Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Open Source

Linux 2.6.37 Released 135

diegocg writes "Version 2.6.37 of the Linux kernel has been released. This version includes SMP scalability improvements for Ext4 and XFS, the removal of the Big Kernel Lock, support for per-cgroup IO throttling, a networking block device based on top of the Ceph clustered filesystem, several Btrfs improvements, more efficient static probes, perf support to probe modules, LZO compression in the hibernation image, PPP over IPv4 support, several networking microoptimizations and many other small changes, improvements and new drivers for devices like the Brocade BNA 10GB ethernet, Topcliff PCH gigabit, Atheros CARL9170, Atheros AR6003 and RealTek RTL8712U. The fanotify API has also been enabled. See the full changelog for more details."
The Internet

Comcast Accused of Congestion By Choice 434

An anonymous reader writes "A kind soul known as Backdoor Santa has posted graphs purportedly showing traffic through TATA, one of Comcast's transit providers. The graphs of throughput for a day and month, respectively, show that Comcast chooses to run congested links rather than buy more capacity. Keeping their links full may ensure that content providers must pay to colocate within Comcast's network. The graphs also show a traffic ratio far from 1:1, which has implications for the validity of its arguments with Level (3) last month."
Music

RIAA Now Blames Journalists For Its Piracy Trouble 367

adeelarshad82 writes "RIAA executives have written a letter to PCMag expressing 'deep disappointment' for publishing an article on Limewire Alternatives. While the article includes a disclaimer from PCMag that it does not condone the download of copyrighted or illegal material, RIAA executives believe that 'PCMag is slyly encouraging people to steal more music.' The letter goes on to ask PCMag to retract the article from their website. PCMag's Editor in Chief has responded to the letter by stating that music industry's charges remain groundless and that it reeks of desperation. He points out that PCMag covers all aspects of technology, which includes the products, services and activities that some groups and individuals might deem objectionable. He defends publishing the article by saying 'We covered these Limewire alternatives because we knew they would be of interest to our readers. We understand that some might use them to illegally download content. We cannot encourage that action, but also cannot stop it. Reporting on the existence of these services does neither.' PCMag has also refused to retract the article."
Security

ISP Owner Who Fought FBI Spying Freed From Gag Order 404

Tootech writes "So you wonder what happens when an ISP recieves a a so-called 'national security letter' from the FBI? Well, read this about an ISP owner's fight to not have to turn over everything and the sink to the FBI: 'The owner of an internet service provider who mounted a high-profile court challenge to a secret FBI records demand has finally been partially released from a 6-year-old gag order that forced him to keep his role in the case a secret from even his closest friends and family. He can now identify himself and discuss the case, although he still can't reveal what information the FBI sought. Nicholas Merrill, 37, was president of New York-based Calyx Internet Access when he received a so-called "national security letter" from the FBI in February 2004 demanding records of one of his customers and filed a lawsuit to challenge it.'"
Crime

FBI Prioritizes Copyright Over Missing Persons 372

An anonymous reader writes "The FBI has limited resources, so it needs to prioritize what it works on. However, it's difficult to see why dealing with copyright infringement seems to get more attention than identity theft or missing persons. In the past year, the FBI has announced a special new task force to fight intellectual property infringement, but recent reports have shown that both identity theft and missing persons have been downgraded as priorities by the FBI, to the point that there are a backlog of such cases."
Encryption

Bitcoin Releases Version 0.3 491

Teppy writes "How's this for a disruptive technology? Bitcoin is a peer-to-peer, network-based digital currency with no central bank, and no transaction fees. Using a proof-of-work concept, nodes burn CPU cycles searching for bundles of coins, broadcasting their findings to the network. Analysis of energy usage indicates that the market value of Bitcoins is already above the value of the energy needed to generate them, indicating healthy demand. The community is hopeful the currency will remain outside the reach of any government." Here are the FAQ, a paper describing Bitcoin in more technical detail (PDF), and the Wikipedia article. Note: a commercial service called BitCoin Ltd., in pre-alpha at bitcoin.com, bears no relation to the open source digital currency.
---
Related: Crypto Tools
United States

11th Circuit Eliminates 4th Amend. In E-mail 490

Artefacto writes "Last Thursday, the Eleventh Circuit handed down a Fourth Amendment case, Rehberg v. Paulk, that takes a very narrow view of how the Fourth Amendment applies to e-mail. The Eleventh Circuit held that constitutional protection in stored copies of e-mail held by third parties disappears as soon as any copy of the communication is delivered. Under this new decision, if the government wants get your e-mails, the Fourth Amendment lets the government go to your ISP, wait the seconds it normally takes for the e-mail to be delivered, and then run off copies of your messages."
Cellphones

Where Android Beats the iPhone 365

snydeq writes "Peter Wayner provides a developer's comparison of Android and the iPhone and finds Android not only competitive but in fact a better choice than the iPhone for many developers, largely due to its Java foundation. 'While iPhone developers have found that one path to success is playing to our baser instincts (until Apple shuts them down), a number of Android applications are offering practical solutions that unlock the power of a phone that's really a Unix machine you can slip into your pocket,' Wayner writes, pointing out GScript and Remote DB as two powerful tools for developers to make rough but workable custom tools for Android. But the real gem is Java: 'The pure Java foundation of Android will be one of the biggest attractions for many businesses with Java programmers on the staff. Any Java developer familiar with Eclipse should be able to use Google's Android documentation to turn out a very basic application in just a few hours. Not only that, but all of the code from other Java programs will run on your Android phone — although it won't look pretty or run as fast as it does on multicore servers.'"
Cloud

