The Internet

Geist's Fair Copyright for Canada Principles 43

An anonymous reader writes "Canadian law prof Michael Geist has been leading the charge against a Canadian DMCA including the creation of a Fair Copyright for Canada Facebook group that now has more than 38,000 members. Having delayed the legislation, he now outlines what Canadians should be fighting for — more flexible fair dealing, a balanced implementation of the WIPO Internet treaties, an ISP safe harbor, and a modernized backup copy provision."
Censorship

Wikileaks Releases Sensitive Guantanamo Manual 643

James Hardine writes "Wired is reporting that a never-before-seen military manual detailing the day-to-day operations of the U.S. military's Guantánamo Bay detention facility has been leaked to the web, via the whistle-blowing site Wikileaks.org, affording a rare inside glimpse into the institution where the United States has imprisoned hundreds of suspected terrorists since 2002. The 238-page document, "Camp Delta Standard Operating Procedures," is dated March 28, 2003. The disclosure highlights the internet's usefulness to whistle-blowers in anonymously propagating documents the government and others would rather conceal. The Pentagon has been resisting — since October 2003 — a Freedom of Information Act request from the American Civil Liberties Union seeking the very same document. Anonymous open-government activists created Wikileaks in January, hoping to turn it into a clearinghouse for such disclosures. The site uses a Wikipedia-like system to enlist the public in authenticating and analyzing the documents it publishes. The Camp Delta document includes schematics of the camp, detailed checklists of what "comfort items" such as extra toilet paper can be given to detainees as rewards, six pages of instructions on how to process new detainees, instructions on how to psychologically manipulate prisoners, and rules for dealing with hunger strikes."
Businesses

Former EA Chicago Employee Speaks Out 48

The closing of EA Chicago came as a bit of a surprise to everyone, including EA Chicago employees. Still dealing with the layoff, an anonymous EA Chicago employee laid out what it was like in the last days to 1up. He touched on the cold reaction to the closure from online readers, and the reality of EA expectations: "In Gibeau's memo, he cited the low chance of short term profitability as an overarching reason for shutting down EA Chicago. Our source claims the company simply had impractical expectations. 'I believe we were never given a fair shake. Fight Night was a huge success,' he said, but 'Def Jam was another story. The estimates for Def Jam's sales were extremely unrealistic for the game. Even if it had done well it would have never hit the unrealistic goals and projections that the marketing department made.'" Update: 11/12 21:31 GMT by Z : Corrected link. Additionally, the folks at Infinity Ward have now offered ex-EA Chicagoans the chance to work with them.
OS X

Leopard Early Adopters Suffer For The Rest of Us 461

News.com tallies up the minor annoyances early adopters have experienced dealing with the newest version of OS X. From a change in folder design to install issues, and beyond to lack of support for Java 6, Mac users have had more to grumble about than usual in the last week. Just the same, the article notes, there have been no major problems and (compared to other OS launches) Leopard kicked off fairly well. "Let's give thanks to the early adopters, however masochistic they may be. You can do all the QA in the world before releasing an operating system, and it's not going to compare to what happens when the unwashed masses get their hands on the product. Microsoft's Windows Vista had years of developer releases, and was released to manufacturing several weeks before it went on sale to the general public. Still, compatibility problems cropped up because it's extremely difficult to anticipate what people are running, and in what combination. It's easier for Apple because it tightly controls its hardware and software, and because there are fewer potential combinations in the wild, but it's still a Herculean task."
Book Reviews

GPU Gems 3 63

Martin Ecker writes "Weighing in at fifty pages short of a thousand, NVIDIA has recently released the third installment of its GPU Gems series, aptly titled "GPU Gems 3" published by Addison-Wesley Publishing. Just like the two previous books before it, GPU Gems 3 is a collection of articles by numerous authors from the game development industry, the offline rendering industry, academia, and of course NVIDIA. The 41 chapters of the book grouped into six parts discuss a wide range of topics, all dealing with recent advancements in using graphics processing units (GPUs, for short) to either render highly realistic images in real-time or do high-performance, parallel computation, an area that is called GPGPU (short for General Purpose computation on GPUs). In this latest installment of the series, the focus of a lot of the chapters is on using new hardware features of Direct3D 10-level hardware, such as NVIDIA's GeForce 8 series, to either get more realistic looking results or higher performance." Read on for the rest of Martin's review.

