Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
GNU is Not Unix

Submission + - RMS debates DRM at Yale, fights off MS ninjas (yaledailynews.com) 1

hesby writes: "On October 17, 2007, the Yale Political Union hosted a debate between Richard M. Stallman and Yale students on the resolution "DRM should be illegal". A barefoot RMS spoke of a corporate conspiracy to use DRM to empower companies and restrict the freedom of users, while students representing various campus political parties argued a variety of supporting points and counterpoints. Setting the stage for the debate were four masked ninjas who launched a mock attack on Stallman as inspired by an xkcd comic strip."
Editorial

Submission + - What are the best gadgets of 2007?

An anonymous reader writes: CNET UK's editors have just voted on what they think are the best gadgets of 2007, interestingly there's not an iPod or iPhone in sight. Instead, the award for best mobile went to the Nokia 6300, best TV went to the Samsung PS50P96, best high-definition product went to the Toshiba HD-XE1, best consumer camera went to the Olympus E-410, best laptop went to the Lenovo ThinkPad T61p, best music/video player went to the Archos 605 WiFi and best sat-nav went to the Garmin nuvi 660. Does everyone agree?
Programming

Submission + - What kind of thinking is apt for Computer Science

gorrepati writes: As a Grad student at the university I found critical thinking to be very popular, atleast with the Professors. After school, at work, it is mostly process-oriented thinking — where by I just think about what to do and do it. It is difficult to think critically all the while being imaginative. The emphasis on not making a mistake hurts the imagination(pardon my limited capacity). The question really is, what kind of thinking gives results — say I want to be a good programmer, working on the next cool thing.
Programming

Submission + - The Linux Driver Project Starts (Again) (linuxdriverproject.org)

eldavojohn writes: "A Novell employee named Greg K-H is trying to revive the Linux Driver Project. He original tried to start this back in January but due to one reason or another had to push it back. Now he's looking for more developers and companies to help out in this effort. From the Wiki, 'We are a group of Linux kernel developers (over 100 strong) and project managers (over 10) that develop and maintain Linux kernel drivers. We work with the manufacturers of the specific device to specify, develop, submit to the main kernel, and maintain the kernel drivers. We are willing and able to sign NDAs with companies if they wish to keep their specifications closed, as long as we are able to create a proper GPLv2 Linux kernel driver as an end result.' If you ever wanted to help out and be a part of the Linux effort, this might be a good chance to get your feet wet."
Security

Submission + - New scam or just a really bad work policy? 4

greymond writes: I recently received an email from a recruiting company for a Graphic Design / Desktop Publishing position. While I have my resume available online as well as pieces of my portfolio I didn't find it at all strange to receive this initial email. I hadn't responded by the afternoon when I received a call from a lady named Pyra who asked me to send her my latest resume because they were very interested in hiring me. I asked about the positions pay since the job title and position seemed like it would be a lot lower pay grade than my current Art Director position I now hold. She said she would inquire about it, but to please send my resume.

Now here is where it gets strange...I sent my resume off (note: my resume has only my name, number and email listed in it — no address) I then received this email asking for my Social Security Number. I found this to be VERY odd as no one ever has asked me for that, save the human resource manager of a company who has already hired me. When I told her I would wait until the interview to give it to them, I was then sent this email which had this letter attached to it. I responded with the same response and needless to say I haven't heard back from them.

Oh and in case my bandwidth gets blown up, the recruiting company was Agneto and the company they were hiring for was supposedly AT&T. So, is this really just a new elaborate scam or just a really bad new business policy?
Education

Submission + - Bird's-Eye View May Include Magnetic Fields

BoredStiff writes: In a story heard on NPR and reported in ScienceDaily reports that a new study finds that migratory birds can "see" magnetic fields. The findings from a current study by a research group from Oldenburg, Germany strongly supports the hypothesis that migratory birds use their visual system to perceive the reference compass direction of the geomagnetic field and that migratory birds are thus likely to "see" the geomagnetic field.
Operating Systems

Submission + - Intel Chief Evangelist comments on Linux scheduler

ByeByeWintel writes: "James Reinders is Intel's Chief Evangelist for Intel's Software Development Products. In a recent interview on Devx.com he stated: "If I could get ONE wish fulfilled would be for OS scheduling to focus on processes, and not threads, for scheduling. And demand that processes manage their scheduling of threads. Why? Because an effective parallel program is going to assume, in general, that all threads are either running or stopped. It is messy to write a parallel program when the OS may be scheduling and unscheduling individual threads which are trying to cooperate. [...] There is a lot of opportunity for operating systems to offer these types of control in the "running of applications" interfaces. I'd like an OS to let me specify the 'world' my application runs in (which processors, how many, etc.) These interfaces are available in Windows at run time (the task manager will let you adjust where a running task can go). I'd like to have more global tools to specify and adjust policies (8-core machinerun "only Outlook" here, run applications on these 4 cores, OS only here, explorer here, etc.)""
It's funny.  Laugh.

