Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Quibbles (Score 2) 2254

All in all, the look is good but there are some minor tweeks the new slashdot could use:

1. Not enough contrast in the links in stories for them to be easily visible. That makes a big difference to old guys with deteriotating eyesight (like me).

2. No way for a story submitter to attach a link or email address to his username when he/she submits a story.

3. The story box is too small when making a story submission and makes it difficult to submit stories from an ipad.

4. When I look at popular in the firehose, I don't see the colors indicating their popularity anymore. This was really useful.

5. Please bring back the story rejected/accepted page that used to show up when you submitted a story.

6. The good - that you have retained the ability from the classic view to look at stories nested, flat, back to front etc.

United States

Submission + - DOJ Seeks Mandatory Data Retention for ISP's 3

Hugh Pickens writes: "Computerworld reports that in testimony before Congress the US Department of Justice renewed its call for legislation mandating Internet Service Providers (ISP) retain customer usage data for up to two years because law enforcement authorities are coming up empty-handed in their efforts to go after online predators and other criminals because of the unavailability of data relating to their online activities. "There is no doubt among public safety officials that the gaps between providers' retention policies and law enforcement agencies' needs, can be extremely harmful to the agencies' investigations" says Jason Weinstein, deputy assistant attorney general at the Justice Department adding that data retention is crucial to fighting Internet crimes, especially online child pornography (PDF). Weinstein admits that a data retention policy raises valid privacy concerns however, such concerns need to be addressed and balanced against the need for law enforcement to have access to the data. "Denying law enforcement that evidence prevents law enforcement from identifying those who victimize others online," concludes Weinstein."
The Military

Submission + - Chinese Stealth Fighter Jet May Use US Technology

Ponca City writes: "In 1999 a US F-117 Nighthawk was downed by a Serbian anti-aircraft missile during a bombing raid. It was the first time one of the fighters had been hit, and the Pentagon blamed clever tactics and sheer luck. The pilot ejected and was rescued. Now the Guardian reports that pieces of the wrecked US F-117 stealth fighter ended up in the hands of foreign military attaches. "At the time, our intelligence reports told of Chinese agents crisscrossing the region where the F-117 disintegrated, buying up parts of the plane from local farmers," says Admiral Davor Domazet-Loso, Croatia's military chief of staff during the Kosovo war. "We believe the Chinese used those materials to gain an insight into secret stealth technologies ... and to reverse-engineer them." Zoran Kusovac says the Serbian regime routinely shared captured western equipment with its Chinese and Russian allies. "The destroyed F-117 topped that wish-list for both the Russians and Chinese," says Kusovac."
Education

Submission + - Study Sez Txt Msgs Make Kidz Gr8 Spellrz

Picknz writes: "The Telegraph reports that researchers have found that texting can improve literacy among pupils by giving them extra exposure to word composition outside the school day. According to the report, the association between spelling and text messaging may be explained by the ''highly phonetic nature' of the abbreviations used by children and the alphabetic awareness required for successfully decoding the words. "It is also possible that textism use adds value because of the indirect way in which mobile phone use may be increasing children’s exposure to print outside of school," says the report. "We are now starting to see consistent evidence that children's use of text message abbreviations has a positive impact on their spelling skills," adds Professor Claire Wood. "There is no evidence that children's language play when using mobile phones is damaging literacy development.""

Comment Not a Smoking Gun (Score 2) 136

http://arstechnica.com/open-source/news/2011/01/new-alleged-evidence-of-android-infringement-isnt-a-smoking-gun.ars

"A close look at the actual files and accompanying documentation, however, suggest that it's not a simple case of copy and paste. The infringing files are found in a compressed archive in a third-party component supplied by SONiVOX, a member of Google's Open Handset Alliance (OHA). SONiVOX, which was previously called Sonic, develops an Embedded Audio Synthesis (EAS) framework and accompanying Java API wrappers which it markets as audioINSIDE."

