Businesses

Snapchat Blames AI As It Cuts 1,000 Jobs 26

Snap is laying off about 1,000 employees, or 16% of its workforce, while closing 300 open roles as it tries to cut costs and push toward profitability with more AI-driven efficiency. "While these changes are necessary to realize Snap's long-term potential, we believe that rapid advancements in artificial intelligence enable our teams to reduce repetitive work, increase velocity, and better support our community, partners, and advertisers," CEO Evan Spiegel wrote in a memo, which was included in the company's 8-K filing (PDF). "We have already witnessed small squads leveraging AI tools to drive meaningful progress across several important initiatives." The Verge reports: The changes are expected to save Snap $500 million by the second half of 2026. Snap had about 5,261 full-time employees as of December 2025, and now joins the growing list of tech companies that have already announced significant layoffs this year, including Meta, Amazon, Oracle, GoPro, and Jack Dorsey's Block.

"Last fall, I described Snap as facing a crucible moment, requiring a new way of working that is faster and more efficient, while pivoting towards profitable growth," Spiegel wrote. "Over the past several months, we have carefully reviewed the work required to best serve our community and partners, and made tough choices to prioritize the investments we believe are most likely to create long-term value."
AI

FDA To Use AI In Drug Approvals To 'Radically Increase Efficiency' 118

The FDA plans to use AI to "radically increase efficiency" in deciding whether to approve new drugs and devices, drawing on lessons from Operation Warp Speed to reduce review times to weeks. The plan was laid out in an article published Tuesday in JAMA. The New York Times reports: Another initiative involves a review of chemicals and other "concerning ingredients" that appear in U.S. food but not in the food of other developed nations. And officials want to speed up the final stages of making a drug or medical device approval decision to mere weeks, citing the success of Operation Warp Speed during the Covid pandemic when workers raced to curb a spiraling death count. [...]

Last week, the agency introduced Elsa, an artificial intelligence large-language model similar to ChatGPT. The FDA said it could be used to prioritize which food or drug facilities to inspect, to describe side effects in drug safety summaries and to perform other basic product-review tasks. The FDA officials wrote that A.I. held the promise to "radically increase efficiency" in examining as many as 500,000 pages submitted for approval decisions.

Current and former health officials said the A.I. tool was helpful but far from transformative. For one, the model limits the number of characters that can be reviewed, meaning it is unable to do some rote data analysis tasks. Its results must be checked carefully, so far saving little time. Staff members said that the model was hallucinating, or producing false information. Employees can ask the Elsa model to summarize text or act as an expert in a particular field of medicine.
Earth

Ski Resorts Battle For a Future as Snow Declines in Climate Crisis (theguardian.com) 255

After promising early dumps of snow in some areas of Europe this autumn, the pattern of recent years resumed and rain and sleet took over. From a report: In the ski resorts of Morzine and Les Gets in the French Alps, the heavy rainfall meant that full opening of resorts was delayed until two days before Christmas, leaving the industry and the millions of tourists planning trips to stare at the sky in hope. But no amount of wishing and hoping will overcome what is an existential threat to skiing in the Alps, an industry worth $30bn that provides the most popular ski destination in the world.

The science is clear, and is spelled out in carefully weighed-up peer reviewed reports. The most recent, this year, warned that at 2C of global heating above pre-industrial levels, 53% of the 28 European resorts examined would be at very high risk of a scarce amount of snow. Scarce snow has been defined as the poorest coverage seen on average every five years between 1961 and 1990. If the world were to hit 4C of heating, 98% of the resorts would be at very high risk of scarce snow cover. Another study has revealed the way in which snow cover in the Alps has had an "unprecedented" decline over the past 600 years, with the duration of the cover now shorter by 36 days.

EU

Python Foundation Raises Concerns Over EU's Proposed Cybersecurity Rules (theregister.com) 40

The Python Software Foundation is "concerned that proposed EU cybersecurity laws will leave open source organizations and individuals unfairly liable for distributing incorrect code," according to the Register. The PSF reviewed the EU's proposed "Cyber Resilience Act" and "Product Liability Act" and reports "issues that put the mission of our organization and the health of the open-source software community at risk."