Submission + - WSU LUG Nerds to auction themselves to women (ap.org)

Mr. Slippery writes: "Associated Press reports that Washington State University's LUG is planning to hold a "nerd auction". According to LUG president Ben Ford,"You can buy a nerd and he'll fix your computer, help you with stats homework, or if you're really adventurous, take you to dinner!" To promote the LUG (and comp sci in general) to women, the plan is that a handful of LUG members will get makeovers from a sorority. "The girls get to have their way with them and we'll document each makeover. We'll make a snazzy video and show it over dinner. After the dinner, we'll auction off the now studly nerds.""
Security

Submission + - Ebay hacked, users personal information posted 1

An anonymous reader writes: This morning a hacker posted the personal contact information and credit card data of 1,200 ebay users on the eBay.com Trust & Saftey forums. eBay pulled the Trust & Saftey forums off line, but not before one user made a video of the hacked forums and posted it on youtube.com. eBay response is on the eBay chatter page, and seems to try and down play this "fraudster"'s activity.
Television

Submission + - Sling Media Sold to EchoStar for $380 Million

An anonymous reader writes: It was the Slingbox that invented place shifting, the ability to send the content you pay to have delivered to one location (in this case your home cable TV signal) to another location. Now long time investor and Dish Network owner Echostar has come to an agreement to purchase Slingbox parent Sling Media for $380 million. The deal, which should be finalized by the end of the year, brings a little more muscle to Sling. Sling needs a backer with some cash as the major media and sporting entities consider the Slingbox a product that induces copyright infringement and may be mulling legal action. Also, the Slingbox is the subject of a patent suit that could take considerable money to defend. The question is, now that EchoStar has control of Slingbox will it water it down to appease the same media companies it buys its programming from?
Programming

Submission + - How to write a brute-force password cracker (rbgrn.net)

rbgrn writes: "If you have access to a password's hash and salt, if applicable, a brute force attempt to crack it is a guaranteed method if you have the CPU cycles available to compute it in a reasonable amount of time. Unfortunately, guessing every single permutation of characters takes exponentially longer with the length of the password used so often times you are facing months if not years of processing time on a single PC. While there are methods to distribute the work across multiple PCs, I am only going to go over a simple brute force algorithm and will hold off on the distributed processing model for a later article."
Businesses

Submission + - Programmers and overtime

Maximum Prophet writes: Programmers and System Administrators typically don't get overtime. Here's and article about a lawyer who's challanging that:

http://www.msnbc.msn.com/id/20908975/

From the 2nd page:

Computer workers of various stripes, for example, have commonly not been paid for their extra hours. ... But under California law, the exemption applies only for workers whose primary function involves "the exercise of discretion and independent judgment." In numerous lawsuits, Thierman and other plaintiffs' attorneys have alleged that legions of systems engineers, help desk staff, and customer service personnel do no such thing. Of programmers, Thierman says, "Yes, they get to pick whatever code they want to write, but they don't tell you what the program does.... All they do is implement someone else's desires."
The takeaway: Everyone start recording your hours now. Even if you don't sue, someone else might, and documentation about your overtime will go a long way. towards getting your piece of the pie.
Security

Submission + - Security expert: F/OSS taking over in every niche (itmanagersjournal.com)

pschmied writes: From the article: 'For me, when I'm able to sell the concept of open source, it's because I convince them that the total cost of ownership is the lowest. It's not just that sticker price. You can go out and buy commercial products from IBM and Microsoft, but the open source product works just as well, and chances are, you can find more people familiar and skilled with the open source tools than you are going to find with skills for a particular proprietary product. In the end, this is what has driven TCO down. It used to be an argument that you would have a hard time finding employees with open source skills. Now that's an easier proposition than finding the other.'
Privacy

Submission + - British police using microdrone for surveillance (wired.com)

randomjohndoe writes: From the Wired Danger Room blog, British police are using a remotely operated microdrone from Microdrones GmbH for aerial surveillance. TFA includes an embedded video which '...contains some footage shot from a Microdrone, which gives an impressive display of its powers. Zooming in on a sunbather in a bikini as a demonstration is not likely to allay fears about how intrusive this technology might be. And the ability to hover outside a window and peer in is one which is equally open to use and abuse.'

All that's needed to complete the aerial assassin in Dean Ing's 1993 novel, Butcher Bird, is the frickin' laser beam.

http://blog.wired.com/defense/2007/09/british-polices.html

Space

Submission + - Do You Need a Permit to Land on the Moon? (slate.com) 4

Billosaur writes: "With the recent announcement of Google's X-prize for a successful private landing of a robot on the Moon, someone has asked the Explainer at Slate.com if permission is required to land something on the Moon? Turns out that while there is no authority that regulates landing objects on another world, getting there does require the permission of the national government from where the launch takes place. This is in accordance with the 1967 Outer Space Treaty, signed by 91 nations, which regulates the uses of outer space by the nations of Earth. Specifically, Article VI enjoins: "The activities of non-governmental entities in outer space, including the Moon and other celestial bodies, shall require authorization and continuing supervision by the appropriate State Party to the Treaty." Start your paperwork!"

Slashdot Top Deals

What the gods would destroy they first submit to an IEEE standards committee.

Working...