Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Pentagon Monitors War Videos Online 216

jonfr writes "According to the BBC, the Pentagon is monitoring online war videos on YouTube and other webpages." From the article: "There is no specific policy that bans troops from posting graphic material. But troops who have served in Iraq and Afghanistan are hearing the message that they should consider carefully what videos they upload to the web. Sites such as YouTube and Ogrish have hundreds or thousands of clips from soldiers, some set to rock music."

Text Mining the New York Times 104

Roland Piquepaille writes "Text mining is a computer technique to extract useful information from unstructured text. And it's a difficult task. But now, using a relatively new method named topic modeling, computer scientists from University of California, Irvine (UCI), have analyzed 330,000 stories published by the New York Times between 2000 and 2002 in just a few hours. They were able to automatically isolate topics such as the Tour de France, prices of apartments in Brooklyn or dinosaur bones. This technique could soon be used not only by homeland security experts or librarians, but also by physicians, lawyers, real estate people, and even by yourself. Read more for additional details and a graph showing how the researchers discovered links between topics and people."

Flaw Finders Lay Seige to Microsoft Office 149

An anonymous reader writes "The Register is reporting that bug reports on the latest iteration of Microsoft Office are certainly keeping the Redmond firm's programmers busy. So far this year 24 flaws have been found by outside researchers, more than six times the number found in all of 2005. From the article: 'The deluge of vulnerabilities for the Office programs - Word, Excel, PowerPoint, Outlook, and, for professional users, Access -signals a shift in the focus of vulnerability research and underscores the impact of flaw-finding tools known as fuzzers. The vulnerabilities in Office also highlight the threat that such files, if remained unchecked, can pose to a corporate network. Not since the days of macro viruses and Melissa have Office files posed such a danger to computer security.'"

A Preview of Election 08 - Podcasting Politicians 134

Video Blogger writes "The LA Times predicts that the 2008 election will feature the rise of Podcasting Politicians, as strategists from both parties try to ride the latest trends to secure a victory in 2008. 'You'll not only be able to text people with messages, you'll be able to raise money, deliver video, audio, create viral organizing -- where one person sees something really interesting and it gets passed on and on,' says Donnie Fowler, a Democratic strategist."

Yahoo! Sells, Advocates DRM-Free Music 244

prostoalex writes "Jessica Simpson's 'A Public Affair' will be sold on Yahoo! Music in MP3 format with no DRM attached. According to Yahoo! Music blog, this is a big deal for the major online music store: 'As you know, we've been publicly trying to convince record labels that they should be selling MP3s for a while now. Our position is simple: DRM doesn't add any value for the artist, label (who are selling DRM-free music every day -- the Compact Disc), or consumer, the only people it adds value to are the technology companies who are interested in locking consumers to a particular technology platform. We've also been saying that DRM has a cost. It's very expensive for companies like Yahoo! to implement. We'd much rather have our engineers building better personalization, recommendations, playlisting applications, community apps, etc, instead of complex provisioning systems which at the end of the day allow you to burn a CD and take the DRM back off, anyway!'"

SCO to Unix developers, We want you back 427

NoGuffCheck writes "CRN is reporting that Darl McBride is looking to get Unix developers back onboard with cash incentives for completing training in SCO's new mobile application kit; EdgeBuilder. It doesn't stop there; there's a 12-cylinder BMW or $100,000 dollars for the development of the best wireless application."

EuroBSDCon 2006, Nov. 10-12th 2006 in Milan 11

nezmar writes "'The 5th European BSD conference is the 2006 event held in European continent where developers can meet, share new ideas and show off the progress of their work. It is also a great place for business players to get in touch with the BSD products and the people behind them.' It will be held in Italy, in Milan, and will be a 3-day event from the 10th to the 12th of November. The first day will be dedicated to tutorials and the other two days to technical sessions. There's also a Call For Tutorials and Papers: abstracts are due before midnight CET on July 31st, 2006."

2006 OpenBSD Hackathon Well Underway 71

An anonymous reader writes "KernelTrap is running a two part who's who at the 2006 OpenBSD Hackathon. Starting on the 27th and running for a full week, developers get together and concentrate on communication rather than just development. Project leader Theo de Raadt was quoted as saying 'I don't think anybody else does this, developers suspend their lives for a week to focus entirely on just development.'"

