Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
User Journal

Journal SPAM: We Could be Heroes, Just for One Day 1

David Gergen on Fox "news" with Greta Van Susteren: "Well, it was a stunning backdrop. I don't -- you know, Greta, I've watched the choreography of presidential events for a long time and participated in a few. I can't remember an event as spectacular, as stunning as this, as impressive as this, since Richard Nixon returned from China 30 years ago."

The Internet

Submission + - New Jersey Denies Internet from Sex Offenders (nytimes.com) 3

eldavojohn writes: "New Jersey just passed legislation making it illegal for sex offenders to use the internet. NJ congresswoman Linda D. Greenstein said, "When Megan's Law was enacted, few could envision a day when a sex offender hiding behind a fake screen name would be a mouse-click away from new and unwitting victims. Sex offenders cannot be given an opportunity to abuse the anonymity the Internet can provide as a means of opening a door to countless new potential victims." While they still can search for jobs, this is a major expansion over the prior legislation which barred them from social networking sites like facebook or myspace."
Privacy

Submission + - Sonic advertising - like it or not (p2pnet.net) 1

newtley writes: "Advertisers are determined to get into your head by one means or another, and Holosonic Research Labs has found yet another way of invading your privacy in the name of forcing you pay attention. You're walking down a street in New York when all of a sudden, 'Who's that?' — whispers a woman's voice. 'Who's There?' No. You weren't having a schizoid episode. You were being subjected to 'sound in a narrow beam, just like light' without your permission. It was coming at you from a rooftop speaker 7 stories up. Don't want to be bombarded by sonic ads? Tough. Wear ear-plugs."
Supercomputing

Submission + - Iran builds supercomputer from banned AMD parts 2

Stony Stevenson writes: Iranian scientists claim to have used 216 microprocessors made by AMD to build the country's most powerful supercomputer, despite a ban on the export of U.S. computer equipment to the Middle Eastern nation. Scientists at the Iranian High Performance Computing Research Center at the country's Amirkabir University of Technology said they used a Linux-cluster architecture in building the system of Opteron processors. The supercomputer has a theoretical peak performance of 860 giga-flops, the posting said. The disclosure, made in an undated posting on Amirkabir's Web site, brought an immediate response Monday from AMD, which said it has never authorized shipments of products either directly or indirectly to Iran or any other embargoed country.
Mars

Submission + - How To Beat Congress's Ban Of Humans On Mars 2

An anonymous reader writes: Earlier this year, the House of Representatives passed a bill that would ban humans on Mars at NASA: "Provided, That none of the funds under this heading shall be used for any research, development, or demonstration activities related exclusively to the human exploration of Mars." The bill is held up in Congress and the anti-Mars language may be taken out. But in case the Mars ban becomes law, the Space Review has a handy guide on how NASA can beat the ban and continue its research and development without breaking the law.
Data Storage

Submission + - The Many Paths to Data Corruption (kerneltrap.org)

Runnin'Scared writes: Linux guru Alan Cox has an interesting writeup on KernelTrap in which he talks about all the possible ways for data to get corrupted when being written to or read from a hard disk drive, which much of the information applicable to all operating systems. He prefaces his comments noting that the details are entirely device specific, then dives right into a fascinating and somewhat disturbing path tracing data from the drive, through the cable, into the bus, main memory and CPU cache. He also discusses the transfer of data via TCP and cautions, 'unfortunately lots of high performance people use checksum offload which removes much of the end to end protection and leads to problems with iffy cards and the like. This is well studied and known to be very problematic but in the market speed sells not correctness.'
Patents

Submission + - Legal summits to tackle Linux (builderau.com.au)

An anonymous reader writes: BuilderAU has the story that the Linux Foundation, custodians of the Linux trademark, have announced that they will host two summits to deal with legal issues surrounding Linux and open-source software. Attendance at the first summit will be restricted to members of the Linux Foundation and their legal counsel. The second summit — an open meeting — will be held in Autumn 2008 where legal experts from any background will be able to attend.
The Courts

Submission + - Record Company Collusion a Defense to RIAA Case?

