Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - Why there is no lossy image format with alpha? (google.com) 8

ciantic writes: Almost every web developer would benefit from image format that has the capabilities of JPEG and Alpha Channel like in PNG. But why there is not any? Google is developing WebP but it seems like it does not include this killer feature, and as it is discussed it gets to stand still when engineer asks something specific. What is the main issue here? Clearly web is missing this kind of format. From my naive stand point of view the alpha channel would be just like RGB channels, with slight exception the extreme values of Alpha should not be compressed. If you need examples why such format is needed, there is not shortage of that in web. Common example for this kind of need is tilted Polaroid picture with transparent background, and gradient fading in photographs.

Submission + - FreeBSD Running On PS3

An anonymous reader writes: One week after Sony's PlayStation 3 private cryptography key was obtained, FreeBSD is up and running on the PS3. There are still a few problems and rough edges, but they should be ironed out when FreeBSD 9.0 is released:

      Nathan Whitehorn writes:
          "Yesterday, I imported support for the Sony Playstation 3 into our 64-bit PowerPC port, expanding our game console support into the current generation.
            There are still a few rough edges due to missing hardware support, but the machine boots and runs FreeBSD stably. These rough edges should be
            smoothed out in time for the 9.0 release."

Mailing List Announce- http://docs.freebsd.org/cgi/getmsg.cgi?fetch=559737+0+archive/2011/freebsd-current/20110109.freebsd-current

Submission + - Android Tablets Ignore Enterprise to Their Peril (infoworld.com)

snydeq writes: "InfoWorld's Savio Rodrigues finds Android tablet madness missing one key ingredient: enterprise-ready features. 'Despite this obvious path into business, it's interesting to note how little attention is being paid to enterprise features by Google or Android device makers. This fact is especially striking considering how far ahead the iPad already is with its enterprise readiness,' Rodrigues writes, noting that, as consumers adopt tablets, they will undoubtedly want to use them to access enterprise systems from outside of the office — an important factor that will affect their purchase decisions. And with Apple declaring its enterprise intentions, Android tablet makers may have even more to learn from the iPad. 'The simple and effective manner in which Apple is communicating the iPad's business-readiness, if even for occasional usage, deserves not just kudos: It begs for imitation from Android device makers.'"

Submission + - College Students Lack Scientific Literacy

An anonymous reader writes: Most college students in the United States do not grasp the scientific basis of the carbon cycle – an essential skill in understanding the causes and consequences of climate change, according to research published in the January issue of BioScience. The study, whose authors include several current and former researchers from Michigan State University, calls for a new way of teaching – and, ultimately, comprehending – fundamental scientific principles such as the conservation of matter.

Submission + - Social Networks Race to IPO to beat Facebook (technorati.com)

frontwave writes: According to Reuter's "Some of these companies want to go public because they want to beat Facebook and others out," said one of their sources. "If Facebook went public before LinkedIn, do you think anyone would pay that much attention to LinkedIn?" You might want to surpass the beast."

Submission + - Third of Malware in History created in 2010 (networkworld.com)

Batblue writes: PandaLabs' Annual Report found that 34 percent of all existing malware has been concocted by cyber criminals in the last year. PandaLabs also pointed out that the year has seen a rise in activist attacks on websites, so-called hacktivist incidents. Most notably, of course, was the coordinated response by the 'Anonymous' group in support of Julian Assange of Wikileaks.

Another trend is the growing interest in Apple Mac as a hacker target. A few years ago, Mac enthusiasts used to boast about their malware-free machines — that's not the case any more. PandaLabs doesn't put any figures on the spread of Mac malware beyond pointing out that the company's growing market share means that it's become more vulnerable to attacks.

PandaLabs believes that many of the trends of 2010 will continue in 2011, with growing examples of cyber-activism, social media attacks, SEO threats, a growing amount of attacks on mobile phones and tablets and more evidence of attacks on Macs.

The Internet

Submission + - What do you do when the Military squats your ASN. (breaksecurity.com)

Auraka writes: There have been multiple times where we have seen global routing go back. Like the ever so famous Pakistan Telecom incident when while trying to block Youtube for Pakistan they blocked it for the world and when China Telecommunications leaked a bunch of prefixes onto the internet. These things happen, but what do you do when the U.S. Military starts announcing prefixes through your AS number, you let them.

