Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Sony

Submission + - Sony Ericsson phone with detachable display

HighWizard writes: As described in a patent application called "Detachable Housings for a Wireless Communication Device ", the mobile phone has two detachably connected housings.

One of them can hold user interface devices such as keypad, keyboard, touchpad, joystick control, etc; for data input and control. Other things, such as GPS receiver, microphone, camera and battery go in there, too.
Censorship

Submission + - Danish ISP Tele2 challenges Pirate Bay-blockade (epn.dk)

krasmussen writes: "After Monday's injuction on Danish ISP Tele2 to block access to The Pirate Bay, the company has now decided to take the case further in court. "We do not like being put in a role where we as ISP have to regulate people's freedom of speech" says Nicholai Pfeiffer, regulatory manager i Telenor, which owns Tele2. However, because the current ruling against Tele2 still stands, the customers are not going to regain access to The Pirate Bay at the moment."
Intel

Submission + - Intel Skulltrail: 8 CPU cores, 4 GPUs and problems (pcper.com)

Vigile writes: "The new Intel Skulltrail platform has been getting a lot of attention since its release due to the raw performance that eight 3.2 GHz cores can bring to media encoding, rendering and other multi-threaded application types. Performance in standard benchmarks like CineBench 10 and POV-Ray is simply unmatched by anything that AMD can offer. What is disappointing though is the gaming aspect of Skulltrail: originally one of Intel's major marketing points of the platform was both SLI and CrossFire support. While it does allow multi-GPU gaming, PC Perspective found the overall performance was a let down because in most cases a single processor, dual-core system was able to offer nearly identical or better overall frame rates without the stability issues Skulltrail exhibited."
The Courts

Submission + - EFF defends terrorist linked CAIR 1

anonymous coward (not wanting to be a target) writes: EFF defends terrorist linked Council for Islamic Relations (CAIR) against copyright and RICO violations in Savage v. CAIR and admits in their pleading (paragraph 91) that CAIR used images of the 9/11 world trade center in conjunction with the HAMAS terrorist linked "Holy Land Foundation's" website to collect donations supposedly destined to 9/11 survivors. EFF appears to be defending fair use by CAIR with "Savage v. CAIR: Another Year, Another Attempt to Misuse Copyright Law to Silence a Critic" while Savage claims: Paragraph 21: "The segment misappropriated was in excess of four minutes. As set forth in more detail herein, the misappropriated segment was used by CAIR for fund- raising purposes and the segment was used in a manner designed to cause harm to the value of the copyright material in the long and short term. This was the desired result and it was part of a greater plan and scheme to destroy public voices that express opposition to the criminal political agenda of CAIR as set forth more fully in the Second Cause of Action". And paragraph 29: "The copyright infringement was done to raise funds for CAIR so that it could self perpetuate and continue to perform its role in the RICO conspiracy set forth in Count Two and to disseminate of propaganda on behalf of foreign interests that are opposed to the continued existence of the United States of America as a free nation" Thanks to the EFF for defending one of the premier unidicted co-conspirators operating as a fifth column in the United States. Commenters on this topic should be aware that CAIR tends to be very litiguous against anyone who dares to criticize their organization
Privacy

Submission + - Fifth Amendment Ruling Protects Passwords 1

PhysicsPhil writes: A few websites (here, here and here) have reported on a recent ruling in US computer law. A federal magistrate judge in Vermont has ruled (PDF) that the Fifth Amendment right against self-incrimination protects a suspect against having to reveal his computer password. The case centres around a (legal) search of a Canadian man's laptop at a border crossing, during which evidence of encrypted child pornography was found. A grand-jury instruction to disclose the password was challenged on Fifth Amendment grounds, leading to this ruling. A columnist at Findlaw.com has an article with legal analysis of some of the issues.
Google

Submission + - Gmail Has a Daily Limit on Sending Email (shodan.in)

Shodan writes: "Gmail imposes a limit on the attachment size (20 MB) and the overall storage space (6 GB and growing) but there's also a daily quote on sending email. Break the rules and Google will disable you Gmail account temporarily without any warnings. So while sending an email message to a large group of friends using Gmail, read the following rules to avoid temporary shut-down of Gmail:"
Displays

Submission + - HDCP/HDMI - What is this? DRM in another acronym? (wikipedia.org) 1

canuck57 writes: I was shopping for a new quad core PC today and asked what is this "DVI with HDCP" all about? Being naive I though it might be High Definition Capable something or rather. What he said sounded in like DRM in the hardware. Needless to say alarm bells ran through my head like a waterfall. So I opted out of the purchase. Was a nice system, 8GB of RAM with a PCI-E video and 24" wide screen...

So I ask, what is HDCP got to do with HDMI and how does it impact me? Or should I just buy a non-HDCP system, they are less expensive? Is it passive or active? Can Linux bypass it? Or is this a dead end for consumers?

Enlightenment

Submission + - Secret Scientology documents published (indymedia.org)

hansguckindieluft writes: de.indymedia.org reports:
The internet group Anonymous that recently declared war on Scientology has published documents and instruction videos (Link to the german newssite with downloads (in english)) reserved for high ranking Scientologists. This has reportedly been made possible by the hack of a scientology server a week ago.
Translated from german:
"The documents include handbooks for the highest OT-levels that normally require investments of hundreds of thousands of dollars into scientology"
"Furthermore CD's for selfindoctrination at 900$ a piece have been 'liberated'"
"Other 'hot stuff' are the OECs (Organization Executive Courses). That tell Org-leaders how to keep, acquire and financially exploit followers"

Other documents contained in the download bear titles like "All about radiation", "Child Dianetics", "The OT Levels" (800 pages), "The Axioms of Scientology" (6 pages), "Advanced Procedures and Axioms" (58p).

