Microsoft

Ray Ozzie's Departing Memo a Warning To Microsoft 345

itwbennett writes "In a parting memo to Microsoft, Ray Ozzie urges Microsoft to 'really, truly, seriously start thinking beyond the PC,' writes blogger Chris Nurney. Nurney suspects that 'Ozzie has been making these points internally for some time,' and that the memo 'could be his way of putting it in the public record.' Some of the memo's juicy bits: 'It's important that all of us do precisely what our competitors and customers will ultimately do: close our eyes and form a realistic picture of what a post-PC world might actually look like, if it were to ever truly occur. ... Today's PCs, phones & pads are just the very beginning; we'll see decades to come of incredible innovation from which will emerge all sorts of "connected companions" that we'll wear, we'll carry, we'll use on our desks & walls and the environment all around us.'"
Bug

Stuxnet Infects 30,000 Industrial Computers In Iran 263

eldavojohn writes "The BBC and AFP are releasing more juicy details about the now infamous Stuxnet worm that Iranian officials have confirmed infected 30,000 industrial computers inside Iran following those exact fears. The targeted systems that the worm is designed to infect are Siemens SCADA systems. Talking heads are speculating that the worm is too complex for an individual or group, causing blame to be placed on Israel or even the United States — although the US official claims they do not know the origin of the virus. Iran claims it did not infect or place any risk to the new nuclear reactor in Bushehr, which experts are suspecting was the ultimate target of the worm."
Businesses

Symantec To Buy VeriSign's Authentication Business 97

"Security giant Symantec is taking another step toward global domination of the information security market with the purchase of VeriSign's authentication business. Back in April it purchased PGP Corporation and GuardianEdge. VeriSign is the best known Certificate Authority; they are virtually synonymous with certificates for SSL and PKI. It seems like this could dilute the trust value of their brand rather than enhance it. It is not clear yet what effects this will have on VeriSign customers but the cynic in me says it can't be good. In terms of putting all your eggs in one basket, this will sure make Symantec a juicy target for hackers (as if they weren't already). Imagine you could hack one company and control a large chunk of endpoint security software and the bulk of the Internet's public key infrastructure."
Businesses

US Gamers Spend $3.8 Billion On MMOs Yearly 177

eldavojohn writes "A new report from Games Industry indicates that MMO gamers in the United States paid $3.8 billion to play last year, with an analysis of five European countries bringing the total close to $4.5 billion USD. In America, the report estimated that payments for boxed content and client downloads amounted to a measly $400 million, while the subscriptions came to $2.38 billion. Hopefully that will fund some developer budgets for bigger and better MMOs yet to come. The study also found that roughly a quarter of the US population plays some form of MMO. Surely MMOs are shaping up to be a juicy industry, and a market that can satisfy people of all walks of life."
Security

Latvian "Robin Hood" Hacker Leaks Bank Details 170

eldavojohn writes "Move over Russell Crowe, an anonymous hacker in Latvia is being hailed as a real life modern Robin Hood. The hacker refers to himself as 'Neo,' claims allegiance with the Fourth Awakening People's Army, and is outing banks that are capitalizing off of the horrible economic status Latvia is currently suffering from. No word on how he is acquiring the information but it is slowly being leaked to TV sources via Twitter and the common people love him. The hacker is thought to be based in Britain but a TV reporter pointed out the fine line Neo is walking, 'On the one hand of course he has stolen confidential data ... and he actually has committed a crime. But at the same time there is value for the public in the sense that now a lot of information gets disclosed and the whole system maybe becomes a little more transparent.' An example of a juicy tidbit he revealed is that managers of a Latvian bank did not take the salary cuts they promised they would after the government bailed them out of economic trouble. You can imagine that taxpayers were upset and thankful they knew this information."
Earth

Utah Assembly Passes Resolution Denying Climate Change 787

cowtamer writes "The Utah State Assembly has passed a resolution decrying climate change alarmists and urging '...the United States Environmental Protection Agency to immediately halt its carbon dioxide reduction policies and programs and withdraw its "Endangerment Finding" and related regulations until a full and independent investigation of climate data and global warming science can be substantiated.' Here is the full text of H.J.R 12." The resolution has no force of law. The Guardian article includes juicy tidbits from its original, far more colorful, version.
Google

Google Unveils goo.gl URL Shortening Service 242

eldavojohn writes "The Sultan of Search is unveiling a new service (currently only available for Google Toolbar and Feedburner) that will tackle a very old problem usually solved by bit.ly or tinyurl — URL shortening. Now, we've heard cries for sanity to prevent potential issues (like what if tr.im had shut down and broken millions of links?) but with one of the goliaths of the industry jumping in the ring it looks like URL shortening is here to stay. And a quick note for people who enjoy privacy, goo.gl explicitly states: 'Please note that Google may choose to publicly display aggregate and non-personally identifiable statistics about particular shortened links, such as the number of end user clicks.' You didn't think Google was going to sit back and let bit.ly harvest juicy data on 2.1 billion links that were clicked in November without trying to corner some of that action to make their ad suggestions more accurate, did you?" Google's shortening service is called Goo.gl.
Security

Hackers vs. Phishers 137

An anonymous reader writes "Some hackers out there don't like to do all the hard work of running a successful phishing campaign. Instead, they developed a simple online service to 'steal' account details from the hard-working phishers. Named AutoWhaler, the service allows anyone to scan a phishing server for log files that contain juicy information such as usernames and passwords."
Oracle

Oracle To Sell Sun's Hardware Business To HP? 76

Underholdning writes "With the DOJ approving Oracle's Sun buyout, the question arises what Oracle might want to do with Sun's hardware business. It's no secret that what Oracle wanted was the software part. Now The Inquirer is running a story claiming that Oracle will sell the hardware business of Sun to HP. This will give Oracle a juicy check while HP can increase its services. Larry Ellison denies that it will take place, but a source for CNN claims otherwise."

