Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Download now? (Score 1) 717

That's an interesting point.

However, it's not a new one. This "loop-hole" in the GPL licenses has often been called "software-as-a-service" (SaaS) loop-hole.

That is why there were created a license that fixes this: the Affero General Public License (AGPL).

However, I haven't ever though of applying the SaaS clause in relation to applications running on "iProduct" devices. But I doubt it will hold, unless the application either run on Apples own web servers, or if Apple still (for some reason) still was the legal owner of your piece of hardware, minimum.

If the SaaS "loop-hole" also will be usable for applications running in locked virtual machines/locked-down devices this is a major reason to consider to use AGPL in stead of GPL for your next FOSS project.

Comment GPLv2 may/may not be considered a "EULA" (Score 1) 717

That's interesting facts about the changing terms you're pointing out.

However, you should not necessarily confuse GPLv2 for a EULA. Or that would really depend on how you define an End-User License Agreement (EULA).

IANAL, but from what I've read, generally, GPLv2/v3 isn't considered an EULA in the proprietary legal-speak sence, since there is no obligations that you as a *user* of the software have to agree upon before using it.

The GPLv2/v3 will grant you as a GPL software *user* a set of *rights* though, which may be beneficial to you (the "4 freedoms", ref FSF). But this isn't anything you have to agree upon -- you don't even have to take advantage of them.

However, you only have to *agree* with the GPLv2/v3 license when you *distribute* the GPL licensed software (this may happen some time after you have used it, or it may never happen at all). You can use the software all that you want, but you are not allowed to re-distribute it unless you oblige to the GPL license term (which in effect ensures that the down-stream receivers of the software you distribute also receives the same essential 4 freedoms as you were entitled to).

So, if it were a legal cage battle on this topic among true lawyers, it isn't obvious that the GPLv2 (nor v3) would be legally classified as a "End-User License Agreement".
PC Games (Games)

An Early Look At Civilization V 286

c0mpliant writes "IGN and Gamespot have each released a preview of the recently announced and eagerly awaited Civilization V. Apart from the obvious new hexagon shape of tiles and improved graphics, the articles go on to outline some of the major changes in the game, such as updated AI, new 'flavors' to world leaders, and a potentially game-changing, one-unit-per-tile system. No more will the stack of doom come to your city's doorsteps. Some features which will not be returning are religion and espionage. The removal of these two have sparked a frenzy of discussion on fan-related forums."

Quantum Encryption Implementation Broken 133

I Don't Believe in Imaginary Property writes "Professor Johannes Skaar's Quantum Hacking group at NTNU have found a new way to break quantum encryption. Even though quantum encryption is theoretically perfect, real hardware isn't, and they exploit these flaws. Their technique relies on a particular way of blinding the single photon detectors so that they're able to perform an intercept-resend attack and get a copy of the secret key without giving away the fact that someone is listening. This attack is not merely theoretical, either. They have built an eavesdropping device and successfully attacked their own quantum encryption hardware. More details can be found in their conference presentation."

An Open Source Compiler From CUDA To X86-Multicore 71

Gregory Diamos writes "An open source project, Ocelot, has recently released a just-in-time compiler for CUDA, allowing the same programs to be run on NVIDIA GPUs or x86 CPUs and providing an alternative to OpenCL. A description of the compiler was recently posted on the NVIDIA forums. The compiler works by translating GPU instructions to LLVM and then generating native code for any LLVM target. It has been validated against over 100 CUDA applications. All of the code is available under the New BSD license."

Hand Written Clock 86

a3buster writes "This clock does not actually have a man inside, but a flatscreen that plays a 24-hour loop of this video by the artist watching his own clock somewhere and painstakingly erasing and re-writing each minute. This video was taken at Design Miami during Art Basel Miami Beach 2009."

Comment Re:Okay, enough already (Score 1) 484

It seems like you didn't RTFA.

The EC has NOT ordered Microsoft to strip out IE from their upcoming Win 7 release. This is fully Microsoft's idea for a "solution". It is a clever move of course, it will prevent other browser makers any free back-riding on Microsoft's Windows (which has also been discussed as a solution, at least by the plaintiffs).

