slashdot.org Site Updates

Syndicate content Slashdot
News for nerds, stuff that matters
Updated: 1 hour 8 min ago

ESRB Exposes Emails of Gamers Who Filed Privacy Complaints

1 hour 45 min ago
simrook writes, "Many people filed privacy complaints with the ESRB over Blizzard's recent (and afterward recanted) move to require the display of users' real life names on Blizzard's official forums. 961 of those complainants had their email addresses exposed in the ESRB's response." The response itself didn't go into the organization's thoughts on Blizzard's plan, but they explained to the Opposable Thumbs blog that anonymity isn't a huge concern to them, as long as users are given the opportunity to opt out. "The role of the ESRB Privacy Online program is to make sure that member websites—those that display our seal on their pages — are compliant with an increasingly complex series of privacy protection laws and are offering a secure space for users to interact and do business online. ... But online privacy protection doesn't necessarily mean the same thing as anonymity. It's about making sure that websites collecting personal information from users are doing so not only in accordance with federal regulations but also with best practices for protecting individuals' personal information online."

Read more of this story at Slashdot.


Categories: Geek News

Electric Cars Won't Strain the Power Grid

3 hours 20 min ago
thecarchik writes "Last week's heat wave prompted another eruption of that perennial question: Won't electric cars that recharge from grid power overload the nation's electricity system? The short answer is no. A comprehensive and wide-ranging two-volume study from 2007, Environmental Assessment of Plug-In Hybrid Vehicles, looked at the impact of plug-in vehicles on the US electrical grid. It also analyzed the 'wells-to-wheels' carbon emissions of plug-ins versus gasoline cars. The load of one plug-in recharging (about 2 kilowatts) is roughly the same as that of four or five plasma television sets. Plasma TVs hardly brought worries about grid crashes."

Read more of this story at Slashdot.


Categories: Geek News

Retrieving a Stolen Laptop By IP Address Alone?

5 hours 18 min ago
CorporalKlinger writes "My vehicle was recently burglarized while parked in a university parking lot in a midwestern state. My new Dell laptop was stolen from the car, along with several other items. I have no idea who might have done this, and the police say that without any idea of a suspect, the best they can do is enter the serial number from my laptop in a national stolen goods database in case it is ever pawned or recovered in another investigation. I had Thunderbird set up on the laptop, configured to check my Gmail through IMAP. Luckily, Gmail logs and displays the last 6 or 7 IP addresses that have logged into your account. I immediately stopped using that email account, cleared it out, and left the password unchanged — creating my own honeypot in case the criminal loaded Thunderbird on my laptop. Sure enough, last week Gmail reported 4 accesses via IMAP from the same IP address in a state just to the east of mine. I know that this must be the criminal who took my property, since I've disabled IMAP access to the account on all of my own computers. The municipal police say they can't intervene in the case since university police have jurisdiction over crimes that take place on their land. The university police department — about 10 officers and 2 detectives — don't even know what an IP address is. I even contacted the local FBI office and they said they're 'not interested' in the case despite it now crossing state lines. Am I chasing my own tail here? How can I get someone to pay attention to the fact that all the police need to do is file some RIAA-style paperwork to find the name associated with this IP address and knock on the right door to nab a criminal and recover my property? How can I get my laptop back — and more importantly — stop this criminal in his tracks?"

Read more of this story at Slashdot.


Categories: Geek News

Sun's Dark Companion 'Nemesis' Not So Likely

7 hours 17 min ago
TravisTR passes along a story about the death of Nemesis. "The data that once suggested the Sun is orbited by a distant dark companion now raises even more questions... The periodicity [of mass extinctions] is a matter of some controversy among paleobiologists but there is a growing consensus that something of enormous destructive power happens every 26 or 27 million years. The question is what? ... another idea first put forward in the 1980s is that the Sun has a distant dark companion called Nemesis that sweeps through the Oort cloud every 27 million years or so, sending a deadly shower of comets our way. ... [Researchers] have brought together a massive set of extinction data from the last 500 million years, a period that is twice as long as anybody else has studied. And their analysis shows an excess of extinctions every 27 million years, with a confidence level of 99%. That's a clear, sharp signal over a huge length of time. At first glance, you'd think it clearly backs the idea that a distant dark object orbits the Sun every 27 million years. But ironically, the accuracy and regularity of these events is actually evidence against Nemesis' existence."

