×
China

Canonical and China Announce Ubuntu Collaboration 171

First time accepted submitter GovCheese writes "Canonical, the software company that manages and funds Ubuntu, announced that the Chinese Ministry of Industry and Information Technology will base their national reference architecture for standard operating systems on Ubuntu, and they will call it Kylin. Arguably China is the largest desktop market and the announcement has important implications. Shuttleworth says, 'The release of Ubuntu Kylin brings the Chinese open source community into the global Ubuntu community.'"
Privacy

SendGrid Fires Employee After Firestorm Over Inappropriate Jokes 1145

tsamsoniw writes "Hoping to strike a blow against sexism in the tech industry , developer and tech evangelist Adria Richards took to Twitter to complain about two male developers swapping purportedly offensive jokes at PyCon. The decision has set into motion a chain of events that illustrate the impact a tweet or two can make in this age of social networking: One the developers and Richards have since lost their jobs, and even the chair of PyCon has been harassed for his minor role in the incident."
Censorship

GoPro Issues DMCA Takedown Over Negative Review 232

skade88 writes "Ars is reporting that GoPro, the company that makes cameras used in extreme sports such as sky diving and swimming with dolphins has issued a DMCA take down notice on a review at DigitalRev that they do not like. See DMCA notice here. From the article: 'DigitalRev has a blog post up about the takedown, suggesting that most DMCA takedowns are "abusive" in nature. "We hope GoPro is not suggesting, with this DMCA notice, that camera reviews should be done only when they are authorized by the manufacturers," writes DigitalRev. "GoPro (or should we call you Go*ro instead?), we'd be interested to hear what you have to say" about the infringement notice.'"
Government

Do Nations Have the Right To Kill Enemy Hackers? 482

Nerval's Lobster writes "Cyber-attacks are much in the news lately, thanks to some well-publicized hacks and rising concerns over malware. Many of these attacks are likely backed in some way by governments anxious to seize intellectual property, or simply probe other nations' IT infrastructure. But do nations actually have a right to fire off a bomb or a clip of ammunition at cyber-attackers, especially if a rival government is backing the latter as part of a larger hostile action? Should a military hacker, bored and exhausted from twelve-hour days of building malware, be regarded in the same way as a soldier with a rifle? Back in 2009, the NATO Cooperative Cyber Defence Centre of Excellence (which also exists under the lengthy acronym NATO CCD COE) commissioned a panel of experts to produce a report on the legal underpinnings of cyber-warfare. NATO CCD COE isn't funded by NATO, and nor is it a part of that organization's command-and-control structure—but those experts did issue a nonbinding report (known as "The Tallinn Manual on the International Law Applicable to Cyber Warfare") exploring the ramifications of cyber-attacks, and what targeted nations can do in response. It's an interesting read, and the experts do suggest that, under circumstances, a nation under cyber-attack can respond to the cyber-attackers with "kinetic force," so long as that force is proportional. Do you agree?"
NASA

Political Pressure Pushes NASA Technical Reports Offline 140

Trepidity writes "The extensive NASA Technical Report Archive was just taken offline, following pressure from members of U.S. Congress, worried that Chinese researchers could be reading the reports. U.S. Representative Frank Wolf (R-VA) demanded that 'NASA should immediately take down all publicly available technical data sources until all documents that have not been subjected to export control review have received such a review,' and NASA appears to have complied. Although all reports are in the public domain, there doesn't appear to be a third-party mirror available (some university libraries do have subsets on microfiche)."
Technology

Ask Slashdot: Dealing With Electrostatic Contamination? 197

interval1066 writes "I've generally made it a practice to blow the dust out of my devices 1) when I remember to do so 2) after about 3 or so years of use 3) when I can get inside the case. My monitor is very thin and difficult to open. When I did finally crack it open I didn't really notice a whole lot of dust, but I blew the thing out anyway and put it back together, and it's doing ok, as far as I can tell. I'd be interested in knowing other Slashdotters' experiences with maintaining their devices in this way and where possible. And I actually extending the life of my devices, or am I just wasting my time?"
Google

Google Keep Labelled "Delete" 221

judgecorp writes "The Google Keep note-keeping app has had a frosty reception. Analysts including Gartner have said its functionality is laughable compared to that of the rival Evernote (saying "it's like saying MSFT Paint is a threat to Photoshop") and other users have rejected it on the grounds that after the death sentence on Reader, Google can't be trusted not to pull the plug on a service which people have come to rely on."
Democrats

