×
Businesses

When It's Time To Scale, US Manufacturing Hits a Wall 268

curtwoodward writes "MIT researchers looked at 150 of the school's spin-out companies in manufacturing businesses over a decade, and found many of them hit the same chasm: Once it was time to ramp up to large-scale production, they couldn't find domestic investors and had to go overseas. The bulk of the research will be published later this year, but it raises an interesting conundrum — if an MIT-pedigreed company has serious trouble ramping up production in the U.S., how much harder is it for the 'average' business that wants to grow? Is it even still possible to do high-tech manufacturing here — or should it be?" Intel seems to be doing OK with U.S. manufacturing, but they have the advantage of established operations.
Advertising

Is Code.org Too Soulless To Make an Impact? 384

theodp writes "By trotting out politicians (Bill Clinton, Mike Bloomberg, Marco Rubio, Al Gore) and celebrities (Chris Bosh, will.i.am, Ashton Kutcher), Tuesday's Code.org launch certainly was a home run with the media. But will it actually strike a chord with kids and inspire them to code? Dave Winer has his doubts, and explains why — as someone who truly loves programming — code.org rubbed him the wrong way. 'I don't like who is doing the pitching,' says Winer, 'and who isn't. Out of the 83 people they quote, I doubt if many of them have written code recently, and most of them have never done it, and have no idea what they're talking about.' Code.org's because-you-can-make-a-lot of-money-doing-it pitch also leaves Dave cold. So, why should one code, Dave? 'Primarily you should do it because you love it, because it's fun — because it's wonderful to create machines with your mind. Hugely empowering. Emotionally gratifying. Software is math-in-motion. It's a miracle of the mind. And if you can do it, really well, there's absolutely nothing like it.' Nice. So, could Code.org use less soulless prattle from 'leaders and trendsetters' and more genuine passion from programmers?" Just force all ninth graders to learn Scheme instead of Microsoft Word.
Operating Systems

Genode OS 13.02 Features Low Latency Audio, Virtualization, Protected DMA 41

On the heels of their December release, the 13.02 release of the Genode multi-server microkernel OS framework continues to deliver major new features. Under the hood, there's support for the IOMMU, bringing safe bus master DMA to userspace drivers (overcoming one of the final advantages monolithic kernels had). They've also added full virtualization support, good enough to boot Linux as an application. In the cool department, they've added a new low latency audio interface that could very well pave the way for something akin to JACK, and right now provides a lightweight way for the system to beep at you in real time . A few more libraries have been ported (libssh, curl, iconv) in preparation for a port of git to the Noux native GNU runtime. There are also a bunch of other improvements to their NOVA microkernel, support for running on the Exynos 5250 and Freescale i.MX53, a new console multiplexer, improvements to the display server, simplification of the base libraries, and more. I'll be attempting to build it and give it a spin to see how well it works in practice sometime soon.
Patents

New Bill Would Require Patent Trolls To Pay Defendants' Attorneys 196

Zordak writes "According to Law 360, H.R. 845, the 'Saving High-Tech Innovators from Egregious Legal Disputes' (SHIELD) Act of 2013 would require non-practicing entities that lose in patent litigation to pay the full legal costs of accused infringers. The new bill (PDF) would define a 'non-practicing entity' as a plaintiff that is neither the original inventor or assignee of a patent, and that has not made its own 'substantial investment in exploiting the patent.' The bill is designed to particularly have a chilling effect on 'shotgun' litigation tactics by NPEs, in which they sue numerous defendants on a patent with only a vague case for infringement. Notably, once a party is deemed to be an NPE early in the litigation, they will be required to post a bond to cover the defendants' litigation costs before going forward."
The Military

Boeing Touts Fighter Jet To Rival F-35 — At Half the Price 497

An anonymous reader sends this news from the CBC: "In a dogfight of defense contractors, the hunter can quickly become the hunted. It's happening now to the F-35. The world's largest defense contractor, Lockheed Martin, is trying to convince wavering U.S. allies — including Canada — to stick with its high-tech, high-priced and unproven F-35 stealth fighter. But the F-35 is way behind schedule, way over budget and, now, it's grounded by a mysterious crack in a turbine fan. After years of technical problems, it's a tempting target for Lockheed Martin's rivals. It's no surprise, then, that the No. 2 defense contractor, Boeing, smells blood... The Super Hornet, it says, is a proven fighter while the F-35 is just a concept — and an expensive one at that. ... The Super Hornet currently sells for about $55 million U.S. apiece; the Pentagon expects the F-35 to cost twice as much — about $110 million."
Piracy

