Open Source

System76 Unveils Open Source 'Launch Configurable Keyboard' for Linux, Windows, and macOS (betanews.com) 61

System76 today unveiled its newest product -- the "Launch Configurable Keyboard." It is a mechanical keyboard made in the USA with a focus on open source. The Launch has both open source firmware and hardware. Even the configuration software -- which runs on Linux, Windows, and macOS -- is open source. From a report: "With a wide swath of customization options, the Launch is flexible to a variety of needs and use cases. The keyboard's thoughtful design keeps everything within reach, vastly reducing awkward hand contortions. Launch comes with additional keycaps and a convenient keycap puller, meaning one can swap keys based on personal workflow preferences to maximize efficiency. Launch also features a novel split Space Bar, which allows the user to swap out one Space Bar keycap for Shift, Backspace, or Function to reduce hand fatigue while typing. Launch uses only three keycap sizes to vastly expand configuration options," says System76. The keyboard, which has a removable USB-C cable for connectivity, is priced at $285.
Electronic Frontier Foundation

EFF Argues For 'Empowerment, Not Censorship' Online (eff.org) 62

An activism director and a legislative analyst at the EFF have co-authored an essay arguing that the key to children's safetly online "is user empowerment, not censorship," reporting on a recent hearing by the U.S. Senate's Judiciary Commitee: While children do face problems online, some committee members seemed bent on using those problems as an excuse to censor the Internet and undermine the legal protections for free expression that we all rely on, including kids. Don't censor users; empower them to choose... [W]hen lawmakers give online platforms the impossible task of ensuring that every post meets a certain standard, those companies have little choice but to over-censor.

During the hearing, Stephen Balkam of the Family Online Safety Institute provided an astute counterpoint to the calls for a more highly filtered Internet, calling to move the discussion "from protection to empowerment." In other words, tech companies ought to give users more control over their online experience rather than forcing all of their users into an increasingly sanitized web. We agree.

It's foolish to think that one set of standards would be appropriate for all children, let alone all Internet users. But today, social media companies frequently make censorship decisions that affect everyone. Instead, companies should empower users to make their own decisions about what they see online by letting them calibrate and customize the content filtering methods those companies use. Furthermore, tech and media companies shouldn't abuse copyright and other laws to prevent third parties from offering customization options to people who want them.

The essay also argues that Congress "should closely examine companies whose business models rely on collecting, using, and selling children's personal information..."

"We've highlighted numerous examples of students effectively being forced to share data with Google through the free or low-cost cloud services and Chromebooks it provides to cash-strapped schools. We filed a complaint with the FTC in 2015 asking it to investigate Google's student data practices, but the agency never responded."
Privacy

Ask Slashdot: How Do You Prepare For The Theft Of Your PC? 262

A security-conscious Slashdot reader has theft insurance -- but worries whether it covers PC theft. And besides the hassles of recreating every customization after restoring from backups, there's also the issue of keeping personal data private. I currently keep important information on a hidden, encrypted partition so an ordinary thief won't get much off of it, but that is about the extent of my preparation... What would you do? Some sort of beacon to let you know where your stuff is? Remote wipe? Online backup?
There's a couple of issues here -- including privacy, data recovery, deterrence, compensation -- each leading to different ways to answer the question: what can you actually do to prepare for the possibility? So use the comments to share your own experiences. How have you prepared for the theft of your PC?
Image

Book Review: Drupal For Designers Screenshot-sm 77

Michael Ross writes "Of all the open source content management systems used for building websites, Drupal has a reputation for being one of the most flexible and powerful available, but not the easiest for web designers to use. Drupal version 7 has made some strides in alleviating those flaws, but there is still much progress to be made. During the past few years, a number of books have been published that explain how Drupal designers can do custom theming, but they tend to focus on the technical details of the theme layer, and not the practice of web design when using Drupal as a foundation. That rich yet neglected subject area is the focus of a new book, Drupal for Designers: The Context You Need Without the Jargon You Don't." Keep reading to see what Michael has to say about the book.
Red Hat Software

Red Hat Clarifies Doubts Over UEFI Secure Boot Solution 437

sfcrazy writes "Red Hat's Tim Burke has clarified Fedora/Red Hat's solution to Microsoft's secure boot implementation. He said, 'Some conspiracy theorists bristle at the thought of Red Hat and other Linux distributions using a Microsoft initiated key registration scheme. Suffice it to say that Red Hat would not have endorsed this model if we were not comfortable that it is a good-faith initiative.'" Color me unimpressed, and certainly concerned: "A healthy dynamic of the Linux open source development model is the ability to roll-your-own. For example, users take Fedora and rebuild custom variants to meet personal interest or experiment in new innovations. Such creative individuals can also participate by simply enrolling in the $99 one time fee to license UEFI. For users performing local customization, they will have the ability to self-register their own trusted keys on their own systems at no cost." From what I can tell, the worst fears of the trusted computing initiative are coming true despite any justifications from Red Hat here. Note that the ability to install your owns keys is certainly not a guaranteed right.
Image

