Andy Updegrove writes: "The U.K. Cabinet Office accomplished today what the Commonwealth of Massachusetts set out (unsuccessfully) to achieve ten years ago: it formally required compliance with the Open Document Format (ODF) by software to be purchased in the future across all government bodies. Compliance with any of the existing versions of OOXML, the competing document format championed by Microsoft, is neither required nor relevant. The announcement was made today by The Minister for the Cabinet Office, Francis Maude. Henceforth, ODF compliance will be required for documents intended to be shared or subject to collaboration. PDF/A or HTML compliance will be required for viewable government documents. The decision follows a long process that invited, and received, very extensive public input – over 500 comments in all."
#NetNeutrality is STILL in danger - Click here to help. DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Check out the new SourceForge HTML5 Internet speed test. ×
Dega704 sends this quote from Ars: No company has lobbied more fiercely against network neutrality than Verizon, which filed the lawsuit that overturned the FCC's rules prohibiting ISPs from blocking and discriminating against Web content. But the absence of net neutrality rules isn't just good for Verizon—it's also good for the blind, deaf, and disabled, Verizon claims. That's what Verizon lobbyists said in talks with congressional staffers, according to a Mother Jones report last month. "Three Hill sources tell Mother Jones that Verizon lobbyists have cited the needs of blind, deaf, and disabled people to try to convince congressional staffers and their bosses to get on board with the fast lane idea," the report said. With "fast lanes," Web services—including those designed for the blind, deaf, and disabled—could be prioritized in exchange for payment. Now, advocacy groups for deaf people have filed comments with the FCC saying they don't agree with Verizon's position."
An anonymous reader writes: Updates to the open-source libbluray, libaacs, and libbdplus libraries have improved the open-source Blu-ray disc support to now enable the Blu-ray Java interactivity layer (BD-J). The Blu-ray Java code is in turn executed by OpenJDK or the Oracle JDK and is working well enough to play a Blu-ray disc on the Raspberry Pi when paired with the VLC media player."
klapaucjusz writes: The EFF has released an experimental router firmware designed make it easy to deploy open (password-less) access points in a secure manner. The EFF's firmware is based on the CeroWRT fork of OpenWRT, but appears to remove some of its more advanced routing features. The EFF is asking for help to further develop the firmware. They want the open access point to co-exist on the same router as your typical private and secured access point. They want the owner to be able to share bandwidth, but with a cap, so guests don't degrade service for the owner. They're also looking to develop a network queueing, a minimalist web UI, and an auto-update mechanism. The EFF has also released the beta version of a plug-in called Privacy Badger for Firefox and Chrome that will prevent online advertisers from tracking you.
alphadogg writes A presentation on a low-budget method to unmask users of a popular online privacy tool Tor will no longer go ahead at the Black Hat security conference early next month. The talk was nixed by the legal counsel with Carnegie Mellon's Software Engineering Institute after a finding that materials from researcher Alexander Volynkin were not approved for public release, according to a notice on the conference's website. Tor project leader Roger Dingledine said, "I think I have a handle on what they did, and how to fix it. ... Based on our current plans, we'll be putting out a fix that relays can apply that should close the particular bug they found. The bug is a nice bug, but it isn't the end of the world." Tor's developers were "informally" shown materials about the bug, but never saw any details about what would be presented in the talk.
An anonymous reader writes: Brianna Wu, leader of a game development studio, has an article exposing the constant harassment of women in the games industry. She says, "I'm not writing this piece to evoke your sympathy. I'm writing to share with you what prominent, successful women in the industry experience, in their own words." She goes through the individual stories of several women targeted by this vitriol, and tries to figure out why it happens. Quoting: "We live in a society that's sexist in ways it doesn't understand. One of the consequences is that men are extremely sensitive to being criticized by women. ... This is why women are socialized to carefully dance around these issues, disagreeing with men in an extremely gentle manner. Not because women are nicer creatures than men. But because our very survival can depend on it. ... Growing a thicker skin isn't the answer, nor is it a proper response. Listening, and making the industry safer for the existence of visible women is the best, and only, way forward."
mrspoonsi sends word that researchers from Temple University have managed to eliminate the HIV-1 virus from human cells for the first time. "When deployed, a combination of a DNA-snipping enzyme called a nuclease and a targeting strand of RNA called a guide RNA (gRNA) hunt down the viral genome and excise the HIV-1 DNA (abstract). From there, the cell's gene repair machinery takes over, soldering the loose ends of the genome back together – resulting in virus-free cells." While antiretroviral therapy can treat people who are infected with HIV, the immune system is incapable of actually removing the virus, so this is an important step in fighting it. The researchers still have to overcome the problem of delivering the the genetic "toolkit" to each affected cell in a patient's body, and also HIV's high mutation rate.
