Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Image

Jetman Attempts Intercontinental Flight 140

Last year we ran the story of Yves Rossy and his DIY jetwings. Yves spent $190,000 and countless hours building a set of jet-powered wings which he used to cross the English Channel. Rossy's next goal is to cross the Strait of Gibraltar, from Tangier in Morocco and Tarifa on the southwestern tip of Spain. From the article: "Using a four-cylinder jet pack and carbon fibre wings spanning over 8ft, he will jump out of a plane at 6,500 ft and cruise at 130 mph until he reaches the Spanish coast, when he will parachute to earth." Update 18:57 GMT: mytrip writes: "Yves Rossy took off from Tangiers but five minutes into an expected 15-minute flight he was obliged to ditch into the wind-swept waters."
Supercomputing

Australia's CSIRO To Launch CPU-GPU Supercomputer 82

bennyboy64 contributes this excerpt from CRN Australia: "The CSIRO will this week launch a new supercomputer which uses a cluster of GPUs [pictures] to gain a processing capacity that competes with supercomputers over twice its size. The supercomputer is one of the world's first to combine traditional CPUs with the more powerful GPUs. It features 100 Intel Xeon CPU chips and 50 Tesla GPU chips, connected to an 80 Terabyte Hitachi Data Systems network attached storage unit. CSIRO science applications have already seen 10-100x speedups on NVIDIA GPUs."
Handhelds

Modded UX490 UMPC Shows Off Years of Community Development 75

An anonymous reader writes "The community at www.MicroPCTalk.com have spent the last few years devising all sorts of mods and tweaks for the Sony VAIO UX-series UMPC. Now they've thrown nearly all of their major breakthroughs into one machine. Using the latest UX model (UX490) as the base, the original SSD has been swapped for a speedy 128GB SSD, the CPU has been unsoldered from the mobo and replaced with a Core 2 Duo U7700 (making this probably the smallest computer to use said CPU). The original EDGE module has been removed, and carefully put in its place is an E169 Huawei terminal which provides up to 7.2mbps 3G (HSDPA), voice and texting. On top of this, the unit quad-boots Mac OS X, Windows 7, Windows Vista, and Windows XP (and the Huawei terminal works under Mac OS X as well)."
Communications

After 35 Years, Another Message Sent From Arecibo 249

0xdeadbeef writes "Two weeks ago, MIT artist-in-residence Joe Davis used the Arecibo radio telescope to send a message to three stars in honor of the 35th anniversary of the famous Drake-Sagan transmission to M13 in 1974. It was apparently allowed but not endorsed by the director of the facility, and used a jury-rigged signal source on what will now be known as the 'coolest iPhone in the world.' The message encoded a DNA sequence, but no word yet on whether it disabled any alien shields. You can get the low-down on Centauri Dreams: Part 1, Part 2."
Science

Light Resonators Used To Move Nano-Sized Objects 63

ElectricSteve writes "Scientists at Cornell University report they can now use a light beam carrying a single milliwatt of power to move objects and even change the optical properties of silicon from opaque to transparent at the nanometric scale." As the article says, such an advancement "could prove very useful for the future of micro-electromechanical (MEMS) and micro-optomechanical (MOMS) systems."
Math

Tracking the World's Great Unsolved Math Mysteries 221

coondoggie writes "Some math problems are as old as the wind, experts say, and many remain truly unsolved. But a new open source-based site from the American Institute of Mathematics looks to help track work done and solve long-standing and difficult math problems. The Institute, along with the National Science Foundation, has opened the AIM Problem Lists site to offer an organized and annotated collection of unsolved problems, and previously unsolved problems, in a specialized area of mathematics research. The problem list provides a snapshot of the current state of research in a particular research area, letting experts track new developments, and newcomers gain a perspective on the subject."
Privacy

Chicago's Camera Network Is Everywhere 327

DesScorp writes "Over the past few years, the City of Chicago has installed video cameras all over the city. Now the Wall Street Journal reports that the city has not only installed its own cameras for law enforcement purposes, but with the aid of IBM, has built a network that possibly links thousands of video surveillance cameras all over Chicago. Possibly, because the city refuses to confirm just how many cameras are in the network. Critics say that Chicago is becoming the city of Big Brother. 'The city links the 1,500 cameras that police have placed in trouble spots with thousands more—police won't say how many—that have been installed by other government agencies and the private sector in city buses, businesses, public schools, subway stations, housing projects and elsewhere. Even home owners can contribute camera feeds. Rajiv Shah, an adjunct professor at the University of Illinois at Chicago who has studied the issue, estimates that 15,000 cameras have been connected in what the city calls Operation Virtual Shield, its fiber-optic video-network loop.' There are so many camera feeds coming in that police and officials can't monitor them all, but when alerted to a situation, can zoom in on the area affected. The ACLU has requested a total number of video feeds and cameras, but as of yet, this information has not been supplied."
Encryption

US Government Using PS3s To Break Encryption 570

Entropy98 writes "It seems that the US Immigration and Customs Enforcement Cyber Crimes Center, known as C3, has replaced its '$8,000 Tableau/Dell server combination' with more efficient and much cheaper $300 PS3s. Each PS3 is capable of 4 million passwords per second, and C3 currently has 20 PS3s with plans to buy 40 more. Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography."

Comment Re:Depends on definition of virus, (Score 1) 156

Long time ago, I realized I can NOT trust ANY application that asks for root/admin access to my system. My solution was to virtualize the crap into its own virtual machine.

RAM is cheap these days, I have 12GB... Perhaps you could do the same. When you want to use that specific application, you just unpause the virtual machine.

I have actually done the same thing with "Internet". "ALL" my "Internet" is inside a virtual machine and my main PC has no Internet access at all.

Just a suggestion.

Slashdot Top Deals

HOST SYSTEM NOT RESPONDING, PROBABLY DOWN. DO YOU WANT TO WAIT? (Y/N)

Working...