theodp writes "In the movie Groundhog Day, a weatherman finds himself living the same day over and over again. It's a tale to which software-designers-of-a-certain-age can relate. Like Philip Greenspun, who wrote in 1999, 'One of the most painful things in our culture is to watch other people repeat earlier mistakes. We're not fond of Bill Gates, but it still hurts to see Microsoft struggle with problems that IBM solved in the 1960s.' Or Dave Winer, who recently observed, 'We marvel that the runtime environment of the web browser can do things that we had working 25 years ago on the Mac.' And then there's Scott Locklin, who argues in a new essay that one of the problems with modern computer technology is that programmers don't learn from the great masters. 'There is such a thing as a Beethoven or Mozart of software design,' Locklin writes. 'Modern programmers seem more familiar with Lady Gaga. It's not just a matter of taste and an appreciation for genius. It's a matter of forgetting important things.' Hey, maybe it's hard to learn from computer history when people don't acknowledge the existence of someone old enough to have lived it, as panelists reportedly did at an event held by Mark Zuckerberg's FWD.us last Friday!"
Dawn Kawamoto writes "Alcatel-Lucent has cut 7,500 jobs since the start of the year — a couple thousand more than what employees of the embattled telecom equipment maker may have been expecting. Last summer, Alcatel-Lucent said it expected to cut over 5,000 jobs by the end of 2013. Well, cuts have gone deeper than that, and the company's newly minted CEO, Michel Combes, told Wall Street during the second quarter earnings call Tuesday to expect additional cuts and the related cost savings in the coming quarters."
An anonymous reader sends this quote from an article at Wired: "In a dramatic about-face on a key internet issue yesterday, Google told the FCC (PDF) that the network neutrality rules Google once championed don't give citizens the right to run servers on their home broadband connections, and that the Google Fiber network is perfectly within its rights to prohibit customers from attaching the legal devices of their choice to its network."
Nerval's Lobster writes "If struggling online-games developer Zynga thought things were bad before, they could be turning a whole lot worse: Facebook is rolling out a pilot program for small- and medium-sized game developers. 'Through the program, we will work with select game developers and provide promotional support for their games in placements across our mobile apps,' reads a note on the Facebook Developers Website. Facebook is promising those developers access to the social network's '800 million monthly mobile users,' a variety of analytics tools for measuring their games' impact, and a 'unique targeting ability' for finding the right audiences — all for a cut of the games' revenue. 'We will be collaborating deeply with developers in our program by helping them cultivate high-quality, long-term players for their games,' the note added. Zynga benefited mightily from its relationship with Facebook, but other developers have subsequently realized they can utilize many of Zynga's tricks — and the social network's enormous audience — for their own ends. King is now Facebook's top app developer, largely on the strength of its Candy Crush Saga game. If Facebook encourages more small- and medium-sized developers to jump into the social gaming, it could fill the arena with even more competitors, which could prove bad news for the already-reeling Zynga. But for Facebook, the benefits are obvious: if any of those tiny-for-the-moment developers create a hit game, the revenues will come flooding in. That would supplement the social network's ad revenue, all while ensuring it doesn't need to overly depend on a single large developer with a set portfolio of games. Zynga has already been suffering from gaming-studio closings, games being shut down, and a declining user-base."
adeelarshad82 writes "Researchers at the U.S. Department of Energy's SLAC National Accelerator Laboratory recently demonstrated electrical switching thousands of times faster than in transistors now in use thanks to a naturally magnetic mineral called magnetite (abstract). The experiment is considered a major step forward in understanding electrical structures at the atomic level and working with recently identified electrical 'building blocks' called trimerons. The breakthrough could lead to innovations in the tiny transistors that control the flow of electricity across silicon chips, enabling faster, more powerful computing devices."
dryriver writes "'The head of police for Moscow's subway system has said stations will soon be equipped with devices that can read the data on the mobile telephones of passengers. In the July 29 edition of Izvestia, Moscow Metro police chief Andrei Mokhov said the device would be used to help locate stolen mobile phones. Mokhov said the devices have a range of about 5 meters and can read the SIM card. If the card is on the list of stolen phones, the system automatically sends information to the police. The time and place of the alert can be matched to closed-circuit TV in stations. Izvestia reported that 'according to experts, the devices can be used more widely to follow all passengers without exception.' Mokhov said it was illegal to track a person without permission from the authorities, but that there was no law against tracking the property of a company, such as a SIM card.' What is this all about? Is it really about detecting stolen phones/SIM cards, or is that a convenient 'cover story' for eavesdropping on people's private smartphone data while they wait to ride the subway? Also — if this scheme goes ahead, how long will it be before the U.S., Europe and other territories employ devices that do this, too?"
An anonymous reader writes "We keep hearing that the 'Internet of Things' is coming – that day when we'll all have not just smart phones but also smart refrigerators, smart alarm clocks, and smart roads and bridges. A new article in IEEE Spectrum magazine makes the argument that this won't happen unless engineers do some serious rethinking of how the Internet's basic routing architecture works. The author, Anthony Liotta, offers some interesting solutions based on two networks in the human body: the autonomic nervous system and the cognitive brain."
