Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Media (Apple)

Submission + - Wired's 1997 "101 ways to save apple"

Waxyreader writes: "Almost ten years after its publication, Wired's 101 Ways to Save Apple cover story from 1997 is still a great read for its advice, good, bad, and just plain weird. FTA: "14. Do something creative with the design of the box and separate yourselves from the pack. The original Macs stood out because of their innovative look." "18. Stop being buttoned-down corporate and appeal to the fanatic feeling that still exists for the Mac" "24. Pay cartoonist Scott Adams $10 million to have Dilbert fall in love with a Performa repairwoman.""
User Journal

Journal Journal: Finally against the Patriot Act 5

Liberals and libertarians have been decrying the Patriot Act for years now, and even though that time period has seen me go from "conservative" to "stark raving mad anarcho-capitalist" I still haven't really felt like there's been anything to get upset about. So far, I hadn't heard real evidence that civil liberties of non-terrorists had been curtailed in meaningful ways.

Television

Submission + - cheaper dvr services?

bofh1234 writes: I subscribe to the dish network top 60 pack and local channels. I have 2 625 dvr receivers, but am only paying for 1 ($5) because they are both hooked to the telephone line 24/7. I am also paying $5.98 for each receiver for the dvr service. The brings the total to over $55 per month. I want to stop paying $17 per month (lose the equipment rental fee and the dvr services). I have 4 tvs.

I like the dvr service, but can I do it on my own? Can I buy a couple of receivers, move the smartcard from the current receivers to the new ones? Can I install a tv distribution system in my home (i.e. something like a hotel setup? satellite comes in, gets decoded, and sent to each room) I already have the wiring just need the equipment (any recommendations?). This would also get rid of the dish network remotes and allow me to go back to using the remotes that came with the tv. Any other ideas?
Communications

Nano-Scale Optical Co-Axial Cables Announced 157

toybuilder writes "Reuters reports that scientists have published their work on nano-scale optical coax in the most recent issue of Applied Physics Letters. The coax cable is only about 300nm wide, and is able to transmit optical signals using a carbon center conductor, transmitting light at about 90% the speed of light."

New PS3, Wii, 360 Downloadables Announced 151

360 gamers have Lost Planet to look forward to this week, but PS3 and Wii owners have things to smile about as well. Today's virtual console game releases feature the Hudson classic title Dungeon Explorer, as well as the shmup Gradius and the sidescrolling shooter Soldier Blade. PS3 owners will get six great downloadable titles sometime 'in early 2007', courtesy of Midway and Sony Online Entertainment. "The six games announced in the deal are Mortal Kombat II, Gauntlet II, Joust, Rampage World Tour, Rampart, and Championship Sprint. Sony Online said those titles were chosen specifically for their multiplayer components, as the company is adding online play for all six." Update: 01/08 22:32 GMT by Z : Oops. Missed Ms. Pac-Man on XBLA this week.
Data Storage

Submission + - Setting up a storage network at home

Lucas123 writes: "There's a story on Computerworld.com about setting up storage networks in your home for file/photo sharing between in-home computers and over the Internet that includes a review of six different network-attached storage devices."
Security

