Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Power

10 IT Power-Saving Myths Debunked 359

snydeq writes "InfoWorld examines 10 power-saving assumptions IT has been operating under in its quest to rein in energy costs vs. the permanent energy crisis. Under scrutiny, most such assumptions wither. From true CPU efficiency, to the life span effect of power-down frequency on servers, to SSD power consumption, to switching to DC in the datacenter, get the facts before setting your IT energy strategy."
The Courts

Submission + - SPAM: Va. Supreme Courtupholds US felony SPAM conviction

coondoggie writes: "The Virginia Supreme Court today upheld the nation's first felony SPAM conviction, according to the Virginia Attorney General. In November 2004, Jeremy Jaynes was convicted by a jury in Loudoun County Circuit Court on three counts of violating Virginia's groundbreaking Anti-Spam Act, which became in law in 2003. This marked the first ever felony conviction in a SPAM case, and the case received international attention. Jaynes was regarded as the eighth-worst spammer in the world on The Spamhaus Project's Registry of Known Spammer Organizations at the time of his arrest. At that time, prosecutors from the Attorney General's Computer Crime Section argued to the jury that Jaynes, utilizing AOL's private computer network, located in Virginia, peddled his products to unsuspecting victims around the world. A search of a Jaynes residence yielded a cache of compact disks with 176 million e-mail addresses and 1.3 billion e-mail user names, police at the time said.In its 4-3 ruling, the court rejected Jaynes' claim that the state law violates both the First Amendment and the interstate commerce clause of the U.S. Constitution. [spam URL stripped]"
Link to Original Source
Security

Submission + - Will Apple open the iPod Touch to Developers? (cnet.com)

An anonymous reader writes: With the launch of the new iPod Touch, the question every developer must be asking is: Will Apple open up the platform? Apple passed the blame on the locked-down status of the iPhone to a need to protect AT&T's/Cingular's fragile wireless network. Earlier this year, Jobs told Newsweek: "You don't want your phone to be an open platform... You need it to work when you need it to work. Cingular doesn't want to see their West Coast network go down because some application messed up." Since the new iPod doesn't work on the cellular carrier's networks, there shouldn't be any need to protect AT&T from malicious or poorly developed applications. Will Steve Jobs open up the platform, or will he find someone else (as he has done so often in the past) to blame? CNet has more on the story.
Security

Submission + - The 8 most dangerous consumer technologies (computerworld.com)

jcatcw writes: Instant messaging tops the list of consumer grade technologies that have invaded the work place without IT support, and sometimes despite IT's best efforts to keep them out. DeKalb Medical Center in Georgia screens traffic to be sure that Web-based email isn't allowing sensitive data out of an internal network. Other organizations are trying to support one, and only one, brand of smartphone or pda. DeKalb is thinking of implementing Lotus Sametime for internal messaging rather than continue their current ban on IM altogether. At the moment, employee education may be the only safeguard against camera phones grabbing confidential data at the medical center. Virtual worlds, flash drives, widgets, and VoIP are all creating their own problems.

Apple Releases New Touch Screen iPod 866

JSM writes to tell us that Apple released a new version of their popular iPod music player today that boasts, among other things, an iPhone-like touch screen and Wi-Fi capabilities. "The iPod Touch will feature the Safari Internet browser and, like the iPhone, play YouTube videos. Apple also announced a new version of its iTunes music store that will allow users to buy songs wirelessly. iTunes will also sell customizable 99-cent ringtones for the iPhone."
Wireless Networking

Submission + - Is "borrowing" Wi-Fi ethical? (bbc.co.uk)

Z80xxc! writes: BBC has written an article about "stealing" Wi-Fi, and whether or not it is ethical. After all of the recent attention given to arrests due to wireless borrowing, it makes me wonder what will happen in the future. Do you steal wireless? Do you think it's ethical? I do.
Patents

