Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Cellphones

Nokia Trades Symbian For MeeGo In N-Series Smartphones 184

An anonymous reader writes "Nokia announced that moving forward, MeeGo would be the default operating system in the N series of smartphones (original Reuters report). Symbian will still be used in low-end devices from Nokia, Samsung, and Sony Ericsson. The move to MeeGo is a demonstration of support for the open source mobile OS, but considering the handset user experience hasn't been rolled out and likely won't be rolled out in time for its vague June deadline outlined at MeeGo.com, could the decision be premature?"

Comment Re:You don't understand the GPL (Score 1) 4

The point is not that the GPL should enable end users to make easy modifications to things like firmware - the GPL doesn't say so anywhere, and it may not even be possible.

The GPL, version 3, does require this. See section 6: "If you convey an object code work under this section in, or with, or specifically for use in, a User Product, [...] the Corresponding Source conveyed under this section must be accompanied by the Installation Information. But this requirement does not apply if neither you nor any third party retains the ability to install modified object code on the User Product (for example, the work has been installed in ROM)."

"Installation Information" is defined to include "any methods, procedures, authorization keys, or other information required to install and execute modified versions of a covered work in that User Product from a modified version of its Corresponding Source".

Comment Re:Correct User Access (Score 1) 932

But then you get a phone call every time they do want to install something. Better is to install sysresccd on a USB hard drive, configure the system just that once the way the users want it and use partimage to store an image of the computer's hard drive on the USB drive. When they get to trouble, restore the image and you've got a working system again - you could even set up a script to do this. In case of security updates, you of course need to restore the image, do the installation and create a new image, but this is much easier than hunting down all the spyware and whatever garbage the users have installed on the computer.

How Do IT Guys Get Respect and Not Become BOFHs? 902

An anonymous reader writes "I work for a small software company (around 60 people) as the sole IT guy. It's my first time in a position like this and after about 1.5 years I'm starting to get a bit burned out. I try to be friendly, helpful, and responsive and I get no respect whatsoever. Users tend to be flat-out rude when they have a problem, violate our pretty liberal policies constantly, and expect complex projects to be finished immediately upon requesting them. My knee-jerk reaction is to be a bastard, although I've avoided it up to this point. It's getting harder. For those of you who have been doing this a lot longer, how do you get a reasonable level of respect from your users while not being a jerk?"
Linux Business

Will ParanoidLinux Protect the Truly Paranoid? 236

ruphus13 writes "There are still places on the world where having anonymity might mean the difference between life and death. Covering one's tracks is considered to be of such paramount importance that we are now witnessing the rise of a Linux distro catering to the most paranoid. The 'alpha-alpha' version of ParanoidLinux is now out. But is this the best way to protect oneself? Couldn't it be easily circumvented? The article asks, 'Why is it necessary to put the applications and services designed to protect anonymity, to encrypt files, to make the user nameless and faceless, all together, in one distribution? Let's think in a truly paranoid manner. Wouldn't it be far easier for a nefarious government organization to target that distribution's repositories, mirror that singular distribution's disk images with files of its own design, and leave every last one of that distribution's users in the great wide open?' What should truly paranoid user do?"
Education

Harvard Faculty Adopts Open-Access Requirement 147

Vooch writes "Harvard University's Faculty of Arts and Sciences adopted a policy this evening that requires faculty members to allow the university to make their scholarly articles available free online." I may not be smart enough to go to college, but at least I can pretend to have a Harvard eduction. I don't think that will be enough to get a gig as a Simpsons writer.
United States

Submission + - Forensics Expert says Al-Qaeda Images Altered

WerewolfOfVulcan writes: Wired reports that researcher Neal Krawetz revealed some veeeeeery interesting things about the Al-Qaeda images that our government loves to show off.

From the article: "Krawetz was also able to determine that the writing on the banner behind al-Zawahiri's head was added to the image afterward. In the second picture above showing the results of the error level analysis, the light clusters on the image indicate areas of the image that were added or changed. The subtitles and logos in the upper right and lower left corners (IntelCenter is an organization that monitors terrorist activity and As-Sahab is the video production branch of al Qaeda) were all added at the same time, while the banner writing was added at a different time, likely around the same time that al-Zawahiri was added, Krawetz says." Why would Al-Qaeda add an IntelCenter logo to their video? Why would IntelCenter add an Al-Qaeda logo? Methinks we have bigger fish to fry than Gonzo and his fired attorneys... }:-) The article contains links to Krawetz's presentation and the source code he used to analyze the photos.

Comment Kernel panics related to wireless (Score 2, Informative) 108

Some of the MacBook Pros have a faulty motherboard causing kernel panics when using a wireless connection. See this thread for details, but the upshot is that if you buy a MBP, it might be a good idea to download some big files over wireless immediately, so if you have this problem you can get a replacement computer immediately. There is some short window (one or two weeks?) within which you can get the computer declared DOA, and if you find out about the problem after that you will have to send the computer to be repaired, which might take a long time.

Slashdot Top Deals

The herd instinct among economists makes sheep look like independent thinkers.

Working...