Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:google has no choice, like many others before t (Score 1) 128

Basically you have to pay them money in order to be allowed to do things that are already ethical, perhaps even legal to do. If you already can do these things, then you often have to put up lobbying efforts to make sure that you can continue doing them.

Paying for extortion is unethical and illegal too. Laws punish both the extorter and who omits to denounce.

For example, recall how after Google introduced gmail, California senator Liz Figueroa wanted to ban it.

Presumably she was afraid of the fact that the average Gmail user wouldn''t be aware that Google (and Google's unfaithful employees, and hackers, and the NSA, ...) would be able to read his email, and continue to be able to do so for an unspecified amount of time after that mail was "deleted". Which is what actually happens today, but to a much wider extent, with people using the services of Google (Facebook, Bing, ...) without being aware of the massive and uncontrollable espionage that supports them, because the terms of service are explained in EULAs which are effectively not understandable by those users. Banning Gmail would have been unuseful and unjust, I'd have regulated them to explain this policy to the users by using the same font size that they use when they advertise the size of the storage space they're offering, before the user signs the contract.

In that case, it took some heavy lobbying in order to keep gmail legal.

You mean that Google overrode the people's sovereign will, that they had expressed democratically by electing Liz Figueroa, by corrupting other politicians? If so, it's highly immoral and Google deserves to be punished for this. The government has the monopoly of coercion in modern democracies, and this privilege stems from the fact that it represents the will of the people. Altering this fact is one of the most serious crimes that an entity can stain itself with.

Before gmail they used to suck horribly, the good ones gave you a whopping 10MB of storage

In 2005 my ISP gave me 300 MB of storage which, in a time of 56K modem dialup connections, was plenty. The free offer from the same provider was 100MB, which is still ten times bigger than 10MB.

and each action you took required an entire page reload, making them slow as fuck.

Did your webmail work like that? The one of my ISP looked like MS Outlook and wasn't bad. Why, AJAX was invented by Microsoft for that exact purpose.

Google

Mr. Schmidt Goes To Washington: A Look Inside Google's Lobbying Behemoth 128

barlevg (2111272) writes "In May 2012, in the midst of an FTC investigation into Google's search practices, the law school at George Mason University in Northern Virginia hosted a conference attended by congressmen, regulators and staffers. The topic: competition, search and social media. What none of the attendees of the conference knew was that Google was pulling many of the strings behind the event, even going so far as to suggest invited speakers. This event, as documented in The Washington Post is just a snapshot of the operations of one of the largest and highest spending lobbying entities in DC, a far cry from the one-man shop it started out as nine years ago, from a company "disdainful" of Washington's "pay-to-play" culture."

Comment Re:I'm disapointed in people (Score 1) 693

when what their user base wanted was yet another rehash of the win 95 desktop layout. The Gnome developers actually tried to do something new in desktop UIs, they actually tried to innovate

Even Windows 8, with all of Microsoft's economical and political prowess behind it, failed, because UI designers decided to drop the excellent "Windows 95 desktop layout" without having a proper replacement for it (Metro solved a different problem). Microsoft's remedies for this situation have all gone in the direction of restoring elements of the Windows 95 desktop layout.

Perhaps so many people want the "Windows 95 desktop layout" not because they dislike change or are irrational beings. Perhaps they want it because it works, and as is the case for most things that work, perhaps its form follows its function, and this could be the reason why most traditional desktop environments tend to appear similar. Most airplanes look like the same, even though aviation is characterized by strong innovation.