History of Slashdot Part 3- Going Corporate 126

When we last left off we were in early 1999- Slashdot had a small business behind it, known as Blockstackers Intergalactic. But we knew that we would need real infrastructure to handle the ever increasing traffic and needs of our readers as well as our employees. A number of suitors approached us with deal of varying sizes and shapes, and we settled on one nobody had never heard of: Andover. (As a reminder don't forget to get your charity bid up ... some items are still reasonably priced! But the EFF always needs cash!)
Security

Attacking Criminal Networks On the Internet 109

Hugh Pickens writes "Computer Scientists at Carnegie Mellon University are developing techniques to analyze and disrupt black markets on the internet, where criminals sell viruses, stolen data, and attack services estimated to total more than $37 million for the seven-month period they studied. To stem the flow of stolen credit cards and identity data, researchers have proposed two technical approaches to reducing the number of successful market transactions. One approach to disrupting the network is a slander attack where an attacker eliminates the verified status of a buyer or seller through false defamation. Another approach undercuts the cyber-crooks' network by creating a deceptive sales environment. 'Just like you need to verify that individuals are honest on E-bay, online criminals need to verify that they are dealing with "honest" criminals,' says Jason Franklin, one of the researchers."

Rob Malda Answers Your Questions 221

Last week hundreds of you posted questions for Slashdot's CmdrTaco, AKA Rob Malda. Today we present his answers to 10 of the highest-moderated questions. CT: You can continue to sign up for 10 year anniversary parties but we're already working on shipping shirts so you won't be able to get a care package... but you can still try to run for the big grand prize by just taking videos of pictures or just doing something cool at your parties to prove that we should have been there.

Microsoft No Longer a 'Laughingstock' of Security? 282

Toreo asesino writes "In a Q&A with Scott Charney, the vice president of Trustworthy Computing at Microsoft, Charney suggests that security in Microsoft products has moved on from being the 'laughing stock' of the IT industry to something more respectable. He largely attributes this to the new Security Development Lifecycle implemented in development practices nearly six years ago. 'The challenge is really quite often in dealing with unrealistic expectations. We still have vulnerabilities in our code, and we'll never reduce them to zero. So sometimes we will have a vulnerability and people say to me, "So the [Security Development Lifecycle (SDL)] is a failure right?" No it isn't. It was our aspirational goal that the SDL will get rid of every bug.'"
Hardware Hacking

Jobs' Next Fight — Dealing With iPhone Hackers 341

An anonymous reader writes "With Steve Jobs' recent announcement of his intention to fight off the independent iPhone developers, the question worth asking is: How will Apple try to defeat the hackers: Software updates, or lawsuits? Will Apple risk losing its most frequently (ab)used legal tool, the Digital Millennium Copyright Act, in order to try and punish the developers of the iPhone unlocking tools? This CNET article explores the legal issues involved in this, which make it perfectly legal to reverse engineer your own iPhone, but illegal to share your circumventing source code with others."

BioShock Review 439

BioShock, the moody drama-driven FPS for the Xbox 360 and PC, was released last month to rave reviews from the major gaming news sites. Since then the internet has been ablaze with outcry about the game's high rating scores. It's hard to understand why. The work of Ken Levine and Irrational Games on the spiritual successor to System Shock 2 is sublime. It's incredibly atmospheric, the game's story is well written and compellingly told, and the first-person shooter gameplay is a respectable, tightly crafted experience. It's a really, really good game. I'll tell you now: it's a 5/5. So why all the angst? Why the backlash? Read on for my review of BioShock, and a few comments on the dangers of 'merely' being a good game.
Role Playing (Games)

Protecting Final Fantasy XI From the Gil-Sellers 116

At GDC Austin, the technical keynote for Thursday focused in on the challenging task of developing the online game Final Fantasy XI. We were treated to a broad but vaguely technical discussion from Hiromichi Tanaka, the producer of the half-a-million strong game world. He was joined by Sage Sundi, the global producer of the game, who gave a fascinating discussion about Square/Enix's battle against real money traders. Their successes have been hard-fought, and are illustrative of the problems facing anyone running one of these games. Read on for notes from the event.
Book Reviews

Programming Erlang 314

gnalre writes "Every day it seems there is a new publication of a book on perl/python/ruby. Some languages however do not seem to get that sort of attention. One of those under-represented languages is Erlang, however for the first time in 10 years a new Erlang book has been published. As someone who had a brief flirtation with Erlang long ago, I was interested to see how the language had evolved in the intervening decade. I was also curious to re-evaluate Erlang to see what solutions it offered to the present day issues of writing reliable distributed applications." Read on for the rest of Tony's review.