From the Register's report: "If the proposed law is enforced as currently written, the authors of open-source components might bear legal and financial responsibility for the way their components are applied in someone else's commercial product," the PSF said in a statement shared on Tuesday by executive director Deb Nicholson. "The existing language makes no differentiation between independent authors who have never been paid for the supply of software and corporate tech behemoths selling products in exchange for payments from end-users...."

The PSF argues the EU lawmakers should provide clear exemptions for public software repositories that serve the public good and for organizations and developers hosting packages on public repositories. "We need it to be crystal clear who is on the hook for both the assurances and the accountability that software consumers deserve," the PSF concludes. The PSF is asking anyone who shares its concerns to convey that sentiment to an appropriate EU Member of Parliament by April 26, while amendments focused on protecting open source software are being considered.

Bradley Kuhn, policy fellow at the Software Freedom Conservancy, told The Register that the free and open source (FOSS) community should think carefully about the scope of the exemptions being sought. "I'm worried that many in FOSS are falling into a trap that for-profit companies have been trying to lay for us on this issue," he said. "While it seems on the surface that a blanket exception for FOSS would be a good thing for FOSS, in fact, this an attempt for companies to get the FOSS community to help them skirt their ordinary product liability. For profit companies that deploy FOSS should have the same obligations for security and certainty for their users as proprietary software companies do."

The article points out that numerous tech organizations are urging clarifications in the proposed regulations, including NLnet Labs and the Eclipse Foundation.
Biotech

Biotech Startup Says Mice Live Longer After Genetic Reprogramming (technologyreview.com) 30

An anonymous reader quotes a report from MIT Technology Review: A small biotech company claims it has used a technology called reprogramming to rejuvenate old mice and extend their lives, a result suggesting that one day older people could have their biological clocks turned back with an injection -- literally becoming younger. The life-extension claim in rodents, made by Rejuvenate Bio, a San Diego biotech company, appears in a preprint paper on the website BioRxiv and hasn't been peer reviewed.

Noah Davidsohn, chief scientific officer of Rejuvenate, says the company used gene therapy to add three powerful reprogramming genes to the bodies of mice that were equivalent in age to human 77-year-olds. After the treatment, their remaining life span was doubled, the company says. Treated mice lived another 18 weeks, on average, while control mice died in nine weeks. Overall, the treated mice lived about 7% longer. Although the increase in lifespan was modest, the company says the research provides a demonstration of age reversal in an animal. "This is a powerful technology, and here is the proof of concept," says Davidsohn. "I wanted to show that it's actually something we can do in our elderly population."

Scientists not connected to the company called the study an exciting landmark but cautioned that whole-body rejuvenation using gene therapy remains a poorly understood concept with huge risks. "It's a beautiful intellectual exercise, but I would shy away from doing anything remotely similar to a person," says Vittorio Sebastiano, a professor at Stanford University. One risk is that the powerful programming process can cause cancer. Such an effect is often seen in mice. Even so, the chance that reprogramming could be an elixir of youth has led to a research and investment boom. One company, Altos Labs, says it has raised over $3 billion.
"Far more information will be needed to learn exactly what changes the reprogramming genes cause in the mice, and researchers say other groups will need to repeat the experiment before they are convinced," adds the report.

"Sebastiano says the life-extension effect reported by Rejuvenate could be due to changes in a single organ or group of cells, rather than a general mouse-wide rejuvenation effect. Among other shortfalls in its research, Rejuvenate did not carefully document which and how many cells were changed by the genetic treatment."
NASA

'NASA's Plan To Make JWST Data Immediately Available Will Hurt Astronomy' 135

An anonymous reader shares an excerpt from an opinion piece in Scientific American, written by Jason Wright. Wright is a professor of astronomy and astrophysics at Pennsylvania State University, where he is director of the Penn State Extraterrestrial Intelligence Center. From the piece: In August the White House announced (PDF) that the results of all federally funded research should be freely accessible by the end of 2025. This will be a big change for scientists in many fields but ultimately a good move for the democratization of research. Under this new guidance, many peer-reviewed papers would be free for the world to read immediately upon publication rather than stuck behind expensive paywalls, and the data that underlay these papers would be fully available and properly archived for anyone who wanted to analyze them. As an astronomer, I'm pleased that our profession has been ahead of the curve on this, and most of the White House's recommendations are already standard in our field.

