Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Communications

F/OSS Multi-Point Video-Conferencing 127

DarkSarin writes "Given that solutions like iChat can seamlessly video-conference for multiple parties on the Mac, and that others are semi-commercial, like Oovoo (which recently left beta and is no longer free for more than 3-way calls), what do you recommend in terms of a F/OSS solution to a need for moderate-sized video-conferencing? Ideally, it would be something which does not use a web-page and does not require hours of configuration. iChat is insanely easy to use. Mebeam.com is also quite simple to operate, but requires so much screen real estate that it can't easily be used in conjunction with any other software. Referring to other documents while in the middle of the conference is nice, but it's important to have the reactions of the other participants — and not everyone has multiple monitors. I am aware of projects like vmukti and services like ustream.tv, but I am thinking more in terms of a stand-alone application that is F/OSS (Ekiga/GnomeMeeting comes to mind, but it does not do multi-point video chat unless one also has access to an H.323 gateway, which is apparently non-trivial to implement). With the prevalence of broadband connections, I am surprised that a solid effort is missing for making easy, painless multi-point video-conferencing for more than 3 or 4 connections (which seems to be the most that a lot of 'free' solutions offer, or even the low-cost ones). So, my question is two-fold: First, why isn't there a better effort at medium to large video-conferencing that pretty much anyone can set up? Second, do you know of any F/OSS applications which work well and support a minimum of 6 to 8 connected parties?"
Communications

20% of U.S. Population Has Never Used Email 279

Ezratrumpet writes "A recent PC World article notes that 20 percent of the U.S. population has never sent an email. Does this number over- or underestimate the actual number of people who know nothing of email? What are the implications of this statistic to our society? Or are these people just Luddites who mourned the demise of the telegraph and have also never used a telephone?"
Medicine

Surgical Robot Removes Calgary Woman's Brain Tumor 107

Raver32 points out an article in the Victoria Times Colonist about an interesting advance in robotic surgery: "Calgary doctors have made surgical history, using a robot to remove a brain tumor from a 21-year-old woman. Doctors used remote controls and an imaging screen, similar to a video game, to guide the two-armed robot through Paige Nickason's brain during the nine-hour surgery Monday. Surgical instruments acting as the hands of the robot — called NeuroArm — provided surgeons with the tools needed to successfully remove the egg-shaped tumor."
The Internet

Canadian ISP Ordered to Prove Traffic-Shaping is Needed 177

Sepiraph writes "In a letter sent to the Canadian Association of Internet Providers and Bell Canada on May 15, the Canadian Radio-television and Telecommunications Commission (CRTC) have ordered Bell Canada to provide tangible evidence that its broadband networks are congested to justify the company's Internet traffic-shaping policies. This is a response after Bell planned to tackle the issue of traffic shaping, also called throttling, on the company's broadband networks. It would be interesting to see Bell's response, as well as to see some real-world actual numbers and compare them to a previous study."
The Internet

Most Business-Launched Virtual Worlds Fail 72

bughunter writes "Internet consultant firm Gartner claims that only 1 in 10 commercial virtual worlds succeeds, and most fail within 18 months: 'Businesses have learned some hard lessons," Gartner analyst Steve Prentice said in a statement released Thursday. "They need to realize that virtual worlds mark the transition from Web pages to Web places and a successful virtual presence starts with people, not physics. Realistic graphics and physical behavior count for little unless the presence is valued by and engaging to a large audience."'" Hard to believe it's even as high as one in ten -- most "virtual worlds" with obvious commercial trappings certainly don't inspire much besides mockery.
Operating Systems

Removing the Big Kernel Lock 222

Corrado writes "There is a big discussion going on over removing a bit of non-preemptable code from the Linux kernel. 'As some of the latency junkies on lkml already know, commit 8e3e076 in v2.6.26-rc2 removed the preemptable BKL feature and made the Big Kernel Lock a spinlock and thus turned it into non-preemptable code again. "This commit returned the BKL code to the 2.6.7 state of affairs in essence," began Ingo Molnar. He noted that this had a very negative effect on the real time kernel efforts, adding that Linux creator Linus Torvalds indicated the only acceptable way forward was to completely remove the BKL.'"

Understanding How CAPTCHA Is Broken 148

An anonymous reader writes "Websense Security Labs explains the spammer Anti-CAPTCHA operations and mass-mailing strategies. Apparently spammers are using combination of different tactics — proper email accounts, visual social engineering, and fast-flux — representing a strategy, explains their resident CAPTCHA expert. It is evident that spammers are working towards defeating anti-spam filters with their tactics."
The Military

The World's Spookiest Weapons 224

DesScorp writes "Popular Science has a piece on some outrageous ideas for weapons; some came to fruition, and others didn't. And while some of the weapons (atom bombs, chemical weapons, bats with bombs strapped to them that seek out homes and buildings at night) are truly frightening, some of them are also kind of silly, such as the Gay Bomb, and the Frisbee bomb that was labeled the 'Modular Disc-Wing Urban Cruise Munition.'"
Communications

NSF Research Reveals Chain Letter Travel Patterns 60

alphadogg writes to tell us that the NSF is researching chain letters and how they travel. The results aren't quite what one might expect, showing a pattern of more selective and circuitous travel. "One surprising finding was that messages often took meandering routes between people who knew each other, often through as many as 100 intermediaries. Many email users also received copies from multiple social groups. The researchers concluded that because messages come from many directions, there's ample opportunity for the messages to be edited along the way."
The Internet

US Senate Asks for National Security Letter Explanation 151

A group of U.S. Senators are asking the FBI to explain a recent controversial National Security Letter sent to the Internet Archive. The Internet Archive was able to defeat the request with help from the EFF and the ACLU this past April. "The Internet Archive's case is only the third known legal challenge to NSLs, despite the fact that the the FBI issues tens of thousands a year -- more than 100,000 such letters were issued in 2004 and 2005 combined. But despite the lack of legal challenges from recipients at ISPs, telephone companies and credit bureaus, successive scathing reports from the Justice Department's Inspector General have found illegal letters and a willy-nilly culture within the bureau towards tracking their usage."
XBox (Games)

Resident Evil 5 — New Character and Gameplay Detail 30

Erik Johnson writes "New details for Resident Evil 5 have been unveiled in the latest issue of 'Famitsu,' a Japanese video game magazine, including a familiar face returning to the hero role, some info on the enemy, and the revealing of a couple new characters."

Slashdot Top Deals

"May your future be limited only by your dreams." -- Christa McAuliffe

Working...