How MySpace Generates Enough Load To Test Itself 65

An anonymous reader points out this article about "...how a big site like MySpace uses thousands of cloud computing cores to do performance testing on its live site. There are some really great numbers in there from the performance tests, like generating 16GB/second of bandwidth and 77,000 hits/second during testing (not including the live traffic on the site at the time)."
Image

The Journal of Serendipitous and Unexpected Results 153

SilverTooth writes "Often, when watching a science documentary or reading an article, it seems that the scientists were executing a well-laid out plan that led to their discovery. Anyone familiar with the process of scientific discovery realizes that is a far cry from reality. Scientific discovery is fraught with false starts and blind alleys. As a result, labs accumulate vast amounts of valuable knowledge on what not to do, and what does not work. Trouble is, this knowledge is not shared using the usual method of scientific communication: the peer-reviewed article. It remains within the lab, or at the most shared informally among close colleagues. As it stands, the scientific culture discourages sharing negative results. Byte Size Biology reports on a forthcoming journal whose aim is to change this: the Journal of Serendipitous and Unexpected Results. Hopefully, scientists will be able to better share and learn more from each other's experience and mistakes."
Government

US Blocking Costa Rican Sugar Trade To Force IP Laws 441

For the last couple of days news has been trickling in about how the US is trying to ram IP laws down Costa Rica's throat by blocking their access to the US sugar market. Techdirt has a good summary of the various commentaries and a related scoop in the Bahamas where the US is also applying IP pressure. "The first is in Costa Rica, which is included in the Central America Free Trade Agreement (CAFTA). Yet like with other free trade agreements that the US has agreed to elsewhere, this one includes draconian intellectual property law requirements. I still cannot understand why intellectual monopoly protectionism — the exact opposite of 'free trade' — gets included in free trade agreements. At least in Costa Rica, a lot of people started protesting these rules, pointing out that it would be harmful for the economy, for education and for healthcare. So the Costa Rican government has not moved forward with such laws. How has the US responded? It's blocking access to the US market of Costa Rican sugar until Costa Rica approves new copyright laws."
The Almighty Buck

Digital Fundraising Booms For Haiti Relief 124

It seems that a recent digital fundraising drive for Haiti relief has stunned organizers at the Red Cross and White House. As of the last tally on Friday the campaign was at well over $8 million. "Earlier Thursday, when the Red Cross topped $3 million in text and social media donations — it hit nearly $40 million from all sources by late Thursday — spokesman Jonathan Aiken described it as 'a phenomenal number that's never been achieved before. People text up to three times at 10 bucks a pop,' Aiken said. 'You're talking about roughly 300,000 people actually spontaneously deciding, "I can spare $10 for this." And that's remarkable.' As of late Thursday, more than half of all donations to the Red Cross's Haiti relief effort had been received online, according to a news release.
Government

Obama Appointee Sunstein Favors Infiltrating Online Groups 689

megamerican writes "President Barack Obama's appointee to head the Office of Information and Regulatory Affairs advocated in a recent paper the 'cognitive infiltration' of groups that advocate 'conspiracy theories' like the ones surrounding 9/11 via 'chat rooms, online social networks, or even real-space groups and attempt to undermine' those groups. Sunstein admits that 'some conspiracy theories, under our definition, have turned out to be true' Sunstein has also recently advocated banning websites which post 'right-wing rumors' and bringing back the Fairness Doctrine. You can find a PDF of his paper here. For decades (1956-1971), the FBI under COINTELPRO focused on disrupting, marginalizing and neutralizing political dissidents, most notably the Black Panthers. More recently CENTCOM announced it would be engaging bloggers 'who are posting inaccurate or untrue information, as well as bloggers who are posting incomplete information.' In January 2009 the USAF released a flow-chart for 'counter-bloggers' to 'counter the people out there in the blogosphere who have negative opinions about the US government and the Air Force.'"
The Courts

Court Unfriendly To FCC's Internet Slap At Comcast 215

Several sources are reporting that federal judges have been harsh in their examination of the FCC's action against Comcast in 2008 for the throttling of Internet traffic from high-bandwidth file-sharing services. "'You can't get an unbridled, roving commission to go about doing good,' said US Court of Appeals for the District of Columbia Circuit Chief Judge David Sentelle during an oral argument. The three-judge panel grilled FCC General Counsel Austin Schlick on the parts of communications law it could cite to justify the Comcast punishment. The FCC argues that it was enforcing an open Internet policy implicit in the law. Judge A. Raymond Randolph repeatedly said the legal provisions cited by the FCC were mere policy statements that by themselves can't justify the commission's action. 'You have yet to identify a specific statute,' he said. The judges' decision in the case could throw into question the FCC's authority to impose open Internet rules."

Slashdot Top Deals

How much net work could a network work, if a network could net work?

Working...