Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Linux

2009, Year of the Linux Delusion 696

gadgetopia writes "An article has come out claiming (yet again) that 2009 will be the year of Linux, and bases this prediction on the fact that low-power ARM processors will be in netbooks which won't have enough power to run Windows, but then says these new netbooks will be geared to 'web only' applications which suits Linux perfectly. And, oh yeah, Palm might save Linux, too." The article goes on to skewer the year of Linux thing that seems to show up on pretty much every tech news site throughout December and January as lazy editors round out their year with softball trolling stories and "Year End Lists." We should compile a year-end list about this :)
Internet Explorer

Microsoft Rushes Internet Explorer Patch 376

drquoz writes "Last week, it was reported that a critical security flaw was found in Internet Explorer. On Tuesday, experts were advising users not to use IE until a patch could be released. On Wednesday, Microsoft released the patch. An interesting quote from the article: 'Kandek suggests that Microsoft is at a disadvantage in updating Internet Explorer because its browser doesn't have a built-in update mechanism like other browser makers. Mozilla, for instance, just released Firefox 3.05 to Firefox users through its auto-update system.'"
Windows

British Royal Navy Submarines Now Run Windows 725

meist3r writes "On his Government blog, Microsoft's Ian McKenzie announced today that the Royal Navy was ahead of schedule for switching their nuclear submarines to a customized Microsoft Windows solution dubbed 'Submarine Command System Next Generation (SMCS NG)' which apparently consists of Windows 2000 network servers and XP workstations. In the article, it is claimed that this decision will save UK taxpayers £22m over the next ten years. The installation of the new system apparently took just 18 days on the HMS Vigilant. According to the BAE Systems press release from 2005, the overall cost of the rollout was £24.5m for all eleven nuclear submarines of the Vanguard, Trafalgar and Swiftsure classes. Talk about staying with the sinking ship."
Education

What Restrictions Should Student Laptops Have? 1117

An anonymous reader writes "We're a school district in the beginning phases of a laptop program which has the eventual goal of putting a Macbook in the hands of every student from 6th to 12th grade. The students will essentially own the computers, are expected to take them home every night, and will be able to purchase the laptops for a nominal fee upon graduation. Here's the dilemma — how much freedom do you give to students? The state mandates web filtering on all machines. However, there is some flexibility on exactly what should be filtered. Are things like Facebook and Myspace a legitimate use of a school computer? What about games, forums, or blogs, all of which could be educational, distracting or obscene? We also have the ability to monitor any machine remotely, lock the machine down at certain hours, prevent the installation of any software by the user, and prevent the use of iChat. How far do we take this? While on one hand we need to avoid legal problems and irresponsible behavior, there's a danger of going so far to minimize liability that we make the tool nearly useless. Equally concerning is the message sent to the students. Will a perceived lack of trust cripple the effectiveness of the program?"
Security

Experts Say To Switch Browsers In Light of IE Vulnerability 455

It appears that the exploit in IE briefly mentioned a few days ago is causing a serious reaction: SteveAU writes "Microsoft has begun flooding media outlets with information advising users to switch to an alternate browser while a serious security flaw is being patched. The flaw, which affects all versions of Microsoft Internet Explorer, is manifested via malware and has infected over 6,000 sites thus far. Microsoft states: 'The vulnerability exists as an invalid pointer reference in the data-binding function of Internet Explorer. When data binding is enabled (which is the default state), it is possible under certain conditions for an object to be released without updating the array length, leaving the potential to access the deleted object's memory space. This can cause Internet Explorer to exit unexpectedly, in a state that is exploitable.'" According to the BBC report, though, Microsoft itself is only asking that users be "vigilant while it investigated and prepared an emergency patch"; it's outside experts who say to dump IE (at least for now).

Update: 12/16 21:11 GMT by KD : Microsoft will issue an emergency critical update for IE tomorrow.
The Internet

Network Neutrality Defenders Quietly Backing Off? 171

SteveOHT writes "Google Inc. has approached major cable and phone companies that carry Internet traffic with a proposal to create a fast lane for its own content, according to documents reviewed by The Wall Street Journal. Google has traditionally been one of the loudest advocates of equal network access for all content providers. The story claims that Microsoft, Yahoo, and Amazon have quietly withdrawn from a coalition of companies and groups backing network neutrality (the coalition is not named), though Amazon's name is reportedly once again listed on the coalition's Web site. Google has already responded, calling the WSJ story "confused" and explaining that they're only talking about edge caching, and remain as committed as ever to network neutrality. The blogosphere is alight with the debate.
Medicine

Why Climbers Die On Mount Everest 417

Science Daily reports that researchers have conducted the first detailed analysis of deaths during expeditions to the summit of Mt. Everest. They found that most deaths occur during descents from the summit in the so-called "death zone" above 8,000 meters, and also identified factors that appear to be associated with a greater risk of death, particularly symptoms of high-altitude cerebral edema. The big surprise that the data indicate those deaths aren't primarily from avalanches or falling ice, as had long been believed.
Science

Oldest-Known Human Brain Discovered 74

Smivs writes "The BBC report that archaeologists have found what could be Britain's oldest surviving human brain. The team, excavating a York University site, discovered a skull containing a yellow substance which scans showed to be shrunken, but brain-shaped. Brains consist of fatty tissue which microbes in the soil would absorb, so neurologists believe the find could be some kind of fossilised brain. More tests will now be done to establish what it is actually made of. The skull was discovered during an exploratory dig at Heslington Eastin, an area of extensive prehistoric farming landscape of fields, trackways and buildings dating back to at least 300 BC."
Portables (Apple)