Submission + - Absolute Software Predicts Top Security Dilemmas

An anonymous reader writes: Absolute Software Predicts What IT Directors will be Saying in 2007 Leading provider of computer theft recovery, data protection and secure asset tracking solutions forecasts top security dilemmas for IT Directors in 2007 Vancouver, Canada: January 04, 2006 — Absolute Software (www.absolute.com), the leading provider of firmware-based, patented Computer Theft Recovery, Data Protection and Secure Asset TrackingTM solutions, presents its predictions for what IT Directors will be saying in 2007. "Give me back my data!" "If 10,000 employee identities are stolen, well, who cares?" "Hey, who stole my IP address?" "If it's not required by law, it's not in my job description..." "How did your virus get in my video?" "Keep your hands off my files." "Spam me baby one more time." "Can we implant RFID chips in all of our employees?" "Please leave your cell phone, Blackberry, digital camera USB-key, voice recorder and any other digital device at the security desk!" "Give me back my data!" According to the Privacy Rights Clearinghouse, more than 100 million records with sensitive information have been affected by data breaches since early 2005. These incidents will continue to increase as companies are forced to make them public knowledge. Corporations will need to implement programs for data protection in addition to computer asset recovery. Often the information stored on stolen or lost computers is more valuable than the device itself. In addition, fear of liability, penalties or other negative repercussions will drive data recovery or remote data deletion technologies to mitigate risks associated with data security breaches. "If 10,000 employee identities are stolen, well, who cares?" Identity theft will rise and become more organized in cyber crime rings in 2007. However, the worst enablers of identity theft are often employers with lax security for data or sensitive information stored on computers. Although consumers often fear putting credit card information into forms on an unknown website for a transaction, it is more likely that someone they know or work with will actually use their identity or credit cards illegally. As more corporations are exposed in public for having put their employees or clients at risk, consumers and government regulators are starting to become outraged at the lack of protections in place for personal information and records. "Hey, who stole my IP address?" Although hacking into someone's computer or using someone's Internet connection for nefarious purposes is not new, 2006 saw the rise of the 'joe job' (an e-mail spam designed to tarnish the reputation of an innocent third party) which raised the stakes to new heights. As cyber criminals become more sophisticated, they can hijack an IP address, computer network or server farm not just to hatch their own evil plans but specifically to implicate the party that has been victimized. This can cause innocent individuals and companies to find themselves 'blacklisted' with all of the email emanating from their domain automatically marked as spam and obstructing them from conducting legitimate business. "If it's not required by law, it's not in my job description..." IT Directors are often caught in the struggle between good vs. evil — otherwise known as best practices vs. budget. Although IT Directors are often able to identify security risks and potential liabilities in their networks and practices, budgetary constraints often restrict them from patching the holes or strengthening their security forces. Worse yet, management often doesn't realize the threats could truly damage the company's reputation and livelihood. (According to the Los Angeles Times, the cost of this year's data breach from Veterans Affairs could top $500 million.) Therefore, if the government or other regulators do not require specific measures or legal protection, management ignores the risks and refuses to empower IT Directors with the means and the resources to secure the company's physical and digital assets. We predict that consumer concern over privacy breaches will force the government to enact more information privacy laws in corporate environments. The 2006 Data Accountability and Trust Act (http://www.cbo.gov/showdoc.cfm?index=7228&sequenc e=0) approved by the House of Representatives, may shame companies by forcing them to disclose security breaches, but without some real repercussions in penalties, fines or prosecution, it won't be enough. "How did your virus get in my video?" Viruses, trojans and worms are going multimedia in '07. We have been trained like Pavlov's dogs not to open executable attachments from people we don't know, but what harm will an innocent video of a talking cat do? A lot. This year we are going to see the rise of multimedia malware. In addition, Web 2.0 will create new security vulnerabilities. As we enable anonymous users to interact and post messages and files on our websites and servers, we are offering new platforms for their malicious intent. Downloading a free ringtone may be giving someone a free pass to your address book. Viewing an 'uplifting' PowerPoint may enable someone to 'lift' the passwords from your desktop. "Keep your hands off my files." Protections have long been in place to theoretically prevent unauthorized access to files. However, passwords and server access restrictions are grossly inadequate when files are being sent over unsecured networks or stored on mobile devices. When the CEO's laptop is stolen, encryption and remote data deletion are two of the more effective methods for protecting information and securing files. "Spam me baby one more time." Spam shows no signs of slowing down. For every new tool there are ten new tricks to circumvent the spam filters and junk mail settings. In 2006, these tools have done little more than hold back a flood with a paper cup. Without effective law enforcement in this arena, the spammers are making too much money to worry about being a little unethical in their business practices. Rumors of international mafia rings and organized crime behind the lucrative business of spam are rampant. Unfortunately, we see no end in sight to the onslaught of offers for prescription drugs, adult toys, hot stock tips and an inheritance from the royal family of Nigeria. IT Directors will continue to deploy filters, third-party services, firewalls and other feeble defenses in the vain hope that the next great product will actually work. "Can we implant RFID chips in all of our employees?" RFID is all the rage in logistics, shipping and warehousing for cargo and equipment. After Walmart pushed the envelope in 2005, forcing its suppliers to use RFID tags, retailers across the mall have taken the leap. Even corporations have started to smarten up, tagging valuable equipment on corporate campuses. In 2007 we'll see the next generation of RFID implementations for workforce management. Although a few brave/questionable companies have implanted glass-encased RFID tags in fearless employees, (see Financial Times story: http://www.ft.com/cms/s/ec414700-9bf4-11da-8baa-00 00779e2340.html), we don't expect employers to adopt this methodology in the near future. We do expect to see RFID enabled ID tags to provide an additional layer of security for facility access, emergency services and human resources and payroll. Employers can leverage RFID to automate and streamline functions that were previously done manually and were labor intensive such as tracking hourly employees, equipment operators or facility access. "Please leave your cell phone, Blackberry, digital camera, USB-key, voice recorder and any other digital device at the security desk." With micro and nano technology generating a plethora of digital devices that can quickly capture, store and disseminate images and files, opportunities abound for security breaches and sensitive data leaks from corporations with the tightest security. We have already seen bans on camera phones in the gym locker room or classroom (because teens are notoriously crafty at exploiting technology in ways we never imagined.) In 2007, we'll start to see more IT Directors tightening the reigns on the use of mobile and digital devices. As files move from a secure server to a Blackberry or a photo at the office Christmas party is posted on the Internet, new risks arise as sensitive information travels outside the walls of corporate headquarters. The very devices that are meant to be productivity tools for a mobile workforce have become liabilities and security vulnerabilities that need to be addressed.
Programming