NASA, as a federal agency that funds and conducts research, is onboard with the idea of freely accessible data. But it has a plan that goes much further than the White House's and that is highly problematic. The agency currently gives a proprietary period to some scientists who use particular facilities, such as a 12-month period for the powerful James Webb Space Telescope (JWST), so that those scientists can gather and analyze data carefully without fear of their work being poached. NASA is looking to end this policy in its effort to make science more open-access. Losing this exclusivity would be really bad for astronomy and planetary science. Without a proprietary period, an astronomer with a brilliant insight might spend years developing it, months crafting a successful proposal to execute it, and precious hours of highly competitive JWST time to actually perform the observations -- only to have someone else scoop up the data from a public archive and publish the result. This is a reasonable concern -- such scooping has happened before.

Without a proprietary period during which the astronomers who proposed given observations have exclusive access to the data, those researchers will have to work very quickly in order to avoid being scooped. Receiving credit for discoveries is especially important for early-career astronomers looking to establish their credentials as they search for a permanent job. Under such time pressure, researchers will need to cut corners, such as skipping the checks and tests that define careful work. Such a sloppy approach will lead to hasty results and incorrect conclusions to the detriment of the entire field. It also can lead to the erosion of work-life boundaries, with astronomers working long hours, sacrificing their health and family time so their result gets out before the competition's. This is bad for the culture of science and disproportionately affects those with children or other time-consuming personal circumstances (such as being a student, a caretaker or a full-time college instructor while also performing research). Allowing researchers to properly benefit from their work is critical for making astronomy as fair and equitable as possible. [...]
"One potential alternative is to create a professional requirement that those who proposed an observation but have not published from it should be offered co-authorship on any paper that uses the data," suggests Wright, noting that it's "not currently the cultural norm in astronomy" and "comes with a whole host of complications."

"Another option is to change the standard for how credit is assigned for any observational work," adds Wright. "Astronomers could, for example, demand that any paper citing a result also cite the proposal that generated the enabling data. In this way, the proposal team could still accrue credit for its work, even if it wasn't the first to publish."

"In the end, though, such adjustments are secondary to the heart of the matter, which is that NASA's plan to eliminate the proprietary period for JWST data is bad for astronomy."
Security

How 1-Time Passcodes Became a Corporate Liability (krebsonsecurity.com) 53

Brian Krebs, reporting at Krebs on Security: In mid-June 2022, a flood of SMS phishing messages began targeting employees at commercial staffing firms that provide customer support and outsourcing to thousands of companies. The missives asked users to click a link and log in at a phishing page that mimicked their employer's Okta authentication page. Those who submitted credentials were then prompted to provide the one-time password needed for multi-factor authentication. The phishers behind this scheme used newly-registered domains that often included the name of the target company, and sent text messages urging employees to click on links to these domains to view information about a pending change in their work schedule.

The phishing sites leveraged a Telegram instant message bot to forward any submitted credentials in real-time, allowing the attackers to use the phished username, password and one-time code to log in as that employee at the real employer website. But because of the way the bot was configured, it was possible for security researchers to capture the information being sent by victims to the public Telegram server. This data trove was first reported by security researchers at Singapore-based Group-IB, which dubbed the campaign "0ktapus" for the attackers targeting organizations using identity management tools from Okta.com. "This case is of interest because despite using low-skill methods it was able to compromise a large number of well-known organizations," Group-IB wrote. "Furthermore, once the attackers compromised an organization they were quickly able to pivot and launch subsequent supply chain attacks, indicating that the attack was planned carefully in advance." It's not clear how many of these phishing text messages were sent out, but the Telegram bot data reviewed by KrebsOnSecurity shows they generated nearly 10,000 replies over approximately two months of sporadic SMS phishing attacks targeting more than a hundred companies.

