Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Submission + - Robotics Engineers: "We don't want to replace humans. We want to enhance humans. (computerworld.com)

Lucas123 writes: Scientists developing smart robotic prosthetics say the lines between robots and humans is beginning to blur and that someday soon people will be able to improve their body. For example, Robotic prosthetics, using a built-in computer, 100 sensors and 17 motors can take natural cues from a user's residual limb, giving him or her the dexterity and grace to play a piano. Robotic exoskeletons have helped people suffering from paralysis walk again and the U.S. military is just weeks away from testing a new exoskeleton, or Iron Man-like suit. And, more than six years ago, a University of Arizona researcher who had successfully connected a moth's brain to a robot predicted that by 2022 we'll be using "hybrid" computers that run a combination of technology and living organic tissue. "By utilizing technology, you're able to improve your body beyond anything you could do in the past," said Daniel Wilson, an engineer with degrees in machine learning and robotics from Carnegie Mellon University.

Submission + - White Shark RFID/Sattellite Tracking Shows Long Journeys, Many Beach Visits (computerworld.com)

Lucas123 writes: Marine biologists from OCEARCH, a non-profit shark research project, have been tagging scores of great whites and other shark species with an array of wireless technologies, gathering granular data on the sharks over the past year or more. For example, Mary Lee, a great white shark that's the same weight and nearly the same length as a Buick, was tagged off of Cape Cod and has made beach visits up and down the U.S. East Coast and Bermuda. She came so close to beaches that the research team alerted local authorities. The team attaches an array of acoustic and satellite tags as well as accelerometers to the sharks, which collect more than 100 data points every second — 8.5 million data points per day. The data has provided a detailed, three-dimensional view of the shark's behavior, which the team has been sharing in real time on its website. OCEARCH plans to expand that data sharing over the next few weeks to social networks and classrooms.

Comment Re:Result of shootout & escape (Score 3, Insightful) 604

There is a continuum on a scale that goes from "I have my own rights and I don't care about anyone else" to "What the individual wants isn't important, it's only the common good that matters." Most of us dislike both extremes and find our beliefs somewhere between the two. In this case, most residents thought the emergency and very temporary needs of their community were significantly more important than their own personal convenience and voluntarily complied with a request to stay in for part of a day. Seems eminently reasonable to me, and so I find it curious to be critical of that.
Censorship

Submission + - Nonpartisan Tax Report Removed After Republican Protest (nytimes.com) 1

eldavojohn writes: On September 14th a PDF report titled "Taxes and the Economy: An Economic Analysis of the Top Tax Rates Since 1945" penned by the Library of Congress' nonpartisan Congressional Research Service was released to little fanfare. However the following conclusion of the report has since roiled the GOP enough to have the report removed from the Library of Congress: 'The results of the analysis suggest that changes over the past 65 years in the top marginal tax rate and the top capital gains tax rate do not appear correlated with economic growth. The reduction in the top tax rates appears to be uncorrelated with saving, investment, and productivity growth. The top tax rates appear to have little or no relation to the size of the economic pie. However, the top tax rate reductions appear to be associated with the increasing concentration of income at the top of the income distribution. As measured by IRS data, the share of income accruing to the top 0.1% of U.S. families increased from 4.2% in 1945 to 12.3% by 2007 before falling to 9.2% due to the 2007-2009 recession. At the same time, the average tax rate paid by the top 0.1% fell from over 50% in 1945 to about 25% in 2009. Tax policy could have a relation to how the economic pie is sliced—lower top tax rates may be associated with greater income disparities.' From the New York Times article: 'The pressure applied to the research service comes amid a broader Republican effort to raise questions about research and statistics that were once trusted as nonpartisan and apolitical.' It appears to no longer be found on the Library of Congress' website.
Hardware

Submission + - Past and Future: The Evolution of the Computer Keyboard (computerworld.com)

Lucas123 writes: As anyone who's typed on a virtual keyboard — or yelled at a voice-control app like Siri — can attest, no current text input holds a candle to a traditional computer keyboard. From the reed switch keyboards of the early '70s to the buckling spring key mechanism that drove IBM's popular PC keyboards for years to ThinTouch technology that will have about half the travel of a MacBook Air's keys, the technology that drove data entry for decades isn't likely to go anyone anytime soon. Computerworld takes a look back on five decades of keyboard development and where it's likely to go in the future.
Cloud

Submission + - Mexican hotel chain outsources IT to US (computerworld.com)

cweditor writes: Grupo Posadas has five data centers supporting more than 100 hotels and other lines of business, but it's moving almost all of those operations to a service provider in Texas. Could cloud service providers help the US become a destination for tech outsourcing instead of an exporter of tech jobs? One stumbling block: The US finds itself on the receiving end of protectionist legislation in other countries that discourages use of non-domestic IT service providers, says the Information Technology & Innovation Foundation.
Security

