×
Windows

Windows: Not Doomed Yet 737

Nerval's Lobster writes "Earlier this week, ZDNet columnist Steven Vaughan-Nichols wrote an article, 'Windows: It's over,' that sparked a lot of passionate online debate. His thesis was simple: Microsoft's dominance of the computing market is coming to an end, accelerated by the incipient failure of Windows 8. Make no mistake about it: there's no way to fudge the numbers in a way that suggests Windows 8 is proving a blockbuster. But maybe it's not doomsday for Windows or Microsoft. After all, the company still has a lot of really smart developers and engineers, a whole ton of cash, and the ability to let its projects play out over years. So here's the question, Slashdotters: Is Windows really doomed? And, if not, what can be done to turn things around? (No originality points awarded for a 'Fire Steve Ballmer' response.)"
Politics

Ask Slashdot: What Planks Would You Want In a Platform of a Political Party? 694

An anonymous reader writes "I am the Technology Manager of the Justice Party (sorry, no relationship to the Avengers). We are currently working on our Platform (version 2.0) and I would be interested to know what people in the science and technology field would like to see in a platform of a political party. For example, we are considering planks that relate to Open Government (data) access, science and maths promotion, space industries, promotion of open source, dealing with SOPA/ CISPA laws, improvement in user privacy and much more. Give us your comments so we can help build a more tech-savvy America."
Google

Google Reinstates Federated Jabber/XMPP Instant Messaging 32

jrepin writes "A few weeks ago the FSF reported that Google had started blocking invites sent from non-Google Jabber servers. This was done as a crude anti-spam measure. Google have since rolled out proper anti-spam filtering for its Jabber service, and has removed the invite block. This was announced a few days ago in a public mailing list post. This means that users of all Jabber servers will once again be able to fully communicate with Google users."
Crime

One Boston Marathon Bomb Suspect Dead, Other At Large After Shootout With Police 1109

theodp writes "During the night, The Tech broke news that gunshots were reported at MIT near 32 Vassar Street (the Ray and Maria Stata Center for Computer, Information, and Intelligence Sciences), and one officer was shot and taken to Mass General Hospital. MIT's Emergency Information page also reports that injuries have been reported. Sadly, CNN is now reporting that the university police officer has died. Look for updates on Twitter." The two suspects identified earlier as being behind the Boston Marathon bombings are believed to be responsible for this. They were found by police. One suspect, 26-year-old Tamerlan Tsarnaev, was killed in a shootout. The other suspect, 19-year-old Dzhokhar Tsarnaev, is still being pursued. The Associated Press reports that the two are believed to be from the Russian region near Chechnya. During the firefight, the suspects threw explosive devices at police. Public transit in Boston has been shut down, and hundreds of thousands of people have been asked to not leave their homes. Here are live feed for local TV news and emergency services audio. Police have been warned that the remaining suspect may have a suicide vest.

Reader Okian Warrior points out a related story worthy of notice: "The 4chan crowd, poring over images of the Boston marathon, identified two dark-skinned and bag-carrying suspects (among others). This was then picked up by The New York Post, who ran the image on Thursday's front page with the headline 'Feds seek these two pictured at Boston Marathon.' And now, a completely innocent teen now finds himself scared to leave his home."
Businesses

Changing the Ratio of Women In Tech: How Etsy Did It 546

First time accepted submitter occidental writes in about Etsy's push to get more women engineers. "You’ve probably heard of Etsy, the bustling online marketplace for crafters and artists. You probably wouldn’t be surprised to learn that most of its customers are women, both buyers and sellers. Ditto that the Etsy team is a pretty good representation of the Earth’s gender ratio. Yet when Marc Hedlund took the helm of Etsy’s Product Development & Engineering department, 97% of the engineering department were men. Hedlund realized that in his nearly two decades in IT, he’s hired no more than 20 women for engineering positions. This began to bother him. Especially after his daughter was born."
Crime

Boston Tech Vs. the Bomber 170

An anonymous reader writes "Amid rumors of an impending arrest in the Boston Marathon bombing, Xconomy has a rundown of local companies working on technologies relevant to the investigation and aftermath. The approaches include Web analytics to identify communication patterns, image and video analysis of the crime scene, surveillance camera hardware and software, and smart prosthetic devices for amputees. A big challenge the authorities face is the sheer volume and different proprietary formats of video from security cameras, mobile devices, and media groups. Ultimately this will be a case study in whether an individual bent on destruction can remain anonymous in an era of digital surveillance, social media, and crowdsourcing."
Microsoft

