How many Windows PCs do you have that would use 300GB in a month?!? It may be time to set up WSUS...
MojoKid writes "NVIDIA announced a major update to its SHIELD Android gaming device today, with the over-the-air update delivering the latest build of Android (v4.3 Jelly Bean) to the handheld console. NVIDIA also launched GameStream in order to bring more PC titles to streaming devices. Wait, need more? How about SHIELD Gamepad Mapper, which turns touch-based Android games into ones that can be enjoyed with SHIELD's console-quality controls. Alongside that Android update comes Console Mode, which turns SHIELD into a portable living room game console. Users will be able to pair up a Bluetooth controller, kick back on the couch, indulge in Android games, browse the Web, and watch your favorite movies all at 1080p."
TexasDex writes: After years of providing great news reporting to the open source community, including interviews, great Linux kernel update summaries, and even breaking the Skype spying story well before it was leaked, The H Online is closing down due to lack of profitability. I've checked them daily for years, so it's be sad to see them go.
TexasDex writes: Improv Everywhere has done it again, and this time their prank is social media-themed. After their previous spontaneous public musicals such as the food court musical that left onlookers entertained and bewildered, their latest hit, 'Gotta Share', delivered at the GEL Conference in New York, poked fun at people who can't go ten minutes without tweeting what they're doing.
Link to Original Source
Link to Original Source
In theory one could emulate TPM inside a virtual machine, but from what I understand there is a key in the TPM that is machine specific. This is how the remote attestation feature works, by checking to make sure the device is "safe" and the software (e.g. music player that only lets you play it for 30 days) running on it has not been modified. This is actually pretty secure, and no logical trickery will get around it, but it's not perfect. The fundamental flaw of all DRM/TPM systems is that you have the keys. They might make them hard to get by putting them on a separate chip instead of the RAM but a sufficiently skilled attacker with, say, an electron microscope, might be able to extract them. At that point everything is completely broken. In the traditional "Alice, Bob, and Eve" story, Alice is sending a message to Bob and doesn't want Eve to be able to decrypt it, but Bob and Eve are effectively the same person. This is why no DRM scheme can be perfect, just a major nuisance to law-abiding folk.
Leemeng writes "I'm looking for a simple, free, and F/OSS flat-file database program. I'm storing info about Wi-Fi access points that I come across, maybe 8-9 fields per entry. I've outgrown Notepad. This info is for my own reference only; it is not going on a Web server. Googling was unhelpful, with results skewed towards SQL, Access (MS), and Oracle, all of which would be overkill for my purposes. My criteria are: it must be simple, F/OSS, must work in Windows Vista, preferably use a portable format, must not be an online app, and must not require Java. Does such a beast exist?"
jlunavtgrad writes "I recently attended an embedded engineering conference and was surprised at how many vendors were selling tools to analyze source code and scan for bugs, without ever running the code. These static software analysis tools claim they can catch NULL pointer dereferences, buffer overflow vulnerabilities, race conditions and memory leaks. Ive heard of Lint and its limitations, but it seems that this newer generation of tools could change the face of software development. Or, could this be just another trend? Has anyone in the Slashdot community used similar tools on their code? What kind of changes did the tools bring about in your testing cycle? And most importantly, did the results justify the expense?"
Joe Ganley writes "You are a programming superstar, and you are looking for work. I recognize this happens relatively rarely, which is part of my problem. But stipulating that it happens, how do I, as a company looking to hire such people, connect with them? Put another way, how do you the programming superstar go about looking for a company that seems like one you'd like to work for? The company I work for is a great place to work; we only hire really great people, we work on hard, interesting problems, and we treat our employees well. We aren't worried about retention or even about how to entice people to work here once we've found them. The problem is simply finding them. The signal-to-noise ratio of the big places like Monster and Dice is terrible. We've had much better luck with (for example) the Joel on Software job boards, but that still doesn't generate enough volume." What methods have other people used to find the truly elite?
froggero1 writes "The New York Post is reporting that Microsoft wants to rekindle the takeover talks with Yahoo. According to the article, Yahoo! has repeatability turned away their offers, but Microsoft hopes that a lucrative 50 billion dollar offer will bring them back to the table. This move would increase Microsoft's web search market share to roughly 38%."
spiffcow asks: "I design internal software for users that are largely computer-illiterate, and obtaining accurate specs for these programs has become a huge challenge. In the most recent instance, I asked for detailed specs on what an accounting program should do (i.e. accounting rules, calculation methods, and so forth), and received a Word document mock-up of an input screen, complete with useless stickers. This seems to be the norm around here. When I asked my boss (the head Sales manager) for specs, he responded saying that it was my responsibility to determine what was needed. How do I convey to the users that, in order to develop the software they want, I need detailed, accurate specs?"
Nuclear Elephant writes "The Consumerist is running a story about a house burned down by a Dell laptop. 'My 130-year-old former farm house was engulfed in flames, with thick dark smoke pouring out of the windows and roof... Hours later, after investigation the fire marshal investigator took me aside asked me if I had a laptop computer. Yes — I told him I had a Dell Inspiron 1200.' It was determined that the laptop, battery, or cord malfunctioned after its owner left for work, leaving the fire to spread through the entire house. All attempts to contact Dell have failed. 'I have tried to call Dell to at least notify them of my problems, but each time I have called I get transferred into an endless loop of "Joe" or "Alan" all speaking a delectable version of English I presume emanates from Bangalore. I have been outright hung up on each time I get someone who speaks a reasonable version of English, or sounds like they might be in charge of something. Promises of call backs have gone, of course, unreturned.'"
theodp writes "Microsoft has applied for a patent for 'securely providing advertising subsidized computer usage.' The application describes how face-recognition webcams and CAPTCHAs can be used in schools to ensure that computer users are paying attention to ads, and the recourse of 'disabling or even repossessing the computer' if they are not."
thesolo asks: "Despite past efforts of the 1970s and 1980s, the United States remains one of only three countries (others are Liberia and Myanmar) that does not use the metric system. Staying with imperial measurements has only served to handicap American industry and economy. Attempts to get Americans using the Celsius scale, or putting up speed limits in kilometers per hour have been squashed dead. Not only that, but some Americans actually see metrication efforts as an assault on 'our way' of measuring. I personally deal with European scientists on a daily basis, and find our lack of common measurement to be extremely frustrating. Are we so entrenched with imperial units that we cannot get our fellow citizens to simply learn something new? What are those of us who wish to finally see America catch up to the rest of the world supposed to do? Are there any organizations that we may back, or any pro-metric legislators who we can support?"
elearning 2.0 writes "It looks like the Deleting Online Predators Act (DOPA) has died a slow death. DOPA was proposed during the height of last year's moral panic around the issue of child safety and sites like MySpace. The legislation would have banned the use of commercial social networking websites in US schools and libraries which receive federal IT funding — therefore undermining much of the pioneering work being done by educators in the e-learning 2.0 space."