases at the 9th Circuit (eff.org)

sunbird writes: The Electronic Frontier Foundation argued several critical cases yesterday before the Ninth Circuit Court of Appeals. Both Hepting v. AT&T and Jewel v. National Security Agency raise important questions regarding whether the NSA's warrantless wiretapping program (pdf summary of evidence) disclosed by whistleblower Mark Klein and implemented by AT&T and other telecoms, violates the Fourth Amendment to the U.S. Constitution. The full text of the Klein declaration and redacted exhibits are publicly available (pdf). This issue has been previously discussed here (1 2 3 4). The Klein evidence establishes that AT&T cut into the fiber optic cables in San Francisco to route a complete copy of internet and phone traffic to the "SG3" secure room operated by the NSA. The trial court dismissed the Hepting lawsuit (pdf order) based on the 2008 Congressional grant of immunity to telecoms. Similarly, the trial court in Jewel dismissed (pdf order) the lawsuit against the government agencies and officials based on the state secrets privilege. Both cases were argued together before the same panel of judges. The audio of the oral argument will be available after 12noon PT today.

Comment Re:We rock!! (Score 2) 270

Yep Google's search results are totally fine and relevant, fresh, yadda yadda. In fact they are even better than they were years ago!

Oh Btw,
".. we’re evaluating multiple changes that should help drive spam levels even lower, including one change that primarily affects sites that copy others’ content and sites with low levels of original content."

Like Jon Stewart says "Whabba wha?"

Security

Submission + - Compromised .giv, .mil, .edu sites for sale (krebsonsecurity.com) 1

Khopesh writes: Imperva blogged today about the sale of compromised .gov, .mil, and .edu sites, illustrating that cyber-criminals are getting bolder. Krebs on Security has an unredacted view of the site list. Perhaps the biggest threat is yet to come; if an industrious criminal can break into top government and military sites, so too can government-backed teams, proving that GhostNet and Stuxnet are just the beginning...

Comment Die Hard 2 (Score 1) 86

Remember that?
Seems like a millennium now.

I sat and and disinfected stacks of floppies.. one by one.
Back then Antivirus was new and Mcafee was the top dog.

What the heck happened to Mcafee? Ugh.
I convinced the management of my organization to dump Mcafee and switch to VIPRE enterprise. 600+ computers
Mcafee did jack squat when real malware came through. Conficker did a thorough pounding of our network while Maccoffee rolled over and played dead.

Science

Submission + - The Tipping Point of Humanness (sciencemag.org)

sciencehabit writes: Robert Zemeckis, take note. Using videos that morph the face of a baby or man into a doll, researchers have figured out at what point we stop considering a face human--and start considering it artificial. The ability, the researchers say, is key to our survival, enabling us to quickly determine whether the eyes we're looking at have a mind behind them. It may also explain why so many people hated The Polar Express.

Submission + - Placebos Work -- Even Without Deception 1

An anonymous reader writes: For most of us, the "placebo effect" is synonymous with the power of positive thinking; it works because you believe you're taking a real drug. But a new study rattles this assumption. Researchers at Harvard Medical School's Osher Research Center and Beth Israel Deaconess Medical Center (BIDMC) have found that placebos work even when administered without the seemingly requisite deception. The study published on December 22 in PLoS ONE.
Piracy

Submission + - MegaUpload Dares RIAA to Sue Them (zeropaid.com)

Dangerous_Minds writes: Yesterday, there were reports that the RIAA and MPAA were working with Mastercard to cut off payments to so-called "rogue-websites" like MegaUpload. Today, a spokesperson from MegaUpload issued a response to the RIAA on ZeroPaid. Bonnie Lam of MegaUpload said, "the vast majority of our revenue is coming from advertising" She also said, "Megaupload is a legitimate business operating within the boundaries of the law. In five years of operation we have not been sued by a single content owner. If the RIAA or MPAA would have legal grounds they would have taken us to court by now. We suggest that they attack us within the legal system and stop labeling us until they have something to show."
Security

Submission + - Will 2011 be the year of mobile malware? (networkworld.com)

alphadogg writes: Perhaps one of the most common predictions of the last six years has been that mobile malicious software will suddenly proliferate, driven by widespread adoption of smartphones with advanced OSes. None of those prognostications have really come to fruition, but it's likely that the coming year will bring a host of new malicious applications. Users — while generally aware of threats aimed at their desktop computers and laptops — have a good chance of being caught flat-footed with their mobile phones.

In the third quarter of this year, up to 80 million smartphones were sold around the world, which accounted for about 20 percent of the total number of mobile phones sold, according to statistics published last month by analyst firm Gartner.

Experts say the threats against those devices are going to come in several categories, including rogue applications. In September, researchers from security vendor Fortinet discovered a mobile component for Zeus, a notorious piece of banking malware that steals account credentials. The mobile component, which targeted Symbian Series 60 devices or BlackBerrys, intercepted one-time passcodes used to verify transactions.

Other threats will include traditional malware, privacy/data collection issues, and social engineering.

Slashdot Top Deals

"I have just one word for you, my boy...plastics." - from "The Graduate"

Working...