Power

Will Small Modular Nuclear Reactors Generate More Waste Than Conventional Ones? (stanford.edu) 284

"A new study from Stanford and the University of British Columbia has bad news for the next generation of nuclear reactors," writes Slashdot reader SoftwareArtist

An announcement from Stanford University warns that "Small modular reactors, long touted as the future of nuclear energy, will actually generate more radioactive waste than conventional nuclear power plants," citing joint research with the University of British Columbia published in Proceedings of the National Academy of Sciences. "Our results show that most small modular reactor designs will actually increase the volume of nuclear waste in need of management and disposal, by factors of 2 to 30 for the reactors in our case study," said study lead author Lindsay Krall, a former MacArthur Postdoctoral Fellow at Stanford University's Center for International Security and Cooperation (CISAC). "These findings stand in sharp contrast to the cost and waste reduction benefits that advocates have claimed for advanced nuclear technologies...."

Energy is produced in a nuclear reactor when a neutron splits a uranium atom in the reactor core, generating additional neutrons that go on to split other uranium atoms, creating a chain reaction. But some neutrons escape from the core — a problem called neutron leakage — and strike surrounding structural materials, such as steel and concrete. These materials become radioactive when "activated" by neutrons lost from the core. The new study found that, because of their smaller size, small modular reactors will experience more neutron leakage than conventional reactors. This increased leakage affects the amount and composition of their waste streams.

"The more neutrons that are leaked, the greater the amount of radioactivity created by the activation process of neutrons," Ewing said. "We found that small modular reactors will generate at least nine times more neutron-activated steel than conventional power plants. These radioactive materials have to be carefully managed prior to disposal, which will be expensive."

That's a problem because already, just in America, spent nuclear fuel is accumulating at a rate of about 2,000 metric tonnes per year, the announcement notes, and is "currently stored in pools or in dry casks at reactor sites."

But that's not the only issue: The study also found that the spent nuclear fuel from small modular reactors will be discharged in greater volumes per unit energy extracted and can be far more complex than the spent fuel discharged from existing power plants. "Some small modular reactor designs call for chemically exotic fuels and coolants that can produce difficult-to-manage wastes for disposal," said co-author Allison Macfarlane, professor and director of the School of Public Policy and Global Affairs at the University of British Columbia. "Those exotic fuels and coolants may require costly chemical treatment prior to disposal."

"The takeaway message for the industry and investors is that the back end of the fuel cycle may include hidden costs that must be addressed," Macfarlane said. "It's in the best interest of the reactor designer and the regulator to understand the waste implications of these reactors."

The study concludes that, overall, small modular designs are inferior to conventional reactors with respect to radioactive waste generation, management requirements, and disposal options. One problem is long-term radiation from spent nuclear fuel. The research team estimated that after 10,000 years, the radiotoxicity of plutonium in spent fuels discharged from the three study modules would be at least 50 percent higher than the plutonium in conventional spent fuel per unit energy extracted.

Because of this high level of radiotoxicity, geologic repositories for small modular reactor wastes should be carefully chosen through a thorough siting process, the authors said.

"We shouldn't be the ones doing this kind of study," said Ewing. "The vendors, those who are proposing and receiving federal support to develop advanced reactors, should be concerned about the waste and conducting research that can be reviewed in the open literature."

Earth

Exxon's Plan For Surging Carbon Emissions Revealed In Leaked Documents 67

An anonymous reader quotes a report from Bloomberg: Exxon Mobil has been planning to increase annual carbon-dioxide emissions by as much as the output of the entire nation of Greece, an analysis of internal documents reviewed by Bloomberg shows, setting one of the largest corporate emitters against international efforts to slow the pace of warming. The drive to expand both fossil-fuel production and planet-warming pollution comes at a time when some of Exxon's rivals, such as BP Plc and Royal Dutch Shell Plc, are moving to curb oil and zero-out emissions. Exxon's own assessment of its $210 billion investment strategy shows yearly emissions rising 17% by 2025, according to the internal documents.

