×
Cellphones

'Of Course We Are In a Post-PC World,' Says Ray Ozzie 399

An anonymous reader writes "Speaking at a tech conference in Seattle this week, former Microsoft Chief Software Architect Ray Ozzie had some interesting things to say about the state of the computing industry. 'People argue about "are we in a post-PC world?" Why are we arguing? Of course we are in a post-PC world. That doesn't mean the PC dies, that just means that the scenarios that we use them in, we stop referring to them as PCs, we refer to them as other things.' Ozzie also thinks Microsoft's future as a company is strongly tied to Windows 8's reception. 'If Windows 8 shifts in a form that people really want to buy the product, the company will have a great future. ... It's a world of phones and pads and devices of all kinds, and our interests in general purpose computing — or desktop computing — starts to wane and people start doing the same things and more in other scenarios.'"
Robotics

Robot Firefighter To Throw Extinguisher Grenades 78

S810 writes "Discovery News is running an article about the U.S. Navy developing a robot capable of 'throwing extinguisher grenades.' From the article: 'SAFFiR would need finger and hand coordination to wrestle fire hoses into place or accurately throw extinguisher grenades. It similarly would need the sure-footed balance of a veteran sailor's sea legs to confidently walk the wave-tossed decks of warships. An infrared camera could allow such a robot to see through smoke-filled hallways, and perhaps it could detect the location of fires through gas sensors. The robot's battery is intended to pack enough energy for half an hour of firefighting action.'"
Privacy

The Privacy Richter Scale 75

Hugh Pickens writes "Jay Cline writes that not all privacy issues are created equal and proposes a privacy Richter scale to rank the bad things that could happen to our privacy. A privacy Richter 1 or 2 event is a temporary bad turn for you or a handful of people, but nothing systemic, posing no lasting harm to individuals or society as a whole. Examples include receiving someone else's mail, having someone expose something embarrassing about you to co-workers or friends, or losing your wallet or purse. Privacy events measuring 4 to 7 on the scale are risks that can cause real and lasting damage to a lot of people and include stolen laptops containing thousands of Social Security numbers and credit-card numbers that would allow identity thieves to make fraudulent transactions that could impact credit scores for years. Finally events topping 8 are points of no return for large numbers of people and society as a whole. DARPA's Total Information Awareness program, proposed in 2002 and defunded by Congress in 2003, would have topped the scale. 'The massive collection of data about U.S. citizens could have created a perpetual bureaucracy that put at risk our right of due process and protection against unlawful search and seizure.' So where does Google's plan to consolidate its 60 privacy policies into a single approach rank? 'The current change ranks at a 3,' writes Cline. 'Larry Page's company will weather this change. I don't see irreparable or lasting harm or loss of liberty. If you don't like Google, use Bing. Don't watch weird things on YouTube. You shouldn't be sending confidential things through Gmail in the first place.'"
Hardware

Server Names For a New Generation 429

itwbennett writes "Server naming is well-trod ground on Slashdot. But as new generations enter the workforce, they're relearning the fundamentals of what makes a good scheme. Can servers named after characters from The Simpsons or The Howard Stern show stand the test of time? If you name your servers after the Seven Dwarfs, can you have any doubt that Grumpy will cause you trouble? Striking a balance between fun and functional is harder than it seems."
Security

Details Of FBI Surveillance In Lulzsec Takedown Emerge 278

uigrad_2000 writes "Yesterday, we learned that one of the top members of LulzSec (Sabu) had been an FBI informant for almost 6 months, and that this confidant of the LulzSec leader 'anarchaos' had given the feds what they needed to take him down. More details have come out now, completing a picture of how the sting took place from start to finish. It turns out that even the server space given from Sabu to anarchaos storing the details of 30,000 credit cards (from the Stratfor hack) had been funded by the FBI."
Security

Anonymous Defaces Panda Security Site 80

An anonymous reader writes "Surviving members of anonymous and/or lulzsec have hacked Panda Security's systems and defaced their site. Looks like revenge is coming back." El Reg has screenshots of the defacement. Panda Security says the intruders only managed to exploit the web server and did not compromise their internal networks.
Medicine

Open Source Robotic Surgeon 42

GlobalEcho writes "Researchers have created a second version of the Raven robotic surgeon, with open-source control code. 'UW researchers also created software to work with the Robot Operating System, a popular open-source robotics code, so labs can easily connect the Raven to other devices and share ideas.' Unfortunately for them, according to The Economist, 'there is [a] legal problem. Intuitive Surgical, the company behind the da Vinci [robot], holds patents that could make launching a commercial competitor tricky — at least in the immediate future."
Cloud

