Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment They were two millenia late to the party. (Score 1) 170

There are several algorithms using the binary number system, including left-to-right binary exponentiation, in Pingala's Chanda-sutra, before 200 BCE. Knuth's _The Art of Computer Programming, Volume 2: Seminumerical Algorithms_ cites B. Datta and A.N. Singh's 1935 _History of Hindu Mathematics 1_. Also al-Kashi described the right-to-left binary exponentiation algorithm in 1427 CE.
It's funny.  Laugh.

The Ultimate Anti-Action Online Game: Waiting In Line 3D 94

Freshly Exhumed writes "Looking a lot like the venerable Wolfenstein 3D or similar Id action games of the DOS days, the new online game Waiting in Line 3D was released Monday by developer Rajeev Basu, and was played 50,000 times in its first 24 hours of activity... er... inactivity. Is the complete lack of any action a brilliant satire of computer gaming? Is it software-based performance art? Is it silly? Judge for yourself, if you can meet the challenge!" Now's a good time to confess if you spent a major portion of your post-Thanksgiving dinner recovery time camped out in line for some of those Black Friday come-ons.
Encryption

Google To Encrypt Cloud Storage Data By Default 217

jfruh writes "Worries about snooping are now a permanent part of our computing landscape, but Google is attempting to ameliorate those fears by encrypting all data on its Google Cloud Storage service by default. Data is encrypted with 128-bit AES, and you can manage the keys yourself or have Google do it for you. A Google spokesperson said that the company "does not provide encryption keys to any government."" (Also at SlashCloud.)
Advertising

IAB Urges People To Stop "Mozilla From Hijacking the Internet" 499

hypnosec writes "In its latest attempt to stop Mozilla from going ahead with its proposed default blocking of third-party cookies in Firefox, the Interactive Advertising Bureau took out a full page ad urging users to stop 'Mozilla from hijacking the Internet.' Through the advert, IAB has claimed that the Firefox maker wants to be the 'judge and jury' when it comes to business models on the web. According to the IAB, Mozilla wants to eliminate the cookies which enable online advertisers to reach the right audience. IAB notes that 'If cookies are eliminated, it is clear to us that consumers will get a less relevant and diverse Internet experience.'"
Microsoft

Microsoft Will Squeeze Datacenters On Price of Windows Server 274

Nerval's Lobster writes "Microsoft plans to raise the price of the Datacenter edition of the upcoming R2 release of Windows Server 2012 by 28 percent, adding to what analysts call a record number of price increases for enterprise software products from Redmond. According to licensing data sheets available for download from the Windows Server 2012 R2 Website (PDF), the price of a single license of Windows Server 2012 R2 Datacenter will be $6,155, compared to $4,809 today—plus the cost of a Client Access Licenses for every user or device connecting to the server. News of the increase was posted yesterday by datacenter virtualization and security specialist Aidan Finn, a six-time Microsoft MVP who works for Dublin-based value added reseller MicroWarehouse Ltd. and has done work for clients including Amdahl, Fujitsu and Barclays. The increase caps off a year filled with a record number of price increases for Microsoft enterprise software, according to a Tweet yesterday from Microsoft software licensing analyst Paul DeGroot of Pica Communications."
Media

HBO Asks Google To Take Down "Infringing" VLC Media Player 364

another random user writes with an excerpt from TorrentFreak: "It's no secret that copyright holders are trying to take down as much pirated content as they can, but their targeting of open source software is something new. In an attempt to remove pirated copies of Game of Thrones from the Internet, HBO sent a DMCA takedown to Google, listing a copy of the popular media player VLC as a copyright infringement. An honest mistake, perhaps, but a worrying one. ... Usually these notices ask Google to get rid of links to pirate sites, but for some reason the cable network also wants Google to remove a link to the highly popular open source video player VLC. ... The same DMCA notice also lists various other links that don't appear to link to HBO content, including a lot of porn related material, Ben Harper's album Give Till It's Gone, Naruto, free Java applets and Prince of Persia 5."
The Courts

Apple Sued For Man's Porn Addiction 509

coolnumbr12 writes "Chris Sevier, a 36-year-old man from Tennessee, got so addicted to porn videos that his wife took his children and left him. Now he has sued Apple saying the company failed to install any filter in its devices to prevent his addiction. In a 50-page complaint, Sevier calls Apple a 'silent poisoner' responsible for the proliferation of 'arousal addiction, sex trafficking, prostitution, and countless numbers of destroyed lives.' Sevier is seeking damages from Apple, but said he we will drop the lawsuit if Apple agrees to sell devices with a 'safe mode.'"
Businesses

Say What? Wading Through the Nonsense In Microsoft's Re-Org Memo 165

curtwoodward writes "Steve Ballmer's attempt to reorganize Microsoft into a more focused company will define his legacy as CEO. So you'd think the wordsmiths in Redmond would take a little time ensuring their message was crystal-clear, right? Not exactly. Ballmer's big, gung-ho memo to Microsofties, posted on the company's website, is chock full of nonsense and corporate executive doublespeak — or, as Ballmer might say, `high-value experiences' that will `involve repartitioning the work' and `drive partners across our integrated strategy and its execution.' Huh?" Honest language in corporate communications is a rare quality. I suspect there's a special language-butchering training course that most C-level executives enthusiastically complete.
DRM

How DRM Won 221

Nerval's Lobster writes "In 2009, when Apple dropped the Digital Rights Management (DRM) restrictions from songs sold through the iTunes Store, it seemed like a huge victory for consumers, one that would usher in a more customer-friendly economy for digital media. But four years later, DRM is still alive and well — it just lives in the cloud now. Streaming media services are the ultimate form of copy protection — you never actually control the media files, which are encrypted before delivery, and your ability to access the content can be revoked if you disagree with updated terms of service; you're also subject to arbitrary changes in subscription prices. This should be a nightmare scenario to lovers of music, film, and television, but it's somehow being hailed by many as a technical revolution. Unfortunately, what's often being lost in the hype over the admittedly remarkable convenience of streaming media services is the simple fact that meaningfully relating to the creative arts as a fan or consumer depends on being able to access the material in the first place. In other words, where your media collection is stored (and can be remotely disabled at a whim) is not something to be taken lightly. In this essay, developer Vijith Assar talks about how the popularity of streaming content could result in a future that isn't all that great. 'Ultimately, regardless of the delivery mechanism, the question is not one of streaming versus downloads,' he writes. 'It's about whether you want to have your own media library or request access to somebody else's. Be careful.'"
Government

Got Malware? Get a Hammer! 254

FuzzNugget writes "After the Economic Development Administration (EDA) was alerted by the DHS to a possible malware infection, they took extraordinary measures. Fearing a targeted attack by a nation-state, they shut down their entire IT operations, isolating their network from the outside world, disabling their email services and leaving their regional offices high and dry, unable to access the centrally-stored databases. A security contractor ultimately declared the systems largely clean, finding only six computers infected with untargeted, garden-variety malware and easily repaired by reimaging. But that wasn't enough for the EDA: taking gross incompetence to a whole new level, they proceeded to physically destroy $170,500 worth of equipment (PDF), including uninfected systems, printers, cameras, keyboards and mice. After the destruction was halted — only because they ran out of money to continue smashing up perfectly good hardware — they had racked up a total of $2.3 million in service costs, temporary infrastructure acquisitions and equipment destruction."

Slashdot Top Deals

A morsel of genuine history is a thing so rare as to be always valuable. -- Thomas Jefferson

Working...