Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Windows

Average User Only Runs 2 Apps, So Microsoft Will Charge For More 842

Barence writes "Microsoft's decision to limit Windows 7 Starter Edition to running only three concurrent applications could force up the price of netbooks as many manufacturers opt for the more expensive Home Premium. The three-app rule includes applications running in the background but excludes antivirus, and the company claims most users wouldn't be affected by the limit. 'We ran a study which suggested that the average consumer has open just over two applications [at any time]. We would expect the limit of three applications wouldn't affect very many people.' However, Microsoft told journalists at last year's Professional Developers Conference that 70% of Windows users have between eight and 15 windows open at any one time."
Earth

Alaskans Prepare For Volcanic Eruption 293

An anonymous reader writes "Mount Redoubt, or Redoubt Volcano, is an active stratovolcano in the largely volcanic Aleutian Range of Alaska. The once quiet volcano has begun to roar once again. Its last eruption was in 1989 and geologists suggest that the next one is upon us. Alaskans who lived through the earlier eruption are stocking up on breathing masks and goggles. Starting on Friday, January 23 2009, the level of seismic activity increased markedly, and on Sunday AVO raised the Aviation Color Code to ORANGE and the Volcano Alert Level to WATCH. On the basis of all available monitoring data AVO regards that an eruption similar to or smaller than the one that occurred in 1989-90 is the most probable outcome. We expect such an eruption to occur within days to weeks." From the AP article: "Alaska's volcanoes are not like Hawaii's. 'Most of them don't put out the red river of lava,' said the observatory's John Power. Instead, they typically explode and shoot ash 30,000 to 50,000 feet high — more than nine miles — into the jet stream. 'It's a very abrasive kind of rock fragment,' Power said. The particulate has jagged edges and has been used as an industrial abrasive. 'They use this to polish all kinds of metals,' he said." The server for the Alaska Volcano Observatory appears to be overloaded and is unresponsive.
Games

Video Game Conditioning Spills Over Into Real Life 232

doug141 writes "Lessons learned in video games may transcend computers, PlayStations and Wiis. New research suggests that virtual worlds sway real-life choices. Twenty-two volunteers who played a cycling game learned to associate one team's jersey with a good flavored drink and another team's jersey with a bad flavored drink. Days later, 3/4 of the subjects avoided the same jersey in a real-world test. Marketers and lawyers will take note."
Transportation

Feds To Offer Cash For Your Clunker 740

coondoggie sends along a NetworkWorld piece that begins, "The government... wants to motivate you to get rid of your clunker of a car for the good of the country (and the moribund car industry). A 'Cash for Clunkers' measure introduced this week by three US Senators, two Democrats and a Republican, would set up a national voucher program to encourage drivers to voluntarily trade in their older, less fuel-efficient car, truck, or SUV for a car that gets better gas mileage. Should the bill pass, the program would pay out a credit of $2,500 to $4,500 for drivers who turn in fuel-inefficient vehicles to be scrapped and purchase a more fuel-efficient vehicle."
Microsoft

The Exact Cause of the Zune Meltdown 465

An anonymous reader writes "The Zune 30 failure became national news when it happened just three days ago. The source code for the bad driver leaked soon after, and now, someone has come up with a very detailed explanation for where the code was bad as well as a number of solutions to deal with it. From a coding/QA standpoint, one has to wonder how this bug was missed if the quality assurance team wasn't slacking off. Worse yet: this bug affects every Windows CE device carrying this driver."
Censorship

Australia To Block BitTorrent 674

Kevin 7Kbps writes "Censorship Minister Stephen Conroy announced today that the Australian Internet Filters will be extended to block peer-to-peer traffic, saying, 'Technology that filters peer-to-peer and BitTorrent traffic does exist and it is anticipated that the effectiveness of this will be tested in the live pilot trial.' This dashes hopes that Conroy's Labor party had realised filtering could be politically costly at the next election and were about to back down. The filters were supposed to begin live trials on Christmas Eve, but two ISPs who volunteered have still not been contacted by Conroy's office, who advised, 'The department is still evaluating applications that were put forward for participation in that pilot.' Three days hardly seems enough time to reconfigure a national network."
Communications

Mediterranean Undersea Cables Cut, Again 329

miller60 writes "Three undersea cables in the Mediterranean Sea have failed within minutes of each other in an incident that is eerily similar to a series of cable cuts in the region in early 2008. The cable cuts are already causing serious service problems in the Middle East and Asia. See coverage at the Internet Storm Center, Data Center Knowledge and Bloomberg. The February 2008 cable cuts triggered rampant speculation about sabotage, but were later attributed to ships that dropped anchor in the wrong place."
Communications

Hacked Business Owner Stuck With $52k Phone Bill 300

ubercam writes "A Canadian business man is on the hook for a $52,000 phone bill after someone hacked into his voice mail system and found a way to dial out. The hacker racked up the charges with calls to Bulgaria. The business owner noticed an odd message coming up on his call display (Feature 36), and alerted his provider, Manitoba Telecom Services. They referred him to their fraud department, who discovered the breach. MTS said that they would reverse the charges if the hacked equipment was theirs, but in this case it was customer owned. The ironic part is that the victim's company, HUB Computer Solutions, is in the business of computer and network security. They even offer to sell, configure and secure Cisco VoIP systems. Looks as though they even couldn't manage to secure their own system, which doesn't bode well for their customers." This certainly isn't the first time someone has exploited the phone system and stuck another with the bill. Maybe it's time for the phone company to get their fraud detection and prevention services at least on par with the credit card companies'.
Image