What a 'Six Strikes' Copyright Notice Looks Like 273

The new Copyright Alert System, a.k.a. the 'Six Strikes' policy, went into effect on Monday. Comcast and Verizon activated it today. Ars Technica asked them and other participating ISPs to see the copyright alerts that will be sent to customers who have been identified as infringing. Comcast was the only one to grant their request, saying that a "small number" of the alerts have already been sent out. The alerts will be served to users in the form of in-browser popups. They explain what triggered the alert and ask the user to sign in and confirm they received the alert. (Not admitting guilt, but at least closing off the legal defense of "I didn't know.") The article points out that the alerts also reference an email sent to the Comcast email address associated with the account, something many users not be aware of. The first two notices are just notices. Alert #5 indicates a "Mitigation Measure" is about to be applied, and that users will be required to call Comcast's Security Assurance group and to be lectured on copyright infringement. The article outlines some of the CAS's failings, such as being unable to detect infringement through a VPN, and disregarding fair use. Comcast said, "We will never use account termination as a mitigation measure under the CAS. We have designed the pop-up browser alerts not to interfere with any essential services obtained over the Internet." Comcast also assures subscribers that their privacy is being protected, but obvious that's only to a point. According to TorrentFreak, "Comcast can be asked to hand over IP-addresses of persistent infringers, and the ISP acknowledges that copyright holders can then obtain a subpoena to reveal the personal details of the account holder for legal action."
News

MIT Says Gunman Hoax Call Mentioned Swartz Case 41

An anonymous reader writes "MIT has posted a letter to campus newspaper The Tech providing a timeline of last weekend's 'gunman' hoax. On Saturday morning, Cambridge, MA police were contacted via Internet relay by a tipster who claimed that a someone wearing armor and carrying a 'really big gun' was in Building 7 at MIT (the Massachusetts Ave. entrance to the Infinite Corridor) and was heading towards the office of MIT President Rafael Reif. The call continued for 18 minutes, with the caller eventually claiming that the gunman was seeking to avenge the suicide of Aaron Swartz, who was being prosecuting for alleged illegal downloads of millions of journal articles using MIT's computer network. The caller also identified the gunman as an MIT staff member, who has since been questioned by police and cleared. MIT has been criticized for waiting 1.5 hours before sending a campus-wide alert after the call was received."
Google

Ask Slashdot: Can Quickoffice On Chromebooks Topple Microsoft's Office? 242

Nerval's Lobster writes "As we discussed yesterday, Google is bringing a Quickoffice viewer to its new high-end Chromebook Pixel, with full editing ability expected within three months. According to TechCrunch, Quickoffice-on-Chromebooks comes courtesy of Native Client. If Chromebooks prove a hit (and Google ports Quickoffice onto devices other than the ultra-high-priced Chromebook Pixel), could that mean the beginning of the end of Microsoft Office's market dominance of the productivity software space? While Microsoft has been pushing into the cloud with software like Office 365, that's also Google's home territory. But can Google actually disrupt the game?"
Security

Video RSA: Self-Encrypting USB Hard Drives for all Operating Systems (Video) 154

Tim Lord met Jay Kim at the RSA Conference in an Francisco. Kim's background is in manufacturing, but he's got an interest in security that has manifested itself in hardware with an emphasis on ease of use. His company, DataLocker, has come up with a fully cross-platform, driver independent portable system that mates a touch-pad input device with an AES-encrypted drive. It doesn't look much different from typical external USB drives, except for being a little beefier and bulkier than the current average, to account for both a touchpad and the additional electronics for performing encryption and decryption in hardware. Because authentication is done on the face of the drive itself, it can be used with any USB-equipped computer available to the user, and works fine as a bootable device, so you can -- for instance -- run a complete Linux system from it. (For that, though, you might want one of the smaller-capacity, solid-state versions of this drive, for speed.) Kim talked about the drive, and painted a rosy picture of what it's like to be a high-tech entrepreneur in Kansas.
Transportation