Read more of this story at Slashdot.


Categories: Geek News

Consumer Reports Can't Recommend iPhone 4

Mon, 07/12/2010 - 22:50
jbezorg was one among many readers to send word that Consumer Reports has concluded that they cannot recommend the iPhone 4. (They still enthusiastically recommend the 3G S.) "It's official. Consumer Reports' engineers have just completed testing the iPhone 4, and have confirmed that there is a problem with its reception. When your finger or hand touches a spot on the phone's lower left side — an easy thing, especially for lefties — the signal can significantly degrade enough to cause you to lose your connection altogether if you're in an area with a weak signal. Due to this problem, we can't recommend the iPhone 4. ... Our findings call into question the recent claim by Apple that the iPhone 4's signal-strength issues were largely an optical illusion caused by faulty software that 'mistakenly displays 2 more bars than it should for a given signal strength.'" The comments on the article don't display any of the vitriol the Apple faithful have been known to unleash upon anyone daring to question the Cupertino way. Perhaps they are moderated.

Read more of this story at Slashdot.


Categories: Geek News

Familial DNA Testing Nabs Alleged Serial Killer

Mon, 07/12/2010 - 22:06
cremeglace writes "A quarter-century of conventional detective work failed to track down the killer responsible for the deaths of at least 10 young women in south Los Angeles dating back to the mid-1980s. But a discarded piece of pizza and a relatively new method of DNA testing has finally cracked the case, police announced last week. On July 7, L.A. police arrested Lonnie Franklin Jr., 57, a former garage attendant and sanitation worker they suspect is the serial killer nicknamed the 'Grim Sleeper.' The key evidence? A match between crime-scene DNA and the suspect's son, obtained by a search through the state's data bank of DNA collected from 1.3 million convicted felons."

Read more of this story at Slashdot.


Categories: Geek News

SETI Institute Is Looking For a Few Good Algorithms

Mon, 07/12/2010 - 21:22
blackbearnh writes "For years, people have been using SETI@Home to help search for signs of extraterrestrial life in radio telescope data. But Jill Tarter, director of the Center for SETI Research at the SETI Institute, wants to take things to the next level. Whereas SETI@Home basically used people's computers as part of a giant distributed network to run a fixed set of filters written by SETI researchers, Tarter thinks someone out there may have even better search algorithms that could be applied. She's teamed with a startup called Cloudant to make large volumes of raw data from the new Allen telescope available, and free Amazon EC2 processing time to crunch the data. According to Tarter: 'SETI@Home came on the scene a decade ago, and it was brilliant and revolutionary. It put distributed computing on the map with such a sexy application. But in the end, it's been service computing. You could execute the SETI searches that were made available to you, but you couldn't make them any better or change them. We'd like to take the next step and invite all of the smart people in the world who don't work for Berkeley or for the SETI Institute to use the new Allen Telescope. To look for signals that nobody's been able to look for before because we haven't had our own telescope; because we haven't had the computing power.'"

Read more of this story at Slashdot.


Categories: Geek News

Education Official Says Bad Teachers Can Be Good For Students

Mon, 07/12/2010 - 21:00
Zenna Atkins, the chairman of the Office for Standards in Education (Ofsted), has raised some eyebrows by saying that, "every school should have a useless teacher." She stresses that schools shouldn't seek out or tolerate bad teaching, but thinks bad teachers provide a valuable life-lesson. From the article: "... on Sunday Ms Atkins told the BBC that schools needed to reflect society, especially at primary level. 'In society there are people you don't like, there are people who are incompetent and there are often people above you in authority who you think are incompetent, and learning that ability to deal with that and, actually surviving that environment can be an advantage.'"

Read more of this story at Slashdot.


