Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Music

Submission + - Club Owner Has To Pay $40k For 10 Cover Songs

An anonymous reader writes: The music industry continues to look to squeeze money out of every possible place. The latest is the story of a club owner in Colorado who was forced to pay $40,000 because a cover band performed at his club and played 10 whole songs. It's true that the club owner in question did not have an ASCAP license, but it's hard to imagine why the club owner should be paying those fees rather than the band, and how it could possibly be fair to pay $40,000 for 10 cover songs that, if anything, probably acted as advertising for the real bands' songs.
Intel

Submission + - Intel Launches Two New Centrino Mobile Platforms

crazyeyes writes: "Intel launched two new Centrino mobile platforms . Intel calls them the Centrino Duo and Centrino Pro. The first is for mainstream users, while the second is for business users. There are also six new Core 2 Duo processors — four standard processors and two low-voltage processors.

The report has specifications of those processors as well as new key features of both platforms and a comparison of the two new platforms. Here's a quote from the article :

The new Santa Rosa mainstream mobile platform will continue to use the Intel Centrino Duo brand name, replacing the Napa platform which was released in 2006. So, there will be some confusion as to which notebook has the latest Santa Rosa technology and which is still based on the older Napa platform. Good luck trying to get the correct information from your local retailers. Some still cannot explain the difference between a platform brand (e.g. Centrino) and a processor (e.g. Core 2 Duo).

Perhaps that's the effect Intel marketing is looking for. Why bother about such details? All you need to know is that it's an Intel Centrino notebook and that's what you should buy!
"
Privacy

Submission + - Harvard prof: computers need to "forget" m

Jessamine writes: A Harvard professor argues that too much information is being retained by computers, and the machines need to learn how to forget things as humans always have. "If whatever we do can be held against us years later, if all our impulsive comments are preserved, they can easily be combined into a composite picture of ourselves," he writes in the paper. "Afraid how our words and actions may be perceived years later and taken out of context, the lack of forgetting may prompt us to speak less freely and openly." Will such massive databases make us all act like politicians? Is data retention creating a "panopticon"? These are questions that the good doctor raises.
Movies

Submission + - Lucas To Make New Live Action Star Wars films

DrNASA writes: An article that quoted George Lucas as saying that SpiderMan 3 is a 'silly movie' also had this interesting bit of King Geek speak: "And here's a little news: Lucas tells me he will make two more live-action films based in the "Star Wars" era. "But they won't have members of the Skywalker family as characters," he said. "They will be other people of that milieu." " TFA — http://www.foxnews.com/story/0,2933,270874,00.html
Hardware Hacking

Submission + - Long-range eye tracking for advertisers

holy_calamity writes: A Canadian firm has launched a device that can track the gaze of multiple people from up to 10 metres away. Originally developed at Queen's University, Ontario, they hope to sell it to advertisers to allow them to monitor how many people look at their ads. Admittedly they are trying more benign stuff too like better hearing aids, but I doubt that will make up for movie posters that make a song and dance whenever you glance their way.
Security

Submission + - Over 10,000 malware sites hosted by IPowerWeb

mdm42 writes: "Ethan Zuckerman blogs that a friend's website, hosted with IPowerWeb, got hacked. Turns out that almost eleven-thousand websites hosted by IPowerWeb have also been hacked in the same manner, but IPowerWeb denies that they have a security problem. The crack injects malicious JavaScript into hosted web pages; the purpose of the JavaScript? To load Windows trojans onto client machines that access the websites.

To the rest of us it looks like their systems have been compromised from the ground up. Or perhaps an inside job...?"
Programming

Submission + - Build and Brand an Eclipse RCP app

An anonymous reader writes: This article provides step-by-step guidelines on how to package and manage a Rich Client Platform (RCP) application as a product with your own branding by using Eclipse's Production Configuration and PDE. Thanks to Eclipse V3.1's new Production Configuration feature, you can now wrap their applications with dependencies and branding elements easily. This article details how to leverage Eclipse Product Configuration with a sample RCP application.
Books

Submission + - Learn how to deal with bosses who are IT jerks

An anonymous reader writes: http://www.cioinsight.com/article2/0,1540,2127212, 00.asp

CIO Insight has just published an interview with author Robert Sutton regarding this new book, "The No Asshole Rule: Building a Civilized Workplace and Surviving One That Isn't. Here's an excerpt:

Robert Sutton's book, The No Asshole Rule: Building a Civilized Workplace and Surviving One That Isn't (Warner Business Books, February 2007), stemmed from articles he wrote for the Harvard Business Review and CIO Insight. "I was surprised how much suffering there was out there," says the Stanford management science professor, referring to the deluge of e-mail messages he received after those pieces were published. He spoke with CIOI Senior Writer Edward Cone about jerks and bullies in the IT workplace.

Read More: http://www.cioinsight.com/article2/0,1540,2127212, 00.asp
Security

Submission + - New Bank Authentication Scheme Debuts, Gets Hacked

An anonymous reader writes: Harvard and CommerceNet researchers report breaking Vidoop, a new two-factor graphical authentication scheme for banks. The scheme requires users to remember "image categories" to login and is supposedly invulnerable to phishing attacks, keyloggers and "all prevalent forms of hacking" (according to theri website and their TV commercial on YouTube). The researchers describe how they broke the scheme in a few hours with a man-in-the-middle attack, and they posted a video of the attack. This is related to the attack on Bank of America's SiteKey by the boarding pass hacker and to the Harvard study on SiteKey that shows how easily users get phished.
Programming

Submission + - 10 Procrastination Avoidance Tips for Techies

kierny writes: Dice.com runs an article on 10 tips for avoiding procrastination. According to researchers, almost everyone procrastinates, and up to 20% of people do so chronically. Overcoming the tendency to procrastinate is especially difficult for techies, give that technology — while boosting productivity — also leads us to distraction, and distractions — Flickr, Skype, IM'ing, BlackBerries — stoke our desire to procrastinate. To help, a leading industrial psychologist recommends a number of techniques to avoid honing your art of delay, from deactivating email notification and killing short-cut buttons, to banishing the Dew and getting separate PCs for work and home.
Security

Submission + - Identity theft battle moves to the states

coondoggie writes: "If you are looking to fight identity theft problems help is on the way. According to a story in the Washington Post today 33 states and the District of Columbia let consumers place a "security freeze" on their credit files and many more states are considering similar legislation. The explosion of identity thefts is top of mind among U.S. consumers according to data released recently by the U.S. Federal Trade Commission (FTC). More than a quarter of a million ID theft complaints were lodged with the agency in 2006, accounting for 36% of the 674,000 complaints the FTC received. http://www.networkworld.com/community/?q=node/1498 5"

Slashdot Top Deals

Thus spake the master programmer: "After three days without programming, life becomes meaningless." -- Geoffrey James, "The Tao of Programming"

Working...