Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Media

Dutch Study Says Filesharing Has Positive Economic Effects 336

An anonymous reader writes "In a study conducted by TNO for the Dutch government the economic effects of filesharing are found to be positive. According to the 146 page report (available for download, but in Dutch) filesharing is good for the prosperity of the Dutch: with filesharing more media are available, even though this costs the media industry some profit. One of the most noticeable conclusions is that downloading and buying are not mutually exclusive: downloaders on average buy just as much music as non-downloaders, but they buy more DVDs and games then people who don't download. They also tend to visit more concerts and buy more merchandise."
Google

Google Terminates Six Services 195

Jonah Bomber writes with this excerpt from Information Week: "In addition to Google's announcements about the elimination of 100 recruiting positions and the shutdown of offices in Austin, Texas; Trondheim, Norway; and Lulea, Sweden, the company said it would close Dodgeball, Google Catalog Search, Google Mashup Editor, Google Notebook, and Jaiku. It also said it's discontinuing the ability to upload videos to Google Video. ... Jaiku, however, will live on as an open source project. Gundotra said that Google engineers have been porting the microblogging service to Google App Engine and that when the migration is completed, the company plans to make the code available under the Apache license."
Image

The Zen of SOA Screenshot-sm 219

Alex Roussekov writes "The book "Zen of SOA" by Tom Termini introduces an original view to the challenging world of SOA. He refers to the Zen philosophy as a "therapeutic device" helping SOA practitioners to get rid of prejudices and opinions in order to apply a clear mind-set based on real-life experiences and the application of technology knowledge. Each chapter of the book is prefaced by Zen Truism that the author suggests to "revisit, reflect on it longer, and see if you are able to establish a truth from the narrative, as well as from your own experiences." In fact, the book is about a SOA Blueprint outlining a methodology for building a successful SOA strategy. The target audience is C-level Executives, IT Managers and Enterprise Architects undertaking or intending to undertake adoption of SOA throughout their organizations. I strongly recommend the book to all SOA practitioners involved in implementation of SOA." Read below for the rest of Alexander's review.
Image

Thieves Take the Cake Screenshot-sm 91

Two very hungry German couriers ate a fruit cake destined for a German newspaper and in its place mailed a box of credit card data. The data including names, addresses and card transactions ended up at the Frankfurter Rundschau daily. The mix-up triggered an alarm, and police advised credit card customers with Landesbank Berlin to check their accounts for inconsistencies. Fruitcake must be different in Germany for people to want to use it as something other than a paperweight.
Censorship

Court Nixes National Security Letter Gag Provision 128

2phar sends news that on Monday a federal appeals court ruled unconstitutional the gag provision of the Patriot Act's National Security Letters. Until the ruling, recipients of NSLs were legally forbidden from speaking out. "The appeals court invalidated parts of the statute that wrongly placed the burden on NSL recipients to initiate judicial review of gag orders, holding that the government has the burden to go to court and justify silencing NSL recipients. The appeals court also invalidated parts of the statute that narrowly limited judicial review of the gag orders — provisions that required the courts to treat the government's claims about the need for secrecy as conclusive and required the courts to defer entirely to the executive branch." Update: 12/16 22:26 GMT by KD : Julian Sanchez, Washington Editor for Ars Technica, sent this cautionary note: "Both the item on yesterday's National Security Letter ruling and the RawStory article to which it links are somewhat misleading. It remains the case that ISPs served with an NSL are forbidden from speaking out; the difference is that under the ruling it will be somewhat easier for the ISPs to challenge that gag order, and the government will have to do a little bit more to persuade a court to maintain the gag when it is challenged. But despite what the ACLU's press releases imply, this is really not a 'victory' for them, or at least only a very minor one. Relative to the decision the government was appealing, it would make at least as much sense to call it a victory for the government. The lower court had struck down the NSL provisions of the PATRIOT Act entirely. This ruling left both the NSL statute and the gag order in place, but made oversight slightly stricter. If you look back at the hearings from this summer, you'll see that most of the new ruling involves the court making all the minor adjustments that the government had urged them to make, and which the ACLU had urged them to reject as inadequate."
Editorial