The largest U.S. oil producer has never made a commitment to lower oil and gas output or set a date by which it will become carbon neutral, and its near-term plans have been disrupted by fallout from the Covid-19 pandemic. Exxon has also never publicly disclosed its forecasts for its own emissions. But the planning documents show for the first time that Exxon has carefully assessed the direct emissions it expects from the seven-year investment plan adopted in 2018 by Chief Executive Officer Darren Woods. The additional 21 million metric tons of carbon dioxide per year that would result from ramping up production dwarfs Exxon's projections for its own efforts to reduce pollution, such as deploying renewable energy and burying some carbon dioxide.
The report notes that these internal estimates "reflect only a small portion of Exxon's total contribution to climate change," and don't take into account emissions "from customers burning fuel in vehicles or other end uses."

"That means the full climate impact of Exxon's growth strategy could likely be five times the company's estimate -- or about 100 million tons of additional carbon dioxide -- had the company accounted for so-called Scope 3 emissions. If its plans are realized, Exxon would add to the atmosphere the annual emissions of a small, developed nation, or 26 coal-fired power plants."
Security

Iranian Hackers Found Way Into Encrypted Apps, Researchers Say (nytimes.com) 28

An anonymous reader quotes a report from The New York Times: Iranian hackers, most likely employees or affiliates of the government, have been running a vast cyberespionage operation equipped with surveillance tools that can outsmart encrypted messaging systems -- a capability Iran was not previously known to possess, according to two digital security reports released Friday. The operation not only targets domestic dissidents, religious and ethnic minorities and antigovernment activists abroad, but can also be used to spy on the general public inside Iran, said the reports byCheck Point Software Technologies, a cybersecurity technology firm, andthe Miaan Group, a human rights organization that focuses on digital security in the Middle East.

The reports, which were reviewed by The New York Times in advance of their release, say that the hackers have successfully infiltrated what were thought to be secure mobile phones and computers belonging to the targets, overcoming obstacles created by encrypted applications such as Telegram and, according to Miaan, even gaining access to information on WhatsApp. Both are popular messaging tools in Iran. The hackers also have created malware disguised as Android applications, the reports said. [...] According to the report by Check Point's intelligence unit, the cyberespionage operation was set up in 2014, and its full range of capabilities went undetected for six years. Miaan traced the first the operation to February 2018 from a malicious email targeting a Sufi religious group in Iran after a violent confrontation between its members and Iranian security forces. It traced the malware used in that attack and further attacks in June 2020 to a private technology firm in Iran's northeast city of Mashhad named Andromedaa. Miaan researchers determined that Andromedaa had a pattern of attacking activists, ethnic minority groups and separatist opposition groups but also had developed phishing and malware tools that could target the general public.

The hackers appeared to have a clear goal: stealing information about Iranian opposition groups in Europe and the United States and spying on Iranians who often use mobile applications to plan protests, according to the Miaan report. [...] According to Check Point, the hackers use a variety of infiltration techniques, including phishing, but the most widespread method is sending what appear to be tempting documents and applications to carefully selected targets. [...] The spyware enabled the attackers to gain access to almost any file, log clipboard data, take screenshots and steal information. According to Miaan, one application empowered hackers to download data stored on WhatsApp. In addition, the attackers discovered a weakness in the installation protocols of several encrypted applications including Telegram, which had always been deemed relatively secure, enabling them to steal the apps' installation files. These files, in turn, allow the attackers to make full use of the victims' Telegram accounts.
"Although the attackers cannot decipher the encrypted communications of Telegram, their strategy makes it unnecessary," the report adds. "Rather, they use the stolen installation files to create Telegram logins to activate the app in the victims' names on another device. This enables the attackers to secretly monitor all Telegram activity of the victims."
Youtube

YouTube's Moderation Questioned After Banning Accounts For Too Many Emojis (engadget.com) 44

"YouTube has a huge problem right now," argues videogame streamer Markiplier. "People's accounts are being suspended without reason, without provocation, and their appeals to get it back are being denied without explanation."

Engadget revisits "YouTube's occasionally questionable moderation" -- in this case, people being banned simply for using too many emojis (or "emotes") in their comments to videogame-streamer Markiplier during a YouTube-produced choose-your-own-adventure special. The service says it has reinstated legions of Markiplier fans' accounts after they were banned simply for spamming emotes (and not even to a great degree) while voting during a live playthrough of the interactive movie A Heist with Markiplier.

