Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Linux Business

Submission + - Malaysian Open Source Procurement Policy Reversed

Ditesh writes: "The Malaysian Open Source Masterplan, which favoured open source over proprietary public sector procurements when all other evaluations are equal, has been reversed to a purely "neutral technology platform" policy due to "negative reaction towards open source (from the IT market)". This comes after months of hard lobbying by Microsoft Malaysia. This reversal is certainly unfortunate, as the policy has helped raise comfort levels of other policy makers worldwide in pursuing similar goals. The Malaysian Open Source Alliance has published a position statement asking for clarification of the term "neutrality", and has received support from MNC's, local companies and free software developers in Malaysia."
The Internet

Submission + - VC says Second Life is not sustainable

skoobafly writes: "Some VC calls Second Life an incredible innovator but won't be able to get mass market adoption and probably isn't sustainable. She's apparently an old text MUD developer and says that Second Life might be like Prodigy — a walled garden service that ultimately didn't have any long term staying power. Philip Rosedale, Second Life's CEO responds to the blog posts and admits that Second Life has some design flaws. What do you think? Do you think Second Life is all marketing hype? Do you think this is what the mass market wants? What do you think comes next in the virtual world space?"
The Almighty Buck

Submission + - Sell your idle cpu cycles

An anonymous reader writes: CPUShare is a research project created by Andrea Arcangeli with the goal of connecting together the computers of the Internet in order to create a general purpose Low Cost and World Wide Supercomputer available to everybody to use in a matter of minutes, controlled by a market for the CPU resources that chooses the price of the CPU resources using the supply and demand law in real time.

It allows the home users to profit from the significant power of their hardware that otherwise would be wasted every day, and is also the first technology that can recycle CPU cycles over the Internet without requiring donations (in terms of electric energy and aging of the CPU) from the home users.

CPUShare might give a NTCO (Negative Total Cost of Ownership) to all the Operative Systems that supports it.

Using the CPUCoins (the CPUCoins are a virtual credit, like in a video game), CPUShare can be optionally used as an energy accumulator, without requiring cash transactions to be useful. After accumulating CPUCoins, users can be allowed to share them with their friends, so that joint supercomputing projects can be developed too.

The CPUShare protocol is open and in turn it provides interoperability to all OS. Currently only x86, x86_64 and powerpc64 CPU resources can be sold with CPUShare, but all architectures can be allowed to join in the future.

CPUShare will contribute to the creation of Open Source Software that will run on top of the CPUShare system. Once a piece of software is ported on top of CPUShare it might cost the same price to run it for 24 hours on a single CPU or to run it for 1 hour on 24 CPUs.

Since all CPUShare development has to happen in the spare time in order to maintain overall profitability, CPUShare development is proceeding quite slow but it's steady.
The Courts

Submission + - Six DMCA Exemptions Granted

Xenographic writes: "The US Copyright Office has just announced six new categories of works exempt from the DMCA's prohibition against circumvention of technological measures that control access to the copyrighted works. This is good news for anyone stuck with old computer dongles or games for game consoles that are no longer available, blind people trying to read ebooks, those trying to unlock cellphones, media studies professors, and anyone who was struck by Sony's rootkit. The bad news is that the exceptions are exceedingly narrow due to their limited authority to grant exceptions. For example, the rootkit exception apparently only allows you to circumvent the access controls caused by a rootkit-laden CD, but not to circumvent any usage controls, nor to circumvent the exact same access controls were they on a DVD instead of a CD..."
Wireless Networking

Submission + - Tagging the real world

Emily writes: The Guardian has an interesting story about two technologies that let people annotate the real world, allowing you to see what others have to say about a specific place when you pass nearby (even if you don't have a GPS in the case of Navizon). Now, that terrible meal you had can become a cautionary tale on someone else's mobile phone.
A question remains though: how long before the Axis of Evil (the same people that have brought us spam, hacking, spoofing and other similar goodies) will start getting interested by this, making your cell phone pop up like there's no tomorrow? Only time will tell... But in the meantime, this technology promises a lot of fun.
United States