Warner Bros: New Program To Digitize Your DVDs 371

shoutingloudly writes "Warner Brothers has just announced a new 'Disc-to-Digital' program to convert your DVDs into digital files that you can play on your internet-connected computers. As the helpful Public Knowledge graphics demonstrate, all you have to do is find a participating store, drive there, pay again for your movie, wait while it's ripped for you, drive home, and hope it works. This will surely have tech-savvy movie fans saying, 'Brilliant! I've been looking for an excuse to uninstall this free, 1-step DVD ripper that I can use in the comfort of my own home. This is much better than DMCA reform.'" In exchange for paying a bit more you might get a higher resolution copy (DRM encumbered and stored in "the cloud"). The launch process is absurdly cumbersome, but: "Later on, Internet retailers like Amazon.com will email customers to offer digital copies of DVDs they previously bought. Eventually, consumers will be able to put DVDs into PCs or certain Blu-ray players that will upload a copy, similar to the way people turn music CDs into MP3 files." Will the video distributors ever offer DRM-free files that you own? The music industry doesn't seem to be any worse off than they were when they insisted upon DRM.
Intel

Intel Releases Sandy Bridge-based Xeon E5 Series 96

crookedvulture writes "Desktop and notebook users have been enjoying chips based on Intel's Sandy Bridge architecture for more than a year. Now, workstations and servers can get in on the action with the Xeon E5-2600 series. These Sandy Bridge-EP Xeons offer up to eight cores, 20MB of cache, and a truly staggering amount of I/O bandwidth. Unlike their consumer-grade counterparts, the new chips feature more advanced power management and the ability to deposit incoming data packets directly into the CPU's cache rather than going through main memory. They also plug into LGA2011 sockets, requiring an upgrade to the new Romley-EP platform. No fewer than 17 models are available, with prices falling between $200 and $2000 and TDPs ranging from 60-150W." The summary is slightly incorrect -- the Xeon E3 series has been out for the workstation market for quite a while (sporting graphics cores on the models ending in -XXX5 too).
Cloud

Gate One Brings Text-mode Surfing To the Web, Quake-Style 71

Riskable writes "As a follow-up to my previous Slashdot story, Gate One is now out of beta. Packages can be downloaded here. There's also a live demo: press the ESC key on this page to have a terminal running lynx drop into view, Quake-style! I've also posted a video overview and the documentation can be found here. Some pertinent changes since the beta: Added the ability display images inline within terminals, key-based SSH authentication, a WebSockets authentication API (for secure embedding), dramatically improved terminal emulation, an overhauled bookmark manager, support for international keyboard layouts, and a web-based log viewer that lets you export logs to self-contained HTML playback files."
The Internet

Cell Phone Jamming Devices Enjoy an Increase In Popularity 805

rullywowr writes "A story run by local new NBC10 of Philadelphia last Friday illuminated the fact that this particular rider of the pubilc bus system is packing a cell phone jammer and is not afraid to use it. Going by the name of 'Eric,' whenever he sees someone being 'rude' on the bus and talking loudly on their cell phone, he screws the antenna on and flips the power switch. Regardless of the steep civil penalites levied by the FCC (up to $16,000 USD), many (such as 'Eric') are still interested by these devices which can be bought on the internet for $40 to over $1000. Opponents of these devices say that not only do they interfere with mobile phones, they often can interfere with 'behind the scenes' communication, Wi-Fi, etc. Despite being illegal, TFA points out that they are readily available on the internet (what else is new?). Do you have an instance where you experienced the positive (or negative) effects of a cell phone jammer?"
Government

Cook County Judge Says Law Banning Recording Police Is Unconstitutional 152

schwit1 writes "A Cook County judge Friday ruled the state's controversial eavesdropping law unconstitutional. The law makes it a felony offense to make audio recordings of police officers without their consent even when they're performing their public duties. Judge Stanley Sacks, who is assigned to the Criminal Courts Building, found the eavesdropping law unconstitutional because it potentially criminalizes 'wholly innocent conduct.' The decision came in the case of Christopher Drew, an artist who was arrested in December 2009 for selling art on a Loop street without a permit. Drew was charged with a felony violation of the eavesdropping law after he used an audio recorder in his pocket to capture his conversations with police during his arrest."
Cloud

With 8 Cards, Wolfenstein Ray Traced 7.7x Faster 97

An anonymous reader writes "As Slashdot readers know Intel's research project on ray tracing for games has recently been shown at 1080p, using eight Knights Ferry cards with Intel's 'Many Integrated Core' architecture. Now a white paper goes into more detail, documenting near-linear scaling for the cloud setup with 8 cards, and gives details on the implementation of 'smart anti-aliasing.' It will be interesting to see how many instances of Intel's next MIC iteration — dubbed Knights Corner, with 50+ cores — will be required for the same workload."
Hardware Hacking

