Forgot your password?
typodupeerror
Software

Code Repository Atlassian Buys Competitor BitBucket 150

Roblimo writes "Wow. Atlassian sent press releases out about this, and we're happy for them. But isn't Git easy to install and use — for free, even if your project is proprietary and secret, not open source and public? Whatever. Some people seem to feel better about proprietary software than about FOSS, and the majority of Atlassian's business comes from meeting the needs of behind-the-firewall, proprietary code repositories. At least Atlassian has free versions of its repository for FOSS and small-scale proprietary developers. Which is sort of nice."

Comment Re:Really, why? (Score 1) 224

Comment interactive zoomable pie chart (Score 2, Interesting) 358

Can you imagine how cool it would be if they used an interactive zoomable pie chart like this one that shows inflation.

You'd start with every government department visible, you could then zoom in to any spending program and see how it was made up, area being proportional to cost.

If recovery.gov don't do it, someone should.

GNU is Not Unix

(Stupid) Useful Emacs Tricks? 412

Count Fenring writes "Since the Vi version of this question was both interesting and popular, let's hear from the other end of the spectrum. What are your favorite tricks, macros, extensions, and techniques for any of the various Emacs? Myself, I like 'M-x dunnet' ;-)"
Security

The Real Story On WPA's Flaw 67

Glenn Fleishman writes "The reports earlier today on WPA's TKIP key type being cracked were incorrect. I spoke at length with Erik Tews, the joint author of the paper that discloses a checksum weakness in TKIP that allows individual short packets to be decrypted without revealing the TKIP key. I wrote this up for Ars Technica with quite a bit of background on WEP and WPA. Tews's paper, co-written with Martin Beck, whom he credits as discovering and implementing a working crack (in aircrack-ng as a module), describes a way to use a backwards-compatible part of TKIP to exploit a weakness that remains from WEP. ARP packets and similarly short packets can be decoded. Longer packets are likely still safe, and TKIP hasn't been cracked. Don't believe the hype, but the exploit is still notable."
Displays

The Pocket-Sized Projector Has Arrived 220

mallumax writes "David Pogue of New York Times has reviewed the Pico, which is a pocket projector from Optoma. The review is quite entertaining (Pogue projects the images on to a plane's ceiling, leaving passengers baffled) and detailed. The highlights are: It is a pocket-sized projector which runs on batteries and can project images and videos from a variety of sources like iPhone, iPod and DVD players with a 480x320px resolution, with a maximum screen size of 65 inches at 8.5 feet. It uses a non-replaceable 10,000 hour LED lamp and a DLP chip from Texas Instruments. The battery lasts for 90 minutes and can be recharged through USB or with its own power cord. The device weighs 115g and comes with an inbuilt speaker which is practically useless. If you want one, it will set you back by $430."

Comment Missing the major point: Lamarckism. (Score 1) 108

Lamarckism:

Lamarckism refers to the once widely accepted idea that an organism can pass on characteristics that it acquired during its lifetime to its offspring (also known as based on heritability of acquired characteristics).
The reason this is so surprising is it breaks a central tenant of genetics, the fact that DNA --> body is a one way process. The germ line DNA is kept separate from the DNA of the rest of the body. Of course I haven't RTFA so I could be completely wrong.

EU Software Patent War Ignites Again 168

pieterh writes "ZDNet UK has a detailed article on the heating-up of the software patent debate in Europe. A new motion before the European Parliament calls for a harmonised patent court (EPLA) that would be able to enforce software patents across Europe. This comes just 15 months after the EP rejected the infamous Computer Implemented Inventions directive." From the article: "Patents on software are formally disallowed under the European patent system, but are routinely granted by the European patent office, according to critics. They are currently difficult to enforce in many EU member states, something critics say would be changed by the failed software patent directive, and now by the EPLA. Software patents are generally considered to add to the legal costs of large enterprises, as well as creating a hostile legal environment for smaller software businesses and open source projects."

China vs U.S. in an 'Internet Race' 347

avatar4d writes to mention an article on CIO about a new 'space race' on the internet between China and the U.S.. China is currently hard at work at what is being called the 'Chinese Next Generation Internet' (CNGI). With plans to unveil the project at the 2008 Beijing Olympics, the network is part of a plan to leap ahead of the United States in innovation and technology. From the article: "The strategy, outlined in China's latest five-year plan, calls for the country to transition its economy from one based almost entirely on manufacturing to one that produces its own scientific and technological breakthroughs — using a new and improved version of today's dominant innovation platform, the Internet. 'CNGI is the culmination of this revolutionary plan' to turn China into the world's innovation capital, says Wu Hequan, vice president of the Chinese Academy of Engineering and the chairman of the CNGI Expert Committee, the group overseeing the project. 'We will use it as a way to break through and be competitive in the global economic market.'"

Korea's Online Aggression a Taste of the Future? 309

DerGeist writes "Imagine your life ruined by an organized mob that convicts with scant, unreliable evidence. Fueled only by hearsay and rumors, an invisible horde of your fellow citizens begins bombarding your snailbox, email, phone, work, school and family with threats, insults and general harassment. You are forced to drop out of school and quit your job as a result of constant attacks. You are shunned and ridiculed in public as anywhere you go, you are instantly recognized. Although it may seem to be just a second-rate Hollywood nightmare scenario reminiscent of "The Net," this sort of "organized mob" justice is being dealt out freely in South Korea where net usage is booming. So freely, in fact, that almost 1 in 10 of 13-65 year-olds has felt its sting. Could this trend hit the U.S.? Will policing net behavior eventually become necessary?"

Microsoft to Supply Electronics to Formula 1 433

Yooden_Vranx writes "speedtv.com reports that beginning in 2008, Microsoft will be the sole supplier of Engine Control Units to Formula 1. Apparently, moving to a single supplier is part of the FIA's (Fédération Internationale de l'Automobile) attempts to cut costs. The article does not clarify whether this cost reduction is enabled by cutting back on tech support, what percentage of the engine's power will be required to run all the 'features' embedded in the device, or whether 'crash' will now refer primarily to software behavior rather than driving incidents."

Slashdot Top Deals

Mr. Cole's Axiom: The sum of the intelligence on the planet is a constant; the population is growing.

Working...