Internet Sales Tax Vote This Week In US Senate 434

SonicSpike excerpts from CNet's coverage of the latest in the seemingly inevitable path toward consistently applied Internet sales taxes for U.S citizens: "Internet tax supporters are hoping that a vote in the U.S. Senate as early as today will finally give them enough political leverage to require Americans to pay sales taxes when shopping online. Sens. Mike Enzi (R-Wy.) and Dick Durbin (D-Ill.) are expected to offer an amendment to a Democratic budget resolution this week that, by allowing states to 'collect taxes on remote sales,' is intended to usher in the first national Internet sales tax." There goes one of the best ways to vote with your dollars.
Botnet

New OS X Trojan Adware Injects Ads Into Chrome, Firefox, Safari 129

An anonymous reader writes "A new trojan specifically for Macs has been discovered that installs an adware plugin. The malware attempts to monetize its attack by injecting ads into Chrome, Firefox, and Safari (the most popular browsers on Apple's desktop platform) in the hopes that users will generate money for its creators by viewing (and maybe even clicking) them. The threat, detected as "Trojan.Yontoo.1" by Russian security firm Doctor Web, is part of a wider scheme of adware for OS X that has "been increasing in number since the beginning of 2013," according to the company."
The Internet

Post "Good Google," Who Will Defend the Open Web? 133

psykocrime writes "The crazy kids at Fogbeam Labs have started a discussion about Google and their relationship with the Open Web, and questioning who will step up to defend these principles, even as Google seem to be abdicating their position as such a champion. Some candidates mentioned include Yahoo, IBM, Red Hat, Mozilla, Microsoft and The Wikimedia Foundation, among others. The question is, what organization(s) have both the necessary clout and the required ethical principles, to truly champion the Open Web, in the face of commercial efforts which are clearly inimical to Open Source, Open Standards, Libre Culture and other elements of an Open Web?"
The Internet

Video The Non-Profit .Org Registry Works Behind the Scenes (Video) 21

ICANN.org says, "The DotOrg Foundation [update: Note that the organization is now known as the Public Interest Registry], along with its operating partners, is committed to stable, efficient and affordable management of the .org registry." Most of us don't spend a lot of time thinking about the Internet's basic "plumbing," and few spend much time thinking about .org and the group that is responsible for maintaining it. That group did, however, have a booth at SXSW. That's where Timothy Lord interviewed .org spokesperson Thuy LeDinh, who was happy to explain what the .org people do and why they do it.
Security

BBC Twitter Accounts Hacked By Pro-Assad Syrian Electronic Army 129

DavidGilbert99 writes "Following BBC Weather on Twitter seems like it wouldn't throw up too many surprises — possibly news of the odd blizzard now and again. But today, the account's 60,000 followers got a little more than 'chance of a light drizzle' when the pro-Assad Syrian Electronic Army hacked the account, along with a couple of other BBC accounts, in an apparent protest at what it sees as reports which don't show the Syrian regime in the best light." Also at the BBC itself.
Censorship

Apple Yanks "Sweatshop Themed" Game From App Store 184

First time accepted submitter danhuby writes "Apple have removed sweatshop-themed game Sweatshop HD by UK developers LittleLoud from their app store citing clause 16.1 — 'Apps that present excessively objectionable or crude content will be rejected.' According to the PocketGamer article, Littleloud's head of games, Simon Parkin, told Pocket Gamer that 'Apple removed Sweatshop from the App Store last month stating that it was uncomfortable selling a game based around the theme of running a sweatshop.'"
Government

Digging Into the Legal Status of 3-D Printed Guns 404

jfruh writes "Defense Distributed, a U.S. nonprofit that aims to make plans for guns available owners of 3-D printers, recently received a federal firearms license from the Bureau of Alcohol, Tobacco and Firearms. That license doesn't cover semi-automatic weapons and machine guns, though — and there are questions about whether the legislation that defines that license really apply to the act of giving someone 3-D printing patterns. Experts on all sides of the issue seemed to agree that no clarification of the law would happen until a high-profile crime involving a 3-D printed weapon was committed."

Slashdot Top Deals