Microsoft Hops On Two-Factor Authentication Bandwagon 132

itwbennett writes "Following similar initiatives by Apple, Google and Facebook, Microsoft is enabling two-factor authentication for its Microsoft Account service, the log-on service for many of its online and desktop products. Users will find instructions on how to add a second form of authentication on the Microsoft Account settings page. The chief form of secondary authentication will be a short code sent to the user's mobile phone, the number of which Microsoft will keep on file, each time the user logs on."
Electronic Frontier Foundation

Obama Administration Threatens CISPA Veto, EFF Urges Action 106

An anonymous reader sent in word that the Obama administration is threatening to veto CISPA in its current form because "The Administration, however, remains concerned that the bill does not require private entities to take reasonable steps to remove irrelevant personal information (PDF) when sending cybersecurity data to the government or other private sector entities. Citizens have a right to know that corporations will be held accountable — and not granted immunity — for failing to safeguard personal information adequately. The Administration is committed to working with all stakeholders to find a workable solution to this challenge." Ars has a few more details, the EFF urges U.S. citizens to oppose the bill, and one of the sponsors tweeted that those opposed to the bill are basement dwelling fourteen-year-olds. Note that the Administration still wants there to be some kind of comprehensive data sharing law in the name of cybersecurity, so this may very well rear its head again in the coming months.
Businesses

Dell Signs Agreement To Cap Icahn's Share Ownership 70

itwbennett writes "As previously reported on Slashdot, activist investor Carl Icahn made a proposal to buy Dell for $15 per share. Now, as part of the review process of potential offers to take Dell private, the company's board of directors has approved an agreement with Icahn that would cap the amount of shares owned by the activist investor. Under the agreement, Icahn and affiliated entities 'have agreed not to make purchases that would cause them to own more than 10 percent of Dell's shares,' Dell said in a statement. Also as part of the agreement, Icahn has agreed not to enter into agreements with other shareholders to jointly own more than 15 percent of Dell's shares." From the press release: "The Special Committee believes that granting the limited waiver to Mr. Icahn while capping his share ownership will maximize the chances of eliciting a superior proposal from Mr. Icahn while at the same time protecting shareholders against potential accumulation of an unduly influential voting interest." Looks like Michael Dell has some serious competition for Dell.
Crime

Pirate Bay Co-Founder Indicted For Hacking, Fraud 99

An anonymous reader writes "Gottfrid Svartholm Warg, a.k.a. 'anakata,' co-founder of The Pirate Bay, has been indicted by a Swedish court on charges of computer hacking and fraud. The prosecuting attorney said, 'A large amount of data from companies and agencies was taken during the hack, including a large amount of personal data, such as personal identity numbers of people with protected identities.' According to Ars, 'The first count of hacking involves allegedly unlawfully using another person's username and password to search Infotorg, a well-known massive privately held commercial database of "private individuals, companies, properties and vehicles." The second count, as previously reported, involves an alleged hack dating back to 2010 of Logica, a Swedish IT firm that contracts with the Swedish tax authority. In March 2012, Logica was hit by an online attack that resulted in around 9,000 Swedes (Google Translate) having their personal identity numbers and names released to the public. ... The third count of hacking, allegedly taking place between July and August 2012, accuses Svartholm Warg of unauthorized access of major Nordic region bank Nordea's computers. The fraud charges accuse Svartholm Warg of allegedly transferring and attempting to transfer money from Nordea to other unauthorized bank accounts.'"
The Media