Not all of the accounts have been restored, Markiplier said, but YouTube added that it was "looking into" both why human moderators denied appeals and how it might "prevent this in the future." The change of heart came after Markiplier (aka Mark Fischbach) posted a video illustrating both how trivial the bans were, examples of denied appeals and the consequences for some users.

As he explained, this didn't just kick people out of chat. It affected entire Google accounts -- people lost videos, channel memberships or access to important services they needed, all because they spammed several emotes in one line. He also blasted YouTube for claiming that appeals were carefully reviewed, noting that there was at least one instance where someone succeeded with an appeal, and was almost immediately banned again for seemingly no reason... The incident highlights the complications and limitations of YouTube's approach to moderation. While the sheer size of YouTube virtually mandates some form of automated policing, it's not guaranteed to correctly interpret everything (especially if it's asked to be particularly strict).

Security

WhatsApp Flaw Could Allow Hackers To Modify, Send Fake Messages (nytimes.com) 11

A recently discovered flaw in WhatsApp could allow hackers to modify and send fake messages (Warning: source may be paywalled; alternative source). Researchers at the Israeli cybersecurity firm Check Point said the vulnerability gives a hacker the possibility "to intercept and manipulate messages sent by those in a group or private conversation" as well as "create and spread misinformation." The New York Times reports: WhatsApp acknowledged that it was possible for someone to manipulate the quote feature, but the company disagreed that it was a flaw. WhatsApp said the system was working as it had intended, because the trade-offs to prevent such a deception by verifying every message on the platform would create an enormous privacy risk or bog down the service. The company said it worked to find and remove anyone using a fake WhatsApp application to spoof the service. "We carefully reviewed this issue and it's the equivalent of altering an email," Carl Woog, a spokesman for WhatsApp, said in a statement. What Check Point discovered had nothing to do with the security of WhatsApp's so-called end-to-end encryption, which ensures only the sender and recipient can read messages, he said.

For now, the issue appears limited to a discussion among security experts. Both WhatsApp and Check Point Software said they had not seen regular users creating fake quote messages in chats. Check Point said it also discovered a way within group chats to send a message to a specific individual within the discussion. That individual is tricked into believing that the whole group saw the message and responds accordingly. WhatsApp played down the concerns raised by Check Point, saying most people know the person who they are messaging on the service. The company said 90 percent of all messages on the service are sent in one-on-one conversations, and the majority of groups are six people or less -- making it less likely that an unknown person can infiltrate a conversation to trick other users.

EU

Twitter Isn't Removing Enough Hate Speech, Complains The EU (cnn.com) 201

An anonymous reader quotes CNN: Twitter is not good enough at removing hate speech from its platform. That's the judgment of Europe's top regulator, which released data on Thursday showing that Twitter has failed to meet its standard of taking down 50% of hate speech posts after being warned that they include objectionable content. Facebook, Twitter, Microsoft, and Google have all agreed to do more, promising last May to review a majority of hate speech flagged by users within 24 hours and to remove any illegal content.

A year into the agreement, the European Commission said that Facebook and YouTube, which is owned by Google, have both managed to remove 66% of reported hate speech. Twitter's rate, meanwhile, was 38%. That's below the commission's standard but a major improvement from December, when the service was removing only 19% of hate speech... Twitter was also slightly slower than rivals Facebook and YouTube when it came to reviewing content. The regulator said that Facebook reviewed flagged content within 24 hours in 58% of cases. YouTube did the same 43% of the time, while Twitter met the 24-hour benchmark in 39% of cases.

European lawmakers are considering laws mandating the blocking of online hate speech, so they're carefully watching what happens when social media companies self-regulate.

