New submitter Hesh writes "Ibex, the first cross-platform VR desktop of its kind, was previously released for Linux, and has finally been updated to work on Mac OS X Mountain Lion. Running at a silky smooth 60fps, it is nearing final release and awaiting delivery of the developer Oculus Rift kits for final integration testing. A Windows version may be released in time. The source can be found on bitbucket for the Linux version and iPhone orientation sensor client while the Mac source is to follow soon at the same location."
Slashdot stories can be listened to in audio form via an RSS feed, as read by our own robotic overlord.
New submitter SkinnyFatSmoothNeck writes "I'll be taking a long train ride in the coming month and I'm looking for ideas and recommendations on anti-theft devices to be used for carry-on luggage. The obvious precautions are always taken: never letting the bag out my sight, wrapping the bag strap around my leg while stowed and so on. But as this is a long ride, there will be a couple of nights involved. The first thing that came to my mind is a two-part device that triggers based on a specified proximity and is controlled from a remote (ie.: the device would be placed inside the bag and trigger a loud alarm if it strays outside of range). Perhaps a more advanced, albeit more expensive, device could also include GPS tracking. But beyond that, what other creative, ingenious or downright sensible solutions do you have to offer?"
An anonymous reader writes "Google on Friday announced yet another security improvement for Chrome 25. In addition to killing silent extension installation, the omnibox in Google's browser will send all searches over a Secure Sockets Layer (SSL) connection. Chrome already does this for users who are signed in to Google: when they search from the address bar, their queries are sent over HTTPS. As of Chrome 25, however, the same will happen for users who aren't signed in to Google."
sciencehabit writes "Scientists have found that, when it comes to mental recall, people are far more likely to remember the text of idle chitchat on social media platforms like Facebook than the carefully crafted sentences of books. The team gathered 200 Facebook posts from the accounts of undergraduate research assistants, such as 'Bc sometimes it makes me wonder' and 'The library is a place to study, not to talk on your phone.' They also randomly selected 200 sentences from recently published books, gathered from free text on Amazon.com. Sentences included, 'Underneath the mass of facial hair beamed a large smile,' and 'Even honor had its limits.' Facebook posts were one-and-a-half times as memorable as the book sentences (abstract). The researchers speculate that effortless chatter is better than well-crafted sentences at tapping into our minds' basic language capacities — because human brains evolved to prioritize and remember unfiltered information from social interaction."
dsinc sends this news from the University of Cambridge: "For the last ten years, theoretical physicists have shown that the intense connections generated between particles as established in the quantum law of ‘entanglement’ may hold the key to eventual teleportation of information. Now, for the first time, researchers have worked out how entanglement could be 'recycled' to increase the efficiency of these connections. Published in the journal Physical Review Letters, the result could conceivably take us a step closer to sci-fi style teleportation in the future, although this research is purely theoretical in nature. ... Previous teleportation protocols have fallen into one of two camps, those that could only send scrambled information requiring correction by the receiver or, more recently, "port-based" teleportation that doesn't require a correction, but needs an impractical amount of entanglement – as each object sent would destroy the entangled state. Now, physicists from Cambridge, University College London, and the University of Gdansk have developed a protocol to provide an optimal solution in which the entangled state is 'recycled,' so that the gateway between particles holds for the teleportation of multiple objects. They have even devised a protocol in which multiple qubits can be teleported simultaneously, although the entangled state degrades proportionally to the amount of qubits sent in both cases."
An anonymous reader writes "3D printing is on its way toward becoming ubiquitous. Of course, if you have such a printer and want to print something, you need raw materials — the plastic filament that's fed into the machine. It's also likely that while you're learning the ropes, you'll print a bunch of terrible attempts at objects, and end up having to throw them out. Now, Wired is reporting on a device aiming to solve both of those problems. Tyler McNaney's 'Filabot' will break down failed projects as well as many other plastic items from traditional manufacturers, turning them into a filament you can then feed through a 3D printer. 'So far the plastics that work are HDPE, LDPE, ABS, NYLON. More to come on the different types that work.' McNaney sees it as a 'closed-loop recycling system on your desk.' The Filabot's Kickstarter campaign succeeded easily in 2012, and now he and his team are getting ready to launch."
An anonymous reader writes "Linux distribution SolusOS has forked the GNOME 3 'fallback mode' that the GNOME Project decided to scrap with the upcoming 3.8 GNOME release. According to SolusOS, the fork, named Consort, can 'maintain an experience virtually identical to GNOME 2, but vastly improve it with no need for hardware acceleration such as with GNOME Shell or Cinnamon.' It 'will bring back all the old features, such as right click-interaction on the panel, GNOME 2 applet support, creating desktop launchers, etc' and 'allow Python GNOME 2 applets to run natively on consort-panel.'"
