Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Okay Funny Guy (Score 1) 395

You are comparing apples to oranges. The windows OS is designed to allow third-party applications to run on it for a nominal additional cost (price of a dev kit) to the third party developer. The Xbox is not. Please, examine Microsoft's license terms carefully before you blindly assume the xbox is open.

More specifically, Why let consumers pay for their media once with a blue-ray player when Microsoft and the media distribution cartel can (and will) earn far more money passing it through the xbox?
Businesses

The Disconnect Between Management and the Value of IT 333

DavidHumus writes "According to a Wall St. Journal article top executives at most companies fail to recognize the value of IT, having a tendency to think of information technology as a basic utility, like plumbing or telephone service. The article lists five primary reasons for 'the wall' between IT and business: 'mind-set differences between management staff and IT staff, language differences, social influences, flaws in IT governance (defined as the specification and control of IT decision rights), and the difficulty of managing rapidly changing technology.' Does this fully explain the extreme lack of understanding of IT at high executive levels? The article is even-handed in apportioning blame but touches on a few good points. In particular, how '[m]ost top executives ... think of IT as an expensive headache that they'd rather not deal with.'"
Privacy

FBI Admits More Privacy Violations 179

kwietman writes "The FBI admitted that in 2006, for the fourth straight year, they improperly accessed phone and internet records of U.S. citizens. Director Robert Mueller testified that the abuses occurred prior to sweeping reforms enacted in 2007, and actually blamed the breaches in part on the telecommunications companies, who submitted more information than was requested. In another unsurprising development, the FBI also underreported the number of security letters - used to authorize wiretaps and to subpoena internet and telecom records - by over 4,600. The use of these letters to identify potential terrorists has, according to the government audit, increased dramatically since the implementation of the Patriot Act. Over 1,000 of these security letters were found to be improper in 2005, and similar numbers were expected for 2006 and 2007."
Microsoft

Creative Capitalism Gets Microsoft $528M Tax Break 545

NewsCloud writes "Microsoft makes products in Washington but records software sales to PC makers and high-volume customers through an operation in Nevada, where there is no corporate tax. So Washington has missed out on more than half a billion in taxes; revenue it could use for badly needed infrastructure needs — such as the needed replacement of the 520 bridge which connects Seattle ... to Microsoft. Reported by Slashdot in 2004, the numbers have increased with the company's growth to approx. $76M in savings last year alone. The author questions the legality of the practice given Microsoft's 35,500+ employees and 11.2 million square feet of real estate in Washington state."
The Internet

P2P Fans Pound Comcast In FCC Comments 306

Not Comcastic writes "Two weeks after officially opening proceedings on Comcast's BitTorrent throttling, angry users are bombarding the FCC with comments critical of the cable provider's practices. 'On numerous occasions, my access to legal BitTorrent files was cut off by Comcast,' a systems administrator based in Indianapolis wrote to the FCC shortly after the proceeding began. 'During this period, I managed to troubleshoot all other possible causes of this issue, and it was my conclusion (speaking as a competent IT administrator) that this could only be occurring due to direct action at the ISP (Comcast) level.' Another commenter writes 'I have experienced this throttling of bandwidth in sharing open-source software, e.g. Knoppix and Open Office. Also I see considerable differences in speed ftp sessions vs. html. They are obviously limiting speed in ftp as well.'"
Movies

What the MPAA Still Isn't Telling Us 150

Scott Jaschik writes "An essay at the Inside Higher Ed site looks at the fallout from the MPAA's admission that its statistics on college student downloading were seriously wrong. Among the questions: What is the MPAA still holding back? Why isn't the MPAA changing its position on legislation? 'Perhaps the MPAA's press release acknowledging its "300 percent error" will set the stage for new, less rancorous private and public discussions about P2P piracy. Colleges and universities respect copyright; colleges and universities are engaged in serious efforts to inform and educate students about the importance of copyright. And MPAA and RIAA officials ... should acknowledge, respect and strongly support the continuing efforts of campus officials to address copyright issues, in part by ending the public posturing that portrays colleges and universities as dens of digital piracy.'"
Book Reviews

The Symantec Guide To Home Internet Security 139

r3lody writes "There are many households that have high-speed Internet connections, yet most people are simply not doing enough to protect themselves from the many exploits that exist. The Symantec Guide to Home Internet Security by Andrew Conry-Murray and Vincent Weafer was written to speak to those people. Symantec Press is the publisher, yet it remains reasonably vendor-neutral. This book is for non-technical people. Its ten chapters cover a relatively slim 240 pages, so it should not intimidate someone who is not a computer professional. Also, you do not really have to read the book front-to-back, but you can focus in on the chapter or chapters that interest you and have fairly complete information." Read on for the rest of Ray's review.
Internet Explorer

Microsoft Confirms IE8 Has 3 Render Modes 525

Dak RIT writes "In a blog post this week, Microsoft's IE Platform Architect, Chris Wilson, confirmed that IE8 will use three distinct modes to render web pages. The first two modes will render pages the same as IE7, depending on whether or not a DOCTYPE is provided ('Quirks Mode' and 'Standards Mode'). However, in order to take advantage of the improved standards compliance in IE8, Web developers will have to opt-in by adding an additional meta tag to their web pages. This improved standards mode is the same that was recently reported to pass the Acid 2 test, as was discussed here."
Networking

