Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:I thought it was for "human beings". (Score 4, Informative) 449

I've been doing something similar on OS X.

Every application's Help menu item has a textbox that filters all menu items. You can also reach this textbox through a shortcut (cmd+shift+?).

So, for example, if I'm editing a document and I want to make some text superscript, Instead of hunting through its menus, I just hit cmd+shift+?, type 'sup' and hit enter.

Comment Re:Avira (Score 1) 142

It's not bundled with Windows and you're not prompted to download or install it when you're installing the OS. You actually need to visit a website to download it.

As far as I know, it's not even the most poplar anti virus software out there, so the bad guys are probably more concerned with the 3rd party AV packages.


Mozilla BrowserID: Decentralized, Federated Login 179

An anonymous reader writes "Mozilla Labs has just launched the prototype of its BrowserID project and the accompanying Verified Email Protocol standard. Basically, BrowserID is a browser-based federated login provider like Facebook Connect, but without the privacy leaks. Fundamentally, BrowserID is public key encryption. You register an email address with your browser, which is then confirmed with a standard 'click here to confirm' email. A public/private key pair is then generated; your browser keeps the private key, and your email provider keeps the public key. Now, when you visit Facebook (or any site that supports BrowserID), your browser gives Facebook your email address and an identity token signed with your private key. Facebook queries your email provider for your public key, decrypts your identity token, and logs you in — voila, secure, private, browser-based logins. Oh, and the prototype is written in HTML and JavaScript — so it works across every modern browser, too."
Security Hacked, Plugin Repository Compromised 110

An anonymous reader writes "Back in April hackers gained access to the servers and exposed passwords/API keys for Twitter and Facebook accounts. Now, hackers gained access to and the plugin repository. Malicious code was found in several commits including popular plugins such as AddThis, WPtouch, or W3 Total Cache. Matt Mullenweg decided to force-reset all passwords on This is a great reminder for all users not use the same password for two different services."

Mozilla Ships Firefox 5, Meets Rapid-Release Plan 282

CWmike writes "Mozilla delivered on Tuesday the final version of Firefox 5, the first edition under the new faster-release regime it kicked off earlier this year. The company also patched 10 bugs in Firefox 5, including one in the browser's handling of the WebGL 3-D rendering standard that rival Microsoft has called unsafe. Firefox 5 looks identical to its predecessor, Firefox 4, but Mozilla's made changes under the hood. Mozilla has denied copying Google Chrome's upbeat schedule but analysts have noted the similarities and pointed out the need of all browser makers to step up the pace. Because of the shorter development cycle, Mozilla called out relatively few new features in Firefox 5."

Why Apple's DUI Checkpoint App Ban Is Stupid 228

hookskat writes " Editor in Chief Nick Gillespie reacts to Apple's decision to ban DUI Checkpoint Apps from the App Store, writing: 'Let me add something even more damning of this latest development in corporate cave-ins to legally protected free speech and I'm gonna bold it for emphasis: Some police departments actually supply the data used in such apps because they reduce the number of drunk drivers on the roads! Somehow, I'm thinking that Steve Jobs circa 1984...would have told U.S. senators sending threatening letters about computer-based info sharing to take a hike. Or at least to spend time on, I don't know, creating a freaking budget for the country rather than worrying about regulating something that helps reduce impaired driving.' Last month, after RIM caved on the same question, released this video on the subject of banning DUI checkpoint apps."
The Internet

IPv6 Traffic Volumes Are Low, But Nobody Knows How Low 231

netbuzz writes "As the June 8 World IPv6 Day experiment draws near, there is universal agreement that little IPv6 traffic is traversing the Internet at the moment. The event is designed in part to increase that volume. However, it will be difficult for Internet policymakers, engineers and the user community at large to tell how the upgrade to IPv6 is progressing because no one has accurate or comprehensive statistics about how much Internet traffic is IPv6 versus IPv4." And in case you don't know much about IPv6 and why it matters, has kindly provided "a primer on the IPv6 transition: why it's cool, how to get started with it and what's changed."

Comment Apple's letter (Score 5, Informative) 108

Full text of Apple's letter to Lodsys:


May 23, 2011

Mark Small
  Chief Executive Officer
  Lodsys, LLC
[Address information removed]

Dear Mr. Small:

I write to you on behalf of Apple Inc. ("Apple") regarding your recent notice letters to application developers ("App Makers") alleging infringement of certain patents through the App Makers' use of Apple products and services for the marketing, sale, and delivery of applications (or "Apps"). Apple is undisputedly licensed to these patents and the Apple App Makers are protected by that license. There is no basis for Lodsys' infringement allegations against Apple's App Makers. Apple intends to share this letter and the information set out herein with its App Makers and is fully prepared to defend Apple's license rights.

