cervesaebraciator writes "A 'Coffee Branding Workshop,' sponsored by the World Intellectual Property Organization, was held recently in Arusha City, at which the Director General of the Tanzania Coffee Board presented a paper titled 'Supporting the Coffee Sector with added Value Products Through Intellectual Property and Branding.' The paper encouraged the use of intellectual property claims, including trademarks, copyrights, patents, and designs, as sources of income which can be used to support agriculture in Africa. The Director General claimed that '[Intellectual property rights] are the basis for today's knowledge based economy and international competitiveness.' This is no doubt related to a broader effort to advance western style intellectual property in Africa through claims of the benefits it offers agriculture. Promoting western style intellectual property law as a means of third world development is a popular strategy for WIPO, the only branch of the UN to have significant wealth deriving from contributions independent of Member States. On a related note of interest to Slashdotters, there is a history of tension between WIPO advocates and FOSS advocates." I hope they take advantage of the marketing possibilities offered by civet-processed coffee.
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×
New submitter garbagechuteflyboy writes "The PengPod is the first dual-booting tablet; It's able to run both Linux and Android. Pengpod is now running the latest Plasma Active which gives this powerful Linux tablet features that were previously only available to iPad and Android tablets. PengPod is currently selling pre-orders on Indiegogo." garbagechuteflyboy adds links to articles about the dual-OS tablet at liliputing, at Ars Technica, and at PCWorld. "First dual-booting tablet" seems like a hard claim to back, but it's nice to see a tablet marketed with Plasma Active in mind.
Vigile writes "Nintendo has never been known to be very aggressive with its gaming console hardware and with today's release (in the U.S.) of the Wii U we are seeing a continuation of that business model. PC Perspective spent several hours last night taking apart a brand new console to reveal a very simplistic board and platform design topped off with the single multi-chip module that holds the IBM PowerPC CPU and the AMD GPU. The system includes 2GB of GDDR3 memory from Samsung and Foxconn/Hon-Hai built wireless controllers for WiFi and streaming video the gamepad. Even though this system is five years newer, many analysts estimate the processing power of Nintendo's Wii U to be just ahead of what you have in the Xbox 360 today."
An anonymous reader writes "Developers been working hard for the past few months to get Linux ported to the TI-Nspire calculator. The port is not yet fully stabilized nor quite ready for broad consumption and requires some user-level knowledge of Linux systems, but is definitely worth a try. Experimental support for root filesystem installed on USB mass storage is being worked on, so that Datalight's proprietary Flash FX/Reliance filesystem used by TI's OS isn't a limit anymore. This also means that the native TI-Nspire OS image is not replaced by the Linux system, and Linux can been booted on demand. Support for USB keyboard, X server, directFB, Wi-Fi (with the help of a powered USB hub) and text-based Internet browsing is progressively being added and tested."
Freddybear writes "If your computer has been cracked and subverted for use by a botnet or other remote-access attack, is it legal for you to hack back into the system from which the attack originated? Over the last couple of years three legal scholars and bloggers have debated the question on The Volokh Conspiracy weblog. The linked webpage collects that debate into a coherent document. 'The debaters are:
- Stewart Baker, a former official at the National Security Agency and the Department of Homeland Security, a partner at Steptoe & Johnson with a large cybersecurity practice. Stewart Baker makes the policy case for counterhacking and challenges the traditional view of what remedies are authorized by the language of the CFAA.
- Orin Kerr, Fred C. Stevenson Research Professor of Law at George Washington School of Law, a former computer crimes prosecutor, and one of the most respected computer crime scholars. Orin Kerr defends the traditional view of the Act against both Stewart Baker and Eugene Volokh.
- Eugene Volokh, Gary T. Schwartz Professor of Law at UCLA School of Law, founder of the Volokh Conspiracy, and a sophisticated technology lawyer, presents a challenge grounded in common law understandings of trespass and tort.'"
lee1 writes "Using special techniques that present information to one eye while hiding the information from the conscious mind (by masking it with more distracting imagery presented to the other eye), researchers have shown two new and very unexpected things: we can read and understand short sentences, and we can perform multi-step arithmetic problems, entirely unconsciously. The results of the reading and calculating are available to and influence the conscious mind, but we remain unaware of their existence. While we have known for some time that a great deal of sensory processing occurs below the surface and affects our deliberative behavior, it was widely believed until now that the subconscious was not able to actually do arithmetic or parse sentences."
