Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Censorship

Have Walled Gardens Killed the Personal Computer? 848

theodp writes "Harvard Law School Prof Jonathan Zittrain explains in The Personal Computer is Dead why you should be afraid — very afraid — of the snowballing replicability of the App Store Model. 'If we allow ourselves to be lulled into satisfaction with walled gardens,' warns Zittrain, 'we'll miss out on innovations to which the gardeners object, and we'll set ourselves up for censorship of code and content that was previously impossible. We need some angry nerds.' Searchblog's John Battelle, who's also solidly in the tear-down-this-walled-garden camp, adds: 'I'm not a nerd, quite, but I'm sure angry.'"
Games

Cedega Being Replaced By GameTree Linux 124

An anonymous reader writes "TransGaming Cedega, the software forked from Wine that allows running Windows games under Linux, is being discontinued and replaced by GameTree Linux. This new software is also free. From the new website: 'TransGaming is pleased to announce the continued development of Cedega Technology under the GameTree Developer Program. This repositioning of the technology that powered the Cedega Gaming Service will allow the entire Linux community to gain free access going forward. Cedega is a cross-platform enablement technology that allows for Windows-native games to be executed on both the Linux desktop and embedded Linux platforms.'"

Comment Lat/Long (Score 5, Interesting) 560

Someone else may have caught this and it got buried in the deeper replies, but I find the 4 2-digit numbers to be very interesting. 74.14E 35.74N is right in the mountains of Pakistan controlled Kashmir. The second part of the message with the names is simply a phonetic spelling of the first part of the message. Naimina has several possible references, #1 on my list of likelihoods would refer to the owner of a website design company of that name targeting the Turkish language. No guess what 93 882 is - probably a predetermined instruction code undecipherable outside the network.

Comment Rights with Responsibility (Score 2, Insightful) 319

There is a general rule of law in the United States based on the concept of a "reasonable adult". Each of the first ten amendments of the American Constitution (and their analogues elsewhere) comes with the unwritten assumption that a reasonable adult will use these freedoms for the betterment of the community. The right to bear arms does not grant me the right to murder my neighbor because I don't like the car he drives. The right to peacefully assemble and protest the actions of government does not grant me the right to riot and destroy the property of others. In this case, the right to free speech does not grant the right to make false accusations. Despite a more liberal interpretation of law in recent years, slander and libel are still criminal acts, not protected by the first amendment. Would a reasonable adult consider J.L.'s parody to hold any truth? Probably not. Would a reasonable adult consider J.S.'s fake profile to hold any truth? Considering the forum on which it was placed, I would have to say yes, as there have been numerous instances of principals and teachers creating just such a profile. Therefore, the issue isn't whether schools have a right to police students' activities outside of school; but rather if actions taken in the world of cyberspace can or should be held to the same standards as those taken in print or public discourse.
Censorship

Canadian Hate-Speech Law Violates Charter of Rights 651

MrKevvy writes "The Canadian Human Rights Tribunal has found that federal hate-speech legislation violates the Canadian Charter of Rights and Freedoms, the equivalent of the US Constitution's Bill of Rights. This decision exonerates Marc Lemire, webmaster of FreedomSite.org, but may have farther-reaching consequences and serve as precedent for future complaints of hate-speech."
IBM

IBM, Other Multinationals "Detaching" From the US 812

theodp writes "If you're brilliant, work really hard, and earn a world-class doctorate from a US university, IBM has a job for you at one of its US research sites — as a 'complementary worker' (as this 1996 piece defined the then-emerging term). But be prepared to ship out to India or China after you've soaked up knowledge for 13 months as a 'long-term supplemental worker.' Newsweek sketches some of the bigger picture, reporting that IBM, HP, Accenture, and others are finding it profitable to detach from the United States (even patenting the process). 'IBM is one of the multinationals that propelled America to the apex of its power, and it is now emblematic of the process of creative destruction pushing America to a new, less dominant, and less comfortable position.'"
Image

