Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Ubuntu One Killer App (Score 1) 126

Canonical would still need to build a user interface on top of the server component, so while it is a good idea there would still be quite a bit of work for Canonical to do as Google has not and most likely will not open source their own Wave implementation. Then again, let's not forgot that Google Wave in the current state is completely unusable for both communication (chat, discussion etc.) and any form of collaboration (specifically collaboration on documents). EtherPad on the other hand actually nails it regarding document collaboration.

So integrating EtherPad support into Ubuntu One would be feasible in the short term, at least to allow users to work together on Notes. It would be double as awesome if there was an effort to integrate support for libinfinity (from Gobby) in Tomboy (which already synchronizes with Ubuntu One). Then for collaboration over the web you'd use Ubuntu One's EtherPad functionality and in your desktop you can easily collaborate from within Tomboy.

Comment Re:What an Oddly Backwards Opinion Piece (Score 1) 416

It is true that at the moment there is indeed a "need" for proprietary software in quite a few areas. However, only in a sense that there is either no free/libre alternative, the alternatives are of lesser quality (where quality is obviously subjective) or (and this is quite often the case) the consumer has becomed locked-in.

However, there is no inherent need for software to be proprietary, the only reason that proprietary software still exists is because the producers (read: software companies) are in a lot of cases satisfied with the status-quo (a proven business model, at least in the sense of making money) and the consumers are not aware there is a better alternative (which would, among other things, lead to higher quality software).

Outside of the IT-industry, where Open Source has essentially already won (it's just that not everybody realizes it yet), this is still very obvious. It's in those areas where vendor lock-in is still the name of the game.

However, as soon as new innovative business models are popularized across the board, in which the advantages of Open Source development outweigh the advantages of keeping your software behind lock and chain, it'll be the end of proprietary software. This process will accelerate once consumers become aware of the advantages (for them) of Open Source development.

Comment Re:Well, let's see (Score 1) 416

You're so wrong it's not even funny. I advise you to read Stallman's essay Why “Free Software” is better than “Open Source”. Here's a quote from the essay that gets to the essence of what we're talking about here:

The fundamental difference between the two movements is in their values, their ways of looking at the world. For the Open Source movement, the issue of whether software should be open source is a practical question, not an ethical one. As one person put it, “Open source is a development methodology; free software is a social movement.” For the Open Source movement, non-free software is a suboptimal solution. For the Free Software movement, non-free software is a social problem and free software is the solution.

As I understand it to Stallman the primary goal of Free Software is not "better software" in terms of say stability, usability etc., it's "better" in the sense that it's the most ethical.

P.S.

I'd like to point out that I personally don't think Stallman is entirely correct in his description of the Open Source movement, as the goal of Open Source has always been the same as Free Software (among other things see Bruce Peren's "It's Time to Talk About Free Software Again"). However, regretfully the term Open Source has in a lot of cases, as evidenced from this entire discussion, become diluted.

Google

Google Open Sources Etherpad, Piratepad Launches 126

Thomas Nybergh writes "The Etherpad code was released by Google under the Apache license a few hours ago. Google's initial plan, after acquiring the service, was to use Etherpad's tech with its new Wave collaboration platform and to shut down the original service entirely. Soon after the Etherpad code was released, the Swedish Pirate Party launched their instance of the service at piratepad.net. An announcement, which also mentions a new Tor node, is published on the party website (Google translation). The original Etherpad service had in a short time become a killer application for collaborative work within at least the Swedish, and according to my personal experience, in the Finnish Pirate Party as well. The Etherpad open source project is available at Google Code."
Social Networks

WordPress.com Implements the Twitter API 39

This morning Matt Mullenweg announced on his blog that WordPress.com has enabled posting and reading blogs via the Twitter API. Now any Twitter app that supports a custom API URL (Tweetie is one such) can be used to either post updates to a WordPress.com blog, or to read updates from blogs to which one has subscribed. Dave Winer calls the move by Automattic, WordPress.com's parent company, "deeply insidious," and notes that 10 years ago he did a similar thing in his Manila blogging platform when the Blogger API came out. Winer opines that Automattic's move has made the Twitter API into an open standard, due to WordPress.com's large base. Winer notes (in a comment on the above-linked post), "The fun starts if they [WordPress] relax some of the limits of the Twitter API and fix some of the glaring problems."

Comment Re:A fresh start (Score 1) 859

Ignoring for a moment whether or not rights are subjective.

Earlier on you awkwardly defined rights as "things that it is wrong for the government to interfere with its citizens doing". Rights are much better defined as entitlements or permissions granted by agreement.

As another poster pointed out this is an issue about freedom of speech versus the right to privacy.

In this case you clearly seem to value freedom of speech over the right of privacy. However, that doesn't make it right (no pun intended) for you to say that the original poster doesn't "understand what a right is".

Comment Re:How much money changed hands? (Score 1) 644

Right Mister investigative journalist, how do you disprove the following:

Ok so by your own admittance we've proven that asus-uk.com at the very least is in fact an official Asus website. Right now let's take it one step further, here's a link to another page on that same domain:

Still asus-uk.com right? Read the page and see that it states: "It's better with Windows®" and links to http://www.itsbetterwithwindows.com/

I'd like to hear how you're going to wiggle your way out of this one. Oh it was just the UK branch, you say? Oh, it was just a lone mad sales guy? Asus was never serious about putting Linux on their netbooks, laptops or whatever from the get go. If you've ever used an Eee pc you'd know that the custom Xandros distro stuff was a disaster and anyone worth their salt would immediately replace it a properly configured distro (in a lot of cases Ubuntu). Asus well never get any money from me again.

Comment Re:This just in (Score 1) 383

It doesn't really have anything to do with a conspiracy. I know some people will immediately go in a frenzy for me even recommending this but if you haven't consider reading some of Chomsky's political stuff such as Manufacturing Consent or Media Control. Then to balance everything out take a look at the criticism section from Wikipedia's article on Chomsky. But most important of all, stay critical and form your own opinion.

Comment Re:Remote admin of a UNIX box? (Score 1) 209

And with key based authentication, key(board) loggers aren't a worry.

They're not? Correct me if I'm wrong but if there's a keylogger on your system your private key has already been compromised and all that the attacker needs is the passphrase. It may even be possible to simply do stuff behind the users back while the passphrase is cached.

Same reason I'm not sure if your idea about introducing another machine or VM and then remoting into that makes sense. A dedicated machine would help but you'd actually need to have a KVM switch.

Comment Re:Remote admin of a UNIX box? (Score 2, Informative) 209

Exactly, the confusion here might be in the terminology. Password versus passhrase.

Anyways, just using keys doesn't magically make everything more secure, it just negates brute force password attacks. From the few high profile cases I remember the compromise was the result of somebody's private key being compromised (e.g. the Debian compromises).

The only true solution is a combination of the principle of least privilege, sandboxing (SELinux etc.), proper monitoring and a whole host of other security measures.

Slashdot Top Deals

"If I do not want others to quote me, I do not speak." -- Phil Wayne

Working...