Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment: Story misleading and sensationalist (Score 5, Informative) 234

by ccr (#35636834) Attached to: Nokia - No More Symbian Phones After 2012

TFA and the original source (press release from Forum Nokia, http://blogs.forum.nokia.com/blog/nokia-developer-news/2011/03/25/open-letter-to-developer-community ) reveal that:

Over the past weeks we have been evaluating our Symbian roadmap and now feel confident we will have a strong portfolio of new products during our transition period - i.e. 2011 and 2012.

And further ..

Iâ(TM)ve been asked many times how long we will support Symbian and Iâ(TM)m sure for many of you it feels we have been avoiding the question. The truth is, it is very difficult to provide a single answer. We hope to bring devices based on Windows Phone to market as quickly as possible, but Windows Phone will not have all language and all localization capabilities from day one. [...] That is why we cannot give you the date when Symbian will no longer be supported.

Finally it is stated:

What I can promise you is that we will not just abandon Symbian users or developers. As a very minimum, we have a legal obligation, varying in length between countries, to support users for a period of time after the last product has been sold.

So there's nothing saying that Nokia will suddenly stop supporting Symbian in 2012. It'll just fade out gradually, and even they don't admit knowing when it will fade out completely.

Comment: Re:Yes, as I've said many times.... (Score 1) 456

by ccr (#34896432) Attached to: Why Linux Loses Out On Hardware Acceleration In Firefox

Uhm, Wine does not work that way. It does not allow access to hardware level any more than any other user-space application gets, there is simply a emulation layer for D3D implemented that "translates" the API to OpenGL. Windows software using OpenGL, on the other hand, gets a much thinner wrapper to pass OGL calls to native OGL.

Comment: Re:Nvidia (Score 1) 456

by ccr (#34896418) Attached to: Why Linux Loses Out On Hardware Acceleration In Firefox

This won't be an issue anytime soon, as I see it. I doubt Wayland will be _really_ ready for prime-time until, say, 5 years from now on. And Nvidia may just seem disinterested outwards, it is entirely possible they are simply just considering the issue internally and do not want to make any verbal commitments, as is typical for companies.

Comment: Re:Symbian sure try hard to prevent you developing (Score 1) 423

by ccr (#32805334) Attached to: Symbian, the Biggest Mobile OS No One Talks About

I remember the "process", or rather the pain, of using Symbian SDK being on about the same level nearly 9 years ago. Which is exactly why Symbian is shit, and how Nokia in general sucks -- they've had a headstart of 10 years to make Symbian development experience better, but it's still the same piece of pigeon poop it was nearly decade ago.

Google and Apple have done better in way lesser time, and seemingly had the sense to avoid at least some of Symbian's mistakes (albeit they seem to have problems of their own, of course), but Nokia hasn't had the sensibility to improve their primary platform. I guess they finally did admit Symbian's inferiority by the partial move to Maemo/Meego.

I'm not even going to start with the often confusing mess that Symbian platform itself is...

Comment: Re:Better solution: read only media (Score 3, Insightful) 264

by ccr (#28744901) Attached to: Security Threats 3 Levels Beyond Kernel Rootkits

And what about those BIOS/EFI[1] firmware-based hypervisor rootkits? If someone is able to gain root access in a given system that is somehow "vulnerable" in such way that a permanent EFI (or similar) rootkit can installed, then you'll be fucked even with the read-only media and all.

Speaking of which, I don't understand why manufacturers are so eagerly adding all this new intelligence into the firmware. What do we need it for anyway? IMO it would be so much simpler from security perspective, if the OS would be at the bottom of it all. Added complexity adds new possibilities for exploitation.

[1] http://en.wikipedia.org/wiki/Extensible_Firmware_Interface

The Internet

+ - French 3 strikes law returns with judicial oversig->

Submitted by suraj.sun
suraj.sun (1348507) writes "French "3 strikes" law returns, now with judicial oversight!

The French Senate has once again approved a reworked version of the country's controversial "three strikes" bill designed to appease the Constitutional Council. Instead of a state-appointed agency cutting off those accused of being repeat offenders, judges will have the final say over punishment.

The approval comes exactly one month after the country's Constitutional Council ripped apart the previous version of the Création et Internet law.

Bring in the judges

Not content to let the idea die, President Nicolas Sarkozy's administration reworked the law in hopes of making it amenable to the Council--instead of HADOPI deciding on its own to cut off users on the third strike, it will now report offenders to the courts. A judge can then choose to ban the user from the Internet, fine him or her 300,000 (according to the AFP), or hand over a two-year prison sentence.