Is It Time For Hacker Scouts? 186

ptorrone writes "MAKE Magazine asks: is it 'Time For Girl Scouts and Boy Scouts 2.0?' What might the future of education be like if it were based on online & earned skill badges, and what could the future of traditional organizations for kids, like the Boy Scouts and Girl Scouts, be like in a very modern, tech-savvy world? Social networks and the maker movement are the perfect intersection of where the kids of today are, but we don't see 'leaderboards' for skills yet; we only see them for video games. Is it time for Hacker Scouts?"
Transportation

Car Hacking Concerns On the Rise 95

Pat Attack writes "I think most of the people who read Slashdot know that if it has circuitry, it can be hacked. Well, the good folks over at CNN have an article about the potential for your car to be hacked. This article lists the potential damage that could be done, proof of concept work, as well as a few scary scenarios. 'With vehicles taking up to three years to develop, [security strategist Brian Contos] says manufacturers will struggle to keep abreast of rapidly-evolving threats unless they organize regular software updates. Instead, he says, any installed technology should be given a so-called "white list" of permissible activities beyond which any procedures are blocked.' My mom reads CNN and is a Luddite. I expect to hear from her today. She'll probably tell me my new car with bluetooth is unsafe."
Crime

In Theory And Practice, Why Internet-Based Voting Is a Bad Idea 218

A few countries, like Estonia, have gone for internet-based voting in national elections in a big way, and many others (like Ireland and Canada) have experimented with it. For Americans, with a presidential election approaching later this year, it's a timely issue: already, some states have come to allow at least certain forms of voting by internet. Proponents say online elections have compelling upsides, chief among them ease of participation. People who might not otherwise vote — in particular military personnel stationed abroad, but many others besides — are more and more reached by internet access. Online voting offers a way to keep the electoral process open to them. With online voting, too, there's no worry about conventional absentee ballots being lost or delayed in the postal system, either before reaching the voter or on the way back to be counted. The downsides, though, are daunting. According to RSA panelists David Jefferson and J. Alex Halderman, in fact, they're overwhelming. Speaking Thursday afternoon, the two laid out their case against e-voting.

(Read more for more, and look for a video interview with Halderman soon).
Android

NSA Publishes Blueprint For Top Secret Android Phone 172

mask.of.sanity writes "The National Security Agency has designed a super-secure Android phone from commercial parts, and released the blueprints(Pdf) to the public. The doubly-encrypted phone, dubbed Fishbowl, was designed to be secure enough to handle top secret phone calls yet be as easy to use and cheap to build as commercial handsets. One hundred US government staff are using the phones under a pilot which is part of a wider project to redesign communication platforms used in classified conversations."
Censorship

Photographing Police: Deletion Is Not Forever 482

Geoffrey.landis writes "The courts have now ruled that the public has the right to videotape the police in the performance of their duties. Of course, that doesn't stop the police from harassing people who do so — even journalists, who sometimes have their cameras confiscated. As it turns out, though, they're not always very knowledgeable about how deletion works. I would say that erasing, or attempting to erase, a video of police arresting somebody illegally (How can a journalist be charged with 'resisting arrest' when he was not being arrested for anything other than resisting arrest?) is a clear case of destruction of evidence by the officers. Destroying evidence is obstruction of justice. That's illegal. Why haven't these police officers been arrested?"
Education

Khan Academy Chooses JavaScript As Intro Language 355

jfruh writes "Slashdotters (many of whom cut their teeth on much-maligned BASIC) have long debated what language kids should learn programming in. Khan Academy, the wildly popular producer of educational videos, has come up with an unorthodox choice: JavaScript, not least because of its ability to keep kids' attention with something fun and graphical."
Education

Ann Arbor Schools Want $45M For Tech, Partly For Computers To Run Google Docs 248

An anonymous reader writes "The Ann Arbor Public Schools defended their request for a $45 million bond for new computers by claiming that Apple eMacs aren't good enough for their Advanced Journalism class. A teacher told reporters that new PCs are needed to run WordPress, Google Docs, and Adobe InDesign CS6. WordPress and Google Docs are server-based applications that can be accessed with nearly any web browser. InDesign CS6 has not been released yet and its system requirements are unknown. As a web developer, I am impressed by the online newspaper published by the journalism class, but I question the need for new hardware. The district previously claimed that the old computers couldn't run its standardized testing software, although they far surpass the vendor's specifications. Does modern education really require cutting-edge computers, or are schools screaming 'think of the children' to win over tech-illiterate voters?" Whatever the answer to that question, exaggerated system requirements aren't the only driving force; the $45 million bond sought would not be dedicated only to replacing journalism program computers, note; it would also be used to fund other infrastructure upgrades, including some lower-tech updates, like new sound amplifiers in the district's classrooms. Ann Arbor schools' web site says that the district has (as of 2010, at least) 16,440 students. What are tech outlays like in the public schools where you live?

Slashdot Top Deals