Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Software

Submission + - How about tagging everything in your computer (tabbles.net)

eiapoce writes: The peculiar program Tabbles now announces the possibility of tagging also internet content.

Tagging web stuff with a desktop app – what’s the catch? I can hear you already wondering “why should I ever use a desktop application to tag stuff which is on the internet? Can’t I just use the browser bookmarks or some online bookmarking service like Delicious?”. Well, let’s see: 1) You can tag files on your disk along with gmails/tweets. To all of you out there who rely extensively the Microsoft Office suite (I guess you’re the majority out there) or to those using any other software that produces files (Photoshop/Illustrator, CAD softwares, Music/Video editingyou name it) it may come in handy to have a gmail/tweet tagged along with your files when working on a project. 2) Speed: web applications are fast but are they as fast as a desktop app like Tabbles? I find myself switching to Chrome as I perceive it faster in pretty much everything compared to Firefox – Tabbles is gonna give you the same feeling if you compare it to a web application, no matter how fast your internet connection is. 3) User friendliness: if you’ve tried navigating through files with Tabbles you might have realised how easy and straight forward it is to get to the file you’re looking without the need of going crazy about where the file is and what its name is well, the same thing will happen with tagging tweets/gmails.


Businesses

Submission + - Apple Claims 'Huge' Loss over iPhone Leak

Hugh Pickens writes: "CNN Money reports that according to recently released court documents, Apple says the theft and leak of its new iPhone prototype will have a "huge" negative effect on the company's earnings. "By publishing details about the phone and its features ... people that would have otherwise purchased a currently existing Apple product would wait for the next item to be released, thereby hurting overall sales and negatively [a]ffecting Apple's earnings," Apple attorney George Riley told a detective in the San Mateo County Sheriff's Office adding that Riley could not estimate exactly how much of a financial hit Apple would take from the incident, but he believed it would be "huge." Apple did not immediately return requests for comment, but Apple analysts were dismissive of Apple's damage assessment. "It's a bunch of legalese and B.S. from lawyers," says Kevin Hunt, analysts and Hapoalim Securities. "Everyone knew a new iPhone was coming." Another analyst noted that both of the previous iPhone updates have been introduced at Apple's Worldwide Developers Conference, which takes place in the early summer. "It's a really tenuous argument from Apple, because anyone who follows its introduction behavior knows that new iPhones come in the early summer," says Charles Wolf, analyst at Needham & Co. "This is stricly corporate speak, directed towards creating some action against this kid from Gizmodo.""
Biotech

Submission + - Resurrected Mammoth Blood is Very Cool

Hugh Pickens writes: "Astrobiology Magazine reports that a team of international researchers has brought the primary component of mammoth blood back to life using ancient DNA preserved in bones from Siberian specimens 25,000 to 43,000 years old and found that the recreated mammoth haemoglobin hads special evolutionary adaptations that allowed the mammoth to cool its extremities down in harsh Arctic conditions to minimise heat loss. We've managed to uncover physiological attributes of an animal that hasn't existed for thousands of years," says team leader Professor Kevin Campbell of the University of Manitoba, Canada. "Our approach opens the way to studying the biomolecular and physiological characteristics of extinct species, even for features that leave no trace in the fossil record." The team converted the mammoth haemoglobin DNA sequences into RNA, and inserted them into modern-day E. coli bacteria, which then manufactured the authentic mammoth protein. Then the team used modern scientific physiological tests and chemical modelling to characterize the biochemical properties that conferred mammoths with physiological cold tolerance. "It has been remarkable to bring a complex protein from an extinct species, such as the mammoth, back to life," adds Professor Alan Cooper, Director of the Australian Centre for Ancient DNA (ACAD), where the mammoth haemoglobin sequences were determined."
Software

Submission + - Software Developer welcomes Piracy (blogspot.com) 2

eiapoce writes:

Tabbles got cracked again — a real crack this time (a dll was patched). I guess it's pretty uncommon to see a software developer blogging about his software begin cracked, but in reality the thing its quite cool ... seeing that someone out there cares and takes the time to crack it is quite cool...and feels rewarding. Plus, there are a bunch of case studies out there showing that the more the software gets cracked, the more cash flows in and even that easily crackable softwares win over hard-to-crack competitors.

More here http://tabbles-dev.blogspot.com/2009/12/tabbles-got-cracked-this-time-its-real.html

Comment Re:I get your point (Score 2, Informative) 507

More than "the devil made me do it" we're facing a serious problem in the coming years:

1) The court recognized and given a written sentence that stated there are innate violence traits in some north africans.
2) Here in italy special laws are provided for the dog races known as "biters" (Bulldogs and the likes). Since the same can be now legally said for North Africans should we have special laws for them?
3) If a "biter" harms a person the law prescribes the dog to be retired. Instead this offender got a penalty discount! (On the news it's written it was a religious issue)
4) If I'll ever be in the position to choose between a north african and someone who doesent have potentially this gene I could do so and I have a sentence that justify me besides my prejudices.

Note: North africans are 41% of foreign inmates in Italian prisons but just 16% of legal immigrants. Thought they are 2% of the population on italian soil they are roughtly 1/3 of italian inmates. Source: http://www.ismu.org/ISMU_new/approfondimento.php?id=80

Comment Re:Wow, that's hypocracy (Score 5, Funny) 425

looks absolutely nothing like the Apple Computer logo

Kinda... Think of when you try to find shapes in the clouds, it's almost the same. The difference this time is that you've got a cold sweat covered Steeve Jobs believing the logo is it's his own and casting black magic on everyone around to project the famous reality distorsion field. Then, actually, throught the field the logos look exactly just the same.

Comment Re:What? (Score 1) 146

That is factually incorrect. While apple relays on App Store reviewers and cersorship for enforcing security on their platform Symbian relies on Certificates.

Certificates are issued at various levels: from home brew developer (install on one phone) to Software firm (installs on all devices). Also certificates are issued with various capabilities like reading contacts, sendind sms, sending data, accessing camera/microphone, being able to read or write system files etc. During the installation of a Symbian program the user is constantly nagged with the following information and has to approve/aknowledge separately: Certificate validity - Certificate Capabilities for the program - Program final install.

You can find more informations here: https://www.symbiansigned.com/app/page

The easy way to circumvent this - similar to jailbreking for iPhones - can be found here http://helloox2.com/ and it's free as long you've got a developer certificate issued for your phone to sign it.

Comment Re:It is only DRM+ (Score 1) 356

Of course, there is little reason to steal; people who want the files in question would simply get DPP-free versions.

I disagree. There is a strong reason to do so: by "vandalizing" this imaginary property you teach the idiot the notion that in no circumstances he would have to get a DRM infected file. In this context erasing the keys on the server would be a exemplary punishment for supporters of this idiocy. (Some music stores relying on DRM infected formats already had to do that when they went out of business - consumers of course were screwed)

Slashdot Top Deals

It's a naive, domestic operating system without any breeding, but I think you'll be amused by its presumption.

Working...