"Tackling illegal hate speech online is a contribution to the fight against terrorism," argued the EU Commission's top justice official.
Open Source

Linux Kernel Adopts 'Code of Conflict' 93

Motor was one of several readers to note that a small patch recently added to the Linux kernel contains guidelines for discourse and dispute resolution within the community. It's called the "Code of Conflict." Quoting: Your code and ideas behind it will be carefully reviewed, often resulting in critique and criticism. The review will almost always require improvements to the code before it can be included in the kernel. Know that this happens because everyone involved wants to see the best possible solution for the overall success of Linux. .... If however, anyone feels personally abused, threatened, or otherwise uncomfortable due to this process, that is not acceptable. ... As a reviewer of code, please strive to keep things civil and focused on the technical issues involved.
Encryption

Tips For Securing Your Secure Shell 148

jones_supa writes: As you may have heard, the NSA has had some success in cracking Secure Shell (SSH) connections. To respond to these risks, a guide written by Stribika tries to help you make your shell as robust as possible. The two main concepts are to make the crypto harder and make stealing keys impossible. So prepare a cup of coffee and read the tutorial carefully to see what could be improved in your configuration. Stribika gives also some extra security tips: don't install what you don't need (as any code line can introduce a bug), use the kind of open source code that has actually been reviewed, keep your software up to date, and use exploit mitigation technologies.
Displays

BenQ's GP1 LED Projector — Small Package, Good Thing 93

The first projector I remember seeing in person had three great big glass eyes (for red, green, and blue lamps) and BNC connectors. It probably weighed more than 100 pounds, and had to be carefully calibrated to align the lenses. Now, I've got a projector above my head that weighs less than a Neal Stephenson novel and has a sharper, brighter image than that monster. I've been looking into LED projectors for a few years now; in that time, I've been waiting for them to come down in price and bump up in lumens. So I was very curious about BenQ's GP1 LED projector (also known, somewhat oddly, as "Joybee"), and was happy to get a sample for review. It may seem retrograde to bother with an 800x600, 100 lumen (no missing zero there: one-hundred lumen) projector in 2009 A.D., but for the past four weeks, I've used it as my primary display, and come out happy. It has some drawbacks, but it's an impressive little device for its $499 pricetag, and I hope a harbinger of even better things to come. Read on for my take on what BenQ got right, and what rough spots stick out.
Businesses

A Push To End the Online Gambling Ban 205

Hugh Pickens writes "Representative Barney Frank of Massachusetts has introduced legislation that would roll back a ban on Internet gambling enacted when Republicans led Congress. The legislation would allow the Treasury Department to license and regulate online gambling companies that serve American customers. Frank's bill has roughly two dozen co-sponsors and the backing of the The Poker Players Alliance, with over a million members. But opponents are mobilizing to defeat the bill including social conservatives and professional and amateur sports organizations, which say more gambling opportunities could threaten the integrity of their competition. 'Illegal offshore Internet gambling sites are a criminal enterprise, and allowing them to operate unfettered in the United States would present a clear danger to our youth, who are subject to becoming addicted to gambling at an early age,' says Representative Spencer Bachus, Republican of Alabama and the ranking member on the House Financial Services Committee. Another powerful roadblock could be the Senate majority leader, Harry Reid, Democrat of Nevada. 'Gaming is an important industry to the state, and anything that affects it will be reviewed carefully,' says Reid's spokesman."
Patents

Microsoft's Internal Advice About Patents 100

BigPoppaT writes "Eric Brechner writes a best practices blog called Hard Code for Microsoft under the name I.M. Wright. His most recent post sounds like an endorsement of open source development (and does end with a call for Microsoft developers to participate in the shared source community). But even better is his advice regarding patents: 'When using existing libraries, services, tools, and methods from outside Microsoft, we must be respectful of licenses, copyrights, and patents. Generally, you want to carefully research licenses and copyrights (your contact in Legal and Corporate Affairs can help), and never search, view, or speculate about patents. I was confused by this guidance till I wrote and reviewed one of my own patents. The legal claims section--the only section that counts--was indecipherable by anyone but a patent attorney. Ignorance is bliss and strongly recommended when it comes to patents.' Interesting advice from inside Microsoft. I wonder if Ballmer would agree that ignorance should be 'strongly recommended when it comes to patents'?"

The Early History of Nupedia and Wikipedia, Part II 140

Today, read the continuation of Larry Sanger's account of the early history of Nupedia and Wikipedia (below), in which Sanger talks about the difficulties of governance in a large, free-wheeling project, some final attempts to save Nupedia, and how he came to resign from the organization. (And if you missed it, you might want to start with yesterday's installment.)

Slashdot Top Deals