Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Firefox

Firefox Adopts a 6-8 Week Variable Release Schedule (mozilla.org) 249

AmiMoJo writes: Four years ago Mozilla moved to a fixed-schedule release model, otherwise known as the Train Model, in which we released Firefox every six weeks to get features and updates to users faster. Now Mozilla is moving to a variable 6-8 week cycle, with the same number of releases per year but some flexibility to 'respond to emerging user and market needs' and allow time for holidays. The new release schedule looks like this:
  • 2016-01-26 – Firefox 44
  • 2016-03-08 – Firefox 45, ESR 45 (6 weeks cycle)
  • 2016-04-19 – Firefox 46 (6 weeks cycle)
  • 2016-06-07 – Firefox 47 (7 weeks cycle)
  • 2016-08-02 – Firefox 48 (8 weeks cycle)
  • 2016-09-13 – Firefox 49 (6 weeks cycle)
  • 2016-11-08 – Firefox 50 (8 weeks cycle)
  • 2016-12-13 – Firefox 50.0.1 (5 week cycle, release for critical fixes as needed)
  • 2017-01-24 – Firefox 51 (6 weeks from prior release)

Hardware Hacking

OpenWrt Turns a $14 Card Reader Into the Smallest Wireless AP (livejournal.com) 43

An anonymous reader writes: The Zsun Wifi card reader is a tiny micro SD card reader with WiFi connectivity. While people managed to access the device's serial console a few months ago, the plan was to eventually run OpenWrt since it's based on the popular Atheros AR9331 WiSoC combined with 64MB RAM and 16MB SPI Flash. A team of Polish hackers have managed this feat, and have now posted instructions to install OpenWrt, as well as other documentation: for example, a description of the board's GPIOs.
Communications

Why Won't T-Mobile Let Us Binge On All Of It? 181

Bennett Haselton writes: T-Mobile has been accused of violating Net Neutrality by providing "Binge On" plans that come with unlimited data, but only from select streaming websites such as Hulu and Netflix streamed at low-quality speeds (while excluding Youtube and Google Play). Why not just duck the whole net neutrality debate by providing Binge On as a medium-bandwidth pipe, which has a limited data streaming speed, but can stream at that speed from any website? Read on for more on this question, and T-Mobile's stilted rationale for its provider-specific system.

Comment Re:Technical solution to a people problem... (Score 1) 89

This is in correct, in many western nations the mail envelopes have been scanned and directed on their path using character recognition. This is effectively the meta data that is tracked in email, especially if people write the sender on the envelope too.

http://www.nytimes.com/2013/07...

Submission + - Red Hat welcomes CentOS to the family (redhat.com)

An anonymous reader writes: Red Hat, Inc, (NYSE: RHT), and the CentOS Project today announced they are joining forces to build a new CentOS, completing the whole Red Hat Linux story, from Fedora through RHEL to CentOS.

Comment Re:How much safer (Score 2) 163

The attacker would have to physically implant the bug in the machine, which would take training. Once it's in, however, the bug can isn't limited to wired networks or short range technologies like Bluetooth or WiFi. It could use GSM or SMS with nothing more than parts bought at a Radio Shack.

Not at all and the technology for monitoring the output for typewriters is decades old.

They can be monitored remotely using the vibration in the office windows or using the fluctuation in the electrical current. Monitoring the vibration in the office windows can be done from across the street or further away.

Comment Re:NRA sedition^H^H^H patriotism (Score 3, Informative) 573

An armed response is not always the answer.

Mainstream media failed to properly report the peaceful revolution in Iceland recently where the population completely replaced their government. http://rhuni.com/l/R7XUh8IIGB

Or we can look at the revolution in Egypt where only 2% of the population marched on the capital.

Security

Video RSA: From Apple Keys to Biometric Security Devices (Video) 21

30 years ago there was a company that made molded plastic push buttons and keyboard keys, including those used on early Apples, Ataris, and Texas Instrument computers. Said company, Key Source International, has morphed over the years into a supplier of secure keyboards and other biometric security devices. Some of what they make is trivial, and some is interesting. In this video (and the accompanying transcript), made by Tim Lord at the 2013 RSA conference, Key Source International marketing VP Philip Bruno tells us about the company and its products.

Comment Already an alternative http://owncloud.org (Score 1) 96

You could possibly run http://owncloud.org/ yourself on an Amazon server and have as much storage as you want. There are clients for Mac, Windows, Linux, iOS and Android.

It took me 30 minutes to set one up. While I may sound like an advert, I am just really excited as I have been waiting for something like this for years.

I think European companies that need to keep data inside Europe for regulatory reasons can then run this for their employees inside their firewalls / VPNs.

Slashdot Top Deals

"Ahead warp factor 1" - Captain Kirk

Working...