An anonymous reader points out just how thick a skin it takes to be a kernel developer sometimes, linking to a chain of emails on the Linux Kernel Mailing List in which Linus lets loose on a kernel developer for introducing a change that breaks userspace apps (in this case, PulseAudio). "Shut up, Mauro. And I don't _ever_ want to hear that kind of obvious garbage and idiocy from a kernel maintainer again. Seriously. I'd wait for Rafael's patch to go through you, but I have another error report in my mailbox of all KDE media applications being broken by v3.8-rc1, and I bet it's the same kernel bug. And you've shown yourself to not be competent in this issue, so I'll apply it directly and immediately myself. WE DO NOT BREAK USERSPACE! Seriously. How hard is this rule to understand? We particularly don't break user space with TOTAL CRAP. I'm angry, because your whole email was so _horribly_ wrong, and the patch that broke things was so obviously crap. ... The fact that you then try to make *excuses* for breaking user space, and blaming some external program that *used* to work, is just shameful. It's not how we work," writes Linus, and that's just the part we can print. Maybe it's a good thing, but there's certainly no handholding when it comes to changes to the heart of Linux.
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×
In January of this year, we posted news of a major pollution site in Texas that was the subject of some anonymous amateur sleuths with drones, who used their UAVs to document the release of a "river of blood" (pig blood, that is) into the Trinity River as it flows through Dallas. Now, garymortimer writes, that documentation has resulted in legal action in the form of an indictment from a Dallas grand jury. "The story went viral and continues to receive hits nearly a year later. I believe this is the first environmental crime to be prosecuted on the basis of UA evidence. Authorities had to act because of the attention the story was receiving."
New submitter RMingin writes "Bruno Ferreira at Tech Report has a number of suggestions that he feels could improve PC gaming. Some are quite thought-provoking. For example: 'When technology advanced [in the '90s], the industry came up with a certification specification to ensure punters didn't miss out—and consequently spent more on better PCs. That spec was called MPC, short for Multimedia Personal Computer. The first version of the MPC spec said, in simple terms: Thy computer shalt be blessed with a sound card and speakers. Thou shalt be provided a CD-ROM drive in which to receive silver discs. Thy processor shalt not be completely crap. At the time, this spec meant a lot—and, to be honest, I think it worked marvelously. We need something like that again. People wanted MPC, everyone sold the better hardware, and everyone was happy. Let the powers that be come up with a new baseline specification. Call it MPC-HD or whatever acronym the marketing Nazgûl want to give it. I'm fine with whatever, as long as it gets the job done.' He also calls for an end to the unintuitive model numbers for GPUs and CPUs, and more consistent driver support."
An anonymous reader writes "Michigan joins Maryland as a state where employers may not ask employees or job applicants to divulge login information for Facebook and other social media sites. From the article: 'Under the law, employers cannot discipline employees or decline to hire job applicants because they do not give them access information, including user names, passwords, login information, or "other security information that protects access to a personal internet account," according to the bill. Universities and schools cannot discipline or fail to admit students if they do not give similar information.' There is one exception, however: 'However, accounts owned by a company or educational institution, such as e-mail, can be requested.'"
alexander_686 writes "Bloomberg is running a series of articles from Susan Crawford about the stagnation of internet access in the U.S., and why consumers in America pay more for slower service. Quoting: 'The two kinds of Internet-access carriers, wired and wireless, have found they can operate without competing with each other. The cable industry and AT&T-Verizon have divided up the world much as Comcast and Time Warner did; only instead of, "You take Philadelphia, I'll take Minneapolis," it's, "You take wired, I'll take wireless." At the end of 2011, the two industries even agreed to market each other’s services.' I am a free market type of guy. I do recognize the abuse that can come from natural monopolies that utilities tend to have, but I have never considered this type of collusion before. To fix the situation, Crawford recommends that the U.S. 'move to a utility model, based on the assumption that all Americans require fiber-optic Internet access at reasonable prices.'"