Because I believe that your letters are based on a fundamental misapprehension regarding Apple's license and the way Apple's products work, I expect that the additional information set out below will be sufficient for you to withdraw your outstanding threats to the App Makers and cease and desist from any further threats to Apple's customers and partners.

First, Apple is licensed to all four of the patents in the Lodsys portfolio. As Lodsys itself advertises on its website, "Apple is licensed for its nameplate products and services." See (emphasis in original). Under its license, Apple is entitled to offer these licensed products and services to its customers and business partners, who, in turn, have the right to use them.

Second, while we are not privy to all of Lodsys's infringement contentions because you have chosen to send letters to Apple's App Makers rather than to Apple itself, our understanding based on the letters we have reviewed is that Lodsys's infringement allegations against Apple's App Makers rest on Apple products and services covered by the license. These Apple products and services are offered by Apple to the App Makers to enable them to interact with the users of Apple productsâ"such as the iPad, iPhone, iPod touch and the Apple iOS operating systemâ"through the use or Apple's App Store, Apple Software Development Kits, and Apple Application Program Interfaces ("APIs") and Apple servers and other hardware.

The illustrative infringement theory articulated by Lodsys in the letters we have reviewed under Claim 1 of U.S. Patent No. 7,222,078 is based on App Makers' use of such licensed Apple products and services. Claim 1 claims a user interface that allows two-way local interaction with the user and elicits user feedback. Under your reading of the claim as set out in your letters, the allegedly infringing acts require the use of Apple APIs to provide two-way communication, the transmission of an Apple ID and other services to permit access for the user to the App store, and the use of Apple's hardware, iOS, and servers.

Claim 1 also claims a memory that stores the results of the user interaction and a communication element to carry those results to a central location. Once again, Apple provides, under the infringement theories set out in your letters, the physical memory in which user feedback is stored and, just as importantly, the APIs that allow transmission of that user feedback to and from the App Store, over an Apple server, using Apple hardware and software. Indeed, in the notice letters to App Makers that we have been privy to, Lodsys itself relies on screenshots of the App Store to purportedly meet this claim element.

Finally, claim 1 claims a component that manages the results from different users and collects those results at the central location. As above, in the notice letters we have seen, Lodsys uses screenshots that expressly identify the App Store as the entity that purportedly collects and manages the results of these user interactions at a central location.

Thus, the technology that is targeted in your notice letters is technology that Apple is expressly licensed under the Lodsys patents to offer to Apple's App Makers. These licensed products and services enable Apple's App Makers to communicate with end users through the use of Apple's own licensed hardware, software, APIs, memory, servers, and interfaces, including Apple's App Store. Because Apple is licensed under Lodsys' patents to offer such technology to its App Makers, the App Makers are entitled to use this technology free from any infringement claims by Lodsys.

Through its threatened infringement claims against users of Apple's licensed technology, Lodsys is invoking patent law to control the post-sale use of these licensed products and methods. Because Lodsys's threats are based on the purchase or use of Apple products and services licensed under the Agreement, and because those Apple products and services, under the reading articulated in your letters, entirely or substantially embody each of Lodsys's patents, Lodsys's threatened claims are barred by the doctrines of patent exhaustion and first sale. As the Supreme Court has made clear, "[t]he authorized sale of an article that substantially embodies a patent exhausts the patent holder's rights and prevents the patent holder from invoking patent law to control postsale use of the article." Quanta Computer, Inc. v. LG Elecs., Inc., 553 U.S. 617 (2008).

Therefore, Apple requests that Lodsys immediately withdraw all notice letters sent to Apple App Makers and cease its false assertions that the App Makers' use of licensed Apple products and services in any way constitute infringement of any Lodsys patent.

Very truly yours,

Bruce Sewell
  Senior Vice President & General Counsel
  Apple Inc.



Gaming On the iPad 2 and What It Means For Apple 93

The Digital Foundry blog took a detailed look at gaming on Apple's recently released iPad 2. While most reviews of the device focus on the tablet's size, accessories and software features, this one puts the new A5 processor through its paces, finding "anything from a 4x to 7x leap over what was seen in the original version of the tablet." The authors suggest that it has boosted mobile gaming to a point where Apple could be preparing for a much bigger entrance into the gaming market. "Either we are looking at a company looking to consolidate its iron grip on the mobile games market by combining its existing unparalleled developer support with state-of-the-art technology, or else iPad 2 represents the first stages of a plan to expand iOS' reach from mobile phones and MP3 players through to tablets and perhaps in the near future, home games consoles. ... Technical and hardware challenges aside, there's no doubt whatsoever that Apple is extremely well-placed to expand its reach in the games market and launch a new, disruptive assault on the status quo every bit as effective as its mobile offerings have been. There have been plenty of creditable attempts at claiming the multi-purpose set-top box market, but there has been no outright winner. Arguably, Apple has the brand presence, the games, and the music/video services to actually make it happen."

Slashdot Top Deals

He who steps on others to reach the top has good balance.