Did Tech Websites Exploit the Boston Marathon Bombing? 182

Nerval's Lobster writes "These days, when something in the world goes very wrong, it seems as if everybody learns about it first on Twitter and Facebook. In the minutes after homemade bombs turned the finish line of the Boston Marathon into a crime scene, terms such as #BostonMarathon shot to the top of Twitter's Trends list; across the country, office workers first learned of the attack when someone posted a message on a Facebook page. Social networks have become this generation's radio, the default conduit for the freshest information. As first responders treated the wounded and the minutes ticked past, news organizations began vacuuming up Twitter and Facebook posts from around Boston and posting it on their Websites, along with 'regular' text updates. A Vine video-snippet of a bomb going off near the finish line, knocking a runner off his feet, ended up embedded into dozens of blog postings. When a disaster strikes, and many of those same news Websites post 'live updates' that incorporate tons of social-networking posts, they face accusations of exploiting the tragedy in the name of pageviews and revenue. That's not surprising—long before 'yellow journalism' became a term, people have charged news organizations with playing up humanity's worst for their own gain. In the immediate aftermath of the Boston bombings, online pundits lashed out against Mashable, The Verge, Wired, and other publications that had posted live updates, accusing them of stepping outside their usual coverage areas for cynical gain. In the following piece, a number of tech editors-in-chief, including The Verge's Joshua Topolsky and Mashable's Lance Ulanoff, talk about their approaches to covering the tragedy."
Windows

Windows 8.1 May Restore Boot-To-Desktop, Start Button 628

New submitter geekoid writes "According to media reports about leaked Windows 8.1 code, the next incarnation of Microsoft's flagship operating system will have an option to boot directly to the desktop. People have discovered 'references to a "CanSuppressStartScreen" option in early builds of the Windows 8.1 registry.' There is also speculation that Microsoft will be re-implementing the Start button, though the claims come from nebulous 'sources,' rather than the leaked code. In light of recent reporting about the general distaste and design flaws of Windows 8's user interface, will Microsoft's updates be dynamic enough to stop the current Windows exodus?"
The Courts

Will the Supreme Court End Human Gene Patents? 228

An anonymous reader writes "Monday, the Supreme Court will hear a case on the validity of breast cancer gene patents. The court has a chance to end human gene patents after three decades. From the article: 'Since the 1980s, patent lawyers have been claiming pieces of humanity's genetic code. The United States Patent and Trademark Office has granted thousands of gene patents. The Federal Circuit, the court that hears all patent appeals, has consistently ruled such patents are legal. But the judicial winds have been shifting. The Supreme Court has never ruled on the legality of gene patents. And recently, the Supreme Court has grown increasingly skeptical of the Federal Circuit's patent-friendly jurisprudence. Meanwhile, a growing number of researchers, health care providers, and public interest groups have raised concerns about the harms of gene patents. The American Civil Liberties Union estimates that more than 40 percent of genes are now patented. Those patents have created "patent thickets" that make it difficult for scientists to do genetic research and commercialize their results. Monopolies on genetic testing have raised prices and reduced patient options.'"
Privacy

NSA Data Center Brings Concerns Over Security and Privacy and Jobs 138

chamilto0516 writes "Twenty-five miles due south of Salt Lake City, a massive construction project is nearing completion. The heavily secured site belongs to the National Security Agency. The NSA says the Utah Data Center is a facility for the intelligence community that will have a major focus on cyber security. Some published reports suggest it could hold 5 zettabytes of data. Asked if the Utah Data Center would hold the data of American citizens, Alexander [director of the NSA] said, 'No...we don't hold data on U.S. citizens,' adding that the NSA staff 'take protecting your civil liberties and privacy as the most important thing that they do, and securing this nation.' But critics, including former NSA employees, say the data center is front and center in the debate over liberty, security and privacy." According to University of Utah computing professor Matthew Might, one thing is clear about the Utah Data Center, it means good paying jobs. "The federal government is giving money to the U.'s programming department to develop jobs to fill the NSA building," he says.
Australia

Corruption Allegations Rock Australia's CSIRO 112

An anonymous reader writes "Australia's premiere government research organization, the CSIRO, has been rocked by allegations of corruption including: dishonesty with 60 top-class scientists bullied or fired, fraud against drug giant Novartis, and illegally using intellectual property, faking documents and unreliable testimony to judicial officers. CSIRO boss Megan Clark has refused to discipline the staff responsible and the federal police don't want to get involved. Victims are unimpressed and former CSIRO scientists are calling for an inquiry."
Education

