Billly Gates writes "IE 10 just hit the final preview yesterday for Windows 7. Windows XP and Windows Vista support has been dropped. Most slashdotters have a complex relationship with Internet Explorer. Many of us hate it but have to use it in the office. Microsoft had tried last year to make IE good again with the release of IE 9 which had some fanfare on slashdot, such as hardware acceleration and better standards compliance. MS even launched a full campaign to get us to switch. IE 10 is supposed to continue the new process and promises to be much faster and support more HTML 5, CSS 3, W3C HTML 5.1 and CSS 3.1 with a score of 320 on HTML5test. As a comparison, last years IE 9 only scored 138. "
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×
DavidGilbert99 writes "With a £400 transmitter, a laptop and a little knowledge you could bring down an entire city's high-speed 4G network. This information comes from research carried out in the U.S. into the possibility of using LTE networks as the basis for a next-generation emergency response communications system. Jeff Reed, director of the wireless research group at Virginia Tech, along with research assistant Marc Lichtman, described the vulnerabilities to the National Telecommunications and Information Administration, which advises the White House on telecom and information policy. 'If LTE technology is to be used for the air interface of the public safety network, then we should consider the types of jamming attacks that could occur five or ten years from now (PDF). It is very possible for radio jamming to accompany a terrorist attack, for the purpose of preventing communications and increasing destruction,' Reed said."
sfcrazy writes "Samsung is clearly accusing Hogan in its recent filing of influencing the jury in favor of Apple. Samsung said in its filing: 'Mr. Hogan's own statements to the media suffice if such a showing is required. Once inside the jury room, Mr. Hogan acted as a "de facto technical expert" who touted his high-tech experience to bring the divided jury together. Contrary to this Court's instructions, he told other jurors incorrectly that an accused device infringes a utility patent unless it is "entirely different"; that a prior art reference could not be invalidating unless that reference was "interchangeable"; and that invalidating prior art must be currently in use. He thus failed "to listen to the evidence, not to consider extrinsic facts, [and] to follow the judge's instructions."'"
An anonymous reader writes "On the opening day of a patent trial between Microsoft and Google-owned Motorola Mobility, Motorola filed a brief (PDF) arguing that the WiFi tech central to the case is also critical to Microsoft's new Surface tablet. Motorola says royalties totaling 2.25% of all Surface revenues is a good starting point. They wrote, 'Microsoft's new Surface tablet will use only 802.11, instead of cellular or wired connections, to connect to the internet. Without 802.11 capability, the Surface tablet would be unable to compete in the market, because consumers can readily select tablet devices other than the Surface that have 802.11 capability.' Microsoft, of course, says this figure is outrageous, given 'Motorola's promise to standards bodies to offer access to the "standard essential" patents on fair and reasonable terms.'"
An anonymous reader writes "Certain iPhone and iPad applications from a Japanese company have broken software piracy detection mechanisms that are sending out tweets on the user's own Twitter account, saying, 'How about we all stop using pirated iOS apps? I promise to stop. I really will. #softwarepirateconfession.' The trouble is, it's sending these out on accounts of users who actually paid up to $50 or