theodp writes "Facebook is unlikely to make many new (non-investor) friends with reports that it paid Irish taxes of about $4.64 million on its entire non-U.S. profits of $1.344 billion for 2011. 'Facebook operates a second subsidiary that is incorporated in Ireland but controlled in the Cayman Islands,' Kenneth Thomas explains. 'This subsidiary owns Facebook Ireland, but the setup allows the two companies to be considered as one for U.S. tax purposes, but separate for Irish tax purposes. The Caymans-operated subsidiary owns the rights to use Facebook's intellectual property outside the U.S., for which Facebook Ireland pays hefty royalties to use. This lets Facebook Ireland transfer the profits from low-tax Ireland to no-tax Cayman Islands.' In 2008, Facebook COO Sheryl Sandberg cited 'local world-class talent' as the motivation behind Facebook's choice of tax-haven Dublin for its international HQ. Similar tax moves by Google, Microsoft, and others who have sought the luck-of-the-Double-Irish present quite a dilemma for tax revenue-seeking governments. Invoking Supreme Court Justice Potter Stewart's famous common sense definition of ethics ('Ethics is knowing the difference between what you have a right to do and what is right to do') is unlikely to sway corporations whose top execs send the message that tax avoidance is the right thing to do and something to be proud of."
TechMediaNetwork. Slashdot has often taken a mediawatch role, especially when it comes to technology coverage -- which is what TechMediaNetork does for a living. As Chief Revenue Office, Mark is in charge of making sure enough money comes in to pay writers and editors, pay for bandwidth and servers, and hopefully have enough revenue over and above expenses to show a profit. We've interviewed editors and writers, and plenty of writers' work gets linked from Slashdot, but we pay little or no (mostly no) attention to the business side of the publishing business. Like it or not, if we are going to have online news someone has to sell the ads and make decisions about whether to set up a paywall or not. That's Mark's job. Like him or not, he does a job somebody has to do, and has been doing it for 30 years. He knows he's talking to a potentially hostile audience here, but he accepts that. As he says, near the end of the video, "...you can't please everybody, right?"
i_want_you_to_throw_ writes "Details of Jaron Lanier's crusade against Web 2.0 continue in an article at Smithsonian Magazine. The article expands upon Lanier's criticism of Web 2.0. It's an interesting read, with Lanier suggesting we are outsourcing ourselves into insignificant advertising-fodder and making an audacious connection between techno-utopianism, the rise of the machines and the Great Recession. From the article: 'As far back as the turn of the century, he singled out one standout aspect of the new web culture—the acceptance, the welcoming of anonymous commenters on websites—as a danger to political discourse and the polity itself. At the time, this objection seemed a bit extreme. But he saw anonymity as a poison seed. The way it didn’t hide, but, in fact, brandished the ugliness of human nature beneath the anonymous screen-name masks. An enabling and foreshadowing of mob rule, not a growth of democracy, but an accretion of tribalism. ... 'This is the thing that continues to scare me. You see in history the capacity of people to congeal—like social lasers of cruelty. That capacity is constant. ... We have economic fear combined with everybody joined together on these instant twitchy social networks which are designed to create mass action. What does it sound like to you? It sounds to me like the prequel to potential social catastrophe. I’d rather take the risk of being wrong than not be talking about that.'"
New submitter electron sponge writes "On Friday morning, the Senate renewed the FISA Amendments Act (PDF), which allows for warrantless electronic eavesdropping, for an additional five years. The act, which was originally passed by Congress in 2008, allows law enforcement agencies to access private communications as long as one participant in the communications could reasonably be believed to be outside the United States. This law has been the subject of a federal lawsuit, and was argued before the Supreme Court recently. 'The legislation does not require the government to identify the target or facility to be monitored. It can begin surveillance a week before making the request, and the surveillance can continue during the appeals process if, in a rare case, the secret FISA court rejects the surveillance application. The court’s rulings are not public.'" The EFF points out that the Senate was finally forced to debate the bill, but the proposed amendments that would have improved it were rejected.
