Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Software

Submission + - Cloud Computing Can Bring Predictability (ness.com)

rsmiller510 writes: Whether you're talking about costs or having the latest technology, cloud computing has the potential to bring more predictability than traditional software with obtuse license terms and multi-year upgrade cycles.
Apple

Submission + - Nearly Half of iPods Sold Are Touches (bnet.com)

bizwriter writes: High tech has an understandable interest in Apple (AAPL) and what the company does. But Apple often keeps key information close to the vest. One such fact is the unit sales of iPods touches — the music player thar uses the same iOS operating system as the iPhone and iPad. But thanks to Apple’s announcement of having sold 160 million iOS device users, we can make a reasonable estimate now, and the answer is more than 45 percent.

Submission + - Mozilla Proposes ‘Do Not Track’ Additi 1

MozTrack writes: The emergence of data mining by third party advertisers has caused a national debate from privacy experts, lawmakers and browser supporters. Mozilla's Firefox, a popular browser company, has proposed a new feature that will prevent people's personal information from getting mined and sold for advertising. The feature would users to set a browser preference that will broadcast their desire to opt-out of third party, advertising-based tracking. It would do this via a "Do Not Track" HTTP header with every click or page view in Firefox.
Security

Submission + - Apple Hires New Security Chief (threatpost.com)

Trailrunner7 writes: Apple has hired a software security expert to head up its growing internal security group. The company has hired David Rice, a former National Security Agency analyst and consultant on security issues, according to reports.

Rice is currently the director of policy reform at the U.S. Cyber Consequences Unit, a technology policy think tank in California. He's also a member of the faculty at IANS and a consultant at The Monterey Group, but he's widely known in the security industry for his book, "Geekonomics," which discusses the need for a more secure software infrastructure.

Apple

Submission + - Toshiba to iPad: You're Flashy, But You're Lame (cnet.com)

Genrou writes: This article on CNET talks about the new strategy Toshiba adopted to grab a slice of the tablet market: there are ways of telling a rival that you don't respect them. You can shun them. You can rise above them. You can even steal their lover. Toshiba, however, has decided on a slightly different strategy when it comes to Apple. In a move redolent of the New Zealand haka war dance, Toshiba has decided to stick out its tongue, widen its eyes, and tell Apple that the iPad is, as they say in certain English quarters, pants. When you go to this sturdy site and happen to employ a device that isn't Flash-friendly — say an iPad or iPhone — Toshiba welcomes you with the words: "Such a shame." The tablet doesn't even have a name yet, though the Toshiba Taunter is surely high up on the list, as is the Toshiba Flashiba.

Submission + - Kinect hack builds 3D maps of the real world (wired.co.uk)

Lanxon writes: Noted Kinect-tinkerer Martin Szarski has used a car, a laptop, an Android smartphone and the aforementioned Xbox 360 peripheral to make a DIY-equivalent of Google Street View. The Kinect's multi-camera layout can be used to capture some fuzzy, but astonishingly effortless 3D maps of real world locations and objects. As we saw in Oliver Kreylos' early hack, you can take the data from Kinect's depth-sensitive camera to map out a 3D point-cloud, with real distances. Then use the colour camera's image to see which RGB pixel corresponds to each depth point, and eventually arrive at a coloured, textured model.

Submission + - geohot Lawyers Move For Dismissal (psx-scene.com)

An anonymous reader writes: Lawyers representing George Hotz (geohot) have moved for a dismissal of Sony's case against him, citing lack of jurisdiction in California.

Submission + - Will It Blend? The New Blender User Interface (linux.com)

jennifercloer writes: The 3D powerhouse Blender is arguably the most complicated piece of desktop software in the open source world. It handles every part of the workflow used to create a CGI film or a 3D game: creating objects, rigging them to move, animating them, controlling lighting, rendering scenes, and even editing the resulting video. Each release packs in more new features than most people can understand without consulting a textbook (or two). One of the down sides, though, is that over the years Blender has developed the reputation of being difficult to learn. Fortunately, the latest release takes on that challenge head-first, and makes some major improvements.
Security

Submission + - Mobile phone hacking - can you stop it? (computerworlduk.com)

DMandPenfold writes: Royal phones hacked, the former prime minister demands a police investigation of possible snooping on his mobile messages, the current prime minister’s director of communications resigns, Rupert Murdoch flies in to London for a crisis meeting, and that is just the start.

Deep into the age of computer hacking, one or more journalists at Murdoch owned British newspaper the News of the World have been accused of carrying out a remarkably old-fashioned hack, that of accessing or ‘phreaking’ voicemail systems used by celebrities and politicians.

Can it be stopped?

The easiest way to avoid having one of these systems hacked ....

Google

Submission + - Android Malware Steals Credit Card Numbers (net-security.org)

Orome1 writes: We often blame users for failing to deny permissions required by malicious applications on Facebook or various mobile platforms, but the truth is that the list of permissions is not necessarily an indication of the malicious intent — especially in this day and age when new malware is popping up daily and often uses previously unthought of approaches. To prove this point, a number of researchers from the City University of Hong Kong and Indiana University have developed a Trojan for the Android mobile OS that requires very few and seemingly innocuous permissions, which it uses to extract credit card and PIN numbers from phone conversations and send them to a remote server via another Trojan.
Wine

Submission + - Wine 1.3.12 integrates DOSBox (h-online.com)

mvar writes: Wine 1.3.12 has been released and this version includes an integrated DOSBox. According to the release announcement, this is an "Initial stab at DOSBox integration"
The Internet

Submission + - IANA to Allocate Last IPv4 Addresses This Week (ispreview.co.uk)

Mark.JUK writes: The internet's last remaining normal IPv4 addresses could be gone by the end of this week after a UK ISP revealed that APNIC, one of the five Regional Internet Registries (RIRs), would ask the Internet Assigned Numbers Authority (IANA) for its two remaining /8 blocks of IPv4 addresses. At present just two /8 blocks remain to be distributed along the normal method. Global policy says that once the IANA free pool is reduced to five /8 blocks (as will happen if APNIC's request is granted), they will all be simultaneously distributed to the five RIRS.

An IPv4 address is assigned to your computer each time you go online (e.g. 85.23.56.198). These are a bit like the online equivalent of your home phone number, except now only a few million out of roughly 4.5 Billion addresses remain. However its replacement, IPv6 (e.g. 2ffe:1800:3525:3:200:f8ff:fe21:67cf), which is longer and more secure by design, still isn't fully supported by all world ISPs, router manufacturers or even software developers. This could lead to some teething problems, such as connectivity problems, although hopefully most end-users will not notice the gradual transition.

Comment Re:But its ok for Google? (Score 1) 299

I equate governmental anger to the government causing a body count.

And it's an EMP that's local, then it's unlikely to frighten the government...

So yeah, annoyance.

While parts of the government may get violently angry about such a thing, the gov as a whole probably wouldn't be violently angry. If I get bitten by a mosquito, then the cells in the affected area are normally inflamed, but I as a person only want to squash the one mosquito.

And there's no real (long-lasting, or wide-spread) anger over it.

Security

Submission + - Terrorist attack in Moscow (corriere.it)

An anonymous reader writes: It was bound to happen... terrorists are starting to blow up the airports, instead of planes.
More damage with way less hassle.

Will the airport security theater finally be fixed, or will they just make it worse?

PS: I fully condemn any sort of violence, and I am not happy at all to see these kind of news.

Slashdot Top Deals

Two can Live as Cheaply as One for Half as Long. -- Howard Kandel

Working...