Forgot your password?
typodupeerror
Education

Submission + - More Schools Go to 4 Day Week to Cut Costs 1

Hugh Pickens writes writes: "Time Magazine reports that as schools return to session in South Dakota, more than one-fourth of students in the state will only be in class from Monday through Thursday as budget constraints lead school districts to hack off a day from the school week. Larry Johnke, superintendant of the Irene-Wakonda school district, says the change will save his schools more than $50,000 per year and in order to make up for the missing day, schools will add 30 minutes to each of the other four days and shorten the daily lunch break. “In this financial crisis, we wanted to maintain our core content and vocational program, so we were forced to do this,” says Johnke. Experts say research is scant on the effect of a four-day school week on student performance but many of the 120 districts that have the shortened schedule nationwide say they've seen students who are less tired and more focused, which has helped raise test scores and attendance while others say that not only did they not save a substantial amount of money by being off an extra day, they also saw students struggle because they weren't in class enough and didn't have enough contact with teachers. "Teachers tell me they are much more focused because they've had time to prepare. They don't have kids sleeping in class on Tuesday," says LaKeisha Johnson, a parent in Peach County Georgia, who sends her fourth-grade daughter to the Boys & Girls Club on Mondays. "Everything has taken on a laser-light focus.""
Apple

Submission + - Macs More Vulnerable Than Windows for Enterprise (theregister.co.uk)

sl4shd0rk writes: At a Black Hat security conference in Las Vegas, researches presented exploits on Apples DHX authentication scheme which can compromise all connected Macs on the LAN within minutes. “If we go into an enterprise with a Mac and run this tool we will have dozens or hundreds of passwords in minutes,” Stamos said. Macs are fine as long as you run them as little islands, but once you hook them up to each other, they become much less secure.
Patents

Submission + - Patent Troll Lawyer Sanctioned: Extortion Tactics (techdirt.com)

An anonymous reader writes: For all the stories of patent trolls and copyright trolls, there haven't been too many stories of either being sanctioned for abusive or extortion-like practices... until now. The Court of Appeals for the Federal Circuit (one level below the Supreme Court) has approved over $600,000 in sanctions against a lawyer for a patent troll, saying that filing over a hundred lawsuits, each of which was followed up almost immediately with offers to settle at fees much cheaper than it would cost to fight, has the "indicia of extortion." Now if only judges started doing that more often.

Submission + - RIAA Threatens ICANN with lawsuit (icann.org)

think_nix writes: A letter from Victoria Sheckler, Deputy General Counsel the RIAA to ICANN threatens to sue ICANN over the future implementation of the .music gTLD if certain "measures" are not met by ICANN in compliance with the RIAA. The letter states and points out such concerns as 'Community Objections', 'Lack of Transparency' , and 'Malicious Conduct' the reasons of concern from the RIAA.

As noted above, we are concerned that a music themed gTLD will be used to enable wide scale copyright and trademark infringment


Google

The Ambiguity of "Open" and VP8 Vs. H.264 493

An anonymous reader writes "With all the talk about WebM and H.264, how the move might be a step backwards for openness, and Google's intention to add 'plugins' for IE9 and Safari to support WebM, this article attempts to clear misconceptions about the VP8 and H.264 codecs and how browsers render video. Firefox, Opera and Google rely on their own media frameworks to decode video, whereas IE9 and Safari will hand over video processing to the operating system (Windows Media Player or QuickTime), the need for the web to establish a baseline codec for encoding videos, and how the Flash player is proprietary, but implementation and usage remain royalty free."
The Media

The Guardian's Complicated Relationship With Julian Assange 237

Sonny Yatsen writes "Vanity Fair has published an interesting behind-the-scenes look at the unlikely and tumultuous working relationship between WikiLeaks' Julian Assange and The Guardian as the Iraq War Logs were being published. The piece highlights the differences and conflicts between the Guardian's journalistic standards and WikiLeaks' transparency. Particularly interesting is the revelation that Julian Assange threatened to sue The Guardian if they publish a portion of Iraq War Logs leaked to them by a disgruntled WikiLeaks volunteer, claiming 'he owned the information and had a financial interest in how and when it was released.'"
Idle

Submission + - Kindergartens ordered to pay copyright for songs (dw-world.de)

BBird writes: Deutsche Welle reports — up until this year, preschools could teach and produce any kind of song they wanted. But now they have to pay for a license if they want children to sing certain songs.
Security

