alphadogg writes: "Microsoft Wednesday is unveiling the first public beta of its Office Communications Server and Office Communicator client, the heart of its unified communications strategy. Oil company Shell is already kicking the tires.
[spam URL stripped]o soft-beta-voip.html"
Tdak writes: "This article offers a simple, no high tech stuff, description of the BitTorrent network and how it works, it also offers a list of most popular Torrent applications, with pros and cos of them. One section is dedicated to tweaking your bit torrent.
From the article:
"BitTorrent is a peer-to-peer network based on the idea that many people sharing a single file is more productive than a single host for a single file. It was not designed as a haven for pirates and copyright violation."
Also this article offers an overview of common bit torrent files Click here to read it "
darkreadingman writes: "How does a company know when its employees are giving away confidential information via blogs or chat rooms? How does it know when phishers or competitors are misusing its logos or brand information? Most companies don't.
Now there's a growing group of cyberintelligence companies that are trying to help. Using Web crawlers and skilled researchers, these companies scour the Internet for evidence of security leaks or misuse of confidential information. Want to know if a prospective employee blogs too much about his company? Want to know what competitors are saying about your company? These services can tell you.
But while such services may help companies beef up their security, they raise some interesting privacy issues. Should a corporation use its employee's personal blogs against them? Is it ethical for companies to monitor what employees say in online chat rooms? Some interesting questions here.
The Xoxo Reader writes: "The Washington Post has a front-page article about AutoAdmit (a.k.a Xoxohth), a message board for law students and lawyers that has been criticized for allowing users to post racist and sexist attacks under the cover of anonymity. The article (and the message board itself) raises important questions about whether freedom of speech can go too far, even if anonymity and loose moderation can otherwise promote usefuldiscussionaboutthelegalcommunity."
Government Drone writes: "Remember the 1997 deal in which Microsoft bought $150 million in non-voting Apple stock? According to this story in InformationWeek, it wasn't done all out of the goodness of Bill Gates' heart:
Weeks prior to bailing out a struggling Apple Computer by purchasing $150 million of its stock, Microsoft officials threatened to cut development of a key product for the Macintosh in order to coerce its rival to make the deal, according to an e-mail unearthed during a recent court hearing.
The original text of the E-mail is here, which mentions a threat to pull the plug on Office for Mac, but argues against it for a variety of reasons. An interesting backend view of what was happening in Apple's darkest days."
writertype writes: "Samsung has become the first company begin shipping hybrid hard drives, we report on ExtremeTech. Unfortunately, there's no word yet (besides "soon") on when retail shipments will begin, or when (or if) 3.5-inch models will be available. Note that these are different than the ReadyBoost USB flash drives optimized for Vista; hybrid drives contain a smaller amount of flash, and work as a write cache for your notebook drive, extending battery life."
piersonr writes: "Under No Child Left Behind, high schools are required to turn over lists of student contact information to the Department of Defense, which adds this information to an extensive database of children. The Department of Defense claims to need the names, addresses, and phone numbers of high school students for recruiting purposes, because it enables recruiters to contact children directly in their homes and at school, which is often done without the knowledge or consent of their parents. Yesterday, Silicon Valley Congressman Mike Honda introducedlegislation to restrict recruiter's access to just those students who have "opted-in" to the list."
icepick72 writes: Canadian B.C. businessman Gordon Keast is suing Telus, a North American phone carrier, after the company refused to let him out of a three-year cellphone contract because he objects to Telus offering what he says is a pornography service.
Meanwhile a priest in Vancouver is urging Catholics to boycott Telus because of the adult content.
Telus is the first North American provider to directly offer such a service. While the priest is directing others regarding this issue, the businessman just wants out — should he be allowed to break his contract?
(Cue jokes: A Canadian businessman, a Telus representative and a priest go fishing...)
from the searching-for-some-free-sushi dept.
castironwok writes "Finally, everything you've ever wanted to know about being an employee at Google, Microsoft, and Yahoo. Tastyresearch describes his (or her) past few years interning and working at the three companies. Things I didn't know from before: Bill Gates wears old shoes, Google's internal security watches you like a hawk, the office styles of each company, and how to fill your suitcase with Google T-shirts. He calls the few select companies the 'prestigious internship circle', noting 'once you have worked at one, it's a lot easier to get into another'."
santakrooz writes: Delphi's always been known as a solid database application development platform, it just had it's 12th birthday on Valentines day, and now the Delphi guys are coming up with a completely new database architecture. The interesting thing is that it's backward compatible, insanely extensible, single sourced between.NET and Wintel native code, and... and written completely in Delphi. Ok I know Delphi's written in Delphi and there are "wow" apps out there written in Delphi like Skype that Delphi guys always like to mention, there was a loosely supported Linux version, so my question is, what can't you do in Delphi? Or a better question is... what have Slashdot readers written in Delphi?
Roland Piquepaille writes: "Today, about 90 percent of the world's electricity is created through an indirect and inefficient conversion of heat. It is estimated that two thirds of the heat used by thermoelectric converters are wasted and released. But now, researchers from the University of California at Berkeley have found a new way to convert this wasted heat into electricity by trapping organic molecules between metal nanoparticles. So far, this method of creating electricity creation is in its very early stage, but if it can scale up to mass production, it may lead to a new and inexpensive source of energy. Read more for many additional references about this research work."
Tony Y. writes: "Nenest (http://www.nenest.com) is a web platform which enables anyone to create online software support databases. Users use Nenest Form Builder to create online forms, then use those form to collect, organize and store data. Those data can be secure for internal employees or members accessing only; or published to public by using social networking tools, including RSS feeds, Digg, del.icio.us and Sphere."