Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Open Source

LibreOffice 3.3 Released Today 470

mikejuk writes "Only four months after the formation of the Document Foundation by leading members of the OpenOffice.org community, it has launched LibreOffice 3.3, the first stable release of its alternative Open Source personal productivity suite for Windows, Macintosh and Linux. Since the fork was announced at the end of September the number of developers 'hacking' LibreOffice has gone from fewer than twenty to well over one hundred, allowing the Document Foundation to make its first release ahead of schedule The split of a large open source office suite comes at a time when it isn't even clear if there is a long term future for office suites at all. What is more puzzling is what the existence of two camps creating such huge codebases for a fundamental application type says about the whole state of open source development at this time. It clearly isn't the idealistic world it tries to present itself as."
Education

The Rise and Rise of the Cognitive Elite 671

hessian writes "As technology advances, the rewards to cleverness increase. Computers have hugely increased the availability of information, raising the demand for those sharp enough to make sense of it. In 1991 the average wage for a male American worker with a bachelor's degree was 2.5 times that of a high-school drop-out; now the ratio is 3. Cognitive skills are at a premium, and they are unevenly distributed."
Government

Iran Launches Cyber-Police Units 45

Khopesh writes "Iran is implementing a cyber police force to combat social networks and similar sources of 'espionage and riots.' This will likely result in more control over internet access than efforts that might hinder attacks like Stuxnet. 'Ahmadi Moghaddam said that Iran's cyber police will take on the "anti-revolutionary" dissident groups that used online social networks to organize protests against President Mahmoud Ahmadinejad following disputed elections held in 2009. "Through these very social networks in our country, anti-revolutionary groups and dissidents found each other and contacted foreign countries and triggered riots," said Ahmadi Moghaddam, referring to the protests that took place at the time.'"
Sci-Fi

BBC To Dispose of Douglas Adams Website 189

An anonymous reader writes "The BBC has announced their intention to dispose of the H2G2 website, originally founded by Douglas Adams. This comes as part of an initiative by the BBC to cut their online spending by 25%. 'BBC Online will be reorganised into five portfolios of "products." All parts of BBC Online have to fit with these. Over the past year all areas of the site have been reviewed to see where, and if, they fit. Sadly ... H2G2 does not fit in the new shape of BBC Online. However, H2G2 is unusual. It is a pre-existing community that the BBC brought into its fold, not a community that the BBC set up from scratch. So rather than closing it, we've decided to explore another option. This process has been referred to elsewhere as the "disposal" of H2G2. I'll admit this is not a great choice of words, but what is means is that we'll be looking for proposals from others to take on the running of H2G2.' One option under discussion is a community buyout."
Security

Ex-NSA Analyst To Be Global Security Head At Apple 145

AHuxley writes "Cnet.com reports that Apple has tapped security expert and author David Rice to be its director of global security. Rice is a 1994 graduate of the US Naval Academy and has a master's degree in Information Warfare and Systems Engineering from the Naval Postgraduate School. He served as a Global Network Vulnerability analyst (Forbes used cryptographer) for the National Security Agency and as a Special Duty Cryptologic officer for the Navy. He is executive director of the Monterey Group, a cybersecurity consulting firm. He's also on the faculty of IANS, an information security research company and works with the US Cyber Consequences Unit. In a 2008 interview with Forbes, 'A Tax On Buggy Software,' Rice talks of a 'tax on software based on the number and severity of its security bugs. Even if that means passing those costs to consumers. ... Back in the '70s, the US had a huge problem with sulfur dioxide emissions. Now we tax those emissions, and coal power plants have responded by using better filters. Software vulnerabilities, like pollution, are inevitable — producing perfect software is impossible. So instead of saying all software must be secure, we tax insecurity and allow the market to determine the price it's willing to pay for vulnerability in software. Those who are the worst "emitters" of vulnerabilities end up paying the most, and it creates an economic incentive to manufacture more secure software.'"
Mozilla

Mozilla Proposes 'Do Not Track' HTTP Header 244

MozTrack writes "The emergence of data mining by third party advertisers has caused a national debate from privacy experts, lawmakers and browser supporters. Mozilla's Firefox, a popular browser company, has proposed a new feature that will prevent people's personal information from getting mined and sold for advertising. The feature would allow users to set a browser preference that will broadcast their desire to opt-out of third party, advertising-based tracking. It would do this via a 'Do Not Track' HTTP header with every click or page view in Firefox."
Google

Google Didn't Ship Relicensed Java Code After All 223

RedK writes "In a follow up to yesterday's news about Google apparently relicensing confidential Oracle code found in Java under the ASL, it seems that the blogger who initially reported the issue was plain wrong, as the files he indicated were in breach of Oracle's copyright do not actually ship with Android. Google has also deleted many of these files, which were mostly used as unit tests."
Censorship

Comics Code Dead 316

tverbeek writes "After more than half a century of stifling the comic book industry, the Comics Code Authority is effectively dead. Created in response to Fredric Wertham's Seduction of the Innocent, one of the early think-of-the-children censorship campaigns, and Congressional hearings, the Code laid out a checklist of requirements and restrictions for comics to be distributed to newsstand vendors, effectively ensuring that in North America, only simplistic stories for children would be told using the medium of sequential art. It gradually lost many of its teeth, and an increasing number of publishers gave up on newsstand distribution and ignored the Code, but at the turn of the century the US's largest comics publishers still participated. Marvel quit it in 2001, in favor of self-applied ratings styled after the MPAA's and ESRB's. Last year Bongo (publishers of the Simpsons comics) quietly dropped out. Now DC and Archie, the last publishers willingly subjecting their books to approval, have announced that they're discontinuing their use of the CCA, with DC following Marvel's example, and Archie (which recently introduced an openly gay supporting character, something flatly forbidden by the original Code) carrying on under their own standards. The Code's cousins — the MPAA and ESRB ratings, the RIAA parental advisory, and the mishmash of warnings on TV shows — still live on, but at least North American comic publishers are no longer subject to external censorship."
The Internet

