×
United States

The IRS vs. Open Source 356

simonstl writes "The IRS wasn't after just the Tea Party, Progressives, or Medical Marijuana: Open Source Software was a regular on IRS watch lists from 2010 to 2012. Did they think it was a for-profit scam, or did they just not understand the approach?"
Google

Is Google Voice Doomed To Be 2nd-Class Messaging System? 172

itwbennett writes "There's a lot to like about Google Voice, including 'voicemail transcriptions, the ability to send and receive unlimited text messages by phone or website, and recording incoming calls,' says Voice convert Kevin Purdy. But when it comes to app integration, Voice is falling short — even on Android phones: 'Most apps that do neat things with incoming texts, like read them out loud when you're driving, can't work with Voice. Tasker, a crazy, nerdy automation tool that can do things like turn your volume up when you get a text from your wife, can't work with Voice.... Online services that text you to verify or remind you are about 50/50.' Google employee Nikhyl Singhal wrote in a Google+ post that 'Hangouts is designed to be the future of Google Voice.' But what Voice users like Purdy are looking for is some sort of 'assurance that Google Voice can work just like any other text messaging system.'"
Australia

Ask Slashdot: Can I Cross US Borders With Legally Ripped Media? 285

First time accepted submitter ozspeed writes "I live in Australia where I've been enjoying the luxury of taking legally purchased music and film and ripping them for my personal enjoyment on my digital media devices; all legal and above board in my country. I'm about to move to the U.S. for a few years and wondered if I would get into trouble if I tried to bring them across the border with me. Any Slashdot been in a similar position, or have a good view of the law on this?" The U.S. has claimed broad data-snooping rights at the border (though some common sense may have broken out, too), but I've never heard of anyone hassled for this reason; have you?
China

Chinese Media Calls For Boycott of Cisco 216

An anonymous reader writes "China's state-run media is calling on the country's wireless carriers to move away from Cisco products. According to reports, using Cisco products allows the U.S. to 'attack China almost at will,' and forms a 'terrible security threat.' Chinese officials are urging the companies' wireless carriers to switch to hardware made by Huawei and ZTE Corp. Citing cybersecurity concerns, the United States has banned the use of equipment from both Huawei and ZTE in its cellular networks. Cisco has not yet been named in documents describing the NSA's global wiretapping operations. Apple, a company named in leaked documents, has slashed iPhone production for the second half of this year on falling overseas sales."
Books

Science Fiction and Fantasy Author Richard Matheson Dead At 87 57

New submitter no bloody nickname writes "The BBC reports that well-known U.S. author Richard Matheson has passed away. He was 87 years old. Mathesons prolific career lasted for more than 60 years and his works include the novels Hell House, The Shrinking Man, A Stir of Echoes, and I am legend. Matheson also wrote for television and cinema. Among the screenplays he wrote were the Spielberg movie Duel as well as multiple episodes of The Twilight Zone. Several of his novels have also been adapted into movies. In the case of I Am Legend this was done not just once but three times. Matheson continued to write books until recently and his most recently published book Generations was released in 2012." Adds reader Dave Knott: "Richard Matheson was a recipient of lifetime achievement recognition in both fantasy (World Fantasy Awards, 1984) and horror (Bram Stoker Awards, 1991), and was inducted into the Science Fiction Hall of Fame in 2010. Matheson passed away on Sunday at his home in Los Angeles."
IBM

Perspectives On the Latest IBM Layoffs 135

An anonymous reader writes "After IBM reported disappointing Q1 earnings in March, to nobody's surprise, layoffs (RAs or 'Resource Actions' in IBM parlance) were announced two months later; June 12 seemed to be when most of the pink slips were handed out. While this is hardly a novel occurrence at IBM, this time the RA'd employee water cooler page is now open for everyone's inspection, and Cringely let loose with some predictable I-told-you-so's about financially oriented IBM senior management. Dan Burger at IT Jungle has a more numbers-oriented take on the latest round of layoffs."
EU

No "Right To Be Forgotten," Says EU Advocate General 116

DW100 writes "A ruling this morning from the European Court of Justice has said that Google does not have to delete personal data from its search index, in a case that could have huge ramifications for web privacy and the so-called 'right to be forgotten.'" From the article: EU Advocate General Niilo Jääskinen "said Google and other search engines are not subject to privacy requirements under current European data protection law. 'Search engine service providers are not responsible, on the basis of the Data Protection Directive, for personal data appearing on web pages they process,' he said in his official ruling, published by the court. He went on to explain that based on current laws citizens do not have a right to be removed from search indexes within the framework of the Data Protection Directive. 'The Directive does not establish a general "right to be forgotten." Such a right cannot therefore be invoked against search engine service providers on the basis of the Directive,' he said."
Advertising

