Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
Music

The Technology Behind Last.fm 125

CNET's Crave has up a detailed interview with Last.fm's Matthew Ogle, the company's head of Web development. Reader CNETNate notes that Last.fm has streamed 275,000 years of audio around the world. From the interview: "We stream all music directly off our servers in London. We have a cluster of streaming nodes including a bunch of powerful machines with solid-state hard drives. We have a process that runs daily which finds the hottest music and pushes those tracks on to the SSDs streamers that sit in front of our regular platter-based streaming machines. That way, if someone is listening to one of our more popular stations, the chances are really good that these songs are coming off our high-speed SSD machines. They're fast because every song is sitting in memory instead of being on a slow, spinning platter." The interview is actually on two pages but pretends it's on three.
Google

Google Attack On the Mobile Market Rumored 324

xchg writes in with a somewhat speculative, though plausible, piece from WiseAndroid claiming that Google is gearing up for an all-out assault on the mobile-phone market that will include a new, Google-branded handset and the first comprehensive Google phone service with unlimited free calls. "The real breakthrough, however, will come with the marriage of the Googlephone to Google Voice, the Californian company’s high-tech phone service. Google Voice gives US users a free phone number and allows unlimited free calls to any phone in the country — landline or mobile. International calls start from... just over a penny a minute. Google Voice also uses sophisticated voice recognition to turn voicemails into emails, can block telemarketing calls automatically and offers free text messaging. Google sounded its intentions two weeks ago when it purchased a small company called Gizmo5... [E]xperts are predicting that the Googlephone will be launched in the US early next year."
IBM

IBM's Answer To Windows 7 Is Ubuntu Linux 863

An anonymous reader writes "It looks like IBM isn't much of a friend of Microsoft's anymore. Today IBM announced an extension of its Microsoft-Free PC effort together with Canonical Ubuntu Linux. This is the same thing that was announced a few weeks back for Africa (a program that began a year ago), and now it's available in the US. The big push is that IBM claims it will cost up to $2,000 for a business to move to Windows 7. They argue that moving to Linux is cheaper."
Databases

MySQL Cofounder Says Oracle Should Sell Database To a Neutral 3d Party 207

alphadogg writes "Oracle should resolve antitrust concerns over its acquisition of Sun Microsystems by selling open-source database MySQL to a suitable third party, its cofounder and creator Michael 'Monty' Widenius said in a blog post on Monday. Oracle's $7.4 billion acquisition of Sun is currently being held up by an investigation by the European Commission. The Commission's main concern seems to be MySQL, which was acquired by Sun in January 2008 for $1 billion. A takeover by the world's leading proprietary database company of the world's leading open source database company compels the regulator to closely examine the effects on the European market, according to remarks made by Competition Commissioner Neelie Kroes last month. The key objective by Widenius is to find a home outside Oracle for MySQL, where the database can be developed and compete with existing products, including Oracle's, according to Florian Mueller, a former MySQL shareholder who is currently working with Monty Program AB on this matter." Richard Stallman agrees.

Submission + - The Sad State of the Mobile Web (infoworld.com)

snydeq writes: "Despite being the much better development platform for today's smartphones, open Web standards still face an uphill battle on mobile devices, Fatal Exception's Neil McAllister writes, nothing that here, as on the desktop, the main hurdle is scalability. But whereas successful Web development for the desktop is a matter of scaling up, mobile Web development calls for applications that can effectively scale down as well — an imperative that is fast making the state of the mobile Web 'even sadder,' McAllister writes. 'The more that modern Web applications take advantage of the new client-side technologies available in desktop browsers, the more the divide between the desktop Web and the mobile Web widens.' As a result, developers are forced to fall back on basic Web technologies — a tactic that too often translates simply into writing separate UIs for mobile users. 'The result? Mobile Web applications are in pretty much the same boat as they were when the first WAP-enabled handsets appeared: two separate development tracks, one for the desktop and one for mobile. Call that an opportunity if you want. I call it a waste of potential.'"
Encryption

Thawte Will End "Web of Trust" On November 16 127

An anonymous reader writes "Thawte is ending their Web of Trust, including their free Personal Email Certificates, in less than 2 weeks' time. This hasn't been picked up by the media yet. Seems to me a lot of people, including myself, are hurt by this." Thawte is offering a 1-year free VeriSign cert to those holding valid Personal Email Certificates; after that you pay.
Privacy