Plans Unveiled For Full Scale Replica of the Titanic 292

Hugh Pickens writes "USA Today reports that Australian billionaire Clive Palmer has unveiled plans for construction of Titanic II, a cruise ship designed as a 'full-scale re-creation' of the Titanic, adding that the ship will be built in China and begin carrying passengers in 2016. The Titanic II will be built 883 feet long – 3 inches longer than the original Titanic – and weigh 55,800 gross tons, according to Palmer, who stopped short of calling the vessel unsinkable. It will carry a maximum of 2,435 passengers and 900 crew members, and include a gymnasium, Turkish baths, a squash court, a swimming pool, a theater and a casino. Like the original ship, there will no TVs aboard and probably no Internet service, Palmer says. Passengers will be able to dress in 1912-style clothing, giving them an opportunity to step back in time, or pretend they are Leo DiCaprio or Kate Winslet, who starred in James Cameron's 1997 blockbuster movie. But industry insiders are skeptical about the commercial viability of the ship. 'Titanic II is a curiosity and may have a draw as a floating hotel, but the idea of spending close to a week at sea on a vessel built around such a thin premise is seen as a stretch, at least by many within the industry,' says Michael Driscoll, editor of industry newsletter Cruise Week. Driscoll adds that he is skeptical about the future of Titanic II in the aftermath of the Carnival Triumph fire and last year's shipwreck of the Costa Concordia off the coast of Tuscany. Paul Kurzman, whose great-grandparents, Isidor and Ida Straus, died on the Titanic, says he has 'no problem' with the construction of Titanic II. 'I don't think they would have had any problem whatsoever, as long as the Titanic II steers clear of icebergs.'"
The Courts

Supreme Court Disallows FISA Challenges 306

New submitter ThatsNotPudding writes "The U.S. Supreme court has rejected pleas to allow any challenges to the FISA wiretapping law unless someone can prove they've been harmed by it. 'The Foreign Intelligence Surveillance Act, or FISA, was originally designed to allow spying on the communications of foreign powers. But after the September 11 attacks, FISA courts were authorized to target a wide array of international communications, including communications between Americans and foreigners. ... In this case, the plaintiffs' groups said their communications were likely being scooped up by the government's expanded spying powers in violation of their constitutional rights. Today's decision, a 5-4 vote along ideological lines by the nation's highest court, definitively ends their case. In an opinion (PDF) by Justice Samuel Alito, the court ruled that these groups don't have the right to sue at all, because they can't prove they were being spied on.'" Further coverage at SCOTUSblog.
Education

Tech Leaders Encourage Teaching Schoolkids How To Code 265

rtoz writes "Code.org has released infographics and a video to explain why students should be taught to code in school. They've gathered support from leaders in politics and the tech industry. Mark Zuckerberg says, 'Our policy at Facebook is literally to hire as many talented engineers as we can find. There just aren't enough people who are trained and have these skills today.' Former U.S. President Bill Clinton adds, 'At a time when people are saying, "I want a good job – I got out of college and I couldn't find one," every single year in America, there is a standing demand for 120,000 people who are training in computer science.' Bill Gates said, 'Learning to write programs stretches your mind, and helps you think better, creates a way of thinking about things that I think is helpful in all domains.' Google's Eric Schmidt is looking beyond first-world countries: 'For most people on Earth, the digital revolution hasn't even started yet. Within the next 10 years, all that will change. Let's get the whole world coding!'" Part of the standing demand for computer science jobs may be influenced by bad policies from tech companies, like Yahoo's ban on working from home.
Networking

West Virgnia Auditor Finds Cisco Router Purchase Not Performed Legally 280

coondoggie writes "West Virginia wasted millions in federal grant money when it purchased 1,164 Cisco routers for $24 million in 2010, a state audit concluded. A report issued this month by the West Virginia Legislative Auditor found the state used a 'legally unauthorized purchasing process' when awarding the router contract, paid for with federal stimulus funds, to Cisco. The auditor also found Cisco 'showed a wanton indifference to the interests of the public' in recommending the investment in its model 3945 branch routers, the majority of which were 'oversized' for the requirements of the state agencies using them, the report (PDF) stated."
Businesses

Why Working Remotely Needs To Make a Comeback 455

silentbrad writes sends this excerpt from a blog post about the history of working from home: "Remote working has existed for centuries. And now is the perfect time for its comeback. ... Prior to the Industrial Revolution, goods were manufactured by contracting individual craftsmen who worked out of their homes. The merchant would drum up sales, and would coordinate the production with at-home sub-contractors. ... This all changed with the Industrial Revolution: production was centralized in factories and cities. For merchant capitalists, this made sense: it was cheaper and more efficient to produce goods in one place, with machinery. ... We've been in the Information Age for at least 25 years. We've made huge leaps in technology. Many of us would describe ourselves as Knowledge Workers: we don't work in factories, we work at desks in front of glowing screens. We don't make goods with physical materials, but rather things made out of bits. The great thing about bits + the internet is that the materials and means needed for production aren't dependent on location. But here's the funny thing: the way work is organized hasn't changed. Despite all these advances, most of us still work in central offices. Employees leave their computer-equipped homes and drive long distances to work at computer-equipped offices. ... CEOs, like Yahoo's Marissa Mayer and Apple's Steve Jobs, think that a central office fosters more innovation and productivity. I think they're wrong. We're still early in the research, but recent studies seem to dispute their claim. ... Managers have developed centuries worth of habits based on the central workplace. The hallmarks of office work (meetings, cubicle workstations, colocation) need to be seen for what they are: traditions we've kept alive since the Industrial Revolution. We need to question these institutions: are they really more innovative and efficient?"
Microsoft

