Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Networking

How Would You Make a Distributed Office System? 218

Necrotica writes "I work for a financial company which went through a server consolidation project approximately six years ago, thanks to a wonderful suggestion by our outsourcing partner. Although originally hailed as an excellent cost cutting measure, management has finally realized that martyring the network performance of 1000+ employees in 100 remote field offices wasn't such a great idea afterall. We're now looking at various solutions to help optimize WAN performance. Dedicated servers for each field office is out of the question, due to the price gouging of our outsourcing partner. Wide area file services (WAFS) look like a good solution, but they don't address other problems, such as authenticating over a WAN, print queues, etc. 'Branch office in a box' appliances look ideal, but they don't implement WAFS. So what have your companies done to move the data and network services closer to the users, while keeping costs down to a minimum?"
Supercomputing

Scientists Trap a Rainbow 147

An anonymous reader writes to tell us that Physicists from both the University of Surrey and Salford University have devised a method to trap a multi-colored rainbow of light inside a prism. "Previous attempts to slow and capture light have involved extremely low or cryogenic temperatures, have been extremely costly, and have only worked with one specific frequency of light at a time. The technique proposed by Professor Hess and Mr Kosmas Tsakmakidis involves the use of negative refractive index metamaterials along with the exploitation of the Goos Hänchen effect, which shows that when light hits an object or an interface between two media it does not immediately bounce back but seems to travel very slightly along that object, or in the case of metamaterials, travels very slightly backwards along the object."
Security

Hackers Use Banner Ads on Major Sites to Hijack Your PC 268

The worst-case scenario used to be that online ads are pesky, memory-draining distractions. But a new batch of banner ads is much more sinister: They hijack personal computers and bully users until they agree to buy antivirus software. And the ads do their dirty work even if you don't click on them.The malware-spiked ads have been spotted on various legitimate websites, ranging from the British magazine The Economist to baseball's MLB.com to the Canada.com news portal. Hackers are using deceptive practices and tricky Flash programming to get their ads onto legitimate sites by way of DoubleClick's DART program. Web publishers use the DoubleClick-hosted platform to manage advertising inventory." CT: Link updated to original source instead of plagerizer.
Google

Google Sued Over Deceptive Search Results 246

biggles266 writes "Internet goliath Google claims to rank search results by relevance, but the search engine engages in deceptive conduct by selling off the top positions to commercial partners, a Sydney court has heard. The Australian Consumer and Competition Commission (ACCC) is taking world-first legal action in the Federal Court against Google Inc over allegedly deceptive conduct related to sponsored links on its websites. The ACCC has brought a two-pronged case against Trading Post and Google — including subsidiaries Google Australia and Google Ireland — for potentially misleading consumers. The consumer watchdog alleges Google does not do enough to differentiate "organic" search results — those ranked by relevance — from sponsored links which appear at the top of the results page."
The Internet

MySpace Takes on Google News and Digg 123

cyberianpan writes "According to a Times Online article, MySpace is going into the news business. They'll soon be premiering a service that will scour the internet for news stories and let users vote on which ones receive the most exposure. This approach blends elements of Google News and sites such as Digg and Netscape, which rely on readers to submit stories and determine their prominence. One could see where this might be the 'holy grail' of internet news. Not only will you be able to tap into the wisdom of the crowds, but ultimately your recommended stories could be influenced by the likes and dislikes of your friends/heroes."
Hardware Hacking

Apple TV Already Being Hacked 260

TunesBoy writes "Only a couple of days after being shipped, the Apple TV is already being modified in a variety of ways. A thread at Something Awful discusses installing VLC, and a dedicated site, AppleTVHacks.net, has appeared and is cataloging hacks including a hard-drive upgrade tutorial. Did Apple intend for the Apple TV to be so easy to upgrade and hack?"
Music

CD Music Sales Down 20% In Q1 2007 544

prostoalex writes "Music sales are not just falling, they're plummeting — by as much as 20% when you compare January-March 2007 with the 2006 numbers. The revenue numbers are actually worse, since CD prices are under pressure. The Wall Street Journal lists many factors contributing to the rapid decline: 800 fewer retail outlets (Tower Records' demise alone closed 89); increasingly negative attitude towards CD sales from big-box retailers (Best Buy now dedicates less floor space to CDs in favor of better-selling items); and file sharing, among others. Songs are being traded at a rate about 17 times the iTunes Store's recent rate of sales. Diminishing CD sales means that you don't have to sell as many to get on the charts. The 'Dreamgirls' movie soundtrack recently hit #1 by selling 60,000 CDs in a week, a number that wouldn't have made the top 30 in 2005."
Security