Television

Submission + - Olevia + Linux = ? 2

Merlin42 writes: I recently bought a Olevia 232T. I just downloaded the updated firmware and noticed that it contained a "Linux Compressed ROM File System" which I was able to mount and explore. I was able to determine that the TV is running Linux 2.6.11 on a 32-bit MIPS processor. I suspect the TV contains at least 8 (and more likely 16MB) of flash. It also has a USB port, which is used to update the flash from a USB disk. This brings up several questions:
  1. Has any one else mucked with this TV, or one like it? I would love to make a more sane menu system for the TV. Of Course mucking the menu would either require assistance from Olevia or some pretty serious RE work.
  2. Could I get a USB NIC working on the TV?
  3. And if so could I get mplayer or firefox working with it? The TV is definitely not running X so doing this would probably again require assistance from Olevia or some pretty serious RE work.
  4. Are there any GPL issues with Olevia using Linux?
Privacy

Submission + - January Identity theft: Blue Cross and Georgetown

HighWizard writes: Companies are paying a lot of attention to securing their networks against malicious attackers and other threats, but some still lag in implementing similar measures for protecting data on desktops, laptops and portable storage devices. The most recent examples are Horizon Blue Cross Blue Shield of New Jersey and Georgetown University, both of which faced data compromises this month. Around 40,000 at Georgetown and 300,000 at Blue Cross Blue Shield.
Sci-Fi

Submission + - Ender's Game to Be Video Game (reuters.com)

eldavojohn writes: "The book that changed my life in 5th grade is being made into a video game. Chair Entertainment, makers of "Undertow", will develop titles based on Orson Scott Card's book and they are also making a game based on his latest book "Empire." The studio cites disappointment in a fruitless movie of the game and hopes to make this one work first. It should be noted that the game will be about the book itself and not the game within the book (no ogre eyes for me)."
The Almighty Buck

Submission + - Google to purchase The New York Times?

phorest writes: Pretty good article about the plusses and minuses for all the parties involved. Granted, it is all speculative at this point but one paragraph got my interest. Sometimes speculation is fun!

Second, Google is embarking on an ambitious mobile platform. It is buying wireless spectrum and will soon introduce Google Mobile. In so doing, it is entering into an arena where the established players have hired (almost) every lobbyist and (almost) every law firm with expertise in telecommunications in Washington, DC and in virtually every state capital. Owning the New York Times would level that playing field in one fell swoop. Owning major media outlets is a strategy that has worked very well for General Electric, Disney, News Corp., Time Warner and others in their dealing with the federal government and with state governments. There's every reason to believe it would be helpful to Google.


Do all mega-corps have to have major-media outlets to maintain their standings with government, or can it be that these companies have so much money that they are just putting that cash to good use?
Cellphones

Submission + - Hackers Unleash GPS on Sprint, Verizon PDAs (phonenews.com)

An anonymous reader writes: With a few clicks of the mouse, users can now free the GPS chip inside their Sprint and Verizon versions of HTC's most powerful PDA.

The Sprint Mogul, and Verizon XV6800, as well as Alltel's PPC-6800, have all been hacked to use the network-assisted gpsOne technology... as a standard GPS receiver. gpsOne touts being as reliable as standard autonomous GPS. Carriers have prevented this from being used without paying for a carrier's GPS navigation software.

With the hacked firmware update, these three phones can now use GPS with Google Maps, Windows Live Search, and navigation apps like TomTom. This marks one of the first times CDMA networks have been un-crippled in regards to GPS, opening the door to consumer use of the feature without paying through the nose needlessly.

Security

Submission + - 38,000 SSN's Compromised at Georgetown

HighWizard writes: A hard drive containing the Social Security numbers of nearly 40,000 Georgetown students, alumni, faculty and staff was reported stolen from the office of Student Affairs. The files include all undergraduate students enrolled from 1998 through the middle of 2006. They also include postgraduates enrolled during that period who were assessed financial transactions that crossed between the main, Medical and Law campuses, such as student health insurance. Of the approximately 14,000 students currently at the university, roughly 7,700 — around 55 percent — had their private information on the missing hard drive, Lambert said.
Networking

Submission + - Internet IP Address Allocation 2008 Report (ip2location.com)

IPAddressReport writes: "In this 2008 study, it analyzes the distribution and the trends of IP address allocation in 238 countries for 2007. From the data analysis (see Table 1 & Chart 1), the United States tops the allocation list by holding 37.73% of the IP addresses worldwide. It follows by United Kingdom (12.83%), Japan (7.64%), China (5.74%), Germany (3.81%), France (3.65%), Canada (2.81%), Korea (2.74%), Netherlands (2.00%) and Italy (1.67%). These Top 11 countries in the list occupied more than 80% of total allocated IP address ranges in the world in 2007. The rest 227 countries are sharing less than 20% of allocated IP address spaces. From the chart analysis (see Chart 2), the United States and the Japan percentages in the IP address space is decreasing in slow pace. China IP address range is increasing at a fast pace and it could potentially overtake the number 3 spot in 2008. Other countries such as Germany and France are growing at slower rate compare to China relatively."

Slashdot Top Deals

God help those who do not help themselves. -- Wilson Mizner

Working...