Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - Foxconn Sees New Source Of Cheap Labor: The United States (forbes.com) 1

hackingbear writes: Foxconn is planning to build manufacturing plants in the U.S., probably in cites such as Detroit and Los Angeles. “Since the manufacturing of Apple’s products is rather complicated, the market watchers expect the rumored plants to focus on LCD TV production, which can be highly automated and easier.” Nice to think they will be hiring herebut still a fascinating insult to U.S. manufacturing prowess, dontcha think – the idea that actually making Apple products is a little too complicated for Americans to handle (Or maybe they won't be able to hire enough workers sitting 8 hours a day screwing really tiny screws into iPhone 5; despite of the higher unemployment rate, laborers here may not be as desperate as the millions of migrant workers looking for work in China.) Foxconn chairman Terry Guo, at a recent public event, noted that the company is planning a training program for US-based engineers, bringing them to Taiwan or China to learn the processes of product design and manufacturing.

Submission + - Getty Images is stealing Creative Commons pictures. (flickr.com)

epSos-de writes: "Getty Images caused controversy for its aggressive pursuit of copyright enforcement on behalf of its photographers.

In reality Getty Images is stealing rights from photographers and publishers. Almost all of the pictures of epSos.de on Flickr were published under the Creative Commons license. Getty Images is licensing pictures from epSos.de through the Flickr account. After licensing the images they change the copyright from free to use to all rights reserved. It is a digital type of theft of free pictures.

The stolen picture is here:

The screen-shot of the digital theft is here:

They will probably try to sue people for using the free picture that was published under the creative commons license first."

Submission + - Sept 14 is red letter day: Black Mesa Half-Life rewrite to be released! (blackmesasource.com)

macklin01 writes: "Sep. 14 is red letter day: after 8 years of development, the third-party "Black Mesa" rewrite of Half-Life is finally going to be released. This re-writes the original Half-Life with the HalfLife2 Source engine, along with significant improvements to the graphics and soundtrack. While you're waiting, you can look at recent screenshots (and a few videos here and there, such as here) and download the soundtrack (and donate!) to whet your appetite. So go on: they're waiting for you in the test chamber, Gordon!"

Submission + - Pirate Bay co-founder arrested in Cambodia (timeslive.co.za)

An anonymous reader writes: A co-founder of top Swedish filesharing site The Pirate Bay, who is on an international wanted list, has been arrested in the Cambodian capital at Stockholm’s request.
Your Rights Online

Submission + - WIPO's Broadcasting Treaty is back (boingboing.net)

c0lo writes: The UN's World Intellectual Property Organization's Broadcasting Treaty is back. This is the treaty that EFF and its colleagues killed five years ago, but Big Content won't let it die.

Under the treaty, broadcasters would have rights over the material they transmitted, separate from copyright, meaning that if you recorded something from TV, the Internet, cable or satellite, you'd need to get permission from the creator and the broadcaster to re-use it. And unlike copyright, the "broadcast right" doesn't expire, so even video that is in the public domain can't be used without permission from the broadcaster

The Military

Submission + - Kamikaze drones - the military robots set to self destruct (army-technology.com)

RougeFive writes: A new wave of Kamikaze unmanned military aircraft, ground robots and water vessels are being built to deliberately destroy themselves as they hit their targets. Since it now makes more economic sense to have them crash into enemy targets rather than engage them, and since direct impact needs only manned or automated navigation rather than the highly-trained skills of multiple operators, these UAVs could well become the de-facto method of engagement of the future.

Submission + - 6 IT Projects are $8 Billion Over Budget at the Dept of Defense (federaltimes.com)

McGruber writes: The Federal Times has the stunning but not surprising news (http://www.federaltimes.com/article/20120723/DEPARTMENTS01/307230001/At-DoD-6-projects-8-billion-over-budget) that a new audit has found that Six Defense Department modernization projects are a combined $8 Billion — or 110 percent — over budget. The projects are also suffering from years-long schedule delays.

In 1998, work began on the Army’s Logistics Modernization Program (LMP). In April 2010, the General Accounting Office (GAO) issued their report "Actions Needed to Improve Implementation of the Army Logistics Modernization Program" (http://www.gao.gov/products/GAO-10-461) about the status of LMP. LMP is now scheduled to be fully deployed in September 2016, 12 years later than originally scheduled, and 18 years after development first began! (Development of the often-maligned Duke Nukem Forever (http://en.wikipedia.org/wiki/Duke_Nukem_Forever) only took 15 years.)