Press2ToContinue sends this quote from a European Space Agency news release: "ESA's Mars Express imaged the striking upper part of the Reull Vallis region of Mars with its high-resolution stereo camera last year. Reull Vallis, the river-like structure in these images, is believed to have formed when running water flowed in the distant martian past, cutting a steep-sided channel through the Promethei Terra Highlands before running on towards the floor of the vast Hellas basin. This sinuous structure, which stretches for almost 1500 km across the martian landscape, is flanked by numerous tributaries, one of which can be clearly seen cutting in to the main valley towards the upper (north) side."
cylonlover writes "Inspired by the tough teeth of a marine snail and the remarkable process by which they form, assistant professor David Kisailus at the University of California, Riverside is working toward building cheaper, more efficient nanomaterials. By achieving greater control over the low-temperature growth of nanocrystals (abstract), his research could improve the performance of solar cells and lithium-ion batteries, lead to higher-performance materials for car and airplane frames, and help develop abrasion-resistant materials that could be used for anything from specialized clothing to dental drills."
An anonymous reader writes "The Swiss Federal Office of Topography has published a complete set of digitized historical maps from 1938 to 2011. The twist: a browser application allows you to create a time travel movie at any place in Switzerland for any zoom level. As an example, you can see the recession of Europe's biggest glacier over the last 75 years. The application is the most recent effort of the Swiss Government to make geodata freely available to the public at no cost using open source software and will include maps dating as far back as 1838."
An anonymous reader writes "The Scientific and Technical Research Council of Turkey (TÜBITAK) has put a stop to the publication and sale of all books in its archives that support the theory of evolution, daily Radikal has reported. The books have long been listed as “out of stock” on TÜBTAK's website, but their further publication is now slated to be stopped permanently. Titles by Richard Dawkins, Alan Moorehead, Stephen Jay Gould, Richard Levontin and James Watson are all included in the list of books that will no longer be available to Turkish readers. In early 2009, a huge uproar occurred when the cover story of a publication by TÜBITAK was pulled, reportedly because it focused on Darwin’s theory of evolution."
An anonymous reader writes "You don't necessarily have to a hacker to be viewed as one under federal law. ProPublica breaks down acts of 'hacktivism' to see what is considered criminal under the Computer Fraud and Abuse Act. It points out that both Aaron Swartz and Bradley Manning were charged under the CFAA. Quoting: 'A DDoS attack can be charged as a crime under the CFAA, as it “causes damage” and can violate a web site’s terms of service. The owner of the site could also file a civil suit citing the CFAA, if they can prove a temporary server overload resulted in monetary losses. ... The charges for doxing depend on how the information was accessed, and the nature of published information. Simply publishing publicly available information, such as phone numbers found in a Google search, would probably not be charged under the CFAA. But hacking into private computers, or even spreading the information from a hack, could lead to charges under the CFAA.'"
msm1267 writes "Oracle's long security nightmare with Java just gets worse. A post to Full Disclosure this morning from a security researcher indicated that two new sandbox bypass vulnerabilities have been discovered and reported to Oracle, along with working exploit code. Oracle released Java 7u11 last Sunday and said it fixed a pair of vulnerabilities being exploited by all the major exploit kits. Turns out one of those two bugs wasn't completely patched. Today's bugs are apparently not related to the previous security issues."
An anonymous reader writes "Wired reports on a research paper from Google employees about the future of authentication on the web. 'Along with many in the industry, we feel passwords and simple bearer tokens such as cookies are no longer sufficient to keep users safe,' the authors write. Their plan involves authenticating just once, to a single device, and then using that to unlock all of your other accounts. "We'd like your smartphone or smartcard-embedded finger ring to authorize a new computer via a tap on the computer, even in situations in which your phone might be without cellular connectivity." Recognizing that this isn't something they can accomplish on their own, they've gone ahead and created a device-based authentication protocol that is 'independent of Google, requires no special software to work — aside from a web browser that supports the login standard — and which prevents web sites from using this technology to track users.'"
walterbyrd sends this excerpt from an article that might make you feel old: "At its annual shareholders' meeting on January 19, 1983, Apple announced two new products that would play a pivotal role in the future of the company: the Apple Lisa, Apple's original GUI-based computer and the precursor to the Macintosh; and the Apple IIe, which represented a natural evolution to the highly successful Apple II computer line. ... The Lisa introduced a completely new paradigm—the mouse-driven graphical user interface—to the world of mainstream personal computers. (Note that the release of the Xerox Star workstation in 1981 marked the commercial debut of the mouse-driven GUI.) The Lisa’s elevated retail price of $9995 at launch (about $23,103 in today’s dollars), slow processor speed (5MHz), and problematic custom disk drives hobbled the groundbreaking machine as soon as it reached the market. ... Around the time of the Apple III’s launch, Apple was so sure of the new computer's success that it had halted all future development of Apple II-related projects. But by 1982, as it became clear that the Apple II wasn’t going away (in fact, it was becoming more popular than ever), Apple scrambled to upgrade its aging Apple II line, which had last been refreshed in 1979 with the Apple II+. The result was the Apple IIe, which packed in several enhancements that regular Apple II users had been enjoying for years thanks to a combination of the Apple II’s plentiful internal expansion slots and a robust third-party hardware community to fill them."