theodp writes "The WSJ catches up with FIRE's Greg Lukianoff and his crusade to expose how universities have become the most authoritarian institutions in America. In Unlearning Liberty, Lukianoff notes that baby-boom Americans who remember the student protests of the 1960s tend to assume that U.S. colleges are still some of the freest places on earth. But that idealized university no longer exists. Today, university bureaucrats suppress debate with anti-harassment policies that function as de facto speech codes. FIRE maintains a database of such policies on its website. What they share, lifelong Democrat Lukianoff says, is a view of 'harassment' so broad and so removed from its legal definition that 'literally every student on campus is already guilty.'"
smi.james.th writes "Here on Slashdot, the concept that older models of business need to be updated to keep with the times is often mentioned. A friend of mine owns a DVD rental store, and he often listens to potential customers walk out, saying that they'd rather download the movie, and not because his prices are unreasonable. With the local telco on a project to boost internet speeds, my friend feels as though the end is near for his livelihood. So, Slashdotters, I put it to you: What can a DVD store owner do to make his store more relevant? What services would you pay for at a DVD store?"
Billly Gates writes "In a bizarre, yet funny and ironic move, Microsoft warned web developers that using WebKit stagnates open standards and innovation on the Web. According to the call to action in its Windows Phone Developer Blog, Microsoft is especially concerned about the mobile market, where many mobile sites only work with Android or iOS with WebKit-specific extensions. Their examples include W3C code such as radius-border, which is being written as -WebKit-radius-border instead on websites. In the mobile market WebKit has a 90% marketshare, while website masters feel it is not worth the development effort to test against browsers such as IE. Microsoft's solution to the problem of course is to use IE 10 for standard compliance and not use the proprietary (yet open source) WebKit."
New submitter NewYork writes with this chestnut from an article about the role of age in the high-tech workplace: 'The shelf life of a software engineer today is no more than that of a cricketer — about 15 years,' says V R Ferose, MD of German software major SAP's India R&D Labs that has over 4,500 employees . 'The 20-year-old guys provide me more value than the 35-year-olds do.'" The article features similar sentiments from Mukund Mohan, CEO of Microsoft's India-based startup initiative.
cervesaebraciator writes "Saturday an article was featured on Slashdot which expressed some hope, if just a fool's hope, that a recent Republican Study Committee Brief could be a sign of broader national discussion about the value of current copyright law. When one sees such progress, credit is deservedly given. Unfortunately, others in Washington did not perhaps see this as worthy of praise. The committee's executive director, Paul Teller, sent a memo today disavowing the earlier pro-copyright reform brief. From the memo: 'Yesterday you received a Policy Brief or [sic] copyright law that was published without adequate review within the RSC and failed to meet that standard. Copyright reform would have far-reaching impacts, so it is incredibly important that it be approached with all facts and viewpoints in hand.' People who live in districts such as Ohio's 4th would do well to send letters of support to those who crafted the original brief. I cannot imagine party leadership will be happy with so radical a suggestion as granting copyright protection for the limited times needed to promote the progress of science and useful arts."
An anonymous reader writes with this snippet from cbc.ca: "'NASA's Hubble and Spitzer space telescopes (not to be outdone by the Kepler Space Telescope) have discovered the most distant galaxy identified so far in the universe... the galaxy is 13.3 billion light years away and only a tiny fraction of the size of the Milky Way. Due to the time it takes light to travel through space, the images seen from Earth now show what the galaxy looked like when the universe was just 420 million years old, according to a press statement released from NASA. The newly discovered galaxy (is) named MACS0647-JD."
An anonymous reader writes "Windows 8 may block most malware out of the box, but there is still malware out there that thwarts Microsoft's latest and greatest. A new Trojan variant, detected as Backdoor.Makadocs and spread via RTF and Microsoft Word document marked as Trojan.Dropper, has been discovered that not only adds a clause to target Windows 8 and Windows Server 2012, but also uses Google Docs as a proxy server to phone home to its Command & Control (C&C) server."
YokimaSun writes "Nintendo has today fired the first salvo in the next-gen console wars with the U.S. release of their Wii U console, which is massively more powerful than the Nintendo Wii and also the PS3/Xbox 360 (so they claim). Yet again Nintendo has done a world first and released a gamepad which is also a tablet and should provide us with games that stretch the boundaries even more. Wii games are compatible with the console, as is the Wii remote. The Wii U comes in 2 SKUs: a 32GB Deluxe package, and an 8GB Basics pack. The games lineup is a strong one, with games such as New Super Mario Bros U, Arkham City Armoured Edition, Assassins Creed 3, Call of Duty Black Ops 2, Sonic AllStars Racing, Nintendo Land, Tank Tank Tank, ScribbleNauts Unlimited, Epic Mickey 2 The Power of Two, ESPN Sports Connection, DarkSiders 2, Rabbids Land, Mass Effect 3, Ninja Gaiden 3 Razors Edge, Tekken Tag Tournament 2, Wipeout 3 and Just Dance 4 all available on launch day."