Categories: Geek News

White House Tackling the Economics of Cybersecurity

Mon, 07/12/2010 - 20:39
GovTechGuy writes "White House Cybersecurity czar Howard Schmidt will be hosting a meeting Wednesday with the Secretaries of DHS and Commerce in which he is expected to discuss the administration's new attempt to change the economic incentives surrounding cybersecurity. Right now, launching attacks on private companies is so cheap and relatively risk-free that there's almost no way that industry can win. The White House could be considering things like tax incentives, liability and insurance breaks, and other steps to try and get companies to invest in protecting their networks. It's also likely to dovetail with a step up in enforcement, so hackers be wary."

Read more of this story at Slashdot.


Categories: Geek News

Ballmer Says Microsoft Is 'Hardcore' About Tablets

Mon, 07/12/2010 - 19:57
gbll writes with news that Microsoft is gearing up to aggressively pursue the tablet PC market, according to CEO Steve Ballmer. Microsoft is working with a variety of hardware companies including Asus, Dell, Samsung, Toshiba and Sony, to release Windows 7 slates later this year. "These slates will be available at a variety of price points and in a variety of form factors — with keyboards, touch only, dockable, able to handle digital ink, etc. Since Ballmer showed off a prototype of a Windows 7 slate from Hewlett-Packard at the Consumer Electronics Show in January, the company has said next-to-nothing about how it planned to address the slate form-factor space. ... Ballmer never mentioned the iPad or the coming Chrome OS-based slates by name during his remarks. Microsoft’s pitch will be that these slates will be sanctioned by corporate IT departments, enabling customers to use them at work and at home."

Read more of this story at Slashdot.


Categories: Geek News

Senators Want Big Rocket Instead of New Tech, Commercial Transportation

Mon, 07/12/2010 - 19:14
FleaPlus writes "Members of the Senate Committee on Commerce, Science, and Transportation are drafting a bill (due this week) which slashes NASA technology development/demonstrations, commercial space transportation, and new robotic missions to a small fraction of what the White House proposed earlier this year. The bill would instead redirect NASA funds to 'immediate' development of a government-designed heavy lift rocket, although it's still unclear if NASA can afford a heavy lifter in the long term or if (with the new technology the Senators seek to cut, like in-space refueling) it actually needs such a rocket. The Senators' rocket design dictates a payload of 75mT to orbit, uses the existing Ares contracts and Shuttle infrastructure as much as possible, and forces use of the solid rocket motors produced by Utah arms manufacturer ATK."

Read more of this story at Slashdot.


Categories: Geek News

Boeing, BAE Systems Show Off New Unmanned Planes

Mon, 07/12/2010 - 18:29
gilgsn writes The hydrogen-powered Phantom Eye unmanned airborne system, a demonstrator that will stay aloft at 65,000 feet for up to four days, was unveiled by Boeing today. 'Phantom Eye is powered by two 2.3-liter, four-cylinder engines that provide 150 horsepower each. It has a 150-foot wingspan, will cruise at approximately 150 knots and can carry up to a 450-pound payload.' Across the pond, BAE Systems showed off Taranis, a UAV that will test the possibility of developing the first ever autonomous, stealth Unmanned Combat Air Vehicle that would ultimately be capable of precisely striking targets at long range — even in another continent."

Read more of this story at Slashdot.


Categories: Geek News

Long-Term Liability For One-Time Security Breaches?

Mon, 07/12/2010 - 17:46
An anonymous reader writes "Not a month goes by where we don't hear about a theft of some organization's laptop containing sensitive personal information, not to mention the even more frequent — but often kept secret — breaches into company networks and databases. It is definitely true that you should be responsible for the security of your information when you handle it, but what happens when the theft of your information is not your fault? You have handed over this information to a company or organization and trusted them to keep is secure, but they failed. They might notify you of the breach or theft, and they might even set up a credit monitoring service for you for a year or two, but the problem is that this information may be used years from now. Is it fair that you have to worry for decades and pay for further credit monitoring when they are to blame for your information ending up in the wrong hands?"

Read more of this story at Slashdot.