Trick or Treatment 713

brothke writes "The recent collapse of financial companies occurred in part because their operations were run like a black box. For many years, alternative medicine has similarly operated in the shadows with its own set of black boxes. In Trick or Treatment: The Undeniable Facts about Alternative Medicine, Simon Singh and Edzard Ernst, MD, break open that box, and show with devastating clarity and accuracy, that the box is for the most part empty." Keep reading for the rest of Ben's review.
Education

What Restrictions Should Student Laptops Have? 1117

An anonymous reader writes "We're a school district in the beginning phases of a laptop program which has the eventual goal of putting a Macbook in the hands of every student from 6th to 12th grade. The students will essentially own the computers, are expected to take them home every night, and will be able to purchase the laptops for a nominal fee upon graduation. Here's the dilemma — how much freedom do you give to students? The state mandates web filtering on all machines. However, there is some flexibility on exactly what should be filtered. Are things like Facebook and Myspace a legitimate use of a school computer? What about games, forums, or blogs, all of which could be educational, distracting or obscene? We also have the ability to monitor any machine remotely, lock the machine down at certain hours, prevent the installation of any software by the user, and prevent the use of iChat. How far do we take this? While on one hand we need to avoid legal problems and irresponsible behavior, there's a danger of going so far to minimize liability that we make the tool nearly useless. Equally concerning is the message sent to the students. Will a perceived lack of trust cripple the effectiveness of the program?"
Data Storage

New Datacenter In Underground Lair 109

lobo235 writes to tell us that a new underground data center designed by Sweden's largest ISP is fit for a classic supervillain, complete with greenhouses, waterfalls, German submarine engines, simulated daylight and can withstand a hit from a hydrogen bomb. "'Rather than just concentrating on technical hardware we decided to put humans in focus,' he said. 'Of course, the security, power, cooling, network, etc, are all top notch, but the people designing data centers often (always!) forget about the humans that are supposed to work with the stuff.'"
Linux Business

Fixstars Buys Terra Soft 20

sgt scrub writes "If you have put Yellow Dog Linux on a PS3 or a Pre X86 Apple, or have an interest in the Cell Broadband Engine, you will be pleased to know that Fixstars has purchased Terra Soft. '"A Cell/B.E. software developer and long-time user of Yellow Dog Linux, Fixstars has great faith in Yellow Dog Linux," said Satoshi Miki, CEO of Fixstars. "This business acquisition allows us to offer a reliable and stable Linux distribution with sense of ease for our customers. I have no doubt that in the expanding Cell/B.E. ecosystem we will offer the best Cell/B.E. solution of the High Performance Computing generation."' I can't think of any group of people better suited to expand the Cell horizon."
Power

Saving Energy Via Webcam-Based Meter Reading? 215

squoozer writes "Like many people, I am trying to cut down on the amount of energy my family and I use in order to save both the environment and my pay packet. Since I want to do this in as scientific a way as possible, I'm taking meter readings every day and recording them in a spreadsheet (OOo Calc naturally). Currently, in the UK at least, neither gas nor electricity meters can be hooked up to any sort of device that can query the meter for its current reading. Rather than climb down into the cellar every day to read the meters, it would be great if I could simply position a webcam in front of each meter and have the value logged automatically each day. The problem is that while I am a software developer (Java mostly) I have no experience in image processing (dials from the electricity meter) and don't really know where to start with this project." Does anyone have any advice for analyzing the visual data this reader would be gathering?
The Internet

New Search Engine Takes "Dyve" Into the Dark Web 55

CWmike writes "DeepDyve has launched its free search engine that can be used to access databases, scholarly journals, unstructured information and other data sources in the so-called 'Deep Web' or 'Dark Web,' where traditional search technologies don't work. The company partnered with owners of private technical publications, databases, scholarly publications and unstructured data to gain access to content overlooked by other engines. Google said earlier this month that it was adding the ability to search PDF documents. In April, Google said it was investigating how to index HTML forms such as drop-down boxes and select menus, another part of the Dark Web."
Handhelds

VMware Promises Multiple OSs On One Cellphone 90

superglaze writes to tell us that VMware has announced a large effort behind their Mobile Virtualization Platform, promising the possibility of multiple operating systems on mobile devices. "The company described MVP as a 'thin layer of software' that will be embedded in handsets and 'be optimized to run efficiently on low-power-consuming and memory-constrained mobile phones.' Asked whether MVP would offer something different from the abstraction already provided by mobile Java, VMware's European product director Fredrik Sjostedt told ZDNet UK that MVP would require less recoding. 'If you want to have an application run on a Java-specific appliance, you need to code it for Java,' Sjostedt said. 'What we're introducing with MVP is an [embedded] abstraction layer below that, between the physical hardware and the software layer.'"

Slashdot Top Deals

Two can Live as Cheaply as One for Half as Long. -- Howard Kandel

Working...