Submission + - Corporate boardrooms open to eavesdropping

cweditor writes: One afternoon this month, a hacker toured a dozen corporate conference rooms via equipment that most every company has in those rooms: videoconferencing. Rapid7 says it could 'easily read a six-digit password from a sticky note over 20 feet away from the camera' and 'clearly hear conversations down the hallway from the video conferencing system.' With some systems, they could even capture keystrokes being typed in the room. Teleconferencing vendors defended their security, saying the auto-answer feature that left those sytsem vulnerable was an effort to strake the right balance between security and usability.
Medicine

Submission + - Medical Imaging with a Hacked LCD Projector (youtube.com)

An anonymous reader writes: Grad students at UC Irvine have built a spatial frequency domain imaging system using parts from a cheap LCD projector and a digital camera. The system can be used to check the level of bruising or oxygenation in layers of tissue that aren't visible to the naked eye, according to an article in Chemical and Engineering News. An accompanying video shows the series of patterned pulses that the improvised imaging system makes in order to read hemoglobin and fat levels below the surface of the skin. A more sophisticated version of the imaging system is being commercialized by a startup within UC Irvine, called Modulated Imaging. The article and video also describe infrared brain scanners that can non-invasively check for brain bleeds, and multiphoton microscopes that produce stunning images of live skin cells.
Android

Submission + - Securing Android for the Enterprise (net-security.org)

Orome1 writes: While many companies use IPsec for secure remote access to their networks, no integrated IPsec VPN client is available on Android. Apple has already fixed this shortcoming in iOS, in part, because it wanted make the iPhone attractive for businesses. The Android operating system doesn’t just lack an integrated IPsec VPN client, it also makes installing and configuring third-party VPN software quite complicated. IPsec VPN clients have to be integrated into the kernel of each device, and the client software has to be installed specifically for a memory area. This means that the firmware of each Android smartphone or tablet has to be modified accordingly. Until a “real” IPsec VPN client is available, Android users can use their devices’ integrated VPN clients based on PPTP or L2TP, which is deployed over IPsec. A “real” IPsec VPN connection, however, is more secure because it encrypts data prior to authentication.
The Almighty Buck

Submission + - Web usage-based billing on its way (sfgate.com) 1

tripleevenfall writes: The days of watching movies on the cheap via the Web may soon be over. Time Warner Cable and U.S. pay-TV companies are on the verge of instituting new fees on Web-access customers who use the most data. Cable's best option is to find ways to profit from the online shift, said Moffett. If the companies were to lose all of their video customers, the revenue decline would be more than offset by a lower programming fees and set-top box spending.

"In the end, it will be the best thing that ever happened to the cable industry," Moffett said.

Technology

Submission + - TV Ownership Declines 2

bs0d3 writes: Every year, the estimated number of U.S. households owning TV sets goes up. Until now. This year, for the first time since 1970, tv ownership has gone down; by about 1%. TV ownership among the key adult 18-49 demo also declined even steeper, down 2.7 percent and percentage of homes without a TV is at the highest level since 1975. The reasons behind this appear to be online media content and the recession.
 

Submission + - Computing pioneers share their first tech memories (silicon.com) 1

An anonymous reader writes: Major names from the world of computing and technology such as Vint Cerf, William Gibson, Richard Stallman, Michael Dell and Hermann Hauser have shared their memories on their first computers and what inspired them to get involved with the computer. Highlight's include Cerf recalling his experience with the valve-based US air defence network Sage — as seen in Dr Strangelove — and Acorn co-founder Hauser building an eight bit computer out of marbles and a shoebox.
The Courts

Submission + - Civil suit filed, involving the time zone database (gmane.org) 1

An anonymous reader writes: Arthur David Olson, the creator and maintainer of the timezone database used in about every unix/linux platform in use on the planet, just sent the message to the timezone mailing list: — From: "Olson, Arthur David (NIH/NCI) [E]" Date: Thu, 6 Oct 2011 11:16:02 -0400 Subject: Civil suit; ftp shutdown; mailing list shutdown A civil suit was filed on September 30 in federal court in Boston; I'm a defendant; the case involves the time zone database. The ftp server at elsie.nci.nih.gov has been shut down. The mailing list will be shut down after this message. Electronic mail can be sent to me at @gmail.com. I hope there will be better news shortly. --ado — A Google search does not yet reveal anything about this; does someone know what is going on?

Slashdot Top Deals

"Just the facts, Ma'am" -- Joe Friday

Working...