Those who are merely providing an Internet connection to dirty pirates can be fined 1,500 and/or receive a month-long temp ban from the online world. (A group of French hackers has already begun to work on software that cracks the passwords on locked WiFi networks so that there's an element of plausible deniability when law enforcement tries to go after home network owners.)

The Senate approved this version of the bill with a vote of 189-142 this week, sending it to the National Assembly for final passage.

ARS Technica : http://arstechnica.com/tech-policy/news/2009/07/its-baack-french-3-strikes-law-gets-another-go-from-senate.ars"

Link to Original Source

Comment: Typical user behaviour, asking for "impossible" (Score 1) 382

by ccr (#28201009) Attached to: UK Police Want Plug-In Computer Crime Detectors

So, as usual, they are asking for an solution that is impossible to implement, at least in any meaningfully reliable way. I mean, how does one sanely "detect" child pornography or any other illegal content to begin with?

Despite these insurmountable odds, I am fairly certain that there will be a long line of companies willing to try and do some half-assed gadgets, because there will be lots of money involved.

Google

+ - SPAM: Google Apps Hacks

Submitted by
stoolpigeon
stoolpigeon writes "It seems that it wasn't long ago that Google was just a search company. The number of on-line products that fly under the Google moniker, today, is impressive. Google has moved well beyond it's office-suite-like applications and excelled with everything from mapping to blogging to 3-D drawing. "Google Apps Hacks" is a new book from O'Reilly, published in conjunction with their Make magazine. This volume presents the reader with 141 hacks in an attempt to get the most out of a wide array of Google's on-line applications. The result is a quick ride that is rather fun and while a bit shallow at times, provides a great overview of just how much is available out there.

There is one issue that I believe must be addressed up front. The title of the book is quite catch- "Google Apps Hacks". It led me to believe that it would be a book full of hacks. The connection with Make made this seem all the more likely. I guess the definition of a hack is somewhat up for debate. I tend to agree with a couple that I found over at the Urban Dictionary, "A clever or elegant technical accomplishment, especially one with a playful or prankish bent. A clever routine in a computer program, especially one which uses tools for purposes other than those for which they were intended, might be considered a hack." and "A temporary, jury-rigged solution, especially in the fields of computer programming and engineering: the technical equivalent of chewing gum and duct tape." I see hacks as either thrown together solutions or extremely clever solutions that use something in a way that is not really what was part of the original intention for that thing. By either definition, many of the hacks in this book, are not hacks. I may be making a large assumption, but I do assume that many will share my opinion on the definition of a hack, so I think it is important that they understand what this book does contain, if it is not full of hacks.

I think what would be more accurate, and probably much less marketable, is that this is a book of Google Apps snippets, instructions and a few hacks. The hacks themselves are rated in the book as one of three levels — Easy, Intermediate and Expert. There are 141 total as I mentioned and they break down like this; 72 easy, 50 intermediate and 19 expert. That says something all on its own. This is especially true when some of the easy hacks include things like signing up for a Gmail account or accessing your calendar from a mobile phone. The instructions to do those things are not a hack, they are instructions on how to use the software as it was intended to be used. No clever tricks, no thrown together work-around, just documentation for things that are pretty easy to do.

With all that said, I think that the book has a high level of value. I just think that someone who judges it by its cover (which we all do, old sayings aside) may get an unpleasant surprise. What is the value, if it does not lie in providing a ton of hacks? Well, this book is an excellent introduction to Google's many on-line applications. I use many already and still learned of a couple new ones when I read this book. It also does bring all that instruction into one place, and provides a very user-friendly style of instruction. There is also a very nice feature, 8 sections that take the reader "Beyond Google...". Each of these sections informs the reader about alternative software that provides similar functionality to the Google software described in the preceding chapter. This is really a great resource and an unexpected bonus for anyone who reads the book.

The book covers the entire Google Documents family with an overview and then chapters that deal specifically with documents, spreadsheets and presentations. The beyond Google section presents Zoho, EditGrid and the ThinkFree on-line office suite. There are some nice hacks here that revolve around using the sharing capabilities as well as pulling data from all over the web and into documents. For example Hack #27 is one of the expert hacks and gives 5 pages of explanation, with black and white images as well as code snippets, on how to pull data from any web site into a spreadsheet. This also serves as a nifty little example of xpath and uncovers some very cool Google spreadsheet functionality. Hack #29 is another rated expert that uses screen scraping, but this time to add currency conversion capabilities to a spread sheet. I thought these were not only fun but did a great job of opening up my mind to a number of other possible uses for these tools.