PAX 2007 In A Nutshell 50

Last weekend the dark horde of nerddom descended on Seattle, entering the heart of the 'Emerald City' to gorge itself on the music, culture, and humor of gaming. The Penny Arcade Expo (PAX) once again brought together fans of the influential webcomic for a festival that, without even trying, seems to be taking the place of old E3. Though they were expecting around 30,000 people, the word was that by early Sunday they'd already gone through some 40,000 badges. There were DSes everywhere, concerts at night, a packed exhibit hall, and benchmark comic strips created by Mike Krahulik and Jerry Holkins adorned almost every wall. Despite all the people and the noise, somehow the event had a community feel to it that was hard to understand ... and even harder to describe. I'll try, though, along with impressions from games on the show floor and the incredible music of folks like Jonathan Coulton and the Minibosses. Read on, and All Hail Ball.
Databases

Learning High-Availability Server-Side Development? 207

fmoidu writes "I am a developer for a mid-size company, and I work primarily on internal applications. The users of our apps are business professionals who are forced to use them, so they are are more tolerant of access times being a second or two slower than they could be. Our apps' total potential user base is about 60,000 people, although we normally experience only 60-90 concurrent users during peak usage. The type of work being done is generally straightforward reads or updates that typically hit two or three DB tables per transaction. So this isn't a complicated site and the usage is pretty low. The types of problems we address are typically related to maintainability and dealing with fickle users. From what I have read in industry papers and from conversations with friends, the apps I have worked on just don't address scaling issues. Our maximum load during typical usage is far below the maximum potential load of the system, so we never spend time considering what would happen when there is an extreme load on the system. What papers or projects are available for an engineer who wants to learn to work in a high-availability environment but isn't in one?"
Book Reviews

Network Warrior 228

Fatty writes "Entry level certifications such as the Cisco Certified Network Associate (CCNA) have become the source of many jokes to people in the industry, largely because of the seemingly inept people that proudly display their certifications. This is made worse by the volume of books geared only to get people through the exam. Network Warrior bills itself as the exact opposite — if the subtitle is to be believed it contains "Everything You Need to Know That Wasn't on the CCNA Exam". With everything from the architecture of the 6500 to layers 8 and 9 of the OSI model (politics and money), it does a pretty good job." Read below for the rest of Sean's views on this book.
Security

Forbes Offers a Sympathetic Portrayal of Hackers 97

selain03 sends us to Forbes for a surprisingly tolerant article on the recent Defcon. The reporter spoke to several of the event organizers and faithfully conveyed their characterization of the community as motivated by curiosity about technology. The article quotes a Department of Defense cybercrime guy: "Run-of-the-mill individual hackers are just noise as we try to focus on the real problem. We have to investigate every threat, but we're often dealing with ankle biters." A refreshing perspective to read in the mainstream media.
Book Reviews

The Design of Sites, Second Edition 43

Joe Kauzlarich writes "The 'pattern' book has become a familiar genre for frequent readers of technical manuals. The idea is to sift through mountains of architectural or design schemes and then to categorize and catalogue the most frequent ideas and present their strengths and weaknesses. This type of book has been a success in software engineering, but can it translate to website design, where designers have everyday and frequent access to other designs? At worst, these books provide a common industry vocabulary (assuming it was read by everyone in the industry). How many people knew what a factory method referred to before Erich Gamma's Design Patterns was released? At best, as in the case of that 'original' software design patterns book, mountains of complex ideas are archived into a single reference and will sit within arm's reach for the rest of your life. So, is the web design discipline full of patterns that evade common sense?" Read below for the rest of Joe's review.
The Internet

The Real Problem With Alexa 372

Alexa drives me nuts. It uses a broken methodology to measure the internet and is, for reasons unclear to anyone, regarded as somehow definitive simply because it allows you to compare two sites with a single simple number. Its sampling methodology is flawed and the numbers it produces are meaningless. And if you want to help me prove this, please install their toolbar. Of course since most of you are Slashdot readers, most of you won't and that only helps prove my point. Read on for what I mean by all of this, and why it matters.
Microsoft

Mandriva Says No to Microsoft Linux Deal 150

Kurtz'sKompund writes "French Linux vendor Mandriva said no to dealing with Microsoft on open source patents. They're the third Linux vendor in a week to do so, joining Red Hat and Ubuntu in the 'against' column. TechWorld reports that Mandriva's CEO echoed statements from other open source leaders, saying essentially 'we don't need to pay protection money to do our job.' From the article: 'Jonathan Eunice, an analyst at Illuminata, said Microsoft's deals with Xandros and Linspire don't have the same impact as they would if they had been made with a major Linux vendor such as Red Hat. "I think Microsoft is going to second-tier players, and they're cutting deals with them because they are softer targets," Eunice said.'"

Slashdot Top Deals