Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment Practical POV, I'm already doing it... (Score 1) 556

My twin boys started using the Leapfrog computer at about 2.5 years old. At 3, they know how to use the mouse and the interface well enough to choose and play the games ! Seriously, 3yo and they can use the mouse (it's a Mac-like 1-click)

They know the alphabet, and love playing the games where you use the keyboard to pick letters. Likewise, they use the arrows to play the puzzle games, and YES, they can do all this at 3 ! They even know how to load carts and turn the thing on (they know how to turn on/off nearly everything though, lol)


Submission XM subscribers backlash since shock jock suspensio

Sirius Uplink writes: "Ever since Opie and Anthony were suspended for 30 days by XM, people are canceling and smashing their XM radios to protest the recent suspension. The topic that had them suspended was about a homeless man "raping" the Secretary of State. Other sites such as People Against Censorship are going further by staging protests outside of their studios in support."

Jack Valenti, Dead at 85 650

saforrest writes "Jack Valenti, a man whose influence in both Washington and Hollywood was profound, died today at age 85. He first became famous as special assistant to Lyndon Johnson: he can even be seen in the famous photo aboard Air Force One. In 1966, he quit this job to become president of the MPAA, from 1966 to 2004."

Google and the CIA? 234

snottgoblin writes "DailyTech has an article suggesting that Google might be involved in a partnership with the CIA. The article also quotes a former CIA officer that Google's refusal to comply with the DOJ over privacy issues was 'a little hypocritical [...] because they were heavily in bed with the Central Intelligence Agency.'" Because I'm sure no one would go on the air and try to drum up a scandal aimed at the biggest target they can find.

Comcast Blocks Yet Another ISPs E-Mail 401

Nom du Keyboard writes, "Last week Comcast shutdown e-mail forwarding from NameZero entirely. People who have bought private domain names (i.e. yourname@yourdomain.com) and have e-mail forwarding to their current Comcast e-mail account through NameZero aren't receiving it any longer. No warnings — no e-mail. Now, again without warning, they've blocked out The Well, one of the oldest ISPs on the net. And nobody can get through to the Comcast people in charge of this to discuss the issue with them. Not the ISPs being blocked. Not the customers who pay Comcast to deliver e-mail to them. Comcast says they're protecting 10M customers from spam. I am a current Comcast broadband customer and I feel I should have the right to whitelist and receive e-mail from whomever I designate. I don't want as much protection as Comcast is giving me. Is it a basic right to be allowed to receive e-mail from whomever I desire, or does Comcast have the right to censor as they wish?" Last week Comcast was also blocking mail from alum.mit.edu. I (probably among many others) left a complaint on the phone line identified in bounce messages; the block was eventually lifted.

Lotus Notes For Linux To Be Released By IBM 219

gamigad writes "According to ZDNet, Lotus Notes 7.0.1 will be released for Linux. Availability is expected to be on July 24. It ain't gonna be a free lunch, tho" It's going to be based mainly on the Eclipse framework, and it does appear that you'll be able to swap a Linux version for a Windows or Mac version if you so choose.

Social Consequences and Effects of RFID Implants? 531

kramdam asks: "Even with all the talk about privacy and security, there seems to be a growing community of people who are implanting themselves with RFID chips. Being a developer myself, I am intrigued about building applications and solutions that will open my doors, unlock my car, log me on to my computer and control home automation. I'm seriously considering jumping into this head first, being on the bleeding edge, and going with an implant. I have looked at resources like Mikey Sklar's site, and Amal Graafstra's site, since they are two pioneers on this subject. For research, I have started TaggedLife to document my own journey. I was wondering what the Slashdot community think about this. What do you think are the social, security, privacy, and health risks associated with this? What are the pluses? Would you do it?"

The Cure for Information Overload 94

Ged writes "Those librarian blogerati have done it again: they've just discovered 'The Cure for Information Overload'. It's a very elegant formula if you ask me, with obvious SRU/SRW applications, and maybe even TLA ramifications. I'm not sure about all of the conclusions, but it sure is an interesting theory."


True ChAoS writes "Using the latest in microwave energy transmission technology, the Wireless Extension Cords (WECs) 'beam' power right where you need it. Broadcasting in the 7.2GHz range, the WECs will not interfere with wireless networks, phones, or Bluetooth components. Be sure to heed all the warnings in the instruction manual; the microwaves used are relatively safe, but you don't want to cook your computer (or coworkers) by mistake." ThinkGeek is also owned by OSTG.

Slashdot Design Changes for Wider Appeal 854

Our marketing department has done extensive research over the last 3 quarters and discovered that our audience is strangely disproportionately skewed towards males. Like, 98.3% males to be precise. To correct this oversight, we have decided to subtly tweak Slashdot's design and content to widen our appeal to these less active demographics. Don't worry! We'll still continue to serve our core audience, but we hope you'll work with us as we try to find a balance that will work for all.

Al-Qaeda Hacker Caught 349

anaesthetica writes "The Washington Post is carrying a story on a young man suspected to be the al-Qaeda hacker 'Irhabi 007'. From the article: 'Celebrated for his computer expertise, Irhabi 007 had propelled the jihadists into a 21st-century offensive through his ability to covertly and securely disseminate manuals of weaponry, videos of insurgent feats such as beheadings and other inflammatory material... The Internet has presented investigators with an extraordinary challenge. But our future security is going to depend increasingly on identifying and catching the shadowy figures who exist primarily in the elusive online world.'"

Stealth Sharks to Patrol the High Seas 331

dylanduck writes ""Imagine getting inside the mind of a shark: swimming silently through the ocean, sensing faint electrical fields, homing in on the trace of a scent." That's what the Pentagon wants to do, says New Scientist. By remotely guiding the sharks' movements using a newly designed neural implant, the military hope to transform the animals into stealth spies."

Nothing recedes like success. -- Walter Winchell