Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Open Source

Desktop Linux Is Dead 1348

digitaldc writes with this quote from PCWorld: "It kills me to say this: The dream of Linux as a major desktop OS is now pretty much dead. Despite phenomenal security and stability — and amazing strides in usability, performance, and compatibility — Linux simply isn't catching on with desktop users. And if there ever was a chance for desktop Linux to succeed, that ship has long since sunk. ... Ultimately, Linux is doomed on the desktop because of a critical lack of content. And that lack of content owes its existence to two key factors: the fragmentation of the Linux platform, and the fierce ideology of the open-source community at large."

MPAA Asks If ACTA Can Be Used To Block Wikileaks 322

An anonymous reader writes "With the entertainment industry already getting laws to block certain sites, it appears they're interested in expanding that even further. The latest is that at a meeting with ACTA negotiators in Mexico, an MPAA representative apparently asked if ACTA rules could be used to force ISPs to block 'dangerous sites' like Wikileaks. It makes you wonder why the MPAA wants to censor Wikileaks (and why it wants to use ACTA to do so). But, the guess is that if it can use Wikileaks as a proxy for including rules to block websites, how long will it be until other 'dangerous' sites, such as Torrent search engines, are included." Note: TechDirt typically has insightful commentary, but make of the original (Spanish) twiiter message what you will.

Comment Re:That is the modus operandi (Score 1) 373

But, this key is the master key, who is Intel to say who can use that key and who can't?
Will Intel sue Sony for use of this key in their BluRay players under the DMCA? (Yes, please?)

It's the correct use of the key, there is nothing being circumvented.

I'm sure they'll tout the list of "approved" hardware manufacturers. But right now that list is made of companies that are willing/stupid enough to pay the extortion money (If you pay us this amount, we won't sue you for use of this key).

The DMCA can only be used when a copyright protection scam^wscheme is cracked... nothing is cracked here, a valid master key is being used in the way it's supposed to work.

If someone enters my house using a copy of my (master) key, I can't legally call it breaking and entering, because nothing is broken. A lock and key is used the way it is intended.


Stewart and Colbert Plan Competing D.C. Rallies Screenshot-sm 696

Lev13than writes "In a direct retort to Glenn Beck's Restoring Honor rally, Jon Stewart and Stephen Colbert have announced competing rallies on October 30th. Stewart plans to host a 'Rally To Restore Sanity' on Oct. 30 on the National Mall in D.C. for the Americans he says are too busy living normal, rational lives to attend other political demonstrations. Colbert, meantime, will shepherd his fans in a 'March To Keep Fear Alive.' 'Damn your reasonableness!' Colbert said. 'Now is not the time to take it down a notch. Now is the time for all good men to freak out for freedom!' Stewart, meanwhile, has promised to provide attendees with signs featuring slogans such as 'I Disagree With You But I'm Pretty Sure You're Not Hitler' and 'I'm Afraid of Spiders.'"

Submission How to upload photos to Facebook Album using FSpot->

iqrash writes: F-Spot is the default picture manager that come with Ubuntu, a very useful software that can help manage you photos, tagging them, import from a device, and many more. F-Spot can also be used to upload photos directly to your Facebook albums.The Facebook upload feature is not activated by default (for some unknown reason). To upload your photos via F-Spot, open F-Spot. Go to "Edit -> Manage Extensions"....
Link to Original Source

Submission North Korea Linux (Red Star OS) Review->

JimLynch writes: There was an announcement a while back that North Korea had come out with its own version of Linux (called Red Star OS). I dropped by the official North Korean site, and found their contact information. I sent a polite email asking for a download link for their distro, but I never heard back from anybody. This was rather rude on their part, or perhaps they just don’t have people who can read English answering their email. Anyway, I wasn’t able to get a download link until today.
Link to Original Source

Submission Confirmed: Steam Not Coming To Linux-> 5

dkd903 writes: A rumor has been going around for about four months that Valve was working on a Linux version of Steam and this had a lot of people in the Linux community very excited. But, Valve has now officially killed the rumor. And it is not what people wants to hear – there is no Linux version of Steam in development. Doug Lombardi, the Marketing VP of Valve Corporation, in an interview, has put an end to all the rumors by saying that they are not working on Steam for Linux right now.
Link to Original Source

Comment Re:the developer should participate in system test (Score 2, Insightful) 396

System testers have to know what the corner cases are. They can't guess them all
That's why you need proper documentation, like use cases, technical designs. Often (and preferably) written by analists and not the developers.

Preferably you have a setup like this:
Business analyst writes documentation based on requirements from the business.
Developers build the application, based on the documentation.
Testers write testcases based on the documentation and test the software as soon as it is released to them.

Testing is a profession too.
And there are many tools and methodologies (TMap, ISTQB, Testframe etc) to ensure proper test-coverage and to have anything meaningful to say about the quality of the tested application.

Comment What freaking app are we talking about?! (Score 1) 168

There is something that I miss in all of the reports I've read about this "trojan", they fail to actually name the app that's supposedly causing all this. Seriously, was the application called "fakeplayer" or something?
It's useful information to know what app is malicious, don't you think? So that you can avoid installing it, or to remove it from your phone before it causes more damage.

The life of a repo man is always intense.