The chapter on Gmail is for the most part pretty basic. One of the expert hacks, altering the appearance of Gmail using ones own stylesheet, is useful not only for Gmail but for any site that one might be interested in modifying. The coverage is decent and much of the functionality and interface is very well documented. The other products introduced are Yahoo! Mail, MS Hotmail and Mozilla Thunderbird. One simple hack is the ability to create 'spare' email addresses with the use of periods in the name or the use of '+' to add onto the name. This hack gained quite a bit of attention on the web not that long ago, and is one of the easy hacks, but still very useful.

Many of the hacks, including hack #54, from the Gmail section, originated with someone other than Lenssen. He is careful to point this out, in the text of the hack, which I thought was very cool. Not giving credit would be a real problem, but it didn't need to be so prominent. That hack, by the way, is how to use the undocumented "lang" operator to search messages based on language. Another easy hack that could be extremely useful.

iGoogle is covered, along with instructions on creating Gadgets. I thought the ability to add any flash game as a gadget was fun but damaging to my productivity. The other options presented are Netvibes, Pageflakes and Protopage. This is followed up with Google Calendar and some nice instructions on adding a Calendar xml widget to a blog, or the inverse, embedding a vast array of content into Calendar events. The other options here are Yahoo! Calendar, Microsoft's Calendar and 30 Boxes. These are both followed by the chapter on Google reader and a list of a number of other possible reader services.

The chapter covering photos and video is shorter than the others when taking into account that it covers Picasa, YouTube and GoogleVideo, but I think that there just isn't as much flexibility or need there as in some of the other applications. The chapter on blogging and Google Groups is just the opposite, with quite a few more hacks and some nice tips on getting the most from each of those services.

Google Maps, Google Earth and Sketchup 3D are covered in a single chapter together. There are some nifty hacks here, though some of the more flashy have already received quite a bit of attention all over the internet. For example, the ability to use Google Earth as a flight simulator has already gained a huge amount of attention on most high profile sites, and many blogs, low traffic sites, etc.

The last chapter covers tools like Analytics and ways to go about doing search engine optimization and generating traffic. There are some nice ideas for the individual who really wants to analyze what traffic they have and try to get more. Here there are some good examples of another strength of the book. It does a good job of crossing over between applications. Two good examples here are Hack #133, which covers exporting Analytics data to Google Spreadsheets and hack #136 which is a very clever way to do user surveys using Google Spreadsheets again.

As I mentioned, most of the book is a bit shallow. But that is not always the case. Some of the expert hacks are not too tough, but do require the reader to get a handle on more than just basic concepts and tools. Some are excellent exercises in getting exposed to all kinds of technology. Hack #121 lets the reader know how to create Google Maps overlays on the fly using Python to generate KML, using data that it read from a MySQL database. That's fun stuff and a far cry from hack #1 "How to Get Your Google Account." In fact for some people, the entire book may be worth these gems.

The book has a nice glossy cover and the 9.7 x 8.0 dimensions mean that it doesn't feel to thick for its almost 400 pages. Those pages fly by and each hack is accompanied by plenty of illustrations and code snippets where appropriate. The table of contents breaks things down well, and each hack is named there and the names give an accurate description of the content. The index is acceptable and the two combine to make this a very easy resource to pick up and jump to just the right content. It can be read from front to back, but that is not at all necessary and there is no thread or flow that would necessitate reading it in order unless the reader was completely new to one of the applications presented. In that case, it might be best to work from the introduction of that application first.

The introduction states that Lenssen and his editor used Google Documents to write this book. This is not much of a surprise as Lenssen's own blog is dedicated to watching Google and their doings.

I've found this to be an extremely useful book. I've used it setting up a Google Site. I've learned about some web applications from Google and from others that I didn't even know existed. I get myself into a bit of a tizzy over the whole use of the word 'hack' thing, but that's just the geek in me coming out. Sometimes I think we love to bicker over stuff like that. That aside, this is a solid book full of useful material."
NASA

+ - SPAM: NASA, DoD agree: earth's weather pattern changed

Submitted by
destinyland
destinyland writes ""If you think the weather is getting more extreme, you're right," the AP reports, citing a new report from 10 government organizations which included NASA, the Department of Defense, and the National Science Foundation. It's not getting as cold at night as it did in earlier decades, there are fewer nights with frosts, and there's more extreme rain and heat, with an increasing frequency of tropical storms (leading to more and stronger hurricanes). Yesterday it was 116 in Palm Springs, while the heavy rainfall in Iowa used to happen just once every 500 years (and now happen every 15). And "Droughts will get dryer, storms will get stormier and floods will get deeper with the changing climate," reads another AP report. "Events that have seemed relatively rare will become commonplace, said the latest report...a joint effort of more than a dozen government agencies.""
Link to Original Source

Give a man a fish, and you feed him for a day. Teach a man to fish, and he'll invite himself over for dinner. - Calvin Keegan

Working...