Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Handhelds

Pandora Console Ready For Pre-Orders 309

Croakyvoice writes "Finally, months after the official announcement, 3,000 lucky people can now pre-order Pandora, possibly the world's fastest handheld console. It boasts a processor capable of up to 900 MHZ, PowerVR 3D graphics, a large 800x480 LCD touchscreen, Wi-Fi, Bluetooth, USB, dual SD card slots, TV out, dual analogue and digital controls, a clamshell DS Lite-style shape, and a 43-button mini keyboard. The console already boasts an amazing amount of ready-for-release software such as Ubuntu and many full-speed emulators for systems such as Snes, Amiga, Megadrive, and many more that are not publicly announced yet. The console is as powerful as the original Xbox and on a par with the Nintendo Wii. Those interested should visit OpenPandora.Org. For the full history of Pandora from inception until the present, check out the Pandora Homebrew Site."
Communications

Two Bills of Interest Advancing In Congress 129

pgn674 writes "While the Emergency Economic Stabilization Act of 2008 failed to pass in the House of Representatives, two other bills of interest to this community are currently moving through the US lawmaking process. One is the Broadband Data Improvement Act, which Communications Workers of America claims will help us towards bringing high-speed Internet access to all Americans. It will have the FCC increase their granularity in reporting the Internet accessibility of an area in the US, and redefine broadband measurements. It has passed through the House and the Senate, and differences in the passed versions are currently being resolved. The other bill is the Webcaster Settlement Act of 2008. Pandora is excited for this one as it will give them time to negotiate with SoundExchange (i.e. the RIAA) for new, more affordable royalty rates. The bill is currently in the Senate, and is expected to pass with ease."
Google

Google Pushes Back Against US Copyright Treaty 233

Hugh Pickens writes "Internet companies led by Google joined groups representing Web users to challenge the Bush administration's bid to toughen international enforcement against copyright pirates. The companies said the US courts and Congress are still working out the correct balance between protecting copyrights and the free exchange of information on the Web and a treaty could be counterproductive. 'There's this assumption that what is good for Disney is what's good for America, but that's an oversimplification,' said Jonathan Band, an intellectual property lawyer representing libraries and high-tech companies. 'There's also what's good for Yahoo and Google.' The US, Japan, Canada and other nations said last year that they would begin negotiations on an agreement aimed at cracking down on counterfeiting of such goods as watches and pharmaceuticals, and the piracy of copyrighted materials, such as software and music recordings. A leaked draft of the deal showed that the treaty could force Internet service providers to cooperate with copyright holders."
Security

US Responsible For the Majority of Cyber Attacks 205

Amber G5 writes "SecureWorks published the locations of the computers from which the greatest number of cyber attacks were attempted against its clients in 2008. The United States topped the list with 20.6 million attempted attacks originating from computers within the country, and China ran second with 7.7 million attempted attacks emanating from computers within its borders. This was followed by Brazil with over 166,987 attempted attacks, South Korea with 162,289, Poland with 153,205, Japan with 142,346, Russia with 130,572, Taiwan with 124,997, Germany with 110,493, and Canada with 107,483."
Privacy

Homeland Security Department Testing "Pre-Crime" Detector 580

holy_calamity writes "New Scientist reports that the Department of Homeland Security recently tested something called Future Attribute Screening Technologies (FAST) — a battery of sensors that determine whether someone is a security threat from a distance. Sensors look at facial expressions, body heat and can measure pulse and breathing rate from a distance. In trials using 140 volunteers those told to act suspicious were detected with 'about 78% accuracy on mal-intent detection, and 80% on deception,' says a DHS spokesman."
The Almighty Buck

eBay To Disallow Checks and Money Orders In US 412

Sir_Kurt writes "In eBay's latest FAQ, they explain that sellers (for the good of the buyers) will no longer be allowed to accept checks or money orders as payment. They can take electronic payments only. So, will Google Checkout, Checkout by Amazon or Amazon Flexible Payment be allowed? No, says eBay: 'Google's and Amazon's products and services compete with eBay on a number of levels, so we are not going to allow them on eBay.' Options are limited to PayPal, ProPay, direct credit payments to the seller, and 'payment upon pickup.' But remember, this is for our own good!" eBay ran into trouble earlier this year for trying to restrict payment options.
Encryption

Nevada Businesses Must Start Encrypting E-Mail By Oct. 1st 178

dtothes writes "Baseline is reporting the state of Nevada has a statute about to go in effect on October 1, 2008 that will force businesses to encrypt all personally identifiable information transmitted over the Internet. They speak with a Nevada legal expert who says the problem is that the statute is written so broadly that the law could potentially open up a ton of unintentional liability and allow for the interpretation of things like password-protected documents to be considered sufficiently encrypted. Quoting: 'Beyond the infrastructure impact, the statute itself looks like Swiss cheese. Bryce K. Earl, a Las Vegas-based attorney, ... has been following the issue closely and believes there are some problems with the statute as it is on the books right now, namely the broad definition of encryption, the lack of coordination with industry standards and the unclear nature of penalties both criminal and civil.'"
The Military