Submission + - d0z.me: The Evil URL Shortener (spareclockcycles.org)

supernothing writes: DDoS attacks seem to be in vogue today, especially considering the skirmishes over Wikileaks in the past few weeks. The size of a DDoS attacks, however, has historically been limited by how many computers one has managed to recruit into a botnet. These botnets almost universally require code to be executed on the participants' local systems, whether they be willing or unwilling. A new approach has been emerging recently, however, which uses some simple Javascript to achieve similar ends. d0z.me is a new service that utilizes these techniques, but provides a unique twist on the idea. Posing as a legitimate URL shortening service, it serves users the requested pages in an iframe, while simultaneously participating in a DDoS attack in the background. No interaction is required beyond clicking the link and staying on the page. This makes it relatively trivial to quickly mount large scale DDoS attacks, and affords willing participants plausible deniability in the assault. Full writeup here.
Image

Nigerian Email Scam Victim Sues Bank, Loses Appeal Screenshot-sm 312

reidhellyer writes "From California Litigation Attorney Blog: 'While many victims of the so-called "Nigerian e-mail scam" would be too embarrassed to trumpet that fact, others end up infamous for their victimhood like the appellant in a published opinion of the California Court of Appeal in Riverside. In March 2009, Charles Peters received an email from someone purporting to be a citizen of Malaysia. The e-mail informed Peters that certain third parties in the United States and Canada owed the Malaysian money, but that “they can not transfer the funds to any bank account outside America continent due to their new company policy [sic].” He asked Peters to “assist me in receiving the funds and forward to me.” He offered to pay Peters 12 percent of the money. Peters agreed after apparently negotiating an increase of his fee to 15 percent.'"
Encryption

FBI Alleged To Have Backdoored OpenBSD's IPSEC Stack 536

Aggrajag and Mortimer.CA, among others, wrote to inform us that Theo de Raadt has made public an email sent to him by Gregory Perry, who worked on the OpenBSD crypto framework a decade ago. The claim is that the FBI paid contractors to insert backdoors into OpenBSD's IPSEC stack. Mr. Perry is coming forward now that his NDA with the FBI has expired. The code was originally added ten years ago, and over that time has changed quite a bit, "so it is unclear what the true impact of these allegations are" says Mr. de Raadt. He added: "Since we had the first IPSEC stack available for free, large parts of the code are now found in many other projects/products." (Freeswan and Openswan are not based on this code.)
Networking

Why Anonymous Can't Take Down Amazon.com 392

suraj.sun writes "The website-attacking group 'Anonymous' tried and failed to take down Amazon.com on Thursday. The group's vengeance horde quickly found out something techies have known for years: Amazon, which has built one of the world's most invincible websites, is almost impossible to crash.... Anonymous quickly figured that out. Less than an hour after setting its sights on Amazon, the group's organizers called off the attempt. 'We don't have enough forces,' they tweeted."
Businesses

Which Shipping Company Is Kindest To Your Packages? 480

Ant writes "Popular Mechanics mailed a bunch of sensors on an epic journey to find out which American shipping company is the most careful with your packages. From the article: 'One disheartening result was that our package received more abuse when marked "Fragile" or "This Side Up." The carriers flipped the package more, and it registered above-average acceleration spikes during trips for which we requested careful treatment.' Here's what they found."
Intel

Intel Talks 1000-Core Processors 326

angry tapir writes "An experimental Intel chip shows the feasibility of building processors with 1,000 cores, an Intel researcher has asserted. The architecture for the Intel 48-core Single Chip Cloud Computer processor is 'arbitrarily scalable,' according to Timothy Mattson. 'This is an architecture that could, in principle, scale to 1,000 cores,' he said. 'I can just keep adding, adding, adding cores.'"
Transportation

Auto Industry's Fastest Processor Is 128Mhz 397

afabbro writes "GM stated that the 2011 Buick Regal will have the auto industry's fastest processor: 128Mhz, and 3MB of flash. 'Three meg of flash memory and 128MHz clock speed doesn't sound like a lot in terms of computing power until you consider the environment these controllers have to live in. Our controllers are made to operate reliably up to 260 degrees (127C) and down to -40 degrees (-40C) for the life of the vehicle.'"

Slashdot Top Deals

What this country needs is a dime that will buy a good five-cent bagel.

Working...