Bandwidth Caps May Be Critical Error For Broadband Companies 317

Technical Writing Geek writes "An Ars Technica article argues that after many years of stagnation, the US broadband landscape is finally 'primed for change'. Companies like Time Warner that decide to cap bandwidth risk being relegated to a 'broadband ghetto. Alternatives to the standard cable modem vs. DSL conundrum will come from technologies like WiMax and (eventually) the 'white space' broadband that might be offered by whoever wins the 700mhz auction. 'All of that is to say that cable and DSL won't always be the only games in town. If wireless solutions are able to deliver on their promises of high speeds with no usage limits, capped cable broadband service like Time Warner has planned is likely to be unattractive, to say the least. Instead of developing plans designed to discourage consumers from feeding at the bandwidth trough, cable companies would be better served in the long run by making investments in new technologies like DOCSIS 3.0 and the kind of infrastructure improvements necessary to meet bandwidth demands.'"
The Courts

New York Launches Intel Antitrust Investigation 66

Multiple users have notified us of reports that the Attorney General of New York has initiated an antitrust investigation of Intel. The EU served Intel with similar charges last July, and AMD has been battling Intel over antitrust issues for some time. Quoting the New York Times: "The subpoenas from Mr. Cuomo's office will seek internal memos, billing documents, and correspondence between Intel and its customers to determine whether the company engaged in a variety of anticompetitive practices, like penalized customers, primarily computer manufacturers, for purchasing processors from competitors or improperly paying customers to use Intel chips exclusively. Chuck Mulloy, a spokesman for Intel, said the company would comply with Mr. Cuomo's subpoena but denied any illegality."
Government

Army Buys Macs to Beef Up Security 342

agent_blue writes "The Army is integrating Macs into their IT network to thwart hack attempts. The Mac platform, they argue, is more secure because there are fewer attacks against OS X than Windows-based systems. 'Military procurement has long been driven by cost and availability of additional software--two measures where Macintosh computers have typically come up short against Windows-based PCs. Then there have been subtle but important barriers: For instance, Macintosh computers have long been incompatible with a security keycard-reading system known as Common Access Cards system, or CAC, which is heavily used by the military. The Army's Apple program, created [in 2005], is working to change that.'"
The Internet

Yahoo! Slammed Over Piracy By Chinese Court 102

An anonymous reader writes "Setting a precedent likely to have far-ranging consequences, a Chinese court has once again lambasted Yahoo! China over piracy concerns. The search firm is (according to the court) infringing on intellectual property rights by allowing copyrighted materials to be downloaded from the internet via search results. 'John Kennedy, chairman and CEO of the International Federation of Phonographic Industries, or IFPI, said in a statement Thursday. "By confirming that Yahoo China's service violates copyright under new Chinese laws, the Beijing court has effectively set the standard for Internet companies throughout the country."'"
Security

'Extreme Security' Web Browsing 267

Sarah S writes "The application security researcher Jeremiah Grossman described to CSO magazine how he takes extreme measure to stay safe online. The simplest tip he uses: two separate browsers: 'One, which he calls the 'promiscuous' browser, is the one he uses for ordinary browsing. A second browser is used only for security-critical tasks such as online banking. When Grossman wants to do online banking, he closes his promiscous browser, opens the more prudish one, and does only what he has to do before closing it and going back to his insecure browser.'"
Games

Churches Use Halo To Spread the Word, Raise Eyebrows 474

The New York Times has a lengthy look at an unorthodox way to spread the religious word: Halo 3 multiplayer matches. Churches across the country have adopted 'Halo Nights' as a way to get kids together in religious centers and church basements. "The alliance of popular culture and evangelism is challenging churches much as bingo games did in the 1960s. And the question fits into a rich debate about how far churches should go to reach young people. Far from being defensive, church leaders who support Halo -- despite its "thou shalt kill" credo -- celebrate it as a modern and sometimes singularly effective tool. It is crucial, they say, to reach the elusive audience of boys and young men." Just the same, the use of the game is raising concerns among some onlookers. GamePolitics reports that many faith communities are heavily debating the issue.
Operating Systems

Intel Chief Evangelist Comments on Linux Scheduler 178

ByeByeWintel writes "James Reinders is Intel's Chief Evangelist for Intel's Software Development Products. In a recent interview on Devx.com he stated: 'If I could get ONE wish fulfilled would be for OS scheduling to focus on processes, and not threads, for scheduling. And demand that processes manage their scheduling of threads ... There is a lot of opportunity for operating systems to offer these types of control in the 'running of applications' interfaces. I'd like an OS to let me specify the 'world' my application runs in (which processors, how many, etc.) These interfaces are available in Windows at run time (the task manager will let you adjust where a running task can go).'"

Slashdot Top Deals

What is wanted is not the will to believe, but the will to find out, which is the exact opposite. -- Bertrand Russell, "Skeptical Essays", 1928

Working...