Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Operating Systems

Launch of OSS For Mobile Phones 75

Linux Mobile Phone Guy writes "Members of the open source GPE project (GPE Palmtop Environment) today announced a new offspring project to create a fully open source software stack for mobile phones, GPE Phone Edition. GPE Phone Edition is a fully open source project based on developments from the GPE project adding necessary components for mobile phone usage. Based on standards defined by the LiPS Forum a complete application software stack is built. The current implementation is based on code contributed to the LiPS Forum by Orange/France Telecom's research and development lab located in Beijing China in collaboration with GPE project members. The result is now an open sourced software stack which can handle a GSM compliant mobile modem for making voice calls, handling the SIM address book and sending and receiving SMS. Also some additional application exists e.g. for media playback, instant messaging and email. They have some screenshots there and even a downloadable VMware image using which you can try the whole thing in a virtual phone on your PC — if you connect a GSM Modem (like an existing phone) to /dev/GSM-Modem you should probably even be able to use the full phone functionality (access SIM card, send/receive SMS, make a call!)."
Biotech

DNA to Test Theory of Roman Village in China 203

Reverse Gear writes "Many of the inhabitants of a lonely village in north western China seems to have distinctive western features. An old theory from the 50s suggests that a Roman legion lost in what is now Iran in the year 53BC lost their commanding officer. They traveled east, so the legend goes, working as mercenaries until they were caught by the Chinese 17 years later. The Chinese described them as using a 'fish-scale formation', which could be a reference to the well-known Roman phalanx technique called the 'tortoise'. The remainder of the legion, it is suggested, may have intermarried with the villagers in Liqian. Scientists are now trying to verify the fascinating theory by testing the DNA of the inhabitants of the Chinese village."
Music

Submission + - Laptop-only music performances?

An anonymous reader writes: As music production tools, computers are everywhere from recording and mixing to publishing. What about computers as the sole musical instrument? DJing or just playing mp3s aside, we have improvisers and orchestras (another) that treat laptop as a full-flavored instrument. What's the most interesting laptop-only live act you have seen/heard? And would you call these guys a boy band?
Netscape

Netscape 9 to Undo Netscape 8 Mistakes? 210

An anonymous reader writes "MozillaZine reports that Netscape 9 has been announced. The most interesting thing is how they seem to be re-evaluating many of the decisions they made with Netscape 8. Netscape 9 will be developed in-house (Netscape 8 was outsourced) and it will be available for Windows, OSX, and Linux (Netscape 8 was Windows only). Although Netscape 9 will be a standalone browser, the company is also considering resuming support for Netscape 7.2, the last suite version with an email client and Web page editor. It remains to be seen whether Netscape will reverse the disastrous decision to include the Internet Explorer rendering engine as an alternative to Gecko but given that there's no IE for OS X or Linux, here's hoping. After a series of substandard releases, could Netscape be on the verge of making of a version of their browser that enhances the awesomeness of Firefox, rather than distracts from it?"
Security

Submission + - Study Finds Bank of America SiteKey is Flawed

An anonymous reader writes: The NYT reports on a Harvard and MIT study, which finds that the SiteKey authentication system employed by Bank of America is ineffective at prevent phishing attacks. SiteKey requires users to preselect an image and to recognize this image before they login, but users don't comply.

The idea is that if customers do not see their image, they could be at a fraudulent Web site, dummied up to look like their bank's, and should not enter their passwords. The Harvard and M.I.T. researchers tested that hypothesis. In October, they brought 67 Bank of America customers in the Boston area into a controlled environment and asked them to conduct routine online banking activities, like looking up account balances. But the researchers had secretly withdrawn the images. Of 60 participants who got that far into the study and whose results could be verified, 58 entered passwords anyway. Only two chose not to log on, citing security concerns.
The study, aptly entitled "The Emperor's New Security Indicators", is available online.
Programming

Submission + - Writing Open Source Documentation?

An anonymous reader writes: I'm an Open Source guy. I run Linux, I suggest FF and OO.org to friends. And I'd like to give back. The problem is, I'm not a coder. So how do I go about writing documentation, and what kind of projects should I look into? What are some stellar examples?

Want to Take On An Open/Unsolved Problem? 276

CexpTretical writes "The accumulation and focusing of knowledge may be the noblest use or purpose of the internet. There are plenty of open or unsolved problems left for this generation. Why not spend some of your time in the dark of this winter working on one of the big problems facing humanity? Open problems exists in almost every field of study. Wikipedia maintains a small list of them and at least one international group called the Union of International Associations maintains a database of open problems." Which problem do you want to see cracked first? Are you already working on one of these big issues?

The Death Of CS In Education? 521

JohnnyKimble writes "A provocatively titled article recently appeared in the 'Future of Computing' section of the British Computer Society website. 'The Death Of Computing' was written by a lecturer at De Montfort University in the UK, and considers the problem of falling interest in computer science courses in the UK and what needs to be done to encourage more students to take the courses." This ties in well with our discussion last night about Why Software is Hard.
Security

MS Office Zero-Day Under Attack 172

paulBarbs writes "Microsoft is warning users to be on the lookout for suspicious Excel files that arrive unexpectedly — even if they come from a co-worker's e-mail address. In an advisory, Microsoft confirmed a new wave of limited "zero-day" attacks was underway, using a code execution flaw in its Microsoft Office desktop productivity suite. Although .xls files are currently being used to launch the spear phishing attacks, Microsoft said users of other Office applications (Word, PowerPoint, Outlook, Access, etc.) are potentially at risk."
Censorship

Submission + - Scientology critic arrested after 6 years

destinyland writes: "Friday police arrested 64-year-old Keith Henson. In 2000 after picketing a Scientology complex, he was arrested as a threat because of a joke Usenet post about "Tom Cruise Missiles." He fled to Canada after being found guilty of "interfering" with a religion, and spent the next 6 years living as a fugitive. Besides being a digital encryption and free speech advocate, he's one of the original Burr-Brown/Texas Instruments researchers and a co-founder of the Space Colony movement."
Privacy

TiVo Selling Data on Users' Watching Habits 244

Gyppo writes "The San Francisco Chronicle reports that TiVo is collecting and selling data on what parts of broadcasts people are rewinding for review and what commercials they are skipping. The data collection is part of a service the company provides to advertisers and television networks, collecting anonymous data on their users' commercial-watching habits. The data they provide is a random subset of their overall userbase, detailing which commercials are skipped and which are actually watched. The article mentions the possibility for privacy abuse, but with this application of technology Tivo is not providing access to what any one individual user watches via the service."

Slashdot Top Deals

Know Thy User.

Working...