It's not clear how the zip file got included in the AOSP, but it's obvious that it wasn't intended to be there and isn't actually used by Android in any capacity. Android is using SONiVOX's EAS code, but doesn't use or need the MMAPI wrapper. This incident is very clearly not a case of Android stealing code from Sun or J2ME. It's a handful of test cases from an unrelated and publicly available Sun reference implementation that got uploaded by accident to AOSP in a zip archive supplied by a third party. It's a tacky mistake, but it's hardly serious or damaging. At worst, it warrants a takedown notice. It's certainly not a smoking gun as one might assume when viewing the code out of context.

Movies

Submission + - Wikileaks Movie Coming to the Big Screen

Hugh Pickens writes: "First Facebook and now Wikileaks as the Guardian reports that studio executives have picked up the screen rights to the forthcoming Julian Assange biography "The Most Dangerous Man in the World" by award-winning Australian writer Andrew Fowler. The book details Assange's life from his childhood on Magnetic Island in Queensland, Australia, all the way through to his founding of the whistleblower website in 2006 to publish classified material. Producers Barry Josephson and Michelle Krumm, who have optioned The Most Dangerous Man in the World, say they are planning a "suspenseful drama" in the vein of All the President's Men and with the thrill of a Tom Clancy novel. "As soon as I met Andrew and read a few chapters of his profound book, I knew that – with his incredibly extensive depth of knowledge – it would enable us to bring a thought-provoking thriller to the screen," says Krumm."
Apple

Submission + - The Case of Apple's Mystery Screw 1

Pickens writes: "Network World reports that in the past if you wanted to remove the outer case on your iPhone 4 to replace the battery or a broken screen, you could use a Phillip screwdriver to remove two tiny screws at the base of the phone and then simply slide off the back cover. But now Apple is replacing the outer screw with a mysterious tamper-resistant "pentalobular" screw across its most popular product lines, making it harder for do-it-yourselfers to make repairs. What about existing products in the field? Pentalobular screws might find their way into them, too. "Apple's latest policy will make your blood boil," says Kyle Wiens, CEO of iFixit. "If you take your iPhone 4 into Apple for any kind of service, they will sabotage it by replacing your Phillips screws with the new, tamper-resistant screws. We've spoken with the Apple Store geniuses tasked with carrying out this policy, and they are ashamed of the practice." Of course only Apple authorized service technicians have Pentalobular screwdrivers and they're not allowed to resell them. "Apple sees a huge profit potential," says Wiens. "A hundred dollars per year in incremental revenue on their installed base is a tremendous opportunity.""
Graphics

Submission + - Facebook Images to Get Expiration Date

Pickens writes: "BBC reports that researchers have created software that gives images an expiration date by tagging them with an encrypted key so that once this date has passed the key stops the images being viewed and copied. Professor Michael Backes, who led development of the X-Pire system, says development work began about 18 months ago as potentially risky patterns of activity on social networks, such as Facebook, showed a pressing need for such a system. "More and more people are publishing private data to the internet and it's clear that some things can go wrong if it stays there too long," says Backes. The X-Pire software creates encrypted copies of images and asks those uploading them to give each one an expiration date. Viewing these images requires the free X-Pire browser add-on. When the viewer encounters an encrypted image it sends off a request for a key to unlock it. This key will only be sent, and the image become viewable, if the expiration date has not been passed."
Transportation

Submission + - Road Train Completes First Trials in Sweden

Hugh Pickens writes: "BBC reports that technology that links vehicles into "road trains" that can travel as a semi-autonomous convoy has undergone its first real world tests with trials held on Volvo's test track in Sweden slaving a single car to a truck to test the platooning system and researchers believe platoons of cars could be traveling on Europe's roads within a decade cutting fuel use, boosting safety and may even reducing congestion. SARTRE researchers say that around 80% of accidents on the road are due to human error so using professional lead drivers to take the strain on long journeys could, they say, see road accidents fall. They also predict fuel efficiency could improve by as much as 20% if "vehicle platooning" takes off, with obvious benefits for the environment. A video of the trial shows the test car traveling behind a truck and then handing over control to that leading vehicle with commands to steer, speed up and slow down all coming from the driver of the lead vehicle while the driver of the test car is seen taking his hands off the wheel, reading a newspaper and sipping coffee as the journey proceeds. "An automated system is likely to make it safer as it takes away driver error but it would have to be 100% reliable," says John Franklin "This kind of system would also require a complete change in motoring culture for drivers to hand over control,.""
Music