Team Aims To Create Pure Evil AI Screenshot-sm 527

puroresu writes "Scientific American reports on the efforts of Selmer Bringsjord and his team at the Rensselaer Polytechnic Institute, who have been attempting to develop an AI possessed of an interesting character trait: pure evil. From the article, 'He and his research team began developing their computer representation of evil by posing a series of questions beginning with the basics: name, age, sex, etc., and progressing to inquiries about this fictional person's beliefs and motivations. This exercise resulted in "E," a computer character first created in 2005 to meet the criteria of Bringsjord's working definition of evil. Whereas the original E was simply a program designed to respond to questions in a manner consistent with Bringsjord's definition, the researchers have since given E a physical identity: It's a relatively young, white man with short black hair and dark stubble on his face.'"
Government

$18M Contract For Transparency Website Released — But Blacked Out 384

zokuga writes "The US government recently approved an $18 million contract for Smartronix to build a website where taxpayers could easily track billions in federal stimulus money, as part of President Obama's promise to make government more transparent through the Internet. However, the contract, which was released only through repeated Freedom of Information Act requests, is itself heavily blacked out. ProPublica reports: 'After weeks of prodding by ProPublica and other organizations, the Government Services Agency released copies of the contract and related documents that are so heavily blacked out they are virtually worthless. In all, 25 pages of a 59-page technical proposal — the main document in the package — were redacted completely. Of the remaining pages, 14 had half or more of their content blacked out.' Sections that were heavily or entirely redacted dealt with subjects such as site navigation, user experience, and everything in the pricing table. The entire contract, in all its blacked-out glory, is here."
The Military

Hacking Nuclear Command and Control 256

The Walking Dude writes "The International Commission on Nuclear Non-proliferation and Disarmament (ICNND) has released an unclassified report exploring the possibility of cyber terrorists launching nuclear weapons. Ominous exploits include unreliable early warning sensors, unsecure nuclear weapons storage, transportation blunders, breaches in the chain of command, and the use of Windows on nuclear submarines. A traditional large-scale terrorist attack, such as the 2008 Mumbai attacks, could be combined with computer network operations in an attempt to start a nuclear war. Amidst the confusion of the traditional attack, communications could be disrupted, false declarations of war could be issued on both sides, and early warning sensors could be spoofed. Adding to this is the short time frame in which a retaliatory nuclear response must be decided upon, in some cases as little as 15 minutes. The amount of firepower that could be unleashed in these 15 minutes would be equivalent to approximately 100,000 Hiroshima bombs."
Biotech

DNA Suggests Three Basic Human Groups 459

Death Metal writes "All of Earth's people, according to a new analysis of the genomes of 53 populations, fall into just three genetic groups. They are the products of the first and most important journey our species made — the walk out of Africa about 70,000 years ago by a small fraction of ancestral Homo sapiens."
Censorship

Bill Would Declare Your Blog a Weapon 780

Mike writes "Law prof Eugene Volokh blogs about a US House of Representatives bill proposed by Rep. Linda T. Sanchez and 14 others that could make it a federal felony to use your blog, social media like MySpace and Facebook, or any other Web media 'to cause substantial emotional distress through "severe, repeated, and hostile" speech.' Rep. Sanchez and colleagues want to make it easier to prosecute any objectionable speech through a breathtakingly broad bill that would criminalize a wide range of speech protected by the First Amendment. The bill is called The Megan Meier Cyberbullying Prevention Act, and if passed into law (and if it survives constitutional challenge) it looks almost certain to be misused."
Books

Amazon Culls "Offensive" Books From Search System 470

Miracle Jones writes "Amazon has instituted an overnight policy that removes books that may be deemed offensive from their search system, despite the sales rank of the book and also irrespective of any complaints. Bloggers such as Ed Champion are calling for a 'link and book boycott,' asking people to remove links to Amazon from their web pages and stop buying books from them until the policy is reversed. Will this be bad business for Amazon, or will their new policies keep them out of trouble as they continue to grow and replace bookstores?"
Communications

Students Call Space Station With Home-Built Radio 330

Pizzutz writes "Four Toronto college students have accomplished a technological feat that their teachers are calling a first. The Humber College seniors made contact with the International Space Station Monday with a radio system they designed and built themselves. School officials say that, to their knowledge, that's never been accomplished by students at the college level." Somewhat disappointingly, the students actually did have permission to make contact.

Slashdot Top Deals

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...