An anonymous reader writes "Google today announced it has already started upgrading all of its SSL certificates to 2048-bit keys. The goal is to beef up the encryption on the connections made to its services. Google says the upgrade, which includes the root certificate that the company uses to sign all of its SSL certificates, will be completed 'in the next few months.' Previously, however, Google was more specific and said it was aiming to finish the process by the end of 2013."
Zothecula writes "The additive layer process of conventional 3D printers means they are usually limited to bottom up fabrication on three axes. Now, the LA-based NSTRMNT team has created a 3D printing process called suspended disposition that gets around gravity by printing objects within a gel. Not only does this allow freeform additive fabrication on six axes, it also enables an 'undo' function."
freddienumber13 writes "In another patent surprise, a patent application by Apple for pinch-to-zoom has been rejected by the USPTO on the grounds that its claims were either anticipated by previous patents or simply unpatentable. This will be welcome news for Samsung, who back in April asked for a stay of the trial. However, Apple has a short period of time in which they can appeal this finding."
Tasmania, there is a Secret Lab. More accurately, it is a business called Secret Lab, run by co-founders Paris Buttfield-Addison and Jon Manning. On their website they say, “Secret Lab is an indie game developer and mobile app training studio based in Hobart, Australia. We're responsible for some of the world's most popular mobile apps -- recently, we've worked on Meebo for iPhone, ABC Play School Art Maker for iPad, ABC Good Game for iPhone and ABC Foodi for iPad. Secret Lab also offers intensive training workshops on iOS and Android development.” They recently presented at OSCON in Portland, OR, where Timothy Lord and his camcorder caught up with them there (as did Rachel Roumeliotis of O'Reilly Media with her camcorder). At just over 30 minutes, this is the longest Slashdot video interview we've ever run. It's worth the time, despite some rough sound patches, if you are interested in mobile game development -- or even if you are just interested in seeing what kind of colorful people do this sort of thing.
curtwoodward writes "MIT's long-awaited internal investigation into its handling of the Aaron Swartz prosecution has been released (PDF), and it's massive — about 180 pages, not counting the reams of supporting documents. And although the report's authors say they were told not to draw any conclusions about MIT's actions — really — they still gently criticized the university. Swartz, a well-known activist, killed himself earlier this year while being prosecuted for federal computer crimes after he improperly downloaded millions of academic research articles. MIT remained notably 'hands-off' throughout the case, the internal report notes, despite requests that it defend Swartz or oppose the prosecution, and ample opportunities to show leadership. The report quotes an MIT official: 'MIT didn't do anything wrong; but we didn't do ourselves proud.'" Swartz's partner, Taren Stinebrickner-Kauffman, calls the report a whitewash.
crashcy sends word that a verdict has been handed down in the case of Bradley Manning. Quoting: "A military judge on Tuesday found Pfc. Bradley Manning not guilty of aiding the enemy, but convicted him of multiple counts of violating the Espionage Act. Private Manning had already confessed to being WikiLeaks’ source for a huge cache of government documents, which included videos of airstrikes in which civilians were killed, hundreds of thousands of front-line incident reports from the Afghanistan and Iraq wars, dossiers on men being held without trial at the Guantánamo Bay prison, and about 250,000 diplomatic cables. But while Private Manning had pleaded guilty to a lesser version of the charges he was facing, which could expose him to up to 20 years in prison, the government decided to press forward with a trial on a more serious version of the charges, including 'aiding the enemy' and violations of the Espionage Act. Beyond the fate of Private Manning as an individual, the 'aiding the enemy' charge — unprecedented in a leak case — could have significant long-term ramifications for investigative journalism in the Internet era."
siliconbits writes "The debate about tagging has been going for nearly a decade. Slashdot has covered it a number of times. But it seems that nobody has yet to come up with a foolproof solution to tagging. Even luminaries like Engadget, The Verge, Gizmodo and Slashdot all have different tagging schemes. Commontag, a venture launched in 2009 to tackle tagging, has proved to be all but a failure despite the backing of heavyweights like Freebase, Yahoo and Zemanta. Even Google gave up and purchased Freebase in July 2010. Somehow I remain convinced that a unified, semantically-based solution, using a mix of folksonomy and taxonomy, is the Graal of tagging. I'd like to hear from fellow Slashdotters as to how they tackle the issue of creating and maintaining a tagging solution, regardless of the platform and the technologies being used in the backend." A good time to note: there may be no pretty way to get at them, but finding stories with a particular tag on Slashdot is simple, at least one at a time: Just fill in a tag you'd like to explore after "slashdot.org/tag/", as in "slashdot.org/tag/bizarro."
An anonymous reader writes "Having been targeted by malware in the past, anti-government protesters in Bahrain are now being hit hard by IP tracking attacks, according to a researcher. Bill Marczak, of Bahrain Watch and Citizen Lab, who is putting together a report on the attacks, said it appeared Bahrain officials had been masquerading as fake activists, sending obfuscated URLs to targets to learn their IP address. The next step is to take the IP address and the time of the click to the relevant ISP to find out who the user is. Then all sorts of things can happen. 'People who have clicked on these links have suffered various types of consequences ranging from having their houses raided and being charged for saying insulting things about the king on Twitter, or losing their jobs,' says Marczak. 'It looks like, from our investigation so far, in one case, the government did lock up the wrong person.'"