Windows

IRS Misses XP Deadline, Pays Microsoft Millions For Patches 322

An anonymous reader writes "When Microsoft terminated official support for Windows XP on April 8th, many organizations had taken the six years of warnings to heart and migrated to another operating system. But not the U.S. Internal Revenue Service. Only 52,000 of their 110,000 Windows-powered computers have been upgraded to Windows 7. They'll now be forced to pay Microsoft for Custom Support. How much? Using Microsoft's standard rate of $200 per PC, it'll be $11.6 million for one year. That leaves $18.4 million of their $30 million budget to finish the upgrades themselves, which works out to $317 per computer."
Microsoft

The New 'One Microsoft' Is Finally Poised For the Future 270

redletterdave writes: "The stodgy old enterprise company whose former CEO once called open source Linux a 'cancer' is gone. So is its notorious tendency to keep developers and consumers within its walled gardens. The 'One Microsoft' goal that looked like more gaseous corporate rhetoric upon its debut last summer now is instead much closer to actual reality. No longer are there different kernels for Windows 8, Windows Phone or Windows RT it's now all just One Windows. As goes the Windows kernel, so goes the entire company. Microsoft finally appears to have aimed all its guns outside the company rather than at internal rivals. Now it needs to rebuild its empire upon this new reality."

Comment Open Source commercial (Score 1) 144

And while Apple can readily fix a bug in its own software, at least for users who keep up on patches, "Linux" refers to a broad range of systems and vendors, rather than a single company, and the affected systems include some of the biggest names in the Linux world, like Red Hat, Debian, and Ubuntu.

And thanks to the LGPL license of GnuTLS, all the users have the possibility to upgrade their systems, independently of whether Red Hat, Debian, Ubuntu, Apple, Microsoft believe that maintaining those systems is still commercially convenient or not. GPLv3 would be better, as it would give the users the warranty of being able to actually install the updated code into their devices, which is important for non-PCs.

Sony

Blender Foundation Video Taken Down On YouTube For Copyright Violation 306

An anonymous reader writes "As if the automated take downs on Youtube weren't already bad enough, today fans of the popular open source 3D software Blender were greeted by a copyright take down notice for their third open movie, Sintel, despite it being released under a Creative Commons license: 'This video contains content from Sony Pictures Movies & Shows, who has blocked it on copyright grounds.' It is believed that the takedown was a result of Sony Electronics adding Sintel to their official 4k demo pool."
Windows

Microsoft's Security Products Will Block Adware By Default Starting On July 1 177

An anonymous reader writes "Microsoft [Thursday] announced a change to how it handles adware, a form of malware that pushes unwanted advertisements to the user. As of July 1, the company's security products will immediately stop any adware they detect and notify the user, who can then restore the program if they wish. Currently, when any of Microsoft's security products (including Microsoft Security Essentials and Microsoft Forefront) detects a program as adware, it will alert the user and offer them a recommended action. If the user doesn't do anything, the security product will let the program continue to run until the user makes a decision." If adware is malware, why wait until July?
United Kingdom

UK Government Pays Microsoft £5.5M For Extended Support of Windows XP 341

whoever57 (658626) writes "The UK Government has signed a contract worth £5.5M (almost $9M) for extended support and security updates for Windows XP for 12 months after April 8. The deal covers XP, Exchange 2003 and Office 2003 for users in central and local government, schools and the National Health Service. The NHS is in need of this deal because it was estimated last September that 85% of the NHS's 800,000 computers were running XP."
Security

TCP/IP Might Have Been Secure From the Start If Not For the NSA 149

chicksdaddy writes: "The pervasiveness of the NSA's spying operation has turned it into a kind of bugaboo — the monster lurking behind every locked networking closet and the invisible hand behind every flawed crypto implementation. Those inclined to don the tinfoil cap won't be reassured by Vint Cerf's offhand observation in a Google Hangout on Wednesday that, back in the mid 1970s, the world's favorite intelligence agency may have also stood in the way of stronger network layer security being a part of the original specification for TCP/IP. (Video with time code.) Researchers at the time were working on just such a lightweight cryptosystem. On Stanford's campus, Cerf noted that Whit Diffie and Martin Hellman had researched and published a paper that described the functioning of a public key cryptography system. But they didn't yet have the algorithms to make it practical. (Ron Rivest, Adi Shamir and Leonard Adleman published the RSA algorithm in 1977). As it turns out, however, Cerf did have access to some really bleeding edge cryptographic technology back then that might have been used to implement strong, protocol-level security into the earliest specifications of TCP/IP. Why weren't they used? The crypto tools were part of a classified NSA project he was working on at Stanford in the mid 1970s to build a secure, classified Internet. 'At the time I couldn't share that with my friends,' Cerf said."
Open Source

