Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Businesses

A Blue-Sky Idea For the USPS — Postal Trucks As Sensors 252

An anonymous reader writes "The US Postal Service may face insolvency by 2011 (it lost $8.5 billion last year). An op-ed piece in yesterday's New York Times proposes an interesting business idea for the Postal Service: use postal trucks as a giant fleet of mobile sensor platforms. [Registration-required link; this no-reg summary encapsulates the idea, as does this paper by the same author.] (Think Google Streetview on steroids.) The trucks could be outfitted with a variety of sensors (security, environmental, RF ...) and paid for by businesses. The article's author addresses some of the obvious privacy concerns that arise."
The Internet

Michael Moore Posts Julian Assange's Bail 987

digitaldc quotes Michael Moore in a story running on the Huffington Post where he says "Yesterday, in the Westminster Magistrates Court in London, the lawyers for WikiLeaks co-founder Julian Assange presented to the judge a document from me stating that I have put up $20,000 of my own money to help bail Mr. Assange out of jail. Furthermore, I (Michael Moore) am publicly offering the assistance of my website, my servers, my domain names and anything else I can do to keep WikiLeaks alive and thriving as it continues its work to expose the crimes that were concocted in secret and carried out in our name and with our tax dollars."
The Internet

Comcast Accused of Congestion By Choice 434

An anonymous reader writes "A kind soul known as Backdoor Santa has posted graphs purportedly showing traffic through TATA, one of Comcast's transit providers. The graphs of throughput for a day and month, respectively, show that Comcast chooses to run congested links rather than buy more capacity. Keeping their links full may ensure that content providers must pay to colocate within Comcast's network. The graphs also show a traffic ratio far from 1:1, which has implications for the validity of its arguments with Level (3) last month."
Government

UK Man Prevented From Finding Chipped Pet Under Data Protection Act 340

Dave Moorhouse was elated when he was informed that a microchip provider had information on the whereabouts of his stolen dog. This joy soon faded when the company informed him that it could not divulge the Jack Russell terrier's location because it would breach the Data Protection Act. Last week a court agreed with the chip company and refused Mr Moorhouse's request for a court order compelling them to reveal the name and address of the new owners. Steven Wildridge, managing director of the chip company said: “This is not a choice, it’s an obligation under the Data Protection Act. If the individuals involved do not want us to pass on their details to the original owner then we cannot do so unless compelled to following a criminal or civil proceeding."
Image

Stewart and Colbert Plan Competing D.C. Rallies 696

Lev13than writes "In a direct retort to Glenn Beck's Restoring Honor rally, Jon Stewart and Stephen Colbert have announced competing rallies on October 30th. Stewart plans to host a 'Rally To Restore Sanity' on Oct. 30 on the National Mall in D.C. for the Americans he says are too busy living normal, rational lives to attend other political demonstrations. Colbert, meantime, will shepherd his fans in a 'March To Keep Fear Alive.' 'Damn your reasonableness!' Colbert said. 'Now is not the time to take it down a notch. Now is the time for all good men to freak out for freedom!' Stewart, meanwhile, has promised to provide attendees with signs featuring slogans such as 'I Disagree With You But I'm Pretty Sure You're Not Hitler' and 'I'm Afraid of Spiders.'"
Input Devices

Submission + - 3Dconnexion releases SDK

New10k writes: "AECnews is reporting (http://aecnews.com/news/2007/03/21/2302.aspx) that Logitech subsidiary 3Dconnexion today released a Software Development Kit for Windows. The Mac version is scheduled for release March 30. The Linux version is already out."
Software

Submission + - Comodo CEO A featured Guest on Computer America

Yuvaraj writes: "Comodo CEO and Chief Security Architect A featured guest on popular radio program ComputerAmerica. Comodo's Melih Abdulhayoglu discusses strategy behind push to protect every computer in the world for free.

For nearly a decade Melih Abdulhayoglu, Chief Security Architect and CEO of Comodo has been exploring technologies that provide online security and safety for both consumers and businesses. In a recent interview with host Carey Holzman of Craig Crossman's ComputerAmerica, Melih discussed how Comodo has been actively working to make the Internet more secure, more authenticated, and more verifiable for free for consumers.

An edited transcript of the interview with Melih Abdulhayoglu's follows. (To hear the full interview, please click here. The broadcast aired on March 19, 2007 at 7:00 PM PST. The host was Carey Holzman (CH), is the author of a number of publications including The Healthy PC).

CH: Our guest tonight is the Chief Security Architect and CEO of Comodo, Melih Abdulhayoglu. They are the makers of a free firewall.

CH: You have an interesting product, can you tell us about it?

MA: Thank you. Sure. We thought, "Why not build one of the best firewalls around and give it away for free?". And [then] we went ahead and did that.

