Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:No Windows? Great! No Microsoft tax! (Score 1) 521

I'd love a low-power, high-performance ARM notebook. I'd be happy with MIPS or Loongson (Chinese MIPS clone) as well. Debian already has a full-blown ARM port and I'll bet they could get it working on an ARM netbook in a day. Ubuntu would undoubtedly be soon-to-follow.

There was an ARM employee at DebConf with a protoype ARM-based netbook. I forget whether it was running Debian or Ubuntu, but in any case the software is basically ready.

As a side benefit, having multiple widely-used architectures for desktop systems (x86 and ARM) would be a support nightmare for hardware companies that still keep their drivers proprietary and undocumented. Yeah, I'm looking at you, Broadcom and NVidia.

I'm pretty sure Broadcom is already providing drivers for ARM as many home routers run on ARM. As for Nvidia, do they have any chips that fit in the price and power brackets of netbooks?

I see a significant barrier to ARM adoption in GCC's code generator, which is poor and apparently getting worse as the optimisations are more tuned for x86 than RISC processors. ARM, like Intel, has its own commercial compiler but it would probably make business sense for them to contribute to GCC as well, just as Intel does.

Comment Re:The most widespread form of child abuse (Score 1) 281

Different ISPs implement filtering in different ways. Many will reroute the IP addresses of the servers with blocked pages/images through a web proxy, which became obvious during the blacklisting of pages on Wikipedia and the Internet Archive. Still, a UK user who is determined to get around Cleanfeed can use a proxy outside the UK or in a data centre (my understanding is that outbound connections from data centres have not been considered). Or, of course, change ISP.
Privacy

University of Washington Tracking the Edge of Privacy 77

Roland Piquepaille writes "We've been told for several years that RFID tags would eventually be everywhere. This isn't the case yet, but researchers at the University of Washington would like to know if the future of social networking could be affected by these tags and check the balance between privacy and utility. They've deployed 200 antennas in one UW building and a dozen researchers are carrying RFID tags on them. According to the Seattle Times, all their moves are tracked every second in the building. Of course, it can be practical to know if a colleague is available for a cup of coffee but this kind of system (if in widespread use) has some serious implications. As the lead researcher said, 'what we want to understand is what makes it useful, what makes it threatening and how to balance the two.'"
The Military

US Cyber Command Wants Greater Attack Mentality 257

superglaze writes "Lieutenant General Robert J Elder, Jr, a senior figure in US Air Force Cyber Command (AFCYBER), has told ZDNet UK that communication issues are hampering the division's co-ordination. 'IT people set up traditional IT networks with the idea of making them secure to operate and defend,' said Elder. 'The traditional security approach is to put up barriers, like firewalls — it's a defense thing — but everyone in an operations network is also part of the [attack] force. We're trying to move away from clandestine operations. We're looking for real physics — a bigger bang resulting in collateral damage.'"
The Courts

Large Hadron Collider Sparks 'Doomsday' Lawsuit 731

smooth wombat writes "In what can only be considered a bizarre court case, a former nuclear safety officer and others are suing the U.S. Department of Energy, Fermilab, the National Science Foundation and CERN to stop the use of the LHC (Large Hadron Collider) until its safety is reassessed. The plaintiffs cite three possible 'doomsday' scenarios which might occur if the LHC becomes operational: the creation of microscopic black holes which would grow and swallow matter, the creation of strangelets which, if they touch other matter, would convert that matter into strangelets or the creation of magnetic monopoles which could start a chain reaction and convert atoms to other forms of matter. CERN will hold a public open house meeting on April 6 with word having been spread to some researchers to be prepared to answer questions on microscopic black holes and strangelets if asked."
The Internet

Egypt Calls for Bandwidth Rationing 182

I Don't Believe in Imaginary Property writes "Egypt's Ministry of Communications and Information Technology has called upon its citizens to ration their internet usage. This comes after two of its three undersea fiber optic links were recently severed. The cut cables have caused communication difficulties for millions of people throughout the Middle East. Ministry spokesman Mohammed Taymur was quoted as saying, 'People should know how to use the Internet because people who download music and films are going to affect businesses who have more important things to do.'"
Programming

How to Deal With Stolen Code? 799

greenrom writes "I work for a small company as a software developer. While investigating a bug in one of our products, I found source code on a website that was nearly identical to code used in our product. Even the comments were the same. It's obvious that a developer at our company found some useful code on the web and copied it. The original author didn't attach any particular license to the code. It's just 200 lines of code the author posted in a forum. Is it legitimate to use source code that's publicly available but doesn't fall under any particular license? If not, what's the best way to deal with this kind of situation? Since I'm now the only person working on this code, there's no practical way to report the situation confidentially. I'm new to the company, and the developer who copied the code is the project lead. Reporting him to management doesn't seem like a good career move. I could rewrite the copied code without reporting him, but since the product is very close to release it would be difficult to make a significant change without providing some justification."
Censorship

Mark Cuban Calls on ISPs to Block P2P 463

boaz112358 writes "Mark Cuban, Dallas Mavericks owner, HDNet CEO, and noted gadfly is publishing on his blog that Comcast and other ISPs should block all P2P traffic, because as he says, "As a consumer, I want my internet experience to be as fast as possible. The last thing I want slowing my internet service down are P2P freeloaders." He complains that commercial content distributors instead of paying for their own bandwidth, are leeching off consumers who are paying for the bandwidth. As an alternative distribution method (at least for audio and video), he suggests Google video."
Businesses

AT&T Calls Telecommuters Back To the Cubicle 393

bednarz writes "AT&T is requiring thousands of employees who work from their homes to return to traditional office environments, sources say. 'It is a serious effort to reel in the telework people,' says the Telework Coalition's Chuck Wilsker, who has heard that as many as 10,000 or 12,000 full-time teleworkers may be affected. One AT&T employee says rumors have been circulating since AT&T's merger with SBC that the new upper management is not supportive of teleworking: 'We'd heard rumors to that effect, and all of a sudden we got marching orders to go back to an office.'"

Windows Vista SP1 Hands-On Details 409

babyshiori writes "Users of Microsoft Windows Vista can rejoice in the fact that Microsoft just released a preview of the Windows Vista Service Pack 1 Release Candidate! The build is the lead-up to the actual service pack, which will be made available to even more testers at a later date. 'In our early tests with the beta, we saw some small improvements in boot time on an HP Compaq 8710p Core 2 Duo notebook. Before SP1, the laptop took 1 minute, 51 seconds to boot. After the update, that figure dropped by almost 20 seconds. Microsoft is also touting improvements in "the speed of copying and extracting files," so we tested a few of those scenarios. We noted a slight increase in the time required to copy 562 JPEG images totaling 1.9GB from an SD Card to the hard drive of the aforementioned HP Compaq notebook.'"
Education

Sesame Street DVD Deemed Adult-Only Entertainment 665

theodp writes "The earliest episodes of Sesame Street are being made available on DVD, but the NYT notes Volumes 1 and 2 carry a rather strange warning: 'These early 'Sesame Street' episodes are intended for grown-ups, and may not suit the needs of today's preschool child.' So why are they unsuitable for toddlers in 2007? Well, in the parody 'Monsterpiece Theater,' Alistair Cookie — played by Cookie Monster — used to appear with a pipe, which he later gobbled. 'That modeled the wrong behavior,' explained a Sesame Street executive producer, adding that 'we might not be able to create a character like Oscar [the Grouch] now.'"

Slashdot Top Deals

"By the time they had diminished from 50 to 8, the other dwarves began to suspect "Hungry." -- a Larson cartoon

Working...