Building a Better Tech School 62

An anonymous reader writes "In late 2011, Cornell University won a prize from NYC Mayor Bloomberg's contest to design a new science school. Google donated some space in Manhattan, and since January this year students have been enrolled in the school's 'beta class, a one-year master's program in computer science.' The beta curriculum is designed to equip the students with all the knowledge they need to jump right into a tech startup: there's a mandatory business class, the U.S. Commerce Department stationed a patent officer on-site, and mentors from the private sector are brought in to help with design. 'The curriculum will not be confined to standard disciplines, but will combine fields like electrical engineering, software development and social sciences, and professors will teach across those boundaries. In fact, no professor has an office, not even the dean, and Dr. Huttenlocher insists they will not when the campus moves to Roosevelt Island, either. Instead, each person has a desk with low dividers, and people can grab conference rooms as needed — much like the headquarters of a small tech company.' It's a long, interesting article about how they're trying to turn 'tech school' into something a lot more rigorous and innovative than something like ITT Tech."
Crime

TJX Hacker Gives Keynote At 'Offensive' Security Conference 35

An anonymous reader writes "Two hundred hackers from around the world gathered at a Miami Beach hotel Thursday and Friday for the Infiltrate Security conference, which focuses on systems hacking from the 'offensive' perspective (with slides). In a keynote address, Stephen Watt, who served two years in prison for writing the software used by his friend Alberto Gonzalez to steal millions of credit card numbers from TJX, Hannaford and other retailers, acknowledges he was a 'black hat' but denies that he was directly involved in TJX or any other specific job. Watt says his TCP sniffer logged critical data from a specified range of ports, which was then encrypted and uploaded to a remote server. Brad 'RenderMan' Haines gave a presentation on vulnerabilities of the Air Traffic Control system, including the FAA's 'NextGen' system which apparently carries forward the same weakness of unencrypted, unauthenticated location data passed between airplanes and control towers. Regarding the recent potential exploits publicized by Spanish researcher Hugo Teso, Haines says he pointed out similar to the FAA and its Canadian counterpart a year ago, but received only perfunctory response."
The Courts

Man Who Tangled With The Oatmeal Ordered To Pay $46k 68

Last summer we followed the odd case of lawyer Charles Carreon, as he went after Matthew Inman, creator of The Oatmeal webcomic, with legal threats. Carreon had been hired by FunnyJunk, a website Inman accused of stealing his comics. Carreon demanded $20,000 in compensation for Inman's "false accusations." Inman declined, and then used the publicity to solicit over $200,000 in donations, which he gave to charity after sending Carreon photographs. Carreon dropped the suit against Inman, but the saga continued. A satirical website was set up about Carreon, which caused him to invoke the legal system again. The article documents the absurdities, which included further legal action and a song. Now, however, Carreon is reaping what he has sown; a judge has ordered him to pay over $46,000 for his role in the legal circus.
Hardware

Rhombus Tech 2nd Revision A10 EOMA68 Card Working Samples 57

lkcl writes "Rhombus Tech and QiMod have working samples of the first EOMA-68 CPU Card, featuring 1GByte of RAM, an A10 processor and stand-alone (USB-OTG-powered with HDMI output) operation. Upgrades will include the new Dual-Core ARM Cortex A7, the pin-compatible A20. This is the first CPU Card in the EOMA-68 range: there are others in the pipeline (A31, iMX6, jz4760 and a recent discovery of the Realtek RTD1186 is also being investigated). The first product in the EOMA-68 family, also nearing a critical phase in its development, will be the KDE Flying Squirrel, a 7-in, user-upgradeable tablet featuring the KDE Plasma Active operating system. Laptops, desktops, game consoles, user-upgradeable LCD monitors and other products are to follow. And every CPU that goes into the products will be pre-vetted for full GPL compliance, with software releases even before the product goes out the door. That's what we've promised to do: to provide Free Software developers with the opportunity to be involved with mass-volume product development every step of the way. We're also on the look-out for an FSF-Endorseable processor which also meets mass-volume criteria, which is proving... challenging."
The Military

Iranians, Russians, and Chinese Hackers Are After You, Says Lawmaker 211

Velcroman1 writes "The House Intelligence Committee is warning that 'time is running out' before the next major cyberattack: The Russians, Iranians, Chinese, and others are likely already on your computer. 'You have criminal organizations trying to get into your personal computer and steal your personal stuff. And by the way, the Chinese are probably on your computer, the Russians are probably on your personal computer, the Iranians are already there,' House Intelligence Committee chairman Mike Rogers (R.-MI) said. 'They're trying to steal things that they think are valuable or use your computer to help them steal from someone else,' he said. 'That's a real problem.'"

Slashdot Top Deals