The Media

Submission + - Ida Primate Fossil Discovery; Media Blitz Correct? (

gpronger writes: What happens when researchers use the popular press? Likely not much good. Similar to "Cold Fusion", the recent media blitz regarding the early primate fossil nicknamed "Ida" is a prime example. Largely prior to peer review, it is being heralded as the "Missing Link".

Only time will tell if there is anything "real" here or not.

The main good that may come out of this is may only be:

1) Researchers being more cautious on how they release info if this fails at the claims made

2) On the positive side, its gotten science in the public eye, and not on the massively tiresome global warming debate


Submission + - Helsinki named Klingon capital of the world 2

Landau writes: "Helsinki in Finland has been the named the city with the highest proportion of Klingon speakers.

Computer security company Sophos — who recently released their anti-virus software in Klingon — has produced a top ten chart, based upon data they collected from the geographic location of downloaders of their Star Trek-themed software.

According to their data, 1 in 1953 people in Helsinki speak Klingon (including Finnish Green parliamentarian Jyrki Kasvi).

Here's the whole chart

1. Helsinki... 1 in 1953 people speak Klingon
2. Manchester, UK... 1 in 2619
3. Tucson... 1 in 2757
4. Seattle... 1 in 3069
5. San Francisco... 1 in 3174
6. London, UK... 1 in 3375
7. Zagreb... 1 in 3410
8. Amsterdam... 1 in 4635
9. Brisbane... 1 in 5327
10. Munich... 1 in 5972

More information on Sophos's website."

Submission + - Court to Google: taking music is evil

pcause writes: Google has been told to pay up for use of music on YouTube. This is another in a continuing series of Court decisions that add up to telling Google that its business practices just aren't legal. This case, the suit by Viacom over pirated content on YouTube, the book scanning settlement, and the like, all point to the fact that Google takes the attitude that if the law is inconvenient to what it sees as in its business interests, the law doesn't matter. If you don't agree sue them.

This really raises the question of what the much talked about slogan, "Do no evil", really means. Perhaps the question no one has asked is "Who decides what is evil?" Seems the Google folks have a broken moral compass when it comes to rights of content owners. What should really worry /. is what they're really doing to your privacy.

Submission + - Flaw made public in OpenSSH encryption ( 1

alimo20 writes: "Researchers at the Royal Holloway, University of London have discovered a flaw in Version 4.7 of OpenSSH on Debian/GNU Linux. According to ISG lead professor Kenny Patterson, an attacker has a 2^{-18} (that is, one in 262,144) chance of success. Patterson tells that this is more significant than past discoveries because "This is a design flaw in OpenSSH. The other vulnerabilities have been more about coding errors"

The vulnerability is possible by a man-in-the-middle intercepting blocks of encrypted material as it passes. The attacker then re-transmits the data back to the server and counts the number of bytes before the server to throws error messages and disconnects the attacker. Using this information, the attacker can work backwards to figure out the first 4 bytes of data before encryption. "The attack relies on flaws in the RFC (Request for Comments) internet standards that define SSH, said Patterson"

"Patterson said that he did not believe this flaw had been exploited in the wild, and that to deduce a message of appreciable length could take days.""


Submission + - Adobe muscles in on Patch Tuesday (

Barence writes: "Adobe is instigating quarterly security updates of its products, which will coincide with Microsoft's "Patch Tuesday". "Based on feedback from our customers, who have processes and resources geared toward Microsoft's 'Patch Tuesday' security updates, we will make Adobe's quarterly patches available on the same days." Microsoft delivers its security updates on the second Tuesday of every month, hence the Patch Tuesday moniker. Adobe has, coincidentally it claims, released its last two security updates on Patch Tuesday."
Operating Systems

Submission + - Ubuntu 9.04 For The Windows Power User ( 1

crazipper writes: "Know a Windows power user who is (honestly) good with technology, but hasn't yet warmed to Linux? Tom's Hardware just posted a guide to installing and using Ubuntu 9.04, written specifically for the MS crowd (in other words, it talks about file systems, mount points, app installation, etc). Hopefully, by the end, your "friend" will realize just how easy Ubuntu can be to use and start down a long path of exploration with a new operating system."

Slashdot Top Deals

Your good nature will bring unbounded happiness.