Security / Privacy Advice? 260

James-NSC writes "My employer is changing its policy towards employee use of social networks. I've been asked to give a 40-minute presentation to the entire company, with attendance mandatory, on the security and privacy concerns relating to social networking. While I was putting it together, I ended up with some miscellaneous information that pertains to security/privacy in general, for example: the emerging ATM skimming (mainly for our European employees), a reminder that email is not private, malware/drive-by in popular search results, etc. Since these topics don't directly relate to the subject I've been asked to address, I've ended up with a section titled 'While I have you...' I'm going to have the mandatory attention of every employee and I thought it would be a great opportunity to give advice on security/privacy issues across the board. As it's an opportunity that one seldom gets, I certainly want to utilize it fullly. If you had the attention of an entire company with employees in the US, UK, Asia, and Australia, what security / privacy advice would you give?"
Censorship

Submission + - Amazon bans public domain from Kindle (sacred-texts.com) 6

John B. Hare writes: "John B. Hare writes "Many publishers of public domain content on the Kindle are being turned away for reasons which Amazon declines to clarify. In the past two weeks any publisher posting a public domain book (or a book which appears to be a public domain book) have received the message "Your book is currently under review by the Kindle Operations team as we are trying to improve the Kindle customer experience. Please check back in 5 business days to see if your book was published to the store."

Amazon claims that this is a quality control issue, that readers can't figure out on their own that a five page Kindle book for $9.99 is a rip-off or yet another Kindle edition of 'Pride and Prejudice' is pointless. This was supposed to be the point of user feedback and the Kindle return policy: the user can quickly decide what the best choice is, and if they don't like it, back out without any harm done.

I own and run one of the primary contributors of new public domain etexts on the web: sacred-texts.com. When the ban went into effect, I was just back from an intense round of chemo. I was disappointed to get this message. I am (was?) in the process of converting all of the 2000+ ebooks at sacred-texts into Kindle editions. I use a homebrew preflight Kindle filter to construct the Kindle binary from my master files, which we have invested nearly a million dollars into creating. We spend thousands a month in-house doing legal clearance, scanning, OCRing, and proofing, often by domain experts. So we are hardly a fly-by-night operation. In fact, many of the PD texts floating around on the Internet and on the Kindle were originally done at sacred-texts at great investment of labor and time. Our Kindle return rate is close to zero.

This morning I received an email stating:

Dear Publisher,

We're working on a policy and procedure change to fix a customer experience problem caused by multiple copies of public domain titles being uploaded by a multitude of publishers. For an example of this problem, do a search on "Pride and Prejudice" in the Kindle Store. The current situation is very confusing for customers as it makes it difficult to decide which 'Pride and Prejudice' to choose. As a result, at this time we are not accepting additional public domain titles through DTP, including the following: The Unknown Life of Jesus Christ
The Aquarian Gospel of Jesus the Christ
Traces of a Hidden Tradition in Masonry and Medieval Mysticism
The History of the Knights Templar by Nicolas Notovitch...


If you believe that we have wrongly identified this title as a public domain title, and you are the copyright holder or are authorized to sell it by the copyright holder, then please reply to title-submission@amazon.com with appropriate documentation of your e-book rights.

Thank you, Amazon.com

As can be seen, this brings an entirely new issue into play: apparently, if I owned the rights to a public domain book and can prove it, they will reconsider. However, nobody can own a public domain book. Amazon is telling us that in order to post our books we need to prove a contradiction!

One key point is that Amazon has applied this ban completely non-selectively. Established publishers such as myself and others who have never had any quality control issues whatsoever, and give good value for the price, have all been tarred with the broad brush of 'Public Domain Publisher--do not post'.

By banning new public domain books from the Kindle, they are making an implicit decision as to which books people should read. You can argue that 'you can get these texts anywhere' but by excluding high quality Kindle books of them from the nascent Kindle marketplace, Amazon is implicitly trying to decide what is a valid part of our culture and what isn't. This trend does not bode well for the future of ebooks.

"

Idle

Submission + - NZ woman fired for using uppercase in email (nzherald.co.nz)

tomachi writes: "This is hilarious. An accountant in NZ has been awarded $17,000 NZD for unfair dismissal after her boss fired her without warning for using uppercase letters in a single email to co-workers. The email, which advises her team how to fill out staff claim forms, specifies a time and date highlighted in bold red, and a sentence written in capitals and highlighted in bold blue. It reads: "To ensure your staff claim is processed and paid, please do follow the below checklist.""
It's funny.  Laugh.