CH: I like that thought, but while there are lots of good firewalls, the problem is that people don't know how to use them. They don't know if an application wants to access the internet, whether they should allow it or not. So they end up clicking "No" and ultimately locking themselves out of their computer, or they "allow all" which defeats the whole point of having a firewall. Melih, could you tell me how Comodo is different from other firewalls, paid or free?

MA: Sure. When the firewall is asking this question, it is checking to see what sort of executable application is running on your computer trying to make a connection to the Internet. The reason it is asking is because it does not know what that specific application is about. So we thought, "Why not create a huge safe list with a safe list of applications so that your firewall will ask you less often?"

CH: Yes, that's mind blowing. Usually 90% of us use regular programs, yet firewalls force people to allow access each and every time one of these people tries to access that program. How many applications do you have in your safe lists that are known to be safe?

MA: We have around 300,000 applications at the moment.

CH: Wow, 300, 000!

MA: And we are getting 3,000 executables a day to review. On daily basis, we keep updating our lists.

CH: And what about some hacker putting something in your safe list?

MA: That's where being the world's 2nd largest Certification Authority comes in. We are the guys who put the padlock on websites, so we have full Public Key Infrastructure. What that means is we have the ability to digitally sign a file so that any modification to it can be protected. If any modification is made, our firewall will know about it and it would reject it.

CH: Is your firewall fast and light-weight or is it going to strain my system resources?

MA: A firewall is all about controlling and stopping malware from making a connection from your home to the Internet. So, how do you test firewall security? This is known as the "leak test". What you do is see is if your firewall is leaking or not. According to independent tests, in terms of having best scoring leak test, we scored top of the list. And we do it in a way whereby it don't take too much system resources.

CH: OK but I could be sending data right now and just not know it

MA: That is one of the biggest problems facing us today. I mean, look at spam. 80% of it comes from Zombie computers that have not been protected. Somehow we are going to have to protect all of those machines or else the army of Zombie PCs will deter all of us from using the Internet.

CH: That's true.

CH: Is there any plan of selling or charging for this firewall or other desktop security products?

MA: No, anything in desktop security that we are going to give to consumers is free.

CH: God bless you. So how do you get paid?

MA: Very good question, actually. Let me explain. First of all, why free? Someone has to provide it for free since the problems we are facing today from spam to spy ware are all because we don't have our machines secured. Many people around the world cannot afford $60 or $70 in countries such as China where the average income is about 100$ a month. So what happens is that all of those machines are left vulnerable, and China has the second largest Internet population in the world.

So spam, spyware, and hacking often come from these machines. To solve this problem, we need to create the idea of a secure and trusted Internet. Once we have done that, we need to come up with a business model that allows us to make money from that.

By giving free products to end-users, we are creating a secure ecosystem for our users and our online businesses. In return, businesses pay Comodo to protect their websites. So, the more users we have using our firewall, the more trusted the Comodo brand is, and the more business customers will choose Comodo to secure their online environment. Our customers are happy because they are using our services to protect their websites and consumers are happy because they can do business online confidently.

CH: That sounds like a good plan. When it comes to AV or firewall, I am a big believer in paying money in exchange to getting something back. But with many solutions, you pay to not get anything.

MA: That's a very important point. Imagine that there is a burglar alarm that only recognizes certain burglars but not all burglars. That's the current flawed model for anti-virus solutions. You can no longer use what is known as black listing technologies and only stop known malware.

Let's look it in this way. In the physical world, there is a door. The door is your 'prevention'. Also, you have a burglar alarm. The burglar alarm is your 'detection'. Thirdly, you have insurance. Insurance is your 'cure'. In a security system, you need all three. You need prevention, detection and cure. In today's security solutions, there is no 'prevention' — only 'detection' technologies such as AV and firewall. For example, in our next version of firewall, is going to have what is known as HIPS to include prevention technologies. What HIPS does is, instead of setting the default to be "allow", we are changing it so the default is "deny".

CH: Companies like McAfee seem like they have lost the way. They put in lots of processes, features, and packaging and ended up with product that was heavy. They give you big boxes and charge $20 or $30 more. What makes Comodo different?

MA: Well, first of all, we have the luxury of not charging people, so we don't have to justify the price by including lots stuff that people don't need. You know, adding features for more and more functionality makes the product not feasible.

CH: That's good to hear, and that's promising in the future. I note that on your website "free" means "free for your firewall, antivirus, email security certificate free and password manager free". Tell me about those.

MA: We believe everyone should be offered free desktop security because it's in everyone's interest to create a more secure and trusted Internet. We are the guys that let you encrypt and digitally sign your email for free. We have products like password manager, backup product, and also a very innovative tool called Verification Engine. This solves the problem of not knowing whether graphics on a site, like a credit card logo, are authentic. We have the only technology in the world to verify the web content with VerificationEngine. So, with these technologies, we are going to create a trusted Internet for everyone.

