Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Privacy

Submission + - Court upholds warrantless Internet snooping (pressesc.com) 1

amigoro writes: "Federal agents can snoop on an individual's web surfing, email and all other forms of Internet communication habits without a warrant, a US appeals court ruled on Friday. The Ninth U.S. Circuit Court of Appeals in San Francisco in its judgment on USA vs Alba concluded that cyber-surveillance was analogous to the use of a pen register that the Supreme Court held in Smith v. Maryland (1979), and did not constitute a search for Fourth Amendment purposes."
Businesses

Submission + - Music industry demanding money from coffee shops (floridatoday.com)

realjd writes: The music industry has started demanding "protection money" from coffee shops with live music. One was even fined for having the TV on while the Monday Night Football theme played. And the owners pay up to one licensing company, all of the others start harassing them demanding payment too. What's a small business to do? It sounds like they don't even check whether any copyright violations occurred, they're just sending bills to any business that may or may not have live music.
Sci-Fi

Roswell UFO Festival 133

jmcharry writes "From the Washington Post: 'Attention, all aliens. Come on down. Because, seriously, this is your crowd. About 50,000 of your closest admirers are expected this weekend for the Roswell UFO Festival, celebrating the 60th anniversary of the nearby crash landing of a flying saucer — and, naturally, the ensuing government cover-up.'"

25th Anniversary of the Sinclair ZX Spectrum 310

Alioth writes "Twenty five years ago today, Sinclair Research launched Britain's most popular home computer of the 1980s — the Sinclair ZX Spectrum. Costing about one third of the price of its rivals such as the Commodore 64 while having a faster CPU and a better BASIC interpreter, the machine sold well in many guises throughout the 1980s and had more than a staggering 9,000 software titles. The machine may well have done well in the US too, had Timex — the company building the machine under license in the US — not already been in financial trouble and about to fold. The machine was also extremely successful in Russia, although not for Sinclair Research — because the Russians made dozens of different clones of the machine, and did so right into the mid 1990s. The machine still has a healthy retro scene, including the development of new commercial software by Cronosoft, and new hardware such as the DivIDE, which allows a standard PC hard disc or compact flash card to be connected to the machine."
Space

Fermi Paradox Predicting Humankind's Future? 854

An anonymous reader writes "The Fermi paradox says that if extraterrestrial civilizations exist, at least one of them should have colonized the entire galaxy by now. But since there is no evidence of this, humankind must be the only intelligent life in the galaxy. The Space Review has an article on how the Fermi paradox can be applied to human civilization. It says that, like the extraterrestrials, humans have three choices: colonize the galaxy, remain on Earth, or become extinct."
Programming

Submission + - Ruby Implementations Shootout

An anonymous reader writes: Ruby has an ever growing number of alternative implementations, and many of these attempt to improve the suboptimal performance of the current mainstream interpreter. Antonio Cangiano has an interesting article in which he benchmarks a few of the most popular Ruby implementations, including Yarv (the heart of Ruby 2.0), JRuby, Ruby.NET, Rubinius and Cardinal (Ruby on Parrot). Numerical evidence is provided rather than shear opinions. The tests clearly show that Yarv is the fastest implementation and that it offers a promising future when it comes to the speed of the next Ruby version.
Portables (Apple)

Submission + - How Steve Jobs Played Hardball in iPhone Birth

Carl Bialik from WSJ writes: "Apple bucked the rules of the cellphone industry when creating the iPhone by wresting control away from normally powerful wireless carriers, the Wall Street Journal reports. From the article: 'Only three executives at the carrier, which is now the wireless unit of AT&T Inc., got to see the iPhone before it was announced. Cingular agreed to leave its brand off the body of the phone. Upsetting some Cingular insiders, it also abandoned its usual insistence that phone makers carry its software for Web surfing, ringtones and other services. ... Mr. Jobs once referred to telecom operators as "orifices" that other companies, including phone makers, must go through to reach consumers. While meeting with Cingular and other wireless operators he often reminded them of his view, dismissing them as commodities and telling them that they would never understand the Web and entertainment industry the way Apple did, a person familiar with the talks says.'"
Red Hat Software

Red Hat Dismissing Microsoft, Oracle 41

Robert writes to tell us Red Hat's CEO Matthew Szulik is encouraging customers to take Microsoft up on their support voucher offer for Novell's rival Linux system in order to "get the issue over with." Dismissing the impact that the Microsoft-Novell deal has had on business, Szulik is just happy to see customers taking Microsoft's money. "Szulik also dismissed Oracle Corp's attempt to under-cut it on Linux support on similar grounds, insisting that customers were unlikely to be convinced by cost savings that are a small percentage of their overall software spend."
Software

OSS Music Composer Gaining Attention 116

An anonymous reader writes "Following in the footsteps of Psycle, VioLet Composer is a completely GPLed music composer for Windows that has slowly but surely been gaining attention. In an interview at Laptoprockers the author covers not only the program itself but the his reasoning behind choosing to open the source using the GPL."
NASA

Lakes Found Under Antarctic Ice Using Space Lasers 77

Reverse Gear writes "There is a new study circling the media about new lakes found underneath the antarctic ice sheets that apparently empty and fill back up quite fast. 'The scientists allay fears that global warming has created these pockets of water. They say these lakes lie some 2,300 feet below compressed snow and ice, too deep for environmental temperature to reach. However, it is necessary to understand what causes the phenomenon as it can facilitate an understanding of the impact of climate change on the ice sheet in Antarctica.' NASA also has some information on the technique used to detect these lakes."
Education

Kansas Adopts New Science Standards 868

porcupine8 writes "The Kansas State Board of Education has changed the state science standards once again, this time to take out language questioning evolution. This turnaround comes fast on the heels of the ouster given this past election to the ultra-conservative Board members who originally introduced the language. 'Science' has also been re-redefined as 'a human activity of systematically seeking natural explanations' (the word 'natural' had been previously stricken from the definition). If you'd like to see the new standards, a version showing all additions and deletions is available from the KS DOE's website (PDF)."
Biotech

Submission + - Bionic eye could restore vision

MattSparkes writes: "A new bionic eye could restore vision to the profoundly blind. A prototype was tested on six patients and "within a few weeks all could detect light, identify objects and even perceive motion again. For one patient, this was the first time he had seen anything in half a century." The user wears a pair of glasses that contain a miniature camera and that wirelessly transmits video to a cellphone-sized computer in the wearer's pocket. This computer processes the image information and wirelessly transmits it to a tiny electronic receiver implanted in the wearer's head."
Security

Drive-By Pharming Attack Could Hit Home Networks 185

Rob wrote in with a link to a CBR Online article discussing drive-by pharming, a new exploitation technique developed by Indiana University and Symantec Corporation. While it's not known if the technique is in use 'in the wild', the exploit could easily co-opt the web-browsing habits of a user that had not properly configured their router. "The attack works because most of the popular home routers ship with default passwords, default internal IP address ranges, and web-based configuration interfaces. The exploit is a single line of JavaScript loaded with a default router IP address, a default password, and an HTTP query designed to reconfigure the router to use the attacker's DNS servers." The article goes on to discuss several related and more advanced techniques related to this one, which security companies will have to keep in mind to guard against future attacks.

Slashdot Top Deals

The difference between reality and unreality is that reality has so little to recommend it. -- Allan Sherman

Working...