US Congress Funds Laser Weapons 423

An anonymous reader writes "The Washington Post reports that the US Congress is funding laser weapons for use in the near future. Low-power lasers called 'dazzlers' are already being used in Iraq to temporarily reduce a person's vision. High-power laser weapons would allow precision attacks that minimize civilian casualties. From the Post: 'The science board said tactical laser systems could be developed for broader use because they "enable precision ground attack to minimize collateral damage in urban conflicts." The report suggested, for example, that "future gunships could provide extended precision lethality and sensing." The board also proposed using lasers to protect against rockets, artillery, mortars and unmanned airborne vehicles by blasting them out of the sky. Last month, the Army awarded Boeing $36 million to continue development of a high-energy laser mounted on a truck that could hit overhead targets. But deployment is not expected until 2016, even if all goes well.'"
Censorship

Apple Rejects iPhone App As Competitive To iTunes 375

DaveyJJ sends news of yet another rejection of an iPhone app by Apple, with perhaps a chilling twist for potential developers of productivity or utility apps. John Gruber of Daring Fireball writes: "Let's be clear: forbidding 'duplication of functionality' is forbidding competition. The point of competition is to do the same thing, but better." Paul Kafasis (co-founder of Rogue Amoeba Software) makes the point that this action by Apple will scare talented developers away from the iPhone platform. And Dave Weiner argues that the iPhone isn't a "platform" at all: "The idea that it's a platform should mean no individual or company has the power to turn you off."
Networking

Server Optimization For Newbies? 295

supaneko writes "I recently took a new job as a network and server administration for a small IT company. I am absolutely shocked at how much is taking place within this company that I have little to no experience with. To help bolster my experience, I purchased a used server to use for hands-on training and practice. My ultimate goal is to have a complete, secure LAMP server available to the public running CentOS. I have been browsing the Net for various guides and tips on setup, optimization, security, and maintenance, but nothing I've found really gives me a hands-on approach to the topics I want to learn about. When you all started out, what route did you take to pick up the server setup and maintenance skills you have now? Is there anything in particular that you would recommend to someone who has excellent skills with consumer PCs and servers but is a total newbie to corporate and enterprise networking and servers?"
The Courts

Judge Rules Defense Can Get DUI Machine Source Code 270

pfleming alerts us to developments in Arizona on a subject we have frequently discussed (e.g. FL, MN, NJ): efforts in DUI cases to obtain source code to devices that analyze blood alcohol levels. On Friday a Pima County Superior Court judge ruled that the software that powers the Intoxilyzer 8000 must be revealed to defense lawyers. "Defense attorneys representing more than 20 people arrested on felony DUI charges agreed to consolidate their cases into one and to argue it before [Judge] Bernini ... The source codes are crucial because the Intoxilyzer 8000 sometimes gives 'weird' or inexplicable results ... Six other states have been battling CMI [maker of the Intoxilyzer] over the source code — Minnesota, Florida, Louisiana, Massachusetts, Tennessee and New Jersey... CMI has currently racked up over $1.2 million in fines in a civil contempt order for not disclosing the source code in Florida."
Security

Most Companies Admit Their Data Is At Risk 60

Weblver1 writes "A recent survey of IT professionals published by web security firm Finjan shows that data-theft should be a good reason for concern. Based on answers from 1,387 professionals, 25% acknowledged that their organization has been breached. What's worse, 42% did not know and could not exclude a breach, reflecting on the number of organizations that could potentially be breached without anyone knowing after the fact. Other findings we should be concerned about include 82% of Healthcare IT respondents admitting that medical records are at risk of data-theft, and 68% of all sectors admitting sensitive corporate information can be compromised by cyber-criminals. Finjan's report is available here (PDF, registration required). This survey comes a week after Forrester Research found in their survey that IT security spending is expected to rise (or at least remain the same) — with the current level of data breaches and sensitive data that is not protected well enough, there is a good reason for it.
First Person Shooters (Games)

The Ultimate Doom Mod Collection? 78

Croakyvoice writes "Law56ker has today released the Nxdoom Collection, a massive collection of 220 Doom Mods for the Dreamcast, a collection of best Total Conversions, Megawads, and Various levels for use on NXDOOM for the Sega Dreamcast. Wads Include Duke Nukem GP, Half Life, Star Wars, Goldeneye, Quake 2 and Star Trek. They come on 2 CDS." Registration is required for downloading anything, but if you're low on Megawads this seems like one-stop shopping.
Bug

Widespread Keyboard Failures on OLPC's XO-1 264

otakuj462 writes "Many participants in OLPC's 'Give 1 Get 1' program of last November are now encountering what has come to be known as the 'stuck key' problem, in which one or more of the keys on their XO-1 laptop's built-in keyboard become stuck in an activated position, or are activated when adjacent keys are pressed. As of January 30th, the official word from OLPC is that the root cause of this problem is unknown because '[t]here are several manufacturers of the keyboards.' ('So far we don't know of any _reliable_ method of fixing the keyboard or the exact root cause.') It is unknown just how widespread this problem currently is, as the 30-day manufacturer's warranty has already expired for most G1G1 participants. However, the OLPC forums are full of reports. OLPC is currently deploying the XO-1 to children in Mongolia and Peru, as well as other developing nations. If OLPC is actively deploying units with known, critical hardware bugs, without a dedicated support infrastructure in place, to children who have never seen a computer before, should they still be considered to be a responsible organization? Did OLPC deploy their hardware too soon?"

Slashdot Top Deals

All life evolves by the differential survival of replicating entities. -- Dawkins

Working...