Categories: Geek News

Chinese News Reports the Taliban Are Training Monkey Soldiers

Mon, 07/12/2010 - 17:13
According to a Chinese news publication, soldiers in Afghanistan may soon come up against a deadly new weapon in the war: monkey soldiers. The report claims that the Taliban are training the monkeys to shoot and kill American soldiers. They also claim to have pictures of monkeys holding AK-47s and Bren light machine guns. From the article: "The New York Magazine has reported about this in jest and stated on Friday, 'No invader has ever conquered Afghanistan, and now we know why. The monkeys will not allow it. It was a good effort, but it's time to pack it in. This is no longer a fight we can win.'”

Read more of this story at Slashdot.


Categories: Geek News

New Google Research On Social Networks

Mon, 07/12/2010 - 17:04
mantis2009 writes "Paul Adams, a senior user experience researcher at Google, has posted a slideshow from a recent presentation that shows insightful research into how people use social networking technologies. The presentation describes several shortcomings of existing technology, and it highlights specific modalities that current technology (ahem, Facebook) gets wrong. Adams concludes that social networking applications are a 'crude approximation' of real-life social networks. 'People don't have one group of friends,' Adams research in several different countries shows that in reality, most people have between four to six groups of friends. He argues that social networking applications need to be built with that reality in mind."

Read more of this story at Slashdot.


Categories: Geek News

Half of Windows 7 Machines Running 64-Bit Version

Mon, 07/12/2010 - 16:24
nk497 writes "Microsoft has said that nearly half of machines running Windows 7 are using the 64-bit version, up from just 11% of PCs running Vista. The 32-bit version is limited to 4GB RAM, while the 64-bit version allows 192GB, as well as added security and virtualization capabilities. While Microsoft is pushing 64-bit as a way to gain performance in the OS, it earlier this year advised users to install the 32-bit version of Office 2010, 'because currently many common add-ins for Office will not function in the 64-bit edition.'"

Read more of this story at Slashdot.


Categories: Geek News

How To Use HTML5 Today

Mon, 07/12/2010 - 15:46
snydeq writes "InfoWorld's Dori Smith offers developers a hands-on guide to using HTML5 today. 'Many of the media reports about HTML5 have focused on the politics, the "not until 2022" sound bite, or on HTML5's prospects as a "Flash killer." The reality of HTML5 is simply that it's the long-needed and long-overdue update to HTML4 — and you can start to implement it today,' Smith writes. Video, semantic tags, smart form input validation — Smith steps through several HTML5 features that can already be implemented, while noting several other presentation features that will soon be on their way. Smith also discusses IE work-arounds, such as HTML 5 Shiv and Google Chrome Frame."

Read more of this story at Slashdot.


Categories: Geek News

Nvidia's $200 GTX 460 Ups Bargain Performance

Mon, 07/12/2010 - 15:00
NervousNerd writes "Nvidia's first DirectX 11 offerings ran hot and offered a negligible performance difference compared to ATI's Radeon HD 5800 series for the cost. Also missing was the $200 mid-range part. But that stopped when Nvidia released the GTX 460 based on a modified version of their infamous Fermi architecture. The GTX 460 offers incredible performance for the price and soundly beats ATI's $200 offering, the HD 5830."

Read more of this story at Slashdot.


Categories: Geek News

UK Designer Grows Clothes From Bacteria

Mon, 07/12/2010 - 14:19
An anonymous reader writes "Experimental UK designer Suzanne Lee 'grows' clothes from bacteria. She has developed a method for growing clothing from yeast, a pinch of bacteria, and several cups of sweetened green tea. From this microbial soup, fibers begin to sprout and propagate, eventually resulting in thin, wet sheets of bacterial cellulose that can be molded to a dress form. As the sheets dry out, overlapping edges 'felt' together to become fused seams. When all moisture has evaporated, the fibers develop a tight-knit, papyrus-like surface."

Read more of this story at Slashdot.


Categories: Geek News

Windows XP SP2 Support Ends Tomorrow

Mon, 07/12/2010 - 13:37
Vectormatic writes "As can be seen on the product page for Windows XP, support for SP2 ends tomorrow, while the majority of Windows XP users still haven't upgraded to SP3. This could open up millions of users/businesses to exploitation, since security updates for SP2 will stop coming in while security fixes to SP3 may clue hackers in to vulnerabilities."

Read more of this story at Slashdot.


Categories: Geek News