jfruh writes "Google TV, despite bold predictions from the company's execs, has singularly failed to take over the TV world. Nevertheless, the company is still plugging away, and one development that might have far-reaching implications is its new context-aware voice search. 'Context aware' is the key to revolutionizing the TV-watching experience: you can say the name of a TV show, the name of a channel, the description of a show, or the description of a kind of video you'd like to find on YouTube, and the TV will show it to you."
Have you META-MODERATED today? Sign up for the Slashdot Daily Newsletter! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25.×
Velcroman1 writes "Invisibility cloaks and deflector shields, once a staple of popular science-fiction, are now the real deal, researchers say. But here on Earth, top researchers have been battling too, not over the fate of the empire but over whose tech will someday shield U.S. ships. Fractal Antenna Systems came out swinging Wednesday over a 'perfected' invisibility cloak by researchers at Duke and Imperial College. Company CEO and inventor Nathan Cohen issued a scathingly critical press release throwing very visible zingers — and claiming he invented it first. '[Their tech] makes you more, not less, visible,' Cohen said. The company says a patent-pending deflector shield built off a variant of the technology can divert electromagnetic radiation around an object — and they plan to show it off Friday in New York City, at the Radio Club of America."
DeptofDepartments writes "With Kindles and ebooks on everyone's lips (sc. hands) nowadays, this might come as a surprise to some, but besides being a techie, I have also amassed quite a collection of actual books (mostly hardcover and first editions) in my personal library. I have always been reluctant to lend them out and the collection has grown so large now that it has become difficult to keep track of all of them. This is why I am looking for a modern solution to implement some professional-yet-still-home-sized library management. Ideally, this should include some cool features like RFID tags or NFC for keeping track of the books, finding and checking them out quickly, if I decide to lend one." For more on what DeptofDepartments is looking for, read on below.
c0lo writes "Engineers from Google's Books team have released the design plans for a comparatively reasonably priced (about $1500) book scanner on Google Code. Built using a scanner, a vacuum cleaner and various other components, the Linear Book Scanner was developed by engineers during the '20 percent time' that Google allocates for personal projects. The license is highly permissive, thus it's possible the design and building costs can be improved. Any takers?" Adds reader leighklotz: "The Google Tech Talk Video starts with Jeff Breidenbach of the Google Books team, and moves on to Dany Qumsiyeh showing how simple his design is to build. Could it be that the Google Books team has had enough of destroying the library in order to save it? Or maybe the just want to up-stage the Internet Archive's Scanning Robot. Disclaimer: I worked with Jeff when we were at Xerox (where he did this awesome hack), but this is more awesome because it saves books."
Billly Gates writes "IE 10 just hit the final preview yesterday for Windows 7. Windows XP and Windows Vista support has been dropped. Most slashdotters have a complex relationship with Internet Explorer. Many of us hate it but have to use it in the office. Microsoft had tried last year to make IE good again with the release of IE 9 which had some fanfare on slashdot, such as hardware acceleration and better standards compliance. MS even launched a full campaign to get us to switch. IE 10 is supposed to continue the new process and promises to be much faster and support more HTML 5, CSS 3, W3C HTML 5.1 and CSS 3.1 with a score of 320 on HTML5test. As a comparison, last years IE 9 only scored 138. "
DavidGilbert99 writes "With a £400 transmitter, a laptop and a little knowledge you could bring down an entire city's high-speed 4G network. This information comes from research carried out in the U.S. into the possibility of using LTE networks as the basis for a next-generation emergency response communications system. Jeff Reed, director of the wireless research group at Virginia Tech, along with research assistant Marc Lichtman, described the vulnerabilities to the National Telecommunications and Information Administration, which advises the White House on telecom and information policy. 'If LTE technology is to be used for the air interface of the public safety network, then we should consider the types of jamming attacks that could occur five or ten years from now (PDF). It is very possible for radio jamming to accompany a terrorist attack, for the purpose of preventing communications and increasing destruction,' Reed said."
sfcrazy writes "Samsung is clearly accusing Hogan in its recent filing of influencing the jury in favor of Apple. Samsung said in its filing: 'Mr. Hogan's own statements to the media suffice if such a showing is required. Once inside the jury room, Mr. Hogan acted as a "de facto technical expert" who touted his high-tech experience to bring the divided jury together. Contrary to this Court's instructions, he told other jurors incorrectly that an accused device infringes a utility patent unless it is "entirely different"; that a prior art reference could not be invalidating unless that reference was "interchangeable"; and that invalidating prior art must be currently in use. He thus failed "to listen to the evidence, not to consider extrinsic facts, [and] to follow the judge's instructions."'"