An anonymous reader writes: With the Little Box Challenge, Google (and IEEE, and a few other sponsors like Cree and Rohm) is offering a $1 million prize to the team which can "design and build a kW-scale power inverter with the highest power density (at least 50 Watts per cubic inch)." Going from cooler-sized to tablet sized, they say, would make a whole lot of things better, and the prize is reserved for the best performing entrant. "Our testing philosophy is to not look inside the box. You provide us with a box that has 5 wires coming out of it: two DC inputs, two AC outputs and grounding connection and we only monitor what goes into and comes out of those wires, along with the temperature of the outside of your box, over the course of 100 hours of testing. The inverter will be operating in an islanded more—that is, not tied or synced to an external grid. The loads will be dynamically changing throughout the course of the testing, similar to what you may expect to see in a residential setting." The application must be filled out in English, but any serious applicants can sign up "regardless of approach suggested or team background." Registration runs through September.
An anonymous reader writes Mozilla has released version 31 of its Firefox web browser for desktops and Android devices. According to the release notes, major new features include malware blocking for file downloads, automatic handling of PDF and OGG files if no other software is available to do so, and a new certificate verification library. Smaller features include a search field on the new tab page, better support for parental controls, and partial implementation of the OpenType MATH table. Firefox 31 is also loaded with new features for developers. Mozilla also took the opportunity to note the launch of a new game, Dungeon Defenders Eternity, which will run at near-native speeds on the web using asm.js, WebGL, and Web Audio. "We're pleased to see more developers using asm.js to distribute and now monetize their plug-in free games on the Web as it strengthens support for Mozilla's vision of a high performance, plugin-free Web."
MarkITx, a company that brokers used commercial IT gear. This gives him an excellent overview of the marketplace -- not just what companies are willing to buy used, but also what they want to sell as they buy new (or newer) equipment. Ben's main talking point in this interview is that hardware has become so commoditized that in a world where most enterprise software can be virtualized to run across multiple servers, it no longer matters if you have the latest hardware technology; that two older servers can often do the job of one new one -- and for less money, too. So, he says, you should make sure you buy new hardware only when necessary, not just because of the "Ooh... shiny!" factor" (Alternate Video Link)
Lasrick writes: MIT's Jeanne Guillemin looks at the recent blunders with smallpox and H5N1 at the Centers for Disease Control and the National Institutes of Health to chronicle the fascinating history of smallpox eradication efforts and the attempts (thwarted by Western scientists) to destroy lab collections of the virus in order to make it truly extinct. "In 1986, with no new smallpox cases reported, the World Health Assembly, the decision-making body of the WHO, resolved to destroy the strain collections and make the virus extinct. But there was resistance to this; American scientists in particular wanted to continue their research." Within a few years, secret biological warfare programs were discovered in Moscow and in Iraq, and a new flurry of defensive research was funded. Nevertheless, Guillemin and others believe that changes in research methods, which no longer require the use of live viruses, mean that stocks of the live smallpox virus can and should finally be destroyed.
rjmarvin writes: Microsoft Research is testing a new method for predicting errors and bugs while developers write code: biometrics. By measuring a developer's eye movements, physical and mental characteristics as they code, the researchers tracked alertness and stress levels to predict the difficulty of a given task with respect to the coder's abilities. In a paper entitled "Using Psycho-Physiological Measures to Assess Task Difficulty in Software Development," the researchers summarized how they strapped an eye tracker, an electrodermal sensor and an EEG sensor to 15 developers as they programmed for various tasks. Biometrics predicted task difficulty for a new developer 64.99% of the time. For a subsequent tasks with the same developer, the researchers found biometrics to be 84.38% accurate. They suggest using the information to mark places in code that developers find particularly difficult, and then reviewing or refactoring those sections later.
nk497 (1345219) writes "Broadband customers are overwhelmingly choosing not to use parental-control systems foisted on ISPs by the government — with takeup in the single-digits for three of the four major broadband providers. Last year, the government pushed ISPs to roll out network-level filters, forcing new customers to make an "active" decision about whether they want to use them or not. Only 5% of new BT customers signed up, 8% opted in for Sky and 4% for Virgin Media. TalkTalk rolled out a parental-control system two years before the government required it and has a much better takeup, with 36% of customers signing up for it. The report, from regulator Ofcom, didn't bother to judge if the filters actually work, however."