Submission + - 100 Terabyte 3.5-inch Digital Data Storage Disks (physorg.com)

oblonski writes: "A very good article over at PhysOrg.com about a new patented technology that allows the manufacturing of 100 Terabyte 3.5" digital data storage discs There is lots of technical explanations and diagrams of the science involved. From the article: "Have you ever dreamt of 100 terabyte of data per 3.5-inch disk? New patented innovation nanotechnology from Michael E. Thomas, president of Colossal Storage Corporation, makes it real. Michael invented and patented the world's first and only concept for non-contact UV photon induced electric field poling of ferroelectric non-linear photonic bandgap crystals, which offers the possibility of controlling and manipulating light within a UV/Deep Blue frequency of 1 nm to 400 nm. It took him 14 years to find a practical conceptualization that would work to advance the storage industry; 3D Volume Holographic Optical Storage Nanotechnology, for which Michael holds the patents. He was invited to present this fascinating discovery to the National Science Foundation in February 2004. This invention and patents on a technique for changing matter at the molecular level is one of the World's only new enabling technologies, having many hundreds of electro-optic applications. Atomic Holographic Nanotechnology will allow for the first time a functional method for programmable molecular lenses that will allow incoming light to be rejected, modified internally, or allowed to pass unaltered through a transparent lens known as disk, tape, card, drum, film, etc. By being able to program optical lenses, many applications based on light and color can be developed, such as holographic storage, bio-terror detection devices, optical electronics, security products, and hundreds of other products never seen before on the world's markets. The small size of ferroelectric transparent structures makes it possible to fabricate nano-optical devices, such as volume holographic storage, having both positive and negative index of refraction that will allow molecular particles of an atomic size to be modified, controlled, and changed to perform a specific function, desired task, used for low cost accurate chemical / biological matter detection, and reprogrammed to accept new non-volatile data and molecular functions. ""
Announcements

Submission + - Top 5 Most Overrated People In The Industry

njkid1 writes: "Peruse any video game forum and you'll stumble across crazed fans who put their idols (in this case, game developers and corporate figureheads) on golden pedestals. There's nothing wrong with that per se, but we decided to dig a little deeper to see if theselegendary figures live up to the hype. Behold, the top five most overrated industry people. Try not to pop a blood vessel."
Music

Submission + - SIRA back on the table

Mateo_LeFou writes: "The Section 115 Reform Act, part of last year's attempt to impose a licensing regime on ephemeral copies of music (think browser cache, RAM, etc.), seems to be alive and well. The new chairman of the "Intellectual Property" subcommittee (a nd distinguished representative from Hollywood) agrees with the copyright registrar that CD sales are falling because of — you guessed it — piracy, and that this slide can be stopped by making the rules about what computers can legally do with music a lot more complicated. Video here"
Businesses

EU Bans Sock-Puppet Blogs 393

PhilipMarlowe9000 writes in with news of a new EU directive that will take effect in the UK at the end of this year to ban "sock-puppet" reviews or websites, part of an EU-wide overhaul of consumer laws. From the article: "Businesses that write fake blog entries or create whole wesbites purporting to be created by customers will fall foul of a European directive banning them from 'falsely representing oneself as a consumer.' From December 31, when the change becomes law in the UK, they can be named and shamed by trading standards or taken to court. The Times has learnt that the new regulations also will apply to authors who praise their own books under a fake identity on websites such as Amazon."
Security

Submission + - "Hacking" a Fake Snow Day

Class Act Dynamo writes: "Two students in Trenton, Ohio face expulsion from their school and possibly some time in juvie for posting a fake snow-related announcement on the school district website. According to the article, there was no hacking involved. The girls somehow must have gotten the password. It will be interesting to find out how that happened. We'll probably find out next week that it was on a post-it note on the principle's desk."
Software

Submission + - Do current Copyright laws still allow for backups?

Ka D'Argo writes: I had a conversation with a associate of mine about making backups of software or music cd's. This person says under the new laws with DRM, copyright and fair use, you as a consumer are no longer allowed to copy in anyway such things. I say, as it's been for god knows how long, you are still able to make a backup of something you legally own. Common sense even says, it's yours to do with as you please if you legally own it (aside from distributing copies for example). So what's the deal? Under current laws that may or may not have been updated lately, can a consumer make a backup copy of a piece of software or music cd?

Slashdot Top Deals

Old programmers never die, they just hit account block limit.

Working...