Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Social Networks Gaining on Internet Portals 96

Compete writes "We have some interesting analysis on how Social Networking sites compare to portals. From a sample size of around 2 million US people, Compete concludes that social networking sites are quickly approaching the traffic level of the big portals like Google and Yahoo. They liken the growth of SNS to email in the 90's. Their key findings: 1. In June, 2 out of every 3 people online visited a social networking site 2. Since January 2004, the number of people visiting or taking part in one of the top online social networks has grown by over 109% 3. Social networking sites are now close to eclipsing traffic to the giants — Google and Yahoo"

The FSF, GPLv3 and DRM 388

whats-life-without-gpl writes "FSF has a thing against DRM. This article tries to explain why RMS isn't a DRM (Note that NewsForge is also owned by OSTG) fan and how GPLv3 is gearing up to protect against it. "

Inside View on Apple WWDC Rumors 231

AppleLurker writes "In a recent interview with DVD newsroom an Apple employee talks WWDC rumors including the iPhone, Blu-ray, MacPro and the Apple Tablet. More realistic about what not to expect next week when Steve Jobs hits the stage." Apple's next move is always a hotbed of debate leading up to a product release and with all the rumors flying this year all bets are off until we see the checkered flag, so take with the requisite grain of salt.

The Next Three Days are the x86 Days 589

Pinky wrote in to note that "Today, tomorrow and the next day are the only days we'll get dates like this: 2/8/6 3/8/6 4/8/6 like the x86 computers :-)" And yes folks, in the August news cycle vortex, even this strikes my fancy. In recent years we've seen numerical giants like 3/1/4, 6/6/6 and 1/2/3, but now really, what do any of us have to look forward to? Is our future dull and meaningless without cool numbers in dates? Oh the humanity of it all ...

Pentagon Monitors War Videos Online 216

jonfr writes "According to the BBC, the Pentagon is monitoring online war videos on YouTube and other webpages." From the article: "There is no specific policy that bans troops from posting graphic material. But troops who have served in Iraq and Afghanistan are hearing the message that they should consider carefully what videos they upload to the web. Sites such as YouTube and Ogrish have hundreds or thousands of clips from soldiers, some set to rock music."

Text Mining the New York Times 104

Roland Piquepaille writes "Text mining is a computer technique to extract useful information from unstructured text. And it's a difficult task. But now, using a relatively new method named topic modeling, computer scientists from University of California, Irvine (UCI), have analyzed 330,000 stories published by the New York Times between 2000 and 2002 in just a few hours. They were able to automatically isolate topics such as the Tour de France, prices of apartments in Brooklyn or dinosaur bones. This technique could soon be used not only by homeland security experts or librarians, but also by physicians, lawyers, real estate people, and even by yourself. Read more for additional details and a graph showing how the researchers discovered links between topics and people."

Flaw Finders Lay Seige to Microsoft Office 149

An anonymous reader writes "The Register is reporting that bug reports on the latest iteration of Microsoft Office are certainly keeping the Redmond firm's programmers busy. So far this year 24 flaws have been found by outside researchers, more than six times the number found in all of 2005. From the article: 'The deluge of vulnerabilities for the Office programs - Word, Excel, PowerPoint, Outlook, and, for professional users, Access -signals a shift in the focus of vulnerability research and underscores the impact of flaw-finding tools known as fuzzers. The vulnerabilities in Office also highlight the threat that such files, if remained unchecked, can pose to a corporate network. Not since the days of macro viruses and Melissa have Office files posed such a danger to computer security.'"

A Preview of Election 08 - Podcasting Politicians 134

Video Blogger writes "The LA Times predicts that the 2008 election will feature the rise of Podcasting Politicians, as strategists from both parties try to ride the latest trends to secure a victory in 2008. 'You'll not only be able to text people with messages, you'll be able to raise money, deliver video, audio, create viral organizing -- where one person sees something really interesting and it gets passed on and on,' says Donnie Fowler, a Democratic strategist."