An anonymous reader writes "On the opening day of a patent trial between Microsoft and Google-owned Motorola Mobility, Motorola filed a brief (PDF) arguing that the WiFi tech central to the case is also critical to Microsoft's new Surface tablet. Motorola says royalties totaling 2.25% of all Surface revenues is a good starting point. They wrote, 'Microsoft's new Surface tablet will use only 802.11, instead of cellular or wired connections, to connect to the internet. Without 802.11 capability, the Surface tablet would be unable to compete in the market, because consumers can readily select tablet devices other than the Surface that have 802.11 capability.' Microsoft, of course, says this figure is outrageous, given 'Motorola's promise to standards bodies to offer access to the "standard essential" patents on fair and reasonable terms.'"
An anonymous reader writes "Certain iPhone and iPad applications from a Japanese company have broken software piracy detection mechanisms that are sending out tweets on the user's own Twitter account, saying, 'How about we all stop using pirated iOS apps? I promise to stop. I really will. #softwarepirateconfession.' The trouble is, it's sending these out on accounts of users who actually paid up to $50 or more for the software and who are legally using it. The app is asking for access to users' Twitter accounts, but does not give the reason why it is asking, so the author of the article concluded (rightly) that things were being done deliberately. Would you want your legally purchased software to send out messages to all of your contacts on Twitter or on other social networks saying that you were a software pirate? Would you excuse the writers of the software if it was just an error in their piracy detection measures?"
concealment sends this quote from an article at ReadWriteWeb: "Tech billionaire and Dallas Mavericks owner Mark Cuban says he is fed up with Facebook and will take his business elsewhere. He's sick of getting hit with huge fees to send messages to his team's fans and followers. Two weeks ago Cuban tweeted out a screen grab of an offer he'd received from Facebook. The social network wanted to charge him $3,000 to reach 1 million people. Along with the screen grab, Cuban wrote, 'FB is blowing it? This is the first step. The Mavs are considering moving to Tumblr or to new MySpace as primary site.'"
the_newsbeagle writes "It's hard to determine what the unconscious brain is doing since, after all, we're not aware of it. But in a neat set of experiments, researchers from the Hebrew University of Jerusalem's consciousness lab found evidence that the unconscious brain can parse language and perform simple arithmetic. The researchers flashed colorful patterns at test subjects that took up all their attention and allowed for the subliminal presentation of sentences or equations. In the language processing experiment, researchers found that subjects became consciously aware of a sentence sooner if it was jarring and nonsensical (like, for example, the sentence 'I ironed coffee')."
EthanV2 writes "The Wall Street Journal cites a report which quotes a 'person familiar with negotiations between the two tech giants,' apparently confirming this special price hike for Apple. The source said: 'Samsung Electronics recently asked Apple for a significant price raise in (the mobile processor known as) application processor. Apple first disapproved it, but finding no replacement supplier, it accepted the [increase].'"
Penurious Penguin writes "The Wall Street Journal, in correspondence with Chevron representatives, reveals that back in 2010, Stuxnet reached Chevron, where it managed to infect — but not significantly affect — the oil giant's network. According to a Chevron representative speaking to CNET, the issue was 'immediately addressed ... without incident.' The Stuxnet worm is believed to be the work of the U.S. and Israel, and this report is confirmation that it struck well wide of its intended targets. Chevron's general manager of the earth sciences department, Mark Koelmel, said to CIO Journal, 'I don't think the U.S. government even realized how far it had spread ... I think the downside of what they did is going to be far worse than what they actually accomplished.'"
cheesecake23 writes "Many talking heads have attributed Obama's success to an unmatched 'ground game.' Now, inside reports from campaign volunteers suggest that Project Orca, a Republican, tech-based voter monitoring effort with 37,000 volunteers in swing states, turned out to be an epic failure due to dismal IT. Problems ranged from state-wide incorrect PINs, to misleading and delayed information packets delivered to volunteers, to a server outage and missing redirection of secure URLs."
MassDosage writes "In a remarkable show of good timing Presentation Patterns turned up on my desk for review within days of me having been asked to give a presentation at a large tech conference. So I decided to read the book as I worked on my presentation and apply any lessons learned as I worked my way through it. The word "patterns" in the book's title will be known to most software developers as a reference to the seminal 'Gang of four' software design patterns book which codified common solutions to software problems. The concept of patterns originated in building architecture with the idea being that by categorizing and naming solutions to problems, a common vocabulary could be built up that allowed practitioners in a certain field to communicate more effectively. This was hugely successful and has spawned the idea of looking for patterns in many other areas which is where this book comes in." Read on for the rest of Mass Dosage's review.