Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Music

Will People Really Boycott Apple Over DRM? 664

Ian Lamont writes "DefectiveByDesign.org is waging a battle against DRM with a 35-day campaign targeting various hardware and software products from Microsoft, Nintendo, and others. On day 11 it blasted iTunes for continuing to use DRM-encumbered music, games, TV shows, movies, audiobooks, and apps with DRM, while competitors are selling music without restrictions. DefectiveByDesign calls on readers to include 'iTunes gift cards and purchases in your boycott of all Apple products' to 'help drive change.' However, there's a big problem with this call to arms: most people simply don't care about iTunes DRM. Quoting: 'The average user is more than willing to pay more money for hobbled music because of user interface, ease of use, and marketing. ... Apple regularly features exclusive live sets from popular artists, while Amazon treats its digital media sales as one more commodity being sold.' What's your take on the DRM schemes used by Apple and other companies? Is a boycott called for, and can it be effective?"
Announcements

Gen Con Goes Up For Sale 34

Trask writes "LivingDice has documents indicating that Gen Con LLC is up for sale. Additionally, there is an offer pending which could close by the end of the year. This may finally put an end to the uncertainty caused by Gen Con's chapter 11 filing and the recently dismissed Lucasfilm lawsuit."
Television

18% of Consumers Can't Tell HD From SD 603

An anonymous reader writes "Thinking about upgrading to an HDTV this holiday season? The prices might be great, but some people won't be appreciating the technology as much as everyone else. A report by Leichtman Research Group is claiming that 18% of consumers who are watching standard definition channels on a HDTV think that the feed is in hi-def." (Here's the original story at PC World.)
Government

The First E-President 169

Szentigrade writes "Popular Science is running a letter by Daniel Engber of the online Slate Magazine in which he offers the US Presidential nominees advice on using the full potential of the Internet upon their election into office. Some examples discussed in the letter include: a project already being developed that speeds up the patent approval process, a UK site that aims to improve government-citizen interactions, and perhaps most importantly, a call for government information to be 'presented in a standardized and widely used data format, like XML, so that anyone — in or out of government — could use and reconfigure it however they pleased.' Will 2009 be the first year of the E-President?"
Communications

US Army Sees Twitter As Possible Terrorist "Operation Tool" 320

Mike writes "A draft US Army intelligence report has identified the popular micro-blogging service Twitter as a potential terrorist tool. A chapter titled 'Potential for Terrorist Use of Twitter' notes that Twitter members reported the July Los Angeles earthquake faster than news outlets and activists at the Republican National Convention in Minneapolis used it to provide information on police movements. 'Twitter is already used by some members to post and/or support extremist ideologies and perspectives,' the report said. The report goes on to say, 'Terrorists could theoretically use Twitter social networking in the US as an operation tool.' Just wait until the Army finds out about chat rooms and email!"
Censorship

Nation-Wide Internet Censorship Proposed For Australia 424

sparky1240 writes "While Americans are currently fighting the net-neutrality wars, spare a thought for the poor Australians — The Australian government wants to implement a nation-wide 'filtering' scheme to keep everyone safe from the nasties on the internet, with no way of opting out: 'Under the government's $125.8 million Plan for Cyber-Safety, users can switch between two blacklists which block content inappropriate for children, and a separate list which blocks illegal material. ... According to preliminary trials, the best Internet content filters would incorrectly block about 10,000 Web pages from one million."
Transportation

Appropriate Tech, 300mpg Car Top 2008 Innovators 155

longacre writes "While some giggles were floating around about the irony of a Microsoft product (Photosynth) finding itself on the same top 10 products list as a toilet, the true stars of last night's annual Popular Mechanics Breakthrough Awards were innovations of far more consequence. MIT professor Amy B. Smith won the marquis Leadership Award for her work on building simple, low-cost technology to help developing countries. Joining Smith from the appropriate technology field were a group of CalTech students who created all-terrain wheelchairs for the disabled, and a Procter & Gamble exec who developed a water purifying powder for the third world. Aptera Vehicles founders Steve Ambro and Chris Anthony made the cut for their 300mpg Typ-1e, which is expected to hit showrooms by the end of this year. Other winners ranged from the Mars Phoenix Lander team, to the developers of a low-cost cancer test, to the creators of Spore."
Games

Dead Space Wants To Scare You 195

Kotaku recently ran a story questioning whether the survival-horror genre still exists, and how Dead Space may or may not fit into it. With reviews for the game starting to come in, Ars Technica reports that the game is, indeed, both scary and good. Gamespy wrote up a Dead Space survival guide, and Gamasutra has a lengthy interview with the game's senior producer. In the production of the game, the developers studied things like car wrecks and war scenes to increase the level of realism. They also want the game's sounds to terrify players, including appropriately timed silence. The launch trailer is also available, though it does contain spoilers.
Science

CERN Releases Analysis of LHC Incident 149

sash writes "From the fresh press release: 'Investigations at CERN following a large helium leak into sector 3-4 of the Large Hadron Collider tunnel have confirmed that cause of the incident was a faulty electrical connection between two of the accelerator's magnets. This resulted in mechanical damage and release of helium from the magnet cold mass into the tunnel. Proper safety procedures were in force, the safety systems performed as expected, and no one was put at risk. Sufficient spare components are in hand to ensure that the LHC is able to restart in 2009, and measures to prevent a similar incident in the future are being put in place.'"
The Internet

Web Singletons? 254

tcmb writes "There are an uncounted number of web mail and picture sharing services, there are more than enough web sites for online bookmark management and friend-finding, but as far as I know there is only one Internet Archive. Which are the true web singletons, services that exist only once in this form?" And does anything approach the singular time-wasting abilities of IMDB or Wikipedia?
Microsoft

The Continuing War Against Microsoft's "Facts" Campaign 316

davidmwilliams writes "I've been rallying against Microsoft's so-called 'Get the Facts' site for the last fortnight in my blog. Rather than give any legitimate comparison facing off Windows Server vs similarly spec'd Linux options, the Microsoft spin doctors opt for bunkum and hogwash with sensational headlines that don't have any substance underneath. Here's the state of play, including an update on my request to Microsoft PR to do something about the blatant lack of integrity displayed. I also go over the latest case study put up by Microsoft: they promise to show why people are choosing Windows Server 2008 over Linux using the City of Uppsala as an example."
Security

Submission + - Mac, BSD prone to decade old attacks 7

BSDer writes: An Israeli security researcher published a paper few hours ago, detailing attacks against Mac, OpenBSD and other BSD-style operating systems. The attacks, says Amit Klein from Trusteer enable DNS cache poisoning, IP level traffic analysis, host detection, O/S fingerprinting and in some cases even TCP blind data injection. The irony is that OpenBSD boasted their protection mechanism against those exact attacks when a similar attack against the BIND DNS server was disclosed by the same researcher mid 2007. It seems now that OpenBSD may need to revisit their code and their statements. According to the researcher, another affected party, Apple, refused to commit to any fix timelines. It would be interesting to see their reaction now that this paper is public.

Slashdot Top Deals

"What man has done, man can aspire to do." -- Jerry Pournelle, about space flight

Working...