Yahoo! Sells, Advocates DRM-Free Music 244

prostoalex writes "Jessica Simpson's 'A Public Affair' will be sold on Yahoo! Music in MP3 format with no DRM attached. According to Yahoo! Music blog, this is a big deal for the major online music store: 'As you know, we've been publicly trying to convince record labels that they should be selling MP3s for a while now. Our position is simple: DRM doesn't add any value for the artist, label (who are selling DRM-free music every day -- the Compact Disc), or consumer, the only people it adds value to are the technology companies who are interested in locking consumers to a particular technology platform. We've also been saying that DRM has a cost. It's very expensive for companies like Yahoo! to implement. We'd much rather have our engineers building better personalization, recommendations, playlisting applications, community apps, etc, instead of complex provisioning systems which at the end of the day allow you to burn a CD and take the DRM back off, anyway!'"

SCO to Unix developers, We want you back 427

NoGuffCheck writes "CRN is reporting that Darl McBride is looking to get Unix developers back onboard with cash incentives for completing training in SCO's new mobile application kit; EdgeBuilder. It doesn't stop there; there's a 12-cylinder BMW or $100,000 dollars for the development of the best wireless application."

EuroBSDCon 2006, Nov. 10-12th 2006 in Milan 11

nezmar writes "'The 5th European BSD conference is the 2006 event held in European continent where developers can meet, share new ideas and show off the progress of their work. It is also a great place for business players to get in touch with the BSD products and the people behind them.' It will be held in Italy, in Milan, and will be a 3-day event from the 10th to the 12th of November. The first day will be dedicated to tutorials and the other two days to technical sessions. There's also a Call For Tutorials and Papers: abstracts are due before midnight CET on July 31st, 2006."

2006 OpenBSD Hackathon Well Underway 71

An anonymous reader writes "KernelTrap is running a two part who's who at the 2006 OpenBSD Hackathon. Starting on the 27th and running for a full week, developers get together and concentrate on communication rather than just development. Project leader Theo de Raadt was quoted as saying 'I don't think anybody else does this, developers suspend their lives for a week to focus entirely on just development.'"

Should Students Be Taught With or Without an IDE? 848

bblazer asks: "Beginning this next school year, there is a strong possibility I will be teaching an intro to Java and an intro to Python course at the local community college. I was wondering what the prevailing wisdom is when it comes to teaching languages - should students be taught with or without an IDE? I am a bit old school and wouldn't mind having them all use vi or emacs, but using a good IDE does have some advantages as well. I should note that the students I will be teaching will have had at least 1 semester of programming in VB or C++." Even though there is limited time in a semester, could a curriculum be constructed to accommodate both methods?

UK Law May Criminalize IT Pros 514

An anonymous reader writes "More worrying news from the UK. This time, a bill meant to fight cybercrime may make it illegal to use or make available network security tools available, just because they could be used by hackers." From the article: "Clayton cited the Perl scripting language, created by Larry Wall in 1987, as an example of a useful technology that could fall foul of the law. 'Perl is almost universally used on a daily basis to permit the Internet to function,' said Clayton. 'I doubt if there is a sysadmin on the planet who hasn't written a Perl program at some time or another. Equally, almost every hacker who commits an offense under section 1 or section 3 of the CMA will use Perl as part of their toolkit. Unless Larry is especially stupid, and there is very little evidence for that, he will form the opinion that hackers are likely to use his Perl system. Locking Larry up is surely not desirable.'" A note that this is equally confusing but separate from yesterday's story about the UK government wanting private encryption keys.

Sun Announces $100k Contest for Grid App Developers 80

C-Shalom writes "EWeek reports that Sun announced a contest where developers can compete for $100k in prizes for developing applications that utilize the Grid. This is in addition to 100 free CPU hours on the Grid. From the article: 'Sun is hosting a competition where developers can compete for $50,000 in prize money. The winners of the Sun Grid Compute Utility Cool Apps Prize for Innovation contest will be determined based on the software they develop on the grid, MacRunnels said. Sun is planning additional contests for later in the year, which will bring the total potential winnings to $100,000.' The press release contains more info not included in the article."

Slashdot Top Deals

Get hold of portable property. -- Charles Dickens, "Great Expectations"

Working...