New submitter titanium93 writes "For months, dozens of people could not use their keyless entry systems to unlock or start their cars when parked in the vicinity of the eight-story Regents bank building in Hollywood, FL. Once the cars were towed to the dealership for repair, the problem went away. The problem resolved itself when police found equipment on the bank's roof that was broadcasting a bootleg radio station. A detective and an FCC agent found the equipment hidden underneath an air conditioning chiller. The man who set up the station has not been found, but he faces felony charges and fines of at least $10,000 if he is caught. The radio station was broadcasting Caribbean music around the clock on 104.7 FM."
dotancohen writes "I am tasked with building a few Linux machines for a small office. However, many the currently available motherboards seem to be Linux-hostile. For instance, in addition to the whole UEFI issue, my last install was a three-day affair due to the motherboard reporting a Linux-supported ethernet device (the common RTL8168) while it was actually using a GbE Ethernet device that does not work with the legacy drivers and didn't even work with a test Windows 7 install until the driver disk was installed. There are no current hardware compatibility lists for Debian or Ubuntu and I've received from Asus and Gigabyte the expected reply: No official Linux support, install Windows for best experience. I even turned to the two large local computer vendors, asking if they could provide Linux-compatible machines ready to go, but neither of them would be of any help. What globally-available motherboards or motherboard manufacturers can you recommend today?"
Every years, McAfee Labs produces a list of predictions relating to computer security for the next 12 months. Last year (PDF) they said Anonymous would have to reinvent itself, and that there would be an overall increase in online hacktivism. This year's report (PDF) is not as optimistic for the hacking collective. "Too many uncoordinated and unclear operations have been detrimental to its reputation. Added to this, the disinformation, false claims, and pure hacking actions will lead to the movement’s being less politically visible than in the past. Because Anonymous’ level of technical sophistication has stagnated and its tactics are better understood by its potential victims, the group’s level of success will decline." That's not to say they think hacktivism itself is on the decline, though: "Meanwhile, patriot groups self-organized into cyberarmies and spreading their extremist views will flourish. Up to now their efforts have had little impact (generally defacement of websites or DDoS for a very short period), but their actions will improve in sophistication and aggressiveness." The report also predicts that malware kits will lead to an "explosion in malware" for OS X and mobile, but that Windows 8 will be the next big target.
An anonymous reader writes "Earlier this year, the Android-based Ouya game console project raised over nine times as much funding as they initially asked for in their Kickstarter campaign. Now, Ouya developer consoles are starting to ship, and folks on the Ouya team released a video showing what the developers should expect. As explained in the video, the console currently being shipped is by no means the final hardware, but promises to give developers everything they need to start developing apps and games for Ouya. The only surprise is that they decided to add a micro-USB port to the hardware, making it easy to hook up to a PC. The Ouya team has also released an SDK for the device (which they call the ODK — Ouya Development Kit), and have provided most of the source under the Apache 2.0 license. They wrote, 'We think we’ve got a great team of developers here at OUYA, but there’s strength in numbers and a wealth of passionate, talented people out there. We want you, the developers of the world, to work alongside us to continually improve our platform. It’s our hope that releasing a more open ODK will help foster such innovation.'"
The NY Times reports China has once again stepped up its efforts to control the internet, passing a new set of rules by which internet users and ISPs must abide. In addition to requiring that users provide their real names to internet providers, the government says those providers are now more responsible for deleting or blocking posts that aren't agreeable to the Chinese authorities. Quoting: "The new regulations, issued by the Standing Committee of the National People’s Congress, allow Internet users to continue to adopt pseudonyms for their online postings, but only if they first provide their real names to service providers, a measure that could chill some of the vibrant discourse on the country’s Twitter-like microblogs. The authorities periodically detain and even jail Internet users for politically sensitive comments, such as calls for a multiparty democracy or allegations of impropriety by local officials. In recent weeks, Internet users in China have exposed a series of sexual and financial scandals that have led to the resignations or dismissals of at least 10 local officials. International news media have also published a series of reports in recent months on the accumulation of wealth by the family members of China’s leaders, and some Web sites carrying such reports ... have been assiduously blocked, while Internet comments about them have been swiftly deleted. The regulations issued Friday build on a series of similar administrative guidelines and municipal rules issued over the past year. China’s mostly private Internet service providers have been slow to comply with them, fearing the reactions of their customers. The Standing Committee’s decision has much greater legal force, and puts far more pressure on Chinese Internet providers to comply more quickly and more comprehensively, Internet specialists said."