CH: Anything you want to mention in our last few moments?

MA: All we want to gain is our users' trust. As users trust Comodo, they will trust websites protected by Comodo and more business will trust our solutions. That is how we want to Create Trust Online.

CH: So everybody who sees or hears this show, get a free copy of the firewall. If you install it, give us your feedback. Thank you. About Comodo

Comodo is a leading global provider of Identity and Trust Assurance services on the Internet, with over 200,000 customers worldwide. With global offices in the US, UK, Ukraine and India, the company offers businesses and consumers the intelligent security, authentication and assurance services necessary to ensure trust in online transactions.

Comodo helps enterprises address digital ecommerce and infrastructure needs with reliable, third generation solutions that improve customer relationships, enhance customer trust and create efficiencies across digital ecommerce operations. Comodo's solutions include integrated Web hosting management solutions, infrastructure services, digital e-commerce services, digital certification, identity assurance, customer privacy and vulnerability management solutions. For additional information on Comodo — Creating Trust Online — please visit: www.comodo.com.

For more information, reporters and analysts may contact

Judy Shapiro
Comodo
(201) 963-9471
Email: judy.shapiro@comodo.com"
PlayStation (Games)

Sony Exec Says Luxury Could Be PS3's Downfall 208

Via Next Generation, an interview with CEO of Sony Corporation Sir Howard Stringer on the site CEO Exchange. In the piece they report that Stringer has gone on record as saying the PS3's price may be its downfall. This is the first indication we've had from Sony's upper management that the console's price may just be too high. "Wii is a wonderful device, but has a different target audience. If we fail, it is because we positioned PS3 as the Mercedes of the videogame field. PS3 is after a different audience and it can be whatever it wants -- a home server, game device, even a computer." Relatedly, a Goldmann Sachs analyst has opined that a PS3 price cut could come this year. Assuming they drop the price by $100 or more, this might blunt the objections many have to the console's lofty pricetag.
Biotech

Submission + - Repairing Heart Tissues with Lab Grown Cells

Anonymous Coward writes: "University of Minnesota researchers have found a cell type in adult rat hearts that can make all types of cardiac cells. This offers hope that someday these cells could be used to repair heart muscle damaged by a heart attack or to grow new blood vessels for use in bypass surgery. Read More"
Slashdot.org

Submission + - Flash put to good use. User created content.

An anonymous reader writes: We're finally seeing Flash — now in its 9th version — being put to some good use. Meta driven it becomes what it promised years ago. This A List A Part article http://alistapart.com/articles/semanticflash shows one aspect of it, enabling Joe User and his gardener too, to make their sites W2.0 savvy. I seriously like the idea behind http://www.purposegames.com/ where users upload images to create their own knowledge games with a pretty simple flash module. All in all a good time for us who stand with one leg in the designer arena, and the other on the developer scene.
It's funny.  Laugh.

Submission + - Novell humor: Linux video shot at "Get a Mac&#

coondoggie writes: "This is great. Novell takes on the Get a Mac ads with a Linux video ad of its own. Here you'll see the usual suspects, PC and Mac kind of trading insults but they are interrupted by a pretty woman — Linux is her name and their destruction is her game. Or something like that. In addition here's a bonus Get a Mac ad that's a pretty funny shot at Microsoft's Vista security. http://www.networkworld.com/community/?q=node/1272 3"
Censorship

Yes Virginia, ISPs Have Silently Blocked Web Sites 204

Slashdot contributor Bennett Haselton writes "A recurring theme in editorials about Net Neutrality -- broadly defined as the principle that ISPs may not block or degrade access to sites based on their content or ownership (with exceptions for clearly delineated services like parental controls) -- is that it is a "solution in search of a problem", that ISPs in the free world have never actually blocked legal content on purpose. True, the movement is mostly motivated by statements by some ISPs about what they might do in the future, such as slow down customers' access to sites if the sites haven't paid a fast-lane "toll". But there was also an oft-forgotten episode in 2000 when it was revealed that two backbone providers, AboveNet and TeleGlobe, had been blocking users' access to certain Web sites for over a year -- not due to a configuration error, but by the choice of management within those companies. Maybe I'm biased, since one of the Web sites being blocked was mine. But I think this incident is more relevant than ever now -- not just because it shows that prolonged violations of Net Neutrality can happen, but because some of the people who organized or supported AboveNet's Web filtering, are people in fairly influential positions today, including the head of the Internet Systems Consortium, the head of the IRTF's Anti-Spam Research Group, and the operator of Spamhaus. Which begs the question: If they really believe that backbone companies have the right to silently block Web sites, are some of them headed for a rift with Net Neutrality supporters?" Read on for the rest of his story.

Slashdot Top Deals

I tell them to turn to the study of mathematics, for it is only there that they might escape the lusts of the flesh. -- Thomas Mann, "The Magic Mountain"

Working...