Prime contractors Computer Sciences Corp, Accenture, IBM and CACI obviously have learned the "If you're not a part of the solution, there's good money to be made in prolonging the problem" lesson! (http://www.despair.com/consulting.html)

Submission + - Ask Slashdot: To use or not to use C++? (cat-v.org) 1

eklavya90 writes: Recently this was on Hackernews so I watched the keynote given by Mr. Bjarne Stroustrup on C++11 (going native) link: http://video.ch9.ms/ch9/252f/ed5c3dc3-3335-493b-9e2c-9fd00012252f/GoingNative2012KeynoteStroustrup_med_ch9.mp4. He told all these wonderful things about C++ and how it was misunderstood and its a really efficient language. Now today there was another link on Hackernews http://harmful.cat-v.org/software/c++/I_did_it_for_you_all in which the same man says C++ is a horrible language. So forgive my noobiness, which one do I believe?. I am not smart enough to judge this myself but I think many are here who can, so help please.

Submission + - UK Goverment pushing for 'Trusted Computing' (guardian.co.uk)

Motor writes: As has long been expected — we are now beginning to see governments pushing for the use of so-called 'trusted computing'. Chips installed in all computers that effectively remove control of the PC from its owner. While there may be security advantages to some of the ideas — few can doubt that it represents a fundamental shift in the IT world. A radical move away from an open technology landscape and towards a system that denies all access unless you have the right credentials. Governments will demand the right credentials to access their services — meaning approved software stacks (i.e Windows) with the right digital signatures. Vernor Vinge had it right .

Submission + - VPN Service Snitched on Alleged LulzSec Member (securityweek.com) 2

wiredmikey writes: Yesterday, Cody Kretsinger, a 23-year-old from Phoenix, Arizona was arrested and charged with conspiracy and the unauthorized impairment of a protected computer.

How did the Feds track down the alleged LulzSec member? It turns out that a VPN service reportedly used to mask his online identify and location was the one who handed over data to the FBI.

According to the federal indictment, Kretsinger registered for a VPN account at HideMyAss.Com under the user name “recursion”. Following that, the indictment said that Kretsinger and other unknown conspirators conducted SQL injection attacks against Sony Pictures in attempt to extract confidential data.

“At a later date it came as no surprise to have received a court order asking for information relating to an account associated with some or all of the above cases,” they wrote in the post this morning. “As stated in our terms of service and privacy policy our service is not to be used for illegal activity, and as a legitimate company we will cooperate with law enforcement if we receive a court order (equivalent of a subpoena in the US).”

You can be sure that HideMyAss is not the only provider to be hit with subpoenas to hand over user data. It’s likely the FBI and other officials are digging deep and requesting similar information from other VPN providers and online services such as Pastebin, Twitter, and other tools and web services commonly used by hackers.

Submission + - Ask Slashdot: Alternatives to Uni

An anonymous reader writes: University seems to me to have four major aspects: learning, helping to get jobs, networking, and as a platform to get into research. Obviously, there are a lot of existing alternatives for networking and learning. Getting jobs also seems to have a few promising alternatives. I'm wondering however, is it possible to get paid to research without a degree? What alternatives do people have for the other aspects of uni?

Submission + - Google Aims to Own Your Online ID (activepolitic.com) 1

bs0d3 writes: Google Chairman Eric Schmidt just said the reason google+ is being so strict about pseudonyms is because the company intends to be an 'identity service'. This would be very similar to the program Obama wanted everyone to have. Although this is the opposite of protecting privacy, google intends to launch other services that require a google+ verified identity.

Submission + - Climate change sees adventurers rowing to magnetic (domain-b.com)

Dalmarf writes: Title should say it all. From the article "First, the good news: six British adventurers succeeded in rowing to the magnetic North Pole in an open boat, after a grueling, 28-day journey from northern Canada.
The bad news: their expedition was possible because of climate change and global warming that has resulted in the dramatic retreat of the Arctic ice sheet."


Submission + - Private planes, private no more (chicagotribune.com) 3

chill writes: The Department of Transportation, which used to allow anyone with a private plane to choose not to have their flight plans made available for public consumption, has decided to eliminate that option. So if you want to snoop into someone else's travel itinerary, you can do it. [Note: The filing of general aviation flight plans with air traffic control is strictly voluntary, but strongly encouraged. Their primary use is if the pilot doesn't arrive within an hour of schedule, where to start looking for the wreckage.]

Slashdot Top Deals

Time to take stock. Go home with some office supplies.