Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Microsoft

Submission + - Microsoft pays companies to use LiveSearch

tsa writes: "On John Battelle's Searchblog there is a piece about how Microsoft pays companies to not only have them use MS's Live Search engine, but also get information about the amount of users and PC's in the company. Companies get paid a fee per PC. The height of the fee depends on the usage of the MS LiveSearch engine. The use of IE7 is mandatory for this, because MS wants the companies to use a plugin for this browser to be able to keep track of the user's searching habits. If you ask me, this is bribery."
Linux Business

Journal Journal: Off-the-shelf dual-boot linux PCs 1

I was surprised today to see an advert from Founder, one of China's major computer manufacturers. It caught my eye because it was promoting the company's new line of dual-boot Windows+Linux desktop machines. Although selling computers with Linux preinstalled isn't particularly strange here, this is an encouraging sign because it shows that the reasons for offering Linux aren't just to save money any more - previous Linux offerings in China seem to have a
Operating Systems

Submission + - 64 bit Menuet 0.59 available

Michael135 writes: Menuet is a fully assembly written OS for x86. Menuet 0.59 beta includes pre-emptive multitasking, multithreading, ring-3 protection, responsive GUI with resolutions up to 1280x1024, Editor/Assembler for applications, TCP/IP stack with Loopback & Ethernet drivers, simple http/ftp clients, free-form application windows and real-time data fetch. Menuet64 is released as freeware and Menuet32 under GPL.
Security

Submission + - Dealing with long-term security requirements?

tbo writes: I'm an academic researcher in the field of quantum computing. I'm interested in learning what the IT community is doing to prepare for future developments in quantum computing and the resulting security implications — in particular, the compromise of most or all known public key cryptosystems.

Although large-scale quantum computers may be a decade or more away, this still has immediate implications for those with long-term forward security requirements (i.e., data that must stay secret for a long time). Does your organization have data with substantial forward security requirements? How do you deal with protecting that data against future advances in cryptanalysis? Has your organization considered quantum key distribution or other new cryptography technologies?

Another concern is replacing the present-day public key cryptography infrastructure with something immune to quantum computers. A malicious person with access to a single large-scale quantum computer could use it to crack the root certificate authorities' private keys, thus enabling him or her to fake certificates for anything they want and perform undetectable man-in-the-middle attacks against banks and e-commerce sites. Since it's very hard to revoke and re-issue root certificates, this would only have to happen once to do serious damage. What are people planning to do about this?
Businesses

Submission + - 15 Minute SEO

Amit Bhawnani writes: "15 Minute SEO is a checklist of the factors that affect your rankings with Google, MSN, Yahoo! and the other search engines. The list contains positive, negative and neutral factors because all of them exist. Most of the factors in the checklist apply mainly to Google and partially to MSN, Yahoo! and all the other search engines of lesser importance."
Google

Submission + - Interesting article on page rankings manipulation

Ayal Rosenthal writes: "March 14, 2007 (Computerworld) — Rand Fishkin knows how valuable it is for a Web site to rank high in a Google search. But even this president of a search engine optimization firm was blown away by a proposal he received at a search engine optimization conference in London last month, where he was a panelist. The topic — Can a poker Web site rank high on a Google search using purely white hat tactics — meaning no spamming, cloaking, link farms or other frowned-upon "black hat" practices. Fishkin answered yes, provided the site also added other marketing techniques and attracted some media attention. The rest of the panel scoffed. "Don't bring a knife to a gunfight," one chided. After all, this is the cutthroat online gambling sector. But one poker Web site owner was intrigued, and he later approached Fishkin. "He said, 'If you can get us a search ranking in the top five for online poker or gambling [using white hat methods], we'll buy that site from you for $10 million,'" http://computerworld.com/action/article.do?command =viewArticleBasic&articleId=9012943&pageNumber=1"

Slashdot Top Deals

We are experiencing system trouble -- do not adjust your terminal.

Working...