Submission + - Sony, Universal to Beat Piracy with 'Instant Pop' 1

Hugh Pickens writes: "The Guardian reports that Britain's two biggest record labels, Sony and Universal, plan to beat music piracy by making new singles available for sale on the day they first hit the airwaves hoping the effort will encourage young people to buy songs they can listen to immediately rather than copying from radio broadcasts online. Songs used to receive up to six weeks radio airplay before they were released for sale, a practice known as "setting up" a record. "What we were finding under the old system was the searches for songs on Google or iTunes were peaking two weeks before they actually became available to buy, meaning that the public was bored of — or had already pirated — new singles," says David Joseph. Sony, which will start the "on air, on sale" policy simultaneously with Universal next month, agreed that the old approach was no longer relevant in an age where, according to a spokesman for the music major, "people want instant gratification"."
Programming

Submission + - How Facebook Ships Code

Hugh Pickens writes: "yeegay has a very interesting article about how Facebook develops and releases software that he has gathered from talking with friends at the company. The two largest teams at Facebook are Engineering and Ops, with roughly 400-500 team members each, together making up about 50% of the company. All engineers go through 4 to 6 week “Boot Camp” training where they learn the Facebook system by fixing bugs. After boot camp, all engineers get access to live DB and any engineer can modify any part of Facebook's code base and check-in at-will so that engineers can modify specs mid-process, re-order work projects, and inject new feature ideas anytime. Then arguments about whether or not a feature idea is worth doing or not generally get resolved by spending a week implementing it and then testing it on a sample of users, e.g., 1% of Nevada users. "All changes are reviewed by at least one person, and the system is easy for anyone else to look at and review your code even if you don’t invite them to," writes yeegay. "It would take intentionally malicious behavior to get un-reviewed code in.” What is interesting for a compnay this size is that there is no official QA group at Facebook but almost every employee is dogfooding the product every day: many times a day and every employee is using a version of the site that includes all the changes that are next in line to go out. All employees are strongly encouraged to report any bugs they see and these are very quickly actioned upon. Facebook has about 60,000 servers with the smallest level comprising only 6 servers and there are nine levels for pushing out new code. For new code the ops team observes those 6 servers at level 1 to make sure that they are behaving correctly before rolling forward to the next level. If a release is causing any issues (e.g., throwing errors, etc.) then the push is halted, the engineer who committed the offending changeset is paged to fix the problem, and then the release starts over again at level 1."
United States

Submission + - US Scraps Virtual Fence along Mexican Border

Pickens writes: "The Arizona Republic reports that the federal government has officially cancelled its multibillion-dollar plan to build a virtual fence along the border with Mexico as Homeland Security Secretary Janet Napolitano disclosed in a congressional briefing that the program known as SBInet was costing too much and achieving too little. "SBInet cannot meet its original objective of providing a single, integrated border-security technology solution," says Napolitano. Boeing was hired in 2006 to develop the system under a three-year federal contract with cost projections for full build-out as high as $8 billion but efforts were plagued by delays, glitches, budget increases and congressional criticism. Napolitano has ordered Customs and Border Protection to launch a more modest and geographically tailored effort using SBInet funds and existing technology such as mobile-surveillance systems, unmanned aircraft, thermal-imaging devices and remote-video surveillance with proven elements of SBInet including stationary radar and infrared-sensor towers. SBInet cost nearly $1 billion for development along 53 miles of Arizona border. Homeland Security says its new plan can enhance security along the remaining 323 miles of Arizona border at a total cost of less than $750 million."

Slashdot Top Deals

Fast, cheap, good: pick two.

Working...