Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 44 declined, 11 accepted (55 total, 20.00% accepted)

Idle

Submission + - Ex-Microsoft CTO writes $625 cookbook (networkworld.com)

carusoj writes: "Nathan Myhrvold, Microsoft's first CTO, made his mark in the tech world. Now he's cemented his place in the world of cooking and food science with the publication of a groundbreaking six-volume, 2,438-page cookbook. Some of the techniques in Myhrvold's "Modernist Cuisine" are intimidating, to put it mildly, calling for such daunting ingredients as liquid nitrogen and equipment such as centrifuges and rotor-stator homogenizers. But Myhrvold and his co-authors insist that the majority of recipes can be made in a conventional home kitchen — with a few recommended, inexpensive extras such as a digital gram scale and water bath for sous vide cooking."
Idle

Submission + - Geekiest marriage proposals ever (networkworld.com)

carusoj writes: Just in time for Valentine's Day, here's a collection of marriage proposals done in true geek fashion — from hacked video games, to an iPhone app, to CmdrTaco's own 2002 proposal here on Slashdot.
The Internet

Submission + - The Internet has shifted under our feet (networkworld.com) 1

carusoj writes: The way traffic moves over the Internet has changed radically in the last five years. Arbor Networks next week will present a study that found that the bulk of Internet traffic no longer moves across Tier-1 international transit providers. Instead, the traffic is handled directly by large content providers, content delivery networks and consumer networks, and is handed off from one of these to another. You can probably guess what some of these companies are: Google, Microsoft, Facebook. Arbor says there are about 30 of these companies – which Arbor calls “hyper giants” – that generate and consume about 30% of all Internet traffic.
Games

Submission + - China game boss sniped rivals, took down Internet (networkworld.com)

carusoj writes: "An attack by a Chinese online game provider meant to cripple the servers of its rivals ballooned to cause an Internet outage in much of the country in May, according to police. The escalation began with a distributed denial-of-service attack on a domain registrar that serves many small gaming companies. While the national scale of the effects was unusual, such attacks are common among some small Internet businesses competing to draw customers in China, security researchers say. Police have arrested four people involved in the attack."
Security

Submission + - Wi-Fi encryption cracked in 60 seconds (networkworld.com)

carusoj writes: "Computer scientists in Japan say they've developed a way to break the WPA encryption system used in wireless routers in about one minute. Last November, security researchers first showed how WPA could be broken, but the Japanese researchers have taken the attack to a new level. The earlier attack worked on a smaller range of WPA devices and took between 12 and 15 minutes to work. Both attacks work only on WPA systems that use the Temporal Key Integrity Protocol (TKIP) algorithm. They do not work on newer WPA 2 devices or on WPA systems that use the stronger Advanced Encryption Standard (AES) algorithm."
Security

Submission + - Cheap scanners can 'fingerprint' paper (networkworld.com)

carusoj writes: "Researchers at Princeton University and University College London say they can identify unique information, essentially like a fingerprint, from any blank sheet of paper using any reasonably good scanner. The technique could be used to crack down on counterfeiting or even keep track of confidential documents. The researchers' paper on the finding is set to be presented at an IEEE security conference in Oakland, Calif., in May."
Robotics

Submission + - iRobot develops hamster-powered robotic vacuum (networkworld.com)

carusoj writes: "The folks at iRobot apparently have plenty of time on their hands. They created a prototype wireless, robotic vacuum cleaner... powered by a hamster running inside a spinning ball. The rodent's movements with the ball are fed to and analyzed by a complex set of sensors, which then guide the actual vacuum device to mimic the animal's speed and direction. You can see where this is going: it's a clever ploy to then get you to buy a second robot that would automatically feed, water, and clean up after the hamster in the first robot."
The Internet

Submission + - Twitter squatting (networkworld.com)

carusoj writes: "Squatting on domain names is nothing new, but Twitter has created a new opportunity for squatters, in the form of Twitter IDs. Writes Richard Stiennon: "Is there evidence of Twitter squatting (squitting?) Let's check. Yup, every single-letter TwitID is taken... How about common words? Garage, wow, war, warcraft, Crisco, Coke, Pepsi, Nike, and Chevrolet are all taken. My guess is that Twitter squatters have grabbed all of these in the hopes that they will be worth selling in the not too distant future. Of course the legitimate holders of brands can sue for them and Twitter can just turn them over if asked. But, because the investment and risk for the squatter is zero, you are going to see the rapid evaporation of available Twitter IDs.""
Security

Submission + - DARPA attempting the impossible (networkworld.com)

carusoj writes: "Former black-hat hacker Noah Schiffman details why DARPA's National Cyber Range project is bound to fail. The NCR is proposed as a simulation of the Internet, including replicating "human behavior and frailties." Schiffman argues that if the Defense Department is really building something of this scope, it might as well use the actual Internet."
Networking

Submission + - Where's our Terabit Ethernet? (networkworld.com)

carusoj writes: "Five years ago, we were talking about using Terabit Ethernet in 2008. Those plans have been pushed back a bit, but Ethernet inventor Bob Metcalfe this week is starting to throw around a new date for Terabit Ethernet: 2015. He's also suggesting that this be done in a non-standard way, at least at first, saying it's an opportunity to "break loose from the stranglehold of standards and move into some fun new technologies.""

Slashdot Top Deals

"Can't you just gesture hypnotically and make him disappear?" "It does not work that way. RUN!" -- Hadji on metaphyics and Mandrake in "Johnny Quest"

Working...