Pigeon Protocol Finds a Practical Purpose 113

Selanit writes "Since David Waitzman wrote his tongue-in-cheek Standard for the Transmission of IP Datagrams on Avian Carriers, there have been occasional attempts to actually transmit information via pigeon. One group back in 2001 successfully sent a PING command. But now there's a practical use for pigeon-based communications: photographers working for the white-water rafting company Rocky Mountain Adventures send memory sticks full of digital photos via homing pigeon so the photos will be ready when the rafters finish up. The company has details on how the pigeons are trained and equipped. It may not be a full implementation of the Pigeon Protocol, but it works in narrow canyons far off the beaten path — and just as David Waitzman presciently predicted, they occasionally suffer packet loss due to hawks and ospreys."
Security

Offshore Drilling Rigs Vulnerable To Hackers 116

Hugh Pickens writes "Foreign Policy magazine reports that a research team from the SINTEF Group, an independent Norwegian think tank, has warned oil companies worldwide that offshore oil rigs are highly vulnerable to hacking as they shift to unmanned robot platforms where vital operations — everything from data transmission to drilling to sophisticated navigation systems that maintain the platform's position over the wellhead — are controlled via wireless links to onshore facilities. 'The worst-case scenario, of course, is that a hacker will break in and take over control of the whole platform,' says Martin Gilje Jaatun, adding that it hasn't happened yet, but computer viruses have caused personnel injuries and production losses on North Sea platforms. The list of potential cyberattackers includes ecowarriors aiming to jack up an oil firms' production costs, extortionists drawn to oil firms' deep pockets, and foreign governments engaging in a strategic contest for ever-more-scarce global oil reserves, says Jeff Vail, a former counterterrorism and intelligence analyst with the US Interior Department. 'It's underappreciated how vulnerable some of these systems are,' says Vail. 'It is possible, if you really understood them, to cause catastrophic damage by causing safety systems to fail.'"
Microsoft

Microsoft Poland Photoshops Black Guy To White One 964

wanted writes "If you look at Microsoft's Poland business solutions Web site, you will probably not notice anything odd about the main picture. However, when you compare it with the original English version, you can see that someone decided that showing black people in Poland is probably not going to be convincing to business. They just Photoshopped the head of a white guy in for the black one, in an amateurish way, leaving his hand unchanged. (Here's a mirror in case something should happen to the original.)" We noted a few months back that the city of Toronto had done something similar.
Businesses

Banks Urge Businesses To Lock Down Online Banking 201

tsu doh nimh writes "Organized cyber-gangs in Eastern Europe are increasingly preying on small and mid-size companies in the US, setting off a multimillion-dollar online crime wave that has begun to worry the nation's largest financial institutions, The Washington Post's Security Fix blog reports: '"In the past six months, financial institutions, security companies, the media and law enforcement agencies are all reporting a significant increase in funds transfer fraud involving the exploitation of valid banking credentials belonging to small and medium sized businesses," reads a confidential alert issued by the Financial Services Information Sharing and Analysis Center, an industry group created to share data about critical threats to the financial sector.' The banking group is urging that commercial bank customers 'carry out all online banking activity from a standalone, hardened, and locked-down computer from which e-mail and Web browsing is not possible.' The story includes interviews with several victim businesses, and explains that in each case, the fraudsters — thought to reside in Eastern Europe — are using "'money mules,' unwitting or willing accomplices in the US hired via Internet job boards. The blog has more stories and details about these crimes."
Programming

Making Sense of Revision-Control Systems 268

ChelleChelle writes "During the past half-decade there has been an explosion of creativity in revision-control software, complicating the task of determining which tool to use to track and manage the complexity of a project as it evolves. Today, leaders of teams are faced with a bewildering array of choices ranging from Subversion to the more popular Git and Mercurial. It is important to keep in mind that whether distributed or centralized, all revision-control systems come with a complicated set of trade-offs. Each tool emphasizes a distinct approach to working and collaboration, which in turn influences how the team works. This article outlines how to go about finding the best match between tool and team."
Privacy

Submission + - Schneier on a generation gap in privacy (japantimes.co.jp)

goompaloompa writes: In The Japan Times, Bruce Shneier writes that a passing conversation online is not what it may seem and that maintaining your privacy is becoming even more difficult as social media and cloud computing become the norm. Furthermore, while users in Japan may think they are secure, their level of protection may vary when the computers that store their data are overseas. At the root of the problem is a new generation gap: old laws incapable of covering current-day scenarios.

Slashdot Top Deals

"There is such a fine line between genius and stupidity." - David St. Hubbins, "Spinal Tap"

Working...