Microsoft Pushing Bing For Search In Schools, With Ad-Removal Hook 158

rujholla writes "Microsoft has been trying to push Apple's iPad aside in favor of Surface tablets in schools, and now the Windows giant is looking to take on Google when it comes to search for students. Microsoft is including features such as allowing K-12 schools to remove advertisements from search results and enhanced privacy controls. Is this enough to beat the Google search quality edge? Or does that edge even still exist?"
Privacy

US Senators: NSA Lies In Fact Sheets 295

Bruce66423 writes "The Guardian reports that two U.S. senators have written to the NSA telling it to amend its 702 provisions fact sheet (PDF) which, they claim, contains inaccuracies. However they can't actually say HOW they are inaccurate, because they would be compromising classified information. So the U.S. government uses taxpayer money to lie to the people... there's a surprise!" From the letter: "In our judgment, this inaccuracy is significant, as it portrays protections for Americans' privacy as being significantly stronger than they actually are." But they go on to say "We appreciate your attention to this matter. We believe that the U.S. government should have broad authorities to investigate terrorism and espionage, and that it is possible to aggressively pursue terrorists without compromising the constitutional rights of ordinary Americans. Achieving this goal depends not just on secret courts and secret congressional hearings, but on informed public debate as well."
Patents

Patents Vs Innovation - the Tabarrok Curve 210

New submitter Optimal Cynic writes "Slashdot likes to argue about intellectual property and patents, and it's clear that both extremes are undesirable. Dr Alex Tabarrok has tackled the question — what is the right level of patent protection? His answer is the Tabarrok Curve, which applies the Laffer Curve methodology to innovation."
Space

Mining the Heavens: In Conversation With Planetary Resources' Chief Engineer 80

cylonlover writes "It wasn't long ago that asteroid mining was only found in the pages of science fiction. Now, with increasing interest in the commercial exploitation of space, companies are springing up to turn asteroids from things that Bruce Willis blows up into raw materials for future travellers and colonists. One such firm is Planetary Resources, which is currently winding up a Kick Starter campaign aimed at raising public awareness about asteroid mining by offering the public access to a space telescope. Gizmag visits the company's Bellevue, Washington headquarters and talks to the President and Chief Engineer, Chris Lewicki." Long, but worth the time.
Security

New EU Rules Require ISPs, Telcos To Come Clean Within 24 Hours of Data Breaches 70

hypnosec writes "Under new EU regulations ISPs and Telcos serving European customers will have to come clean within 24 hours in case of a security or data breach that leads to theft, loss, or compromise of data. Companies will have to disclose the nature and size of the breach within the first 24 hours. Whenever it's not possible to submit such data, they must provide 'initial information' within the stipulated time and full details within three days. Under the new terms the affected organizations will be required to reveal information such as information that has been compromised and the steps that have been taken or will be taken to resolve the situation. If the breach 'is likely to adversely affect' personal information or privacy, affected businesses and consumers will be notified of the breach."
Hardware

Quantum-Tunneling Electrons Could Make Semiconductors Obsolete 276

Nerval's Lobster writes "The powerful, reliable combination of transistors and semiconductors in computer processors could give way to systems built on the way electrons misbehave, all of it contained in circuits that warp even the most basic rules of physics. Rather than relying on a predictable flow of electrons that appear to know whether they are particles or waves, the new approach depends on quantum tunneling, in which electrons given the right incentive can travel faster than light, appear to arrive at a new location before having left the old one, and pass straight through barriers that should be able to hold them back. Quantum tunneling is one of a series of quantum-mechanics-related techniques being developed as possible replacements for transistors embedded in semiconducting materials such as silicon. Unlike traditional transistors, circuits built by creating pathways for electrons to travel across a bed of nanotubes are not limited by any size restriction relevant to current manufacturing methods, require far less power than even the tiniest transistors, and do not give off heat or leak electricity as waste products, according to Yoke Khin Yap of Michigan Technological University, lead author of a paper describing the technique, which was published in the journal Advanced Materials last week."
Hardware Hacking

Whistled Platform Upgraded With Word Recognition 30

An anonymous reader writes "A few weeks ago, Slashdot featured a cheap platform performing 80FFTs per second to recognize whistles. The platform is open hardware/open source and is aimed for sound processing projects. To this goal, the creator (limpkin) just implemented a simple proof of concept algorithm that will control your lighting once the platform listens to a particular word. A small video has been made to explain the basic concepts of sound recognition to encourage hobbyist to make their own."
X

Xfce, LXDE, GNOME3 Desktops Running On Ubuntu Mir Via XMir 162

An anonymous reader writes "Through the use of XMir, a translation layer for running legacy X11 applications atop Ubuntu's forthcoming Mir display server, the GNOME Shell, Xfce, and LXDE desktops now run on this X.Org Server alternative. With XMir, the traditional window managers are still running while Mir treats these desktops as a single window."

Slashdot Top Deals