Ask Blizzard About Starcraft2, Diablo III, WoW, or Battle.net 520

Well, Blizzcon 2009 is about to get underway (look for the big news from the keynote in a few hours) and given how fast it sold out I'm sure there are still many rabid fans interested in what Blizzard might have to say that don't want to shell out the $40 for Pay-Per-View access. So, to that end we have interviews scheduled tomorrow with the teams from Starcraft2, Diablo III, World of Warcraft, and Battle.net. If there is anything you wish to know about the progress or juicy details from any of these teams please leave it in the comments below. We'll try to parse through for the best questions and get you answers during our interview slots tomorrow. The usual Slashdot interview rules apply.
SuSE

SUSE Studio 1.0 Released 121

apokryphos writes "Novell has just announced the release of SUSE Studio 1.0 — a user-friendly Web service that allows you to create your customized Linux distribution as a live CD, USB, Xen, or VMware image. Users have control over adding any repositories, packages, and files to the distribution. A new user can do the full creation and customization of the software appliance in roughly ten minutes. It also includes a Flash-based 'test drive' service, which allows you to try out your appliance in a Web browser before downloading it."
Biotech

Texas Makes Zombie Fire Ants 398

eldavojohn writes "What do you do when a foreign species has been introduced to your land from another continent? Bring over the natural predator from the other continent. Scientists in Texas have introduced four kinds of phorid flies from South America to fight fire ants. These USDA approved flies dive bomb ants and lay an egg inside the ant. The maggot hatches and eats away juicy tender delicious ant brain until the ant is nothing more than a zombie that wanders around for two weeks before the head falls off and the ant dies. A couple of these flies will cause the ants to modify their behavior and this will be a very slow acting solution to curb the $1 billion in damage these ants do to Texas cattle ranches and — oddly enough — electrical equipment like circuit breakers. You may remember zombifying parasites hitting insects like cockroaches."
Idle

Swedish Factory Fined $3,000 For Robot Attack 1

rodrigoandrade writes "The robo-assault reportedly took place in 2007, when a man attempted to repair a defective machine used to lift rocks without properly checking the power supply beforehand. And unfortunately, the human head isn't all that different than a big juicy rock to such a robot."
Security

CCC Create a Rogue CA Certificate 300

t3rmin4t0r writes "Just when you were breathing easy about Kaminsky, DNS and the word hijacking, by repeating the word SSL in your head, the hackers at CCC were busy at work making a hash of SSL certificate security. Here's the scoop on how they set up their own rogue CA, by (from what I can figure) reversing the hash and engineering a collision up in MD5 space. Until now, MD5 collisions have been ignored because nobody would put in that much effort to create a useful dummy file, but a CA certificate for phishing seems juicy enough to be fodder for the botnets now."
Image

Porn Star Screenshot-sm 4

She has the matching shorts that say "Juicy."
Communications

Why Email Has Become Dangerous 255

mikkl666 writes "The Sydney Morning Herald runs an interesting story dealing with a study about email user behavior, explaining how and why email can be a terrible distraction: 'It takes an average of 64 seconds to recover your train of thought after interruption by email. So people who check their email every five minutes waste 8 1/2 hours a week figuring out what they were doing moments before.' Email is also compared to slot machines in the way it works psychologically: 'So with email, usually when I check it there is nothing interesting, but every so often there's something wonderful — an invite out or maybe some juicy gossip — and I get a reward.' There are also some hints offered on how to keep control of the inbox, for those of us already addicted."
Role Playing (Games)

D&D 4th Edition Details Released 171

Wired is reporting that some juicy details of Wizards of the Coast's new 4th edition for Dungeons and Dragons are being leaked on to the web from the D&D Experience in Arlington, VA this week. "Wizards of the Coast, the current custodians of the D&D universe, have been talking about the upcoming fourth edition of the game for months, but they've been fairly cagey about hard details, preferring to tell us more about how elves love footraces than how much damage a fireball does. They're running actual 4e games at D&D Experience, though, and thanks to people with scanners, you can too!"
Intel

Details of Intel 45nm Processors Leaked 104

DCC writes "TechARP has gotten some juicy news from Intel. This time, it's the top secret details of the Intel 45nm desktop processors, both Yorkfield and Wolfdale with benchmarks and pricing included! 'As promised earlier, Intel will launch their 45 nm processors by the end of this year. In fact, we have been told that the launch date had already been set at November 11, 2007, so mark your calendars. [...] Code-named Yorkfield XE, the Intel Core 2 Extreme QX9650 will be a quad-core processor built from two 45 nm Wolfdale processor dies. It will displace the Core 2 Extreme QX6850 (Kentsfield) processor as the top desktop processor model until Q3, 2008'"
Security

Social Networking Sites Full of Security Holes 76

athloi writes "Social networking Web sites such as MySpace.com are increasingly juicy targets for computer hackers, who are demonstrating a pair of vulnerabilities they claim expose sensitive personal information and could be exploited by online criminals."

Steve Jobs Hates Buttons 713

ElvaWSJ writes "While many technology companies load their products up with buttons, Steve Jobs treats them as blemishes that add complexity and hinder their clean aesthetics. The iPhone is Steve Jobs's attempt to crack a juicy new market for Apple Inc. But it's also part of a decades-long campaign by Mr. Jobs against a much broader target: buttons. The new Apple cellphone famously does without the keypads that adorn its rivals. Instead, it offers a touch-sensing screen for making phone calls and tapping out emails. The resulting look is one of the sparest ever for Apple, a company known for minimalist gadgets. "

Slashdot Top Deals