Submission + - Copyright Office Announces DMCA Exceptions

Baricom writes: The Library of Congress Copyright Office published its triennial list of DMCA exceptions today, according to the Electronic Frontier Foundation. For the next three years, people can circumvent protections in copy-protected CDs, DVDs, video games, dongles, e-books, and cell phones under very limited circumstances. Unfortunately, space-shifting and DVD backups weren't among the exemptions.
Announcements

Submission + - UK Police to get roadside fingerprinting tools

mormop writes: According to the BBC, British Police will soon be given the tools and permission to finger print people stopped for driving offences using a hand held scanner by the side of the road. As usual the criteria for being scanned is limited but on every prior occasion these things always end up being put to widespread use a year or so down the line. Look at a Police Officer in a funny way and win a free trip onto the National Criminal Records Database.
Programming

Submission + - Software Engineering of GUI programming

cucucu writes: "After ten years of programming for the network, I started programming a GUI Desktop application.
My problem is most GUI tutorials out there are nothing more than a taxonomy of buttons, dialogs, and checkboxes. So as I checked GUI toolkits, I found that I can easily learn all the widgets, layouts, callbacks, etc and start coding a GUI application.
But very soon I found myself repeating code all over.
Is there a good guide for the Software Engineering aspects of GUI programming? How to reuse code, and build my class hierarchies over the toolkit's one?
An online guide would be great, although I am ready to shop online for a good book covering these aspects."
Software

Submission + - Software Used to Finger Suspects

eldavojohn writes: "In Holyoke, Massachusetts the police have a new member on the team. It's facial recognition software that will mine the 9.5 million state license images of Massachusetts residents. From the article, 'Police Chief Anthony R. Scott said yesterday he will take advantage of the state's offer to tap into a computer system that can identify suspects through the Registry of Motor Vehicle's Facial Recognition System.' The kicker is that it's been in use since May and has been successful."
Security

Submission + - UK Biometric Passports cracked in minutes.

Alranor writes: In a piece of news which is unlikely to surprise anyone, the Guardian is reporting today that the new and much hyped as secure biometric passports issued by the UK government are surprisingly easy to crack.

Some choice quotes from the article:

I am sitting with my scary computer man and we have just sucked out all the supposedly secure data and biometric information from three new passports and displayed it all on a laptop computer.

"The Home Office has adopted a very high encryption technology called 3DES — that is, to a military-level data-encryption standard times three. So they are using strong cryptography to prevent conversations between the passport and the reader being eavesdropped, but they are then breaking one of the fundamental principles of encryption by using non-secret information actually published in the passport to create a 'secret key'. That is the equivalent of installing a solid steel front door to your house and then putting the key under the mat."


At this point, I have to ask, is there anything that the UK government have ever done in the IT / Computing field which they haven't royally messed up?
Microsoft

Submission + - Ballmer: Linux users owes MS for infringed patents

MadJo writes: "Linux infringes patents of Microsoft, according to Steve Ballmer. And now Microsoft wants compensation for that.

From his keynote of November 16th:
"[Suse Linux has] appropriately compensated Microsoft for our intellectual property, which is important to us. In a sense you could say anybody who has got Linux in their data center today sort of has an undisclosed balance sheet liability, because it's not just Microsoft patents. Because of the way open-source works, there's nobody who's been able to do patent coverage or patent indemnification behind that.""
Privacy

Submission + - UCLA Student Tasered by Police in Library

An anonymous reader writes: An Iranian-American student at UCLA was tasered on Tuesday by campus police for failing to provide proper identification during a random security check at the school library.

The shocking incident was caught on videotape and has created quite a controversy in the Westwood campus.

Police tasered the student even after he was handcuffed and posed no threat to anyone.

http://youtube.com/watch?v=5g7zlJx9u2E
http://www.dailybruin.com/news/articles.asp?id=389 60
Power

Submission + - Wireless power on the horizon

cLive ;-) writes: "The BBC is reporting on developments in the world of wireless power transmission. An MIT team is exploring the idea of transmitting power through resonance (rather than using the pretty inefficient induction method).

"When you have two resonant objects of the same frequency they tend to couple very strongly," Professor Soljacic told the BBC News website. "Consumers desire a simple universal solution that frees them from the hassles of plug-in chargers and adaptors". That's a bit of an understatement!"

Slashdot Top Deals

Genetics explains why you look like your father, and if you don't, why you should.

Working...