How Apple Orchestrated Attack On Researchers 389

An anonymous reader sends us to George Ou's blog on ZDNet for a tale of how Apple's PR director reportedly orchestrated a smear campaign against security researchers David Maynor and Jon Ellch last summer. Ou has been sitting on this story ever since and is only now at liberty to tell it. He posits that the Month of Apple Bugs was a direct result of Apple's bad behavior in the Maynor-Ellch affair. From the blog: "Apple continued to claim that there were no vulnerabilities in Mac OS X but came a month later and patched their Wireless Drivers (presumably for vulnerabilities that didn't actually exist). Apple patched these 'non-existent vulnerabilities' but then refused to give any credit to David Maynor and Jon Ellch. Since Apple was going to take research, not give proper attribution, and smear security researchers, the security research community responded to Apple's behavior with the MoAB (Month of Apple Bugs) and released a flood of zero-day exploits without giving Apple any notification. The end result is that Apple was forced to patch 62 vulnerabilities in just the first three months of 2007 including last week's megapatch of 45 vulnerabilities."
The Courts

IBM Asks Court To Declare Linux Non-Infringing 133

A Cyclic Graph writes "We finally have a redacted version of IBM's Reply Memorandum in Support of Summary Judgment on Counterclaim 10 in SCO v. IBM. In short, IBM is asking the Court to declare that Linux doesn't infringe upon any of SCO's purported intellectual property. This document is the last word on that matter until the Court either declares there to be no doubt that Linux is free of infringement, or decides that that issue has to be decided by the jury. In their brief, IBM points out that SCO puts forth a convoluted set of non-answers referencing each other to disguise it's inability to answer IBM. Their set of cross-references is so complex that Groklaw readers graphed the claims to make what little sense of them they could."
Privacy

FBI Says Paper Trails Are Optional 244

WerewolfOfVulcan writes "According to this Washington Post article, the FBI says that it doesn't have to comply with even the unconstitutional provisions of the Patriot Act when asking for phone records. Apparently that whole due process thing doesn't include them. Funny thing is, they've apparently already been doing it for years." Quoting: "Under past procedures, agents sent 'exigent circumstances letters' to phone companies, seeking toll records by asserting there was an emergency. Then they were expected to issue a grand jury subpoena or a 'national security letter,' which legally authorized the collection after the fact. Agents often did not follow up with that paperwork, the inspector general's investigation found. The new instructions tell agents there is no need to follow up with national security letters or subpoenas. The agents are also told that... they may make requests orally, with no paperwork sent to phone companies. Such oral requests have been made over the years in terrorism and kidnapping cases, officials said."
Power

Hummer Greener Than Prius? 920

An anonymous reader sends in a story from Central Connecticut State University, claiming that a Prius takes more energy to manufacture than a Hummer — 50% more. In addition, the article claims that the Prius costs $3.25 per mile over its expected lifespan of 100,000 miles compared to $1.95 per mile for the Hummer. The article gets its data from a study by CNW Marketing called Dust to Dust, which is an attempt to account for all the costs of vehicles, from manufacture through operation through repair and disposal. The $3.25/mile cost quoted for the Prius is the 2005 number; for 2006 it is $2.87. This improvement pulled the Prius below the straight industry average — all the other hybrids are still above that average. And the Hummer is not listed at all for 2006. Update: 03/21 00:44 GMT by J : You might want to take those figures with a grain of salt; I don't think anyone's seen the supporting data. Read on for details.

Feed Privacy Board OKs Eavesdropping (wired.com)

A secretive White House privacy board says two Bush surveillance programs -- electronic eavesdropping and financial tracking -- do not violate citizens' civil liberties. By the Associated Press.


Data Storage

Digital Big Bang — 161 Exabytes In 2006 176

An anonymous reader tips us to an AP story on a recent study of how much data we are producing. IDC estimates that in 2006 we created, captured, and replicated 161 exabytes of digital information. The last time anyone tried to estimate global information volume, in 2003, researchers at UC Berkeley came up with 5 exabytes. (The current study tries to account for duplicating data — on the same assumptions as the 2003 study it would have come out at 40 exabytes.) By 2010, according to IDC, we will be producing far more data than we will have room to store, closing in on a zettabyte.
Science

The Blackest Material 299

QuantumCrypto writes "Researchers at Rensselaer Polytechnic Institute have created 'the world's first material that reflects virtually no light.' This anti-reflection technology is based on nanomaterial and could lead to the development of more efficient solar cells, brighter LEDs, and 'smarter' light sources. In theory, if a room were to be coated with this material, switching on the lights would only illuminate the items in the room and not the walls, giving a sense of floating free in infinite space."

Slashdot Top Deals

The bugs you have to avoid are the ones that give the user not only the inclination to get on a plane, but also the time. -- Kay Bostic

Working...