How many Windows PCs do you have that would use 300GB in a month?!? It may be time to set up WSUS...
MojoKid writes "NVIDIA announced a major update to its SHIELD Android gaming device today, with the over-the-air update delivering the latest build of Android (v4.3 Jelly Bean) to the handheld console. NVIDIA also launched GameStream in order to bring more PC titles to streaming devices. Wait, need more? How about SHIELD Gamepad Mapper, which turns touch-based Android games into ones that can be enjoyed with SHIELD's console-quality controls. Alongside that Android update comes Console Mode, which turns SHIELD into a portable living room game console. Users will be able to pair up a Bluetooth controller, kick back on the couch, indulge in Android games, browse the Web, and watch your favorite movies all at 1080p."
TexasDex writes: After years of providing great news reporting to the open source community, including interviews, great Linux kernel update summaries, and even breaking the Skype spying story well before it was leaked, The H Online is closing down due to lack of profitability. I've checked them daily for years, so it's be sad to see them go.
TexasDex writes: Improv Everywhere has done it again, and this time their prank is social media-themed. After their previous spontaneous public musicals such as the food court musical that left onlookers entertained and bewildered, their latest hit, 'Gotta Share', delivered at the GEL Conference in New York, poked fun at people who can't go ten minutes without tweeting what they're doing.
Link to Original Source
Link to Original Source
secmartin writes "Researchers at Delft University warn that large parts of the BitTorrent network might collapse if The Pirate Bay is forced to shut down. A large part of the available torrents use The Pirate Bay as tracker, and other available trackers will probably be overloaded if all traffic is shifted there. TPB is currently using eight servers for their trackers. According to the researchers, even trackerless torrents using the DHT protocol will face problems: 'One bug in a DHT sorting routine ensures that it can only "stumble upon success", meaning torrent downloads will not start in seconds or minutes if Pirate Bay goes down in flames.'"
mikesd81 writes to tell us that four Google employees may be facing charges of defamation and failure to control personal data simply because they didn't remove a video of a boy with Down's Syndrome being harassed and eventually hit over the head with a box of tissue, from Google Video. The video was posted in September of 2006 and was removed by Google within a day of receiving the initial complaints, but apparently that isn't fast enough. "Google maintains charges against the employees are unwarranted, Pancini said. Europe's E-commerce Directive exempts service providers from prescreening content before it is publicly posted, he said. Also, the video was technically uploaded to a Google server in the US, not in Italy, Pancini said. 'It was a terrible video,' Pancini said, adding that Google is concerned about the case's impact on censorship on the Internet. The defendants include David C. Drummond, a Google senior vice president, corporate development and chief legal officer. Pancini said Drummond did paperwork to create Google Italy, but has never lived in the country."
Are you sure someone didn't enter the password as the hint? I know, you said you hadn't entered a hint, etc. etc. Just a random thought.
In theory one could emulate TPM inside a virtual machine, but from what I understand there is a key in the TPM that is machine specific. This is how the remote attestation feature works, by checking to make sure the device is "safe" and the software (e.g. music player that only lets you play it for 30 days) running on it has not been modified. This is actually pretty secure, and no logical trickery will get around it, but it's not perfect. The fundamental flaw of all DRM/TPM systems is that you have the keys. They might make them hard to get by putting them on a separate chip instead of the RAM but a sufficiently skilled attacker with, say, an electron microscope, might be able to extract them. At that point everything is completely broken. In the traditional "Alice, Bob, and Eve" story, Alice is sending a message to Bob and doesn't want Eve to be able to decrypt it, but Bob and Eve are effectively the same person. This is why no DRM scheme can be perfect, just a major nuisance to law-abiding folk.
Leemeng writes "I'm looking for a simple, free, and F/OSS flat-file database program. I'm storing info about Wi-Fi access points that I come across, maybe 8-9 fields per entry. I've outgrown Notepad. This info is for my own reference only; it is not going on a Web server. Googling was unhelpful, with results skewed towards SQL, Access (MS), and Oracle, all of which would be overkill for my purposes. My criteria are: it must be simple, F/OSS, must work in Windows Vista, preferably use a portable format, must not be an online app, and must not require Java. Does such a beast exist?"
jlunavtgrad writes "I recently attended an embedded engineering conference and was surprised at how many vendors were selling tools to analyze source code and scan for bugs, without ever running the code. These static software analysis tools claim they can catch NULL pointer dereferences, buffer overflow vulnerabilities, race conditions and memory leaks. Ive heard of Lint and its limitations, but it seems that this newer generation of tools could change the face of software development. Or, could this be just another trend? Has anyone in the Slashdot community used similar tools on their code? What kind of changes did the tools bring about in your testing cycle? And most importantly, did the results justify the expense?"
Fields writes "It's well known that failed hard drives can be recovered, but few people actually use a recovery service because they're expensive and not always successful. Even fewer people ever get any insights into the process, as recovery companies are secretive about their methods and rarely reveal any more information that is necessary for billing. Geek.com has an article walking through a drive recovery handled by DriveSavers. The recovery team did not give away many secrets, but they did reveal a number of insights into the process. From the article, "'[M]y drive failed in about every way you can imagine. It had electro-mechanical failure resulting in severe media damage. Seagate considered it dead, but I didn't give up. It's actually pretty amazing that they were able to recover nearly all of the data. Of course, they had to do some rebuilding, but that's what you expect when you send it to the ER for hard drives.'" Be sure to visit the Museum of Disk-asters, too.
sciurus0 writes "As the open source version control system Subversion nears its 1.5 release, one of its developers asks, what is the project's future? On the one hand, the number of public Subversion DAV servers is still growing quadratically. On the other hand, open source developers are increasingly switching to distributed version control systems like Git and Mercurial. Is there still a need for centralized version control in some environments, or is Linus Torvalds right that all who use it are 'ugly and stupid'?" The comments on the blog post have high S/N.
Joe Ganley writes "You are a programming superstar, and you are looking for work. I recognize this happens relatively rarely, which is part of my problem. But stipulating that it happens, how do I, as a company looking to hire such people, connect with them? Put another way, how do you the programming superstar go about looking for a company that seems like one you'd like to work for? The company I work for is a great place to work; we only hire really great people, we work on hard, interesting problems, and we treat our employees well. We aren't worried about retention or even about how to entice people to work here once we've found them. The problem is simply finding them. The signal-to-noise ratio of the big places like Monster and Dice is terrible. We've had much better luck with (for example) the Joel on Software job boards, but that still doesn't generate enough volume." What methods have other people used to find the truly elite?
It seems trashing the Fourth Amendment is very profitable: For one company, FISA wiretaps carry a $1K pricetag
Comcast, which is among the nation's largest telecommunication companies, charges $1,000 to install a FISA wiretap and $750 for each additional month authorities want to keep an eye on suspects, according to the company's Handbook for Law Enforcement. Secrecy News obtained the document and published it Monday.
theodp writes "Wikipedia defines a protection racket as an extortion scheme whereby a powerful non-governmental organization coerces businesses to pay protection money which allegedly serves to purchase the organization's 'protection' services against various external threats. Compare this to IBM's just-published patent application for 'Extracting Value from a Portfolio of Assets', which describes a process by which 'very large corporations' impress upon smaller businesses that paying for 'the protection of a large defensive patent portfolio' would be 'a prudent business decision' for them to make, 'just like purchasing a fire insurance policy.' Sounds like Fat Tony's been to Law School, eh? Time for IBM to put-their-money-where-their-patent-reform-mouth-is and deep-six this business method patent claim!"