Submission + - Physical Access to most US institutions broken (openpcd.org)

An anonymous reader writes: During the "27th Chaos Communication Congress" (http://events.ccc.de/congress/2010) held in Berlin this last December, a document was presented that shows how to expose the security keys of HID's proprietary iClass physical access cards. By some reports, over 80% of US-based institutions have deployed iClass physical access cards and readers. Look around your building and see if your door card reader has the HID logo. This exposes hospitals, universities, sea-side ports, utility companies, airports, high-tech companies, etc throughout the US to potential physical access security breaches. Those intimate with physical security have advocated for other PROX and MIFARE technologies. The US Government has been defining new standards in physical access associated with successful US Government employee PIV ID Card (http://csrc.nist.gov/publications/nistpubs/800-116/SP800-116.pdf). Many Government contractors as well as some local state governments have deployed PIV-I ID Cards (http://www.va.gov/pivproject/faq.asp) that rely on updated physical access technology/security. Physical Security managers at these US Institutions should be aware of this new vulnerability and assess their new elevated risks.

Submission + - The problem with Windows tablets: they run Windows (networkworld.com) 2

jbrodkin writes: Microsoft CEO Steve Ballmer and cohorts drew some major applause at CES by showing off new tablets running Windows 7, and for good reason. New devices from Acer, ASUS and Samsung are sleek and have innovative form factors, for example dual screens and slide-out keyboards. But the advances can largely be attributed to the good work of Microsoft's hardware partners. The problem with Windows tablets is that they still run Windows.
While all of the devices can be used in touch-only mode, they also come with either virtual or physical keyboards for navigating those parts of Windows that aren't pleasant to use in a touch-based interface. Aberdeen Group research analyst says the iPad shows consumers have voted with their feet for tablet operating systems that replace the old desktop computing paradigm, and Microsoft still hasn't jumped on board. "Although Microsoft has shown avid and innovative adoption of the new user model for smartphones with Windows Phone 7 and Kinect, they have not shown the public that they view the tablet opportunity with that same level of innovation and attention to detail," he says.
Another problem: With Windows Phone 7 running on smartphones and regular Windows running on tablets, Microsoft will have a hard time building app stores to compete with the sheer scale of the Apple App Store and the Android Market.

Submission + - AT&T Joins the 4G Fraudsters (itworld.com) 1

itwbennett writes: Remember back in November when AT&T was quick to jump all over T-Mobile for falsely claiming to have a 4G network? Well, apparently they've decided to join the 4G fun — by changing a few words on their consumer website and redefining 4G to just mean 'faster'. Faster than what, we don't know. But certainly not fast enough to meet the downstream speed benchmark of 100 Mbps (bits per second) set by the International Telecommunication Union.

Submission + - Hackers find new way to cheat on Wall Street (infoworld.com)

GMGruman writes: The high-speed trading exchanges that conduct the business of buying and selling stocks and mutual funds are so fast that hackers can introduce delays of a few microseconds completely unnoticed by today's network monitoring technology — and manipulate prices in the process to reap millions of dollars to the detriment of everyone else, InfoWorld's Bill Snyder reports. This kind of activity creates new reason to distrust Wall Street and shows how the computer networks we all rely on for conducting business and moving information are ripe for undetectable hacking.

Submission + - Google Killing Flash Download Extensions in Chrome

An anonymous reader writes: It appears that Google may today just have decided to tell us users that we're no longer allowed to install extensions that allow us to download Flash objects and video in Google Chrome, as it is described here: http://danielsmedegaardbuus.dk/2010-10-01/is-google-taking-away-our-flash-media-downloader-extensions/

Wondering if we're looking at a new Chrome chapter here, as opposed to the big surprise when we were allowed to block ads. Seems we may block Flash, but we may not nick it.


Submission + - BlackBerry's encryption hacked; backups now a risk (infoworld.com)

GMGruman writes: InfoWorld blogger Martin Heller reveals that a Russian passcode-breaker developer has broken the encryption used in BlackBerry backups. That can help recover data when passwords are lost but also give data thieves access to a treasure trove of corporate secrets. And the developer boasts that it was easier to crack the BlackBerry encryption than it was to crack Apple iOS's.
Social Networks

Submission + - Why the revolution will not be tweeted (newyorker.com)

An anonymous reader writes: Social media is ill suited to promoting real social change, argues Malcolm Gladwell in this article from The New Yorker magazine. He deftly debunks conventional wisdom surrounding the impact of Twitter, Facebook and other social media in driving systemic social change, comparing them to the organizational strategies of the 1960s civil rights movement. For example the Montgomery bus boycott, he argues, was successful because it was driven by the disciplined and hierarchically organized NCAAP. In contrast a loose, social-media style network wouldn't have sustained the year long campaign. He concludes that social media promote social 'weak ties' which are not strong enough to motivate people to take big risks, such as imprisonment or attack, for social change.

Slashdot Top Deals

Algol-60 surely must be regarded as the most important programming language yet developed. -- T. Cheatham