Proprietary Blobs and the Pursuit of a Free Kernel 405

jammag writes "Ever since the GNewSense team pointed out that the Linux kernel contains proprietary firmware blobs, the question of whether a given distro is truly free software has gotten messier, notes Linux pundit Bruce Byfield. The FSF changed the definition of a free distribution, and a search for how to respond to this new definition is now well underway. Who wins and what solutions are implemented could have a major effect on the future of free and open source software. Debian has its own solution (by allowing users to choose their download), as do Ubuntu and Fedora (they include the offending firmware by default but make it possible to remove it). Meanwhile, the debate over firmware rages on. What resolves this issue?"
Sci-Fi

Ghostbusters Game Coming From Atari 48

Variety reported last week that Atari secured the rights to a Ghostbusters video game from Activision Blizzard, intending to publish something next year to coincide with the first movie's 25th anniversary. "The Ghostbusters game, which features all four actors from the original movie and a new script by Dan Aykroyd and Harold Ramis, is a follow-up to Ghostbusters II." Now, Eurogamer confirms that the game is indeed in development for the PC, PS2, PS3, Wii, Xbox 360 and DS.
Image

Slashdot's Disagree Mail Screenshot-sm 126

Usually persistence is an admirable quality. There comes a time however when you reach that fine line between endeavoring to persevere, and drunk dialing your ex-girlfriend. The mail this week is from people who don't know when to say when. You have to admire their determination and feel a little bit bad that they don't have anything else to do. Read below to see how many times someone can click send in a day.

Comment Re:Themes? (Score 3, Insightful) 668

Why do i want themes? I would much rather have a clean simple music player

Because people disagree on what "clean simple" means. If the UI is not themeable and you don't like it, you have to switch to a different player altogether. If it is themeable, you just need to switch to a different theme.

Sci-Fi

Michael Crichton Dead At 66 388

Many readers have submitted stories about the death of Michael Crichton. The 66-year-old author of Jurassic Park and The Andromeda Strain died unexpectedly Tuesday "after a courageous and private battle against cancer," a press release said. In addition to writing, he also directed such sci-fi classics as Westworld and Runaway. Crichton was married five times and had one child.
Communications

Sex Offender E-Mail Registry Signed Into Law 459

As noted in Wired yesterday, tragedy in chaos writes, "Senator and Presidential-hopeful John McCain has managed to get a new bill signed into law, in the hope of ridding online social networks of the sexual predation of children. The 'Keeping the Internet Devoid of Sexual Predators Act of 2008,' as it is called, calls for a database to be made in which all registered sexual offenders must also register their e-mail addresses so that MySpace, Facebook, etc. can run current and hopeful users through it, and eliminate access to the offenders. Though a noble goal, this is not very well thought out in methodology. They are asking known criminals to be honest, and are expecting them not to utilize any of the free and readily available e-mail services that exist so as to circumvent the system. There is also a potential for the crafty sex offender to possibly cause false positives by just registering an address that does not belong to them, thereby drawing in innocent bystanders."
Image

Man Uses Remote Logon To Help Find Laptop Thief Screenshot-sm 251

After his computer was stolen, Jose Caceres used a remote access program to log on every day and watch it being used. The laptop was stolen on Sept. 4, when he left it on top of his car while carrying other things into his home. "It was kind of frustrating because he was mostly using it to watch porn," Caceres said. "I couldn't get any information about him." Last week the thief messed up and registered on a web site with his name and address. Jose alerted the police, who arrested a suspect a few hours later. The moral of the story: never go to a porn site where you have to register.
The Internet

Remembering 50 Years of (and Leading Up To) the Internet 78

katrina writes "Covering the infamous MafiaBoy bank hack, the launch of the first ever online newspaper — MIT's 'The Tech' — and Brewster Kahle developing the Internet Archive back in 1996, five decades of the most significant Internet developments, hacks, legal battles and innovations have been documented in a massive historical article on Cnet UK."

Slashdot Top Deals

"Don't drop acid, take it pass-fail!" -- Bryan Michael Wendt

Working...