Linus Torvalds Suspends Key Linux Developer 641

alphadogg writes: "An argument between developers of some of the most basic parts of Linux turned heated this week, resulting in a prominent Red Hat employee and code contributor being banned from working on the Linux kernel. Kay Sievers, a well-known open-source software engineer, is a key developer of systemd, a system management framework for Linux-based operating systems. Systemd is currently used by several prominent Linux distributions, including two of the most prominent enterprise distros, Red Hat and SUSE. It was recently announced that Ubuntu would adopt systemd in future versions as well. Sievers was banned by kernel maintainer Linus Torvalds on Wednesday for failing to address an issue that caused systemd to interact with the Linux kernel in negative ways."
United States

NSA Infiltrated RSA Deeper Than Imagined 168

Rambo Tribble (1273454) writes "Reuters is reporting that the U.S. National Security Agency managed to have security firm RSA adopt not just one, but two security tools, further facilitating NSA eavesdropping on Internet communications. The newly discovered software is dubbed 'Extended Random', and is intended to facilitate the use of the already known 'Dual Elliptic Curve' encryption software's back door. Researchers from several U.S. universities discovered Extended Random and assert it could help crack Dual Elliptic Curve encrypted communications 'tens of thousands of times faster'."
Businesses

Apple, Google Go On Trial For Wage Fixing On May 27 148

theodp writes: "PandoDaily's Mark Ames reports that U.S. District Judge Lucy Koh has denied the final attempt by Apple, Google, Intel, and Adobe to have the class action lawsuit over hiring collusion practices tossed. The wage fixing trial is slated to begin on May 27. 'It's clearly in the defendants' interests to have this case shut down before more damaging revelations come out,' writes Ames. (Pixar, Intuit and LucasFilm have already settled.) The wage fixing cartel, which allegedly involved dozens of companies and affected one million employees, also reportedly affected innovation. 'One the most interesting misconceptions I've heard about the "Techtopus" conspiracy,' writes Ames of Google's agreement to cancel plans for an engineering center in Paris after Jobs expressed disapproval, 'is that, while these secret deals to fix recruiting were bad (and illegal), they were also needed to protect innovation by keeping teams together while avoiding spiraling costs.' Ames adds, 'In a field as critical and competitive as smartphones, Google's R&D strategy was being dictated, not by the company's board, or by its shareholders, but by a desire not to anger the CEO of a rival company.'"
Transportation

Security Evaluation of the Tesla Model S 93

An anonymous reader writes: "Nitesh Dhanjani has written a paper outlining the security mechanisms surrounding the Tesla Model S, as well as its shortcomings, titled 'Cursory Evaluation of the Tesla Model S: We Can't Protect Our Cars Like We Protect Our Workstations.' Dhanjani says users are required to set up an account secured by a six-character password when they order the car. This password is used to unlock a mobile phone app and to gain access to the user's online Tesla account. The freely available mobile app can locate and unlock the car remotely, as well as control and monitor other functions.

The password is vulnerable to several kinds of attacks similar to those used to gain access to a computer or online account. An attacker might guess the password via a Tesla website, which Dhanjani says does not restrict the number of incorrect login attempts. Dhanjani said there is also evidence that Tesla support staff can unlock cars remotely, leaving car owners vulnerable to attackers impersonating them, and raising questions about the apparent power of such employees to locate and unlock any car with or without the owner's knowledge or permission. In his paper, Dhanjani also describes the issue of Tesla's REST APIs being used by third parties without Tesla's permission, causing Tesla owners' credentials to be sent to those third parties, who could misuse the information to locate and unlock cars."

Slashdot Top Deals

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...