Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Upgrades

BASH 4.0 Released 459

An anonymous reader writes "The widely used Bourne-Again Shell (BASH) version 4.0 is out. The new major release fixes several remaining bugs in the 3.x releases, and introduces a bunch of new features. The most notable new features are associative arrays, improvements to the programmable completion functionality, case-modifying word expansions, co-processes, support for the `**' special glob pattern, and additions to the shell syntax and redirections. The shell has been changed to be more rigorous about parsing commands inside command substitutions, fixing one piece of POSIX non-compliance. Most of us will probably wait for the distros to test the new version and upgrade gradually, but you always have the option of grabbing the source and compiling it yourself. Enjoy."
Microsoft

Vista Capable Lawsuit Loses Class-Action Status 172

nandemoari writes "The long-running 'Vista Capable' lawsuit challenging Microsoft's marketing of PCs capable of running only the most basic version of the Windows Vista operating system has reportedly lost its class-action status. Federal judge Marsha Pechman decertified the class-action lawsuit, saying that plaintiffs had failed to show that consumers paid more for PCs with the 'Vista Capable' label than they would have otherwise."
Encryption

Security Review Summary of NIST SHA-3 Round 1 146

FormOfActionBanana writes "The security firm Fortify Software has undertaken an automated code review of the NIST SHA-3 round 1 contestants (previously Slashdotted) reference implementations. After a followup audit, the team is now reporting summary results. According to the blog entry, 'This just emphasizes what we already knew about C, even the most careful, security conscious developer messes up memory management.' Of particular interest, Professor Ron Rivest's (the "R" in RSA) MD6 team has already corrected a buffer overflow pointed out by the Fortify review. Bruce Schneier's Skein, also previously Slashdotted, came through defect-free."
Businesses

Ballmer Pleads For Openness To Compete With Apple 532

mjasay writes "At the Mobile World Congress, Steve Ballmer took aim at Apple's closed iPhone ecosystem with an ironic plea for openness: 'Openness is central because it's the foundation of choice.' Ballmer has apparently forgotten his company's own efforts to vertically integrate hardware and software (Zune, XBox), its history of vertically integrating software (tying SharePoint into Office, IE, SQL Server, Active Directory, etc.), as well as years of illegally tying Windows to Internet Explorer that only the US Justice Department could undo. Indeed, Microsoft's effect on the browser market has pushed Mozilla to get involved in a recent European Commission action against the software giant, with Mozilla's Mitchell Baker recently declaring that 'A number of illegal activities were also involved in creating IE's market dominance,' now requiring government intervention to open up the browser market to fair competition. Putting aside Microsoft's own tainted reputation in the field of openness, is Ballmer right? Should Apple open up its iPhone platform to outside competition, both in terms of hardware and software?"
IT

Does Your Vendor Issue Gag Orders? 210

Presto Vivace writes to tell us that CIO has an interesting article about customer "gag orders" that some ERP vendors are trying to impose contractually. "The effect: customers will be prevented from working with peers and others in the software company's "ecosystem" to help with technical issues or compare pricing options. 'In addition,' Wang adds, 'the customer now lacks the proper checks and balances in pressuring a vendor to deliver on promised capabilities or address severe security issues, and cannot go to the media as a last resort, if needed.'" What other questionable practices (and potential solutions) have others had to work with?
Biotech

Acquired Characteristics May Be Inheritable 242

A story from a week or so back in Technology Review describes research coming to the surprising conclusion that Jean-Baptiste Lamarck may have been right — that acquired characteristics can be passed on to offspring, at least in rodents. Lamarck's ideas have been controversial for 200 years, and dismissed in mainstream scientific thinking for nearly that long. "In Feig's study, mice genetically engineered to have memory problems were raised in an enriched environment — given toys, exercise, and social interaction — for two weeks during adolescence. The animals' memory improved... The mice were then returned to normal conditions, where they grew up and had offspring. This next generation of mice also had better memory, despite having the genetic defect and never having been exposed to the enriched environment."
The Courts

The Pirate Bay Is Making a "Spectrial" of It 406

IDOXLR8 writes "The Harvard Law students defending accused file-swapper Joel Tenenbaum are doing their best to turn his upcoming trial into a media event. But when it comes to pure spectacle, they have nothing on The Pirate Bay. TPB is referring to the event as a 'spectrial,' a cross between a spectacle and a trial. They have set up a site where you can track their current location, complete with journal entries. The trial begins next Monday and features a live audio feed and Twitter translations."
Microsoft

Microsoft To Open Retail Stores 535

chaz373 writes "CNET reports that Microsoft is going retail. In the 'Beyond Binary' blog Ina Fried reports, 'After years of brushing off the notion, Microsoft said on Thursday that it will open up its own line of retail stores. Without detailing the plans, Microsoft said it has hired David Porter, a 25-year Wal-Mart veteran, to lead the effort. Sources say that Porter's mission will be to develop the company's retail plans and that the effort is likely to start small with just a few locations.'"
Mozilla