Submission + - Second Life goes Open Source

ghstridr writes: (Taken from the press release) San Francisco, CA — January 8, 2007 — Linden Lab®, creator of 3D virtual world Second Life® (www.secondlife.com), is releasing the code of its Viewer application to the open source software development community. Developers can now access the source code to the Second Life end-user software in order to make modifications, enhancements and to add new features. "Open sourcing is the most important decision we've made in seven years of Second Life development. While it is clearly a bold step for us to proactively decide to open source our code, it is entirely in keeping with the community-creation approach of Second Life," said Cory Ondrejka, CTO of Linden Lab. More info: http://lindenlab.com/press/releases/01_08_07
XBox (Games)

Submission + - Games on Vista Will Connect to Xbox Live

nmb3000 writes: There has always been a separation between PC games and their cousins on game consoles, and one of these defining barriers has been the inability to play networked games that mix PC and console clients together into a seamless cross-platform experience. It seems, however, that this may be about to change with a new lineup of games coming of Windows Vista in 2007. Microsoft recently announced at CES that games for Vista utilizing DirectX 10 will be able to connect and participate fully in Xbox Live's services. This includes online game play and all related features such as voice communication. This means popular online games such as Halo 2's multiplayer will no longer be limited to console owners; from the article: "In addition, "Halo® 2" for Windows Vista (Microsoft Game Studios/Bungie Studios) will also support Live, including enabling Windows gamers to communicate with Xbox Live gamers and earn Achievements in the famed "Halo 2" campaign — a first for any "Halo" title on any platform."
Handhelds

Submission + - Nokia announces N800, developer device program

Sunspire writes: Today at CES, Nokia's CEO announced the immediate availability of the Nokia N800 Linux-powered Internet tablet. Compared to its predecessor the 770, the N800 sports twice the memory, dual SD slots, the same brilliant 225 DPI screen and a beefier ARMv6 core. Nokia also cited partnerships with both Skype and Rhapsody to bring the services to the tablet. Nokia also announced a Developer Device Program at their developer site maemo.org, whereby 500 Open Source developers in the Maemo community will be able to buy a N800 for just $99. The company has been busy grabbing prominent developers from the Open Source community and is now one of the a key backers of the GNOME software stack, including GTK, D-Bus and GStreamer, supporting the projects through both sponsorships and code. The tablets are a strange fusion of proprietary and Open Source software, and so far it seems to be benefiting all parties involved.
Security

Submission + - Are cell phone cameras really a security risk?

str4ng3 writes: "I work for a DOD Contractor that does not allow camera phones in the building, however there are no restrictions on mp3 players, USB thumbsticks and PDAs. Are camera phones really that big of a security risk in this day and age? Does anyone else share my pain?"
The Internet

Submission + - Opera Responds on "Secret" Security Patch

Kelson writes: "A member of the Opera development team has responded to last week's article which criticized Opera for fixing critical security issues in December's 9.10 release, but not disclosing the existence of the vulnerability until three weeks later.
Sometimes it even happens that we do not mention issues in our changelogs even though we have fixed it — because we are waiting for other vendors to fix the same issue in their products.
It can happen that the severity of an exploit is upgraded by our internal security team at a later stage, since further analysis shows that the original severity was not accurate: our priority is to first fix the issue...
So what you have been seeing with the 9.10 release and the delayed announcement of two vulnerabilities is an unhappy coincidence of the release and the Christmas vacation.
"
Software

What Makes Software Development So Hard? 567

lizzyben writes to mention that CIO Insight is running a short piece that takes a look at why the rocky culture of software development continues to exist despite all of the missed deadlines, blown budgets, and broken promises. From the article: "I was not really looking or thinking about big software projects. I was just coming out of my experiences at Salon, where we built a content management system in 2000, which was painful. I was one of the people in charge of it, and when the dust cleared, I thought, I don't really know that much about software development. Other people must have figured it out better than I have; I must go and learn. So I started reading, and talking to people, and realized it's a big subject and an unsolved problem. And the bigger the project, the harder the problem."
Networking

Submission + - Bill Gates funds anti-net neutrality politicians

Ditesh writes: "Microsoft billionaire Bill Gates privately funded a campaign by a United States Congressman opposed to net neutrality, according to data in the campaign finance database and the US House of Representatives voting record. According the records, Bill Gates donated the maximum allowed US$2,000 to Republican House Representative David Dreier of California, a staunch opponent of net neutrality who brought down the Democrat Edward Markey Net Neutrality Act of 2006."
User Journal

Journal Journal: Nearing critical mass for funding open nVidia drivers

I was just made aware of a pledge drive attempting to raise $10,000 USD to help fund a project working on open-source nVidia drivers. This would provide full 3D-acceleration to open-source operating systems, and could potentially sidestep the persistent debate between "partial support with open-source drivers" vs. "full support with proprietary drivers." It appears that the organizers intend to use the FSF as an intermediary to transfer the f

Slashdot Top Deals

I'm always looking for a new idea that will be more productive than its cost. -- David Rockefeller

Working...