NewYorkCountryLawyer writes: "Is collusion by the record companies a defense to an RIAA case? We're about to find out, because the RIAA has made a motion to strike the affirmative defense of Marie Lindor, who alleged that "the plaintiffs, who are competitors, are a cartel acting collusively in violation of the antitrust laws and of public policy, by tying their copyrights to each other, collusively litigating and settling all cases together, and by entering into an unlawful agreement among themselves to prosecute and to dispose of all cases in accordance with a uniform agreement, and through common lawyers, thus overreaching the bounds and scope of whatever copyrights they might have" in UMG v. Lindor. The motion will be decided by the same judge who agreed with legal scholars in sustaining another affirmative defense of Ms. Lindor, in which she alleges (pdf) that the RIAA's $750-per-song-file statutory damages theory is "unconstitutionally excessive and disproportionate to any actual damages that may have been sustained, in violation of the Due Process Clause"."
Windows

Submission + - Mark Russinovich about Vista network slowdown 1

koro666 writes: In his latest blog post, Mark Russinovich analyzes the network slowdown experienced by some users when playing multimedia content. "Tests of MMCSS during Vista development showed that [...] heavy network traffic can cause enough long-running DPCs to prevent playback threads from keeping up with their media streaming requirements, resulting in glitching. MMCSS' glitch-resistant mechanisms were therefore extended to include throttling of network activity. It does so by issuing a command to the NDIS device driver [...] [to] pass along, at most 10 packets per millisecond (10,000 packets per second)."
The Internet

Submission + - Rural broadband crisis hurts residents & compa (computerworld.com) 1

Ian Lamont writes: "Thanks to profit-oriented telco industry in the U.S., rural residents don't have as much access to broadband services as those who live in urban or suburban areas. According to the federal government, just 17% of rural U.S. households subscribe to broadband service. But the problem is more than a conflict between Wall Street and small-town residents wanting to surf the 'Net or play Warcraft — the lack of broadband access prevents many businesses from growing and diversifying rural economies, as it's expensive or impossible to get broadband:

Soon after moving to Gilsum, N.H. (population 811), [Kim] Rossey learned that he couldn't get broadband to support his Web programming business, TooCoolWebs. DSL wasn't available, and the local cable service provider wasn't interested in extending the cabling for its broadband service the three-tenths of a mile required to reach Rossey's house — even if he paid the full $7,000 cost. Rossey ended up signing a two-year, $450-per-month contract for a T1 line that delivers 1.44Mbit/sec. of bandwidth. He pays 10 times more than the cable provider would have charged and receives one quarter of the bandwidth.
The author also notes that larger businesses are being crimped, from a national call center to a national retailer which claims 17% of its store locations can't get broadband."

Announcements

Submission + - NID Admits ATT/Verizon help with wiretaps (msn.com) 1

Unlikely_Hero writes: National Intelligence Director Mike McConnell has confirmed in an interview with the El Paso Times that AT&T and Verizon have both been helping the Bush Administration conduct wiretaps. He also claims that only 100 Americans are under surveilance, that it takes 200 hours to assemble a FISA warrant on a telephone number and suggests that companies like AT&T and Verizon that "cooperate" (read, collude) with the Administration should be granted immunity from the lawsuits they currently face regarding the issue. Full text available here: http://www.msnbc.msn.com/id/20396282/
Censorship

Submission + - How to silence free speech silently (washingtonpost.com) 1

quizzicus writes: "The Washington Post writes today about a sensitive White House document detailing how to screen for, silence, and remove protesters who show up at the President's public appearances. Obtained by an ACLU subpoena in the Rank v. Jenkins case, the Presidential Advance Manual (pdf) lays out strategies such as searching audience members at the door for hidden protest material, strategically placing "rally squads" throughout the crowd to intercept and shout down hecklers, and forcefully removing dissenters who cannot be squelched. The manual advises, however, that staff should "decide if the solution would cause more negative publicity than if the demonstrators were simply left alone.""
Security

Submission + - How To Steal Cars - Breaking a Car's Cipher

An anonymous reader writes: KeeLoq is a cipher used in several car anti-theft mechanisms distributed by Microchip Technology Inc. It may protect your car if you own a Chrysler, Daewoo, Fiat, General Motors, Honda, Toyota, Volvo, Volkswagen, or a Jaguar. The cipher is included in the remote control device that opens and locks your car and that controls the anti-theft mechanisms.

The 64-bit key block cipher was widely believed to be secure. In a recent research, a method to identify the key in less than a day was found. The attack requires access for about 1 hour to the remote control (for example, while it is stored in your pocket). The attacker than runs the implemented software, finds the secret cryptographic key, and drives away in your car after copying the key.

More info at: http://www.cosic.esat.kuleuven.be/keeloq/
Music

Submission + - The Future of Music (ieee.org)

An anonymous reader writes: The loudness war, what many audiophiles refer to as an assault on music (and ears), has been an open secret of the recording industry for nearly the past two decades and has garnered more attention in recent years as CDs have pushed the limits of loudness thanks to advances in digital technology. The "war" refers to the competition among record companies to make louder and louder albums by compressing the dynamic range. But the loudness war could be doing more than simply pumping up the volume and angering aficionados — it could be responsible for halting technological advances in sound quality for years to come.

Slashdot Top Deals

According to the latest official figures, 43% of all statistics are totally worthless.

Working...