New submitter rongten (756490) writes I am managing a computer lab composed of various kinds of Linux workstations, from small desktops to powerful workstations with plenty of RAM and cores. The users' $HOME is NFS mounted, and they either access via console (no user switch allowed), ssh or x2go. In the past, the powerful workstations were reserved to certain power users, but now even "regular" students may need to have access to high memory machines for some tasks. Is there a sort of resource management that would allow the following tasks? To forbid a same user to log graphically more than once (like UserLock); to limit the amount of ssh sessions (i.e. no user using distcc and spamming the rest of the machines, or even worse, running in parallel); to give priority to the console user (i.e. automatically renicing remote users jobs and restricting their memory usage); and to avoid swapping and waiting (i.e. all the users trying to log into the latest and greatest machine, so have a limited amount of logins proportional to the capacity of the machine). The system being put in place uses Fedora 20, and LDAP PAM authentication; it is Puppet-managed, and NFS based. In the past I tried to achieve similar functionality via cron jobs, login scripts, ssh and nx management, and queuing system — but it is not an elegant solution, and it is hacked a lot. Since I think these requirements should be pretty standard for a computer lab, I am surprised to see that I cannot find something already written for it. Do you know of a similar system, preferably open source? A commercial solution could be acceptable as well.
New submitter I Ate A Candle (3762149) writes Tails OS, the Tor-reliant privacy-focused operating system made famous by Edward Snowden, contains a number of zero-day vulnerabilities that could be used to take control of the OS and execute code remotely. At least that's according to zero-day exploit seller Exodus Intelligence, which counts DARPA amongst its customer base. The company plans to tell the Tails team about the issues "in due time", said Aaron Portnoy, co-founder and vice president of Exodus, but it isn't giving any information on a disclosure timeline. This means users of Tails are in danger of being de-anonymised. Even version 1.1, which hit public release today (22 July 2014), is affected. Snowden famously used Tails to manage the NSA files. The OS can be held on a USB stick and leaves no trace once removed from the drive. It uses the Tor network to avoid identification of the user, but such protections may be undone by the zero-day exploits Exodus holds.
Nom du Keyboard writes: After seeing a drop in my DVD service from Netflix I got a customer service representative tonight to confirm that Netflix has ceased processing DVD returns on Saturdays nationwide. And that they did this without notifying their customers, or reducing prices to compensate for the reduced service. Given that the DVD selection still far outstrips their streaming selection, this may be news to others like myself who don't find streaming an adequate replacement for plastic discs. My experience up until recently, unlike Netflix's promise of a 1-3 day turnaround at their end which gives them lots of wiggle room to degrade service even further, had been of mailing in a DVD on day one, having them receive it and mail out my next selection on day two, and receiving it on day three. Now with them only working 5 days and many U.S. Post Office holidays, they're still getting the same money for significantly less. The Netflix shipping FAQ confirms the change, and a spokesperson said, "Saturdays have been low volume ship days for us."
MojoKid (1002251) writes NVIDIA just officially announced the SHIELD Tablet (powered by their Tegra K1 SoC) and SHIELD wireless controller. As the SHIELD branding implies, the new SHIELD tablet and wireless controller builds upon the previously-released, Android-based SHIELD portable to bring a gaming-oriented tablet to consumers. The SHIELD Tablet and wireless controller are somewhat of mashup of the SHIELD portable and the Tegra Note 7, but featuring updated technology and better build materials. You could think of the SHIELD Tablet and wireless controller as an upgraded SHIELD portable gaming device, with the screen de-coupled from the controller. The device features NVIDIA's Tegra K1 SoC, paired to 2GB of RAM and an 8", full-HD IPS display, with a native resolution of 1920x1200. There are also a pair of 5MP cameras on the SHIELD Tablet (front and rear), 802.11a/b/g/n 2x2 MIMO WiFi configuration, GPS, a 9-axis motion sensor, and Bluetooth 4.0 LE. In addition to the WiFi-only version (which features 16GB of internal storage), NVIDIA has a 32GB version coming with LTE connectivity as well. NVIDIA will begin taking pre-orders for the SHIELD Tablet and wireless controller immediately.