Last Days For Central IPv4 Address Pool 376

jibjibjib writes "According to projections by APNIC Chief Scientist Geoff Huston, IANA's central IPv4 address pool is expected to run out any day now, leaving the internet with a very limited remaining supply of addresses. APNIC will probably request two /8s (33 million addresses) within the next few weeks. This will leave five /8s available, which will be immediately distributed to the five Regional Internet Registries in accordance with IANA policy. It's expected that APNIC's own address pool will run low during 2011, making ISPs and businesses in the Asia-Pacific region the first to feel the effects of IPv4 exhaustion. The long-term solution to IP address exhaustion is provided by IPv6, the next version of the Internet Protocol. IPv6 has been an internet standard for over a decade, but is still unsupported on many networks and makes up an almost negligible fraction of Internet traffic. Unless ISPs dramatically accelerate the pace of IPv6 deployment, users in some regions will be stuck on IPv4-only connections while ISPs in other regions run out of public IPv4 addresses, leading to a fragmented Internet without the universal connectivity we've previously taken for granted."
Security

UK Cosmetic Retailer Lush Targeted By Hackers 109

Tasha26 writes "Cosmetic retailer Lush stopped its online activities on Jan 21 due to hacking activities. Their website is still down due to 'continuing attempts to re-enter,' and Lush is thinking of spinning a small PayPal outlet as a temporary solution. The company is urging customers who placed an order between Oct 2010 and Jan 2011 to contact their banks for advice on compromised credit card details. The company even posted a message addressed to the hacker, saying, 'If you are reading this, our web team would like to say that your talents are formidable. We would like to offer you a job — were it not for the fact that your morals are clearly not compatible with ours or our customers.'"
Microsoft

Ballmer Says 90% of Chinese Users Pirate Software 313

jbrodkin writes "Microsoft CEO Steve Ballmer used the official state visit of Chinese President Hu Jintao as an opportunity to complain that 90% of Microsoft software users in China didn't pay for the products. The comments were part of a discussion with Barack Obama and the Chinese president about intellectual property protection. According to a White House transcript, Obama said in a press conference that 'we were just in a meeting with business leaders, and Steve Ballmer of Microsoft pointed out that their estimate is that only 1 customer in every 10 of their products is actually paying for it in China.' Obama didn't detail any specific measures the US and China would take to help Microsoft and other vendors fighting software piracy. 'The Chinese government has, to its credit, taken steps to better enforce intellectual property,' Obama said. 'We've got further agreement as a consequence of this state visit. And I think President Hu would acknowledge that more needs to be done.' Microsoft did not say how it calculated the statistic that 90% of Chinese users aren't paying for Microsoft software."
Math

Euler's Partition Function Theory Finished 117

universegeek writes "Mathematician Ken Ono, from Emory, has solved a 250-year-old problem: how to exactly and explicitly generate partition numbers. Ono and colleagues were able to finally do this by realizing that the pattern of partition numbers is fractal (PDF). This pattern allowed them to find a finite, algebraic formula, which is like striking oil in mathematics."
Google

Does Google Pin Copyright Violations On the ASF? 136

An anonymous reader writes "Florian Mueller claims to have produced new evidence that he believes supports Oracle's case against Google on the copyright side of the lawsuit. Oracle originally presented one example to the court, and that file was found to have been part of older Android distributions, with an Apache license header. Mueller has just published six more files of that kind and believes the Apache Software Foundation will disown those just like the first one because those were never part of the Apache Harmony code base. Furthermore, various source files from the Sun Java Wireless Toolkit were found in the Android codebase, containing a total of 38 copyright notices that mark them as proprietary and confidential, but Google apparently published their source code regardless."
Privacy

Daniel Ellsberg On WikiLeaks, Google and Facebook 87

angry tapir writes "The Silicon Valley companies that store our personal data have a growing responsibility to protect it from government snooping, according to Daniel Ellsberg, the man who leaked the Pentagon Papers. Discussing the growing role of Internet companies in the public sphere, Ellsberg said companies such as Google, Facebook and Twitter need to take a stand and push back on excessive requests for personal data." Ellsberg spoke as part of a panel at an event from the Churchill Club, which included Clay Shirky, Jonathan Zittrain and others discussing the WikiLeaks situation.
Transportation

Electronics In Flight — Danger Or Distraction? 532

another similar writes "IEEE Spectrum has a blog post revisiting the debate on whether electronic devices pose a risk to flight avionics spurred by a NY Post article about Arianna Huffington's refusal to power down her Blackberry during takeoff. The post points out the EU's removal of their own ban on cell phone use in 2007 and the likelihood of significant non-compliance daily in the US — and curiously, planes haven't been falling from the sky at a similar rate. While the potential exists for there to be a problem, it would appear the risk is low. Ever bent the rules? Is an app for landing commercial jets somewhere in our future?"

Slashdot Top Deals

Today is a good day for information-gathering. Read someone else's mail file.

Working...