Firefox Faster In Wine Than Native 493

An anonymous reader writes "Tuxradar did some benchmarks comparing Firefox's Windows and Linux JavaScript performance. 'We did some simple JavaScript benchmarks of Firefox 3.0 using Windows and Linux to see how it performed across the platforms — and the results are pretty bleak for Linux.' Later on, they tried Wine. 'The end result: Firefox from Mozilla or from Fedora has almost nil speed difference, and Firefox running on Wine is faster than native Firefox.'"
The Almighty Buck

Microsoft Slaps $250K Bounty On Conficker Worm 258

alphadogg writes "The spreading Conficker/Downadup worm is now viewed as such a significant threat that it's inspired the formation of a posse to stop it, with Microsoft leading the charge by offering a $250,000 reward to bring the Conficker malware bad guys to justice. The money will be paid for 'information that results in the arrest and conviction of those responsible for illegally launching the Conficker malicious code on the Internet,' Microsoft said today in a statement, adding it is fostering a partnership with Internet registries and DNA providers such as ICANN, ORG, and NeuStar as well as security vendors Symantec and Arbor Networks, among others, to stop the Conficker worm once and for all. Conficker, also called Downadup, is estimated to have infected at least 10 million PCs. It has been slowly but surely spreading since November. Its main trick is to disable anti-malware protection and block access to anti-malware vendors' Web sites."
Networking

How To Keep Rats From Eating My Cables? 1032

An anonymous reader writes "I am curious to know what vermin prevention/eradication methods are used in other locations. I am working at a dealership and we have an exterminator man who puts out glue traps and bait stations, but they still come and eat my cable. The latest was a couple of fiber runs — very expensive. I have threatened my boss with a cat for the server room (my office), going so far as to cruise the local Humane Society's website and eye-balling a nice Ragdoll-Siamese mix. Even if I do feel like dealing with a litter box, cat hair in the equipment and pouncings on my keyboards (and I'm not sure I do), that only covers the server room. We have multiple buildings on the campus which get locked up to prevent theft, but it isn't secure enough to keep out the critters and the latest chew spot was in the ceiling. Any ideas?"
Be

BeOS Successor Haiku Keeps the Faith 448

kokito writes "OSNews managing editor Thom Holwerda reviews Haiku, the open source successor of the Be operating system. According to the review, Haiku faithfully/successfully replicates the BeOS user experience and 'personality,' boasting very short boot times, the same recognizable but modernized GUI using antialiasing for fonts and all vector graphics as well as vector icons, a file system with support for metadata-based queries (OpenBFS) and support for the BeAPI, considered by some the cleanest programming API ever. The project has also recently released a native GCC 4.3.3 tool chain, clearing the way for bringing up-to-date ports of multi-platform apps such as Firefox and VLC, and making it easier to work on Haiku ports in general." (More below.)
Security

How To Argue That Open Source Software Is Secure? 674

Smidge207 writes "Lately there has been a huge push by Certified Microsoft Professionals and their companies to call (potential) clients and warn them of the dangers of open source. This week I received calls from four different customers saying that they were warned that they are dangerously insecure because they run open source operating systems or software, because 'anyone can read the code and hack you with ease.' Other colleagues in the area also have noticed that three local Microsoft Partners have been trying to strike fear in the minds of companies that respond, 'Yes, we use open source or Linux' when the sales call comes in. I know this is simply a sales tactic by these companies, but how do I fix the damage these tactics cause? I have several customers who now want more than my word about the security of systems that have worked for them flawlessly for 5-6 years, with minimal expense outside of upgrades and patching for security. Does anyone have a good plan or sources of reliable information that can be used to inform the customer?"
AMD

Nvidia Is Trying To Make an x86 Chip 420

Slatterz writes with a story from PC Authority which says that "Word has reached us that Nvidia is definitely working on an x86 chip and the firm is heavily recruiting x86 engineers all over Silicon Valley. The history behind this can be summarised by saying they bought an x86 team, and don't have a licence to make the parts. Given that the firm burned about every bridge imaginable with the two companies who can give them licences, Nvidia has about a zero chance of getting one."
The Internet

Who Owns Application Delivery Meta-Data In the Cloud? 67

Random Feature writes "The Cloud Computing Interoperability Forum (CCIF) is currently discussing cloud portability specifications. It seems crazy to define a standard before we even know who owns what in the cloud because you can only port what you own. For example, if you created a security or acceleration policy for your cloud computing-based app, is the policy yours or the provider's? Who owns meta-data in the cloud?" True portability between clouds seems to hang on the answer.

Slashdot Top Deals

Any circuit design must contain at least one part which is obsolete, two parts which are unobtainable, and three parts which are still under development.

Working...