Review: Dragon Age: Origins Screenshot-sm 452

Since the release of Baldur's Gate in 1998, BioWare has cultivated a strong reputation for quality role-playing games, exploring various aspects of the genre ranging from traditional D&D roles and rules to space marine and Jedi Knights. Dragon Age: Origins is a shift back to traditional swords-and-sorcery standards, unashamedly embracing the archetypes that made RPGs what they are, and using them to tell a complex, interesting story in a familiar yet unexplored world. In addition, BioWare has done yet another iteration of their combat system to make it deeper and allow the player to dictate the level of engagement. The result is that Dragon Age: Origins is one of the best RPGs in recent history. Read on for the rest of my thoughts.

PMD Applied 108

Simon P. Chappell writes "It's a fundamentally agreed fact within our industry that code reviews are good. Really good. Sliced bread good. But have you actually tried organizing one? If you can get everyone together that needs to be there at the same time in the same meeting room, then you still have the challenge of trying to keep a roomful of geeks from getting trapped in minutiae and squabbling over details like formatting conventions. Well, what if I told you that you could get your code reviews done in less than five minutes and that there would be no arguing? Enter PMD, an open-source Java static analyzer. Think of it as a code review in a box. As if that weren't wonderful enough, there's even a book, PMD Applied, written by Tom Copeland, the author of PMD." Read on for the rest of Simon's review.

Inescapable Data 99

jsuda writes "The authors of Inescapable Data share their excitement about what they see as a rapidly-developing convergence of digital technologies having enormous significance for business and culture. This convergence, in their view, is inescapable, life-altering for both good and bad, and presents a frame-shattering paradigm-shift which is mostly unrecognized, and much less examined critically. Inescapable Data is a thought-provoking book meant to describe the new technologies and to examine the special values which arguably will emerge from the convergence." Read the rest of John's review.
Books

Running Mac OS X Panther 288

sympleko (Matthew Leingang) writes with his review of Running Mac OS X Panther, by James Duncan Davidson. "The Macintosh has come a long way in twenty-plus years. Much has been said of Mac OS X being the perfect union of a rock-solid operating system with a beautiful and functional user interface. Since the iMac, Apple's market share has been steadily increasing, and since OS X, Unix users have been making the switch. My last computer was a dual-boot box that I kept finding excuses to keep from booting to Windows. My PowerBook is literally the best of both worlds. I can run the older unix-based apps I need to for work, and use Microsoft programs and play fancy games when I want. It's also essentially two different computers. This book is about using that second computer, the workhorse behind the scenes." Read on for the rest.
The Internet

Joe Clark's Answers -- In Valid XHTML 489

We sent 10 of your questions to usability guy Joe Clark, and he took it upon himself to go a bit beyond simply answering them. In his reply he said, "Answers attached in a valid XHTML file. I would suggest at least retaining the id attributes. I copy-edited all the questions, but the words are all the same; they are now merely spelled and capitalized correctly. I think all the links work." Whatever. We left Joe's formatting intact. It's a little different from our usual style, but variety is the spice of Slashdot.
Linux

GnuCash Developer Robert Merkel Responds 98

These are Robert's answers to questions about GnuCash you posted on June 18th. He says, "Some of the answers to the questions here were the result of discussions with the other people at LDG, where others were more qualified to speak on various topics, so the readers are really getting the benefit of our collected wisdom (well, we hope it's wisdom :) )"
The Internet

Can eSizing Clothes, Bare Personal Info? 13

jwater asks: "As we become more entrenched into a digital economy, do companies like eZsize and TheRightSize, who are discussed in this article from Wired News, seem to make sense? Would you use these ideas to buy a 'fitting' gift for your wife/husband/boyfriend/girlfriend this Christmas season? Customization seems like the next big wave for e-business, but are you willing to sacrifice the personal information to make such concepts take off?" A certain degree of personal information is necessary for the production of customized commercial items, but how should those commercial entities treat and protect your data, and what penalties should they risk if they fail?
Games

Indrema's John Gildred Answers Your Questions 96

Recently you asked Indrema founder John Gildred about the Linux-based console system his company plans to introduce. Here's what he has to say about its hackability, strategy, developers and more -- thanks for the in-depth answers, John.
News

Friday Night Quickies (and misc. Slashdot notes)

James Renken wrote in to tell us about a humorous ZD articles revolving around the destruction of those annoying office assistants. Death to Clippy! Brett Taylor wrote in to say that the October issue of Daemon News, a BSD based ezine, is now out. Bill Kilgallon sent in a link to what is unquestionably the Ultimate PalmPilot Case. And lastly, several folks wrote in to tell us that ZD now has something they call "the ultimate linux resource". Hit the link to read some notes about moderation as well as comments about future direction of Slashdot content)

Slashdot Top Deals