Should Apple Open Source the iPhone? 379

An anonymous reader writes "Given the OpeniBoot project is just a breath away from getting Android onto the iPhone, maybe Apple should consider opening up the platform. This post has five reasons, but I think there are far more. Without open source, Apple will find itself in the same position as today's Microsoft in seven years."
Microsoft

Microsoft Plans VR Simulation of Everything? 217

Ian Lamont writes "Microsoft recently updated ESP, a virtual reality modeling platform that until now has primarily been used to model aircraft and flight simulations. Microsoft has plans to expand it to other industries such as real estate and urban planning, but one of the most interesting possibilities could be what one observer refers to as a 'simulation of everything,' based on Virtual Earth and perhaps even user-generated content. Indeed, Microsoft's research chief has been promoting the idea of commerce applications and other tools built on top of what he calls the 'Spatial Web', a blend of 3D, video, and location-aware technologies. He gave an example of a shopkeeper creating 3D models of his store's interior and goods with Photosynth and then uploading the results into a large 3D model of local shopping district. Customers could 'visit' the area, browse products, and order them for real-world delivery."
Sci-Fi

William Gibson's AGRIPPA Recovered and Revealed 98

Bud Cook writes "While the text of William Gibson's elusive electronic poem AGRIPPA is widely posted around the Web, it has not been seen in its original incarnation — custom-built software designed to scroll the poem through a single play before encrypting each line with an RSA algorithm — since 1992. Today is the 16th anniversary, to the day, of the poem's initial release. A team of scholars at the University of Maryland and UC Santa Barbara used forensic computing to restore the code from an original diskette loaned by a collector and have placed video of the complete 'run,' as well as never-before-seen footage from the night of AGRIPPA's public debut in 1992, up on a Web site called the Agrippa Files. There's also a detailed essay documenting the forensic process, plus a mess of stills, screenshots, and a copy of the disk image itself."
Education

When Teachers Are Obstacles To Linux In Education 1589

jamie found this blog post up on the HeliOS Project, which brings Linux to school kids in Austin, TX. It makes very clear some of the obstacles that free software faces in the classroom. It seems a teacher came upon a student demonstrating Linux to other kids and handing out LiveCDs. The teacher confiscated the CDs and wrote an angry email to HeliOS's founder, Ken Starks: "Mr. Starks, I am sure you strongly believe in what you are doing but I cannot either support your efforts or allow them to happen in my classroom. At this point, I am not sure what you are doing is legal. No software is free and spreading that misconception is harmful. ... This is a world where Windows runs on virtually every computer and putting on a carnival show for an operating system is not helping these children at all. I am sure if you contacted Microsoft, they would be more than happy to supply you with copies of an older version of Windows and that way, your computers would actually be of service to those receiving them..." Starks pens an eloquent reply, which contains a factoid I have not seen mentioned before: "The fact that you seem to believe that Microsoft is the end all and be-all is actually funny in a sad sort of way. Then again, being a good NEA member, you would spout the Union line. Microsoft has pumped tens of millions of dollars into your union. Of course you are going to 'recommend' Microsoft Windows."
Government

FCC Commissioner Lauds DRM, ISP Filtering 217

snydeq writes "Ars Technica's Nate Anderson and InfoWorld's Paul Venezia provide worthwhile commentary on a recent speech by FCC Commissioner Deborah Taylor Tate (PDF), in which she praised DRM as 'very effective' and raised a flag in favor of ISP filtering. Anderson: 'Having commissioners who feel that the government has a duty to partner with and back educational classroom content from the RIAA; who really believe that ISP filtering is so unproblematic we can stop considering objections; and who think that universities worry about file-swapping because tuition might be raised to pay for the needed "expansion of storage capabilities" (huh?) isn't good for the FCC and isn't good for America.' Venezia: 'Leave the ISPs out of it — it's not their job to protect a failing business model, and a movement toward a tiered and filtered Internet will do nothing to stem the tide of piracy, but will result in great restrictions on innovation, freedoms, and the general use of the Internet. There's nothing to be gained down that path other than possibly to expand the wallets of a few companies.'"
Security

Botnets As "eWMDs" 172

John Kelly writes "The current issue of Policy Review has a paper by an American computer scientist and the recent Permanent Undersecretary of Defense for Estonia. Drawing on the Estonian cyber attacks a year and a half ago, as well as other recent examples, they argue that botnets are the major problem. They propose that botnets should be designated as 'eWMDs' — electronic weapons of mass destruction. The paper also proposes a list of reforms that would help to limit the scale and impact of future botnet attacks, beginning with defining and outlawing spam, internationally." Many of the proposed solutions are common-sensical and won't be news to this audience, but it is interesting to see the botnet threat painted in such stark terms for readers of the Hoover Institution's Policy Review. For a more comprehensive overview of cyber-security threats, listen to NPR's interview with security experts on the occasion of the release of a new report, "Securing Cyberspace for the 44th Presidency," which recommends creating a cyber-security czar reporting to the President.

Slashdot Top Deals

So you think that money is the root of all evil. Have you ever asked what is the root of money? -- Ayn Rand

Working...