alphadogg (971356) writes "In its quest to help enterprises seek out and neutralize all threats to their Wi-Fi networks, AirMagnet is now looking to the skies. In a free software update to its AirMagnet Enterprise product last week, the Wi-Fi security division of Fluke Networks added code specifically crafted to detect the Parrot AR Drone, a popular unmanned aerial vehicle that costs a few hundred dollars and can be controlled using a smartphone or tablet. Drones themselves don't pose any special threat to Wi-Fi networks, and AirMagnet isn't issuing air pistols to its customers to shoot them down. The reason the craft are dangerous is that they can be modified to act as rogue access points and sent into range of a victim's wireless network, potentially breaking into a network to steal data."
rtoz (2530056) writes Researchers at MIT have developed a new spongelike material structure which can use 85% of incoming solar energy for converting water into steam. This spongelike structure has a layer of graphite flakes and an underlying carbon foam. This structure has many small pores. It can float on the water, and it will act as an insulator for preventing heat from escaping to the underlying liquid. As sunlight hits the structure, it creates a hotspot in the graphite layer, generating a pressure gradient that draws water up through the carbon foam. As water seeps into the graphite layer, the heat concentrated in the graphite turns the water into steam. This structure works much like a sponge. It is a significant improvement over recent approaches to solar-powered steam generation. And, this setup loses very little heat in the process, and can produce steam at relatively low solar intensity. If scaled up, this setup will not require complex, costly systems to highly concentrate sunlight.
New submitter Tmackiller writes with an excerpt from VG247.com: The British government has decriminalised online video game, music and movie piracy, scrapping fuller punishment plans after branding them unworkable. Starting in 2015, persistent file-sharers will be sent four warning letters explaining their actions are illegal, but if the notes are ignored no further action will be taken. The scheme, named the Voluntary Copyright Alert Programme (VCAP), is the result of years of talks between ISPs, British politicians and the movie and music industries. The UK's biggest providers – BT, TalkTalk, Virgin and Sky – have all signed up to VCAP, and smaller ISPs are expected to follow suit. VCAP replaces planned anti-piracy measures that included cutting users' internet connections and creating a database of file-sharers. Geoff Taylor, chief executive of music trade body the BPI, said VCAP was about "persuading the persuadable, such as parents who do not know what is going on with their net connection." He added: "VCAP is not about denying access to the internet. It's about changing attitudes and raising awareness so people can make the right choice." Officials will still work to close and stem funding to file-sharing sites, but the news appears to mean that the British authorities have abandoned legal enforcement of online media piracy. Figures recently published by Ofcom said that nearly a quarter of all UK downloads were of pirated content." Tmackiller wants to know "Will this result in more private lawsuits against file sharers by the companies involved?"
New submitter bnortman (922608) was the first to write in with word of "a new research paper discussing a new form of user fingerprinting and tracking for the web using the HTML 5 <canvas> ." globaljustin adds more from an article at Pro Publica: Canvas fingerprinting works by instructing the visitor's Web browser to draw a hidden image. Because each computer draws the image slightly differently, the images can be used to assign each user's device a number that uniquely identifies it. ... The researchers found canvas fingerprinting computer code ... on 5 percent of the top 100,000 websites. Most of the code was on websites that use the AddThis social media sharing tools. Other fingerprinters include the German digital marketer Ligatus and the Canadian dating site Plentyoffish. ... Rich Harris, chief executive of AddThis, said that the company began testing canvas fingerprinting earlier this year as a possible way to replace cookies ...
M-Saunders (706738) writes The death of print has been predicted for years, and many magazines and publishers have taken a big hit with the rise of eBooks and tablets. But not everyone has given up. Four geeks quit their job at an old Linux magazine to start Linux Voice, an independent GNU/Linux print and digital mag with a different publishing model: giving profits and content back to the community. Six months after a successful crowdfunding campaign, the magazine is going well, so here is the full story.
An anonymous reader writes The Economist reports, "'UNDER capitalism', ran the old Soviet-era joke, 'man exploits man. Under communism it is just the opposite.' In fact new research suggests that the Soviet system inspired not just sarcasm but cheating too: in East Germany, at least, communism appears to have inculcated moral laxity. Lars Hornuf of the University of Munich and Dan Ariely, Ximena García-Rada and Heather Mann of Duke University ran an experiment last year to test Germans' willingness to lie for personal gain. Some 250 Berliners were randomly selected to take part in a game where they could win up to €6 ($8). ... The authors found that, on average, those who had East German roots cheated twice as much as those who had grown up in West Germany under capitalism. They also looked at how much time people had spent in East Germany before the fall of the Berlin Wall. The longer the participants had been exposed to socialism, the greater the likelihood that they would claim improbable numbers ... when it comes to ethics, a capitalist upbringing appears to trump a socialist one."