Should Students Be Taught With or Without an IDE? 848

bblazer asks: "Beginning this next school year, there is a strong possibility I will be teaching an intro to Java and an intro to Python course at the local community college. I was wondering what the prevailing wisdom is when it comes to teaching languages - should students be taught with or without an IDE? I am a bit old school and wouldn't mind having them all use vi or emacs, but using a good IDE does have some advantages as well. I should note that the students I will be teaching will have had at least 1 semester of programming in VB or C++." Even though there is limited time in a semester, could a curriculum be constructed to accommodate both methods?

UK Law May Criminalize IT Pros 514

An anonymous reader writes "More worrying news from the UK. This time, a bill meant to fight cybercrime may make it illegal to use or make available network security tools available, just because they could be used by hackers." From the article: "Clayton cited the Perl scripting language, created by Larry Wall in 1987, as an example of a useful technology that could fall foul of the law. 'Perl is almost universally used on a daily basis to permit the Internet to function,' said Clayton. 'I doubt if there is a sysadmin on the planet who hasn't written a Perl program at some time or another. Equally, almost every hacker who commits an offense under section 1 or section 3 of the CMA will use Perl as part of their toolkit. Unless Larry is especially stupid, and there is very little evidence for that, he will form the opinion that hackers are likely to use his Perl system. Locking Larry up is surely not desirable.'" A note that this is equally confusing but separate from yesterday's story about the UK government wanting private encryption keys.

Sun Announces $100k Contest for Grid App Developers 80

C-Shalom writes "EWeek reports that Sun announced a contest where developers can compete for $100k in prizes for developing applications that utilize the Grid. This is in addition to 100 free CPU hours on the Grid. From the article: 'Sun is hosting a competition where developers can compete for $50,000 in prize money. The winners of the Sun Grid Compute Utility Cool Apps Prize for Innovation contest will be determined based on the software they develop on the grid, MacRunnels said. Sun is planning additional contests for later in the year, which will bring the total potential winnings to $100,000.' The press release contains more info not included in the article."

Japanese Lab Creates 'Da Vinci' Voices 183

Mikki writes "Using methods employed in criminal investigations, the Japan Acoustic Lab has analyzed the skeletal structures of Leonardo Da Vinci and Mona Lisa's faces to replicate how their voices would have sounded." While Da Vinci is cool, I can think of a slew of other deceased notables worth talking with as well.

UK Government Wants Private Encryption Keys 822

An anonymous reader writes "Businesses and individuals in Britain may soon have to give their encryption keys to the police or face imprisonment. The UK government has said it will bring in the new powers to address a rise in the use of encryption by criminals and terrorists." From the article: "Some security experts are concerned that the plan could criminalise innocent people and drive businesses out of the UK. But the Home Office, which has just launched a consultation process, says the powers contained in Part 3 are needed to combat an increased use of encryption by criminals, paedophiles, and terrorists. 'The use of encryption is... proliferating,' Liam Byrne, Home Office minister of state told Parliament last week. 'Encryption products are more widely available and are integrated as security features in standard operating systems, so the Government has concluded that it is now right to implement the provisions of Part 3 of RIPA... which is not presently in force.'"

FreeBSD Vows to Compete with Desktop Linux 370

AlanS2002 writes "FreeBSD developer Scott Long is being reported as saying that FreeBSD is quickly approaching feature parity with Linux. Apparently this is being achieved through efforts to more tightly integrate GNOME with FreeBSD, with one of the priorities being to 'GNOME's hardware abstraction layer--which handles hardware-specific code--working with FreeBSD'."

Giant Rock Growing in Mount St. Helens' Crater 144

An anonymous reader writes to mention a CNN article about the huge geological formation growing in Mount St. Helens' crater. From the article: "The fin-shaped mass is about 300 feet tall and growing 4 feet to 5 feet a day, said Dan Dzurisin, a geologist at the U.S. Geological Survey. The rock in the crater began growing last November, steadily moving west and pushing rock and other debris out of its way as it goes." Scientists think the mountain will eventually replace the lave dome blown out by the original 1980 eruption.

Slashdot Top Deals

To the systems programmer, users and applications serve only to provide a test load.

Working...