The Hacker Who Found the Secrets of the Next Xbox and PlayStation 214

An anonymous reader writes "Stephen Totilo at Kotaku has a long article detailing the exploits of an Australian hacker who calls himself SuperDaE. He managed to break into networks at Microsoft, Sony, and Epic Games, from which he retrieved information about the PS4 and next-gen Xbox 'Durango' (which turned out to be correct), and he even secured developer hardware for Durango itself. He uncovered security holes at Epic, but notified the company rather than exploiting them. He claims to have done the same with Microsoft. He hasn't done any damage or facilitated piracy with the access he's had, but simply breaching the security of those companies was enough to get the U.S. FBI to convince Australian authorities to raid his house and confiscate his belongings. In an age where many tech-related 'sources' are just empty claims, a lot of this guy's information has checked out. The article describes both SuperDaE's activities and a journalist's efforts to verify his claims."
Chrome

Google Releases Chrome 25 With Voice Recognition Support 93

An anonymous reader writes "Google on Thursday released Chrome version 25 for Windows, Mac, and Linux. While Chrome 24 was largely a stability release, Chrome 25 is all about features, including voice recognition support via the newly added Web Speech API and the blocking of silent extension installation. You can update to the latest release now using the browser's built-in silent updater, or download it directly from google.com/chrome." But if you're more interested in the growing raft of Google-branded hardware than running Google OSes, some good news (via Liliputing) about the newly released Pixel: Bill Richardson of Google posted on Thursday that the Pixel can boot Linux Mint, and explained how users can follow his example, by taking advantage of new support for a user-provided bootloader.
China

Growing Public Unrest Leads China To Admit To 'Cancer Villages' 174

eldavojohn writes "A new report from China's environment ministry has resulted in long-overdue self-realizations as well as possible explanations for 'cancer villages.' The term refers to villages (anywhere from 247 to 400 known of them) that have increased cancer rates due to pollution from nearby factories and industry. The report revealed that many harmful chemicals that are prohibited and banned in developed nations are still found in China's water and air. Prior research has shown a direct correlation between industrialization/mining and levels of poisonous heavy metals in water. As a result, an air pollution app has grown in popularity and you can see the pollution from space. China has also released a twelve-year plan for environmental protection."
Software

Microsoft, BSA and Others Push For Appeal On Oracle v. Google Ruling 191

sl4shd0rk writes "In 2012, Oracle took Google to court over the use of Java in Android. Judge William Alsup brought the ruling that the structure of APIs could not be copyrighted at all. Emerging from the proceedings, it was learned that Alsup himself had some programming background and wasn't bedazzled by Oracle's thin arguments on the range-checking function. The ruling came, programmers rejoiced and Oracle vowed Appeal. It seems that time is coming now, nearly a year later, as Microsoft, BSA, EMC, Netapp, et al. get behind Oracle to overturn Alsup's ruling citing 'destabilization' of the 'entire software industry.'"
The Military

US Stealth Jet Has To Talk To Allied Planes Over Unsecured Radio 270

Lasrick writes "David Axe at Wired's Danger Room explains: 'For the first time, America's top-of-the-line F-22 fighters and Britain's own cutting-edge Typhoon jets have come together for intensive, long-term training in high-tech warfare. If only the planes could talk to each other on equal terms. The F-22 and the twin-engine, delta-wing Typhoon — Europe’s latest warplane — are stuck with partially incompatible secure communications systems. For all their sophisticated engines, radars and weapons, the American and British pilots are reduced to one-way communication, from the Brits to the Yanks. That is, unless they want to talk via old-fashioned radio, which can be intercepted and triangulated and could betray the planes’ locations. That would undermine the whole purpose of the F-22s radar-evading stealth design, and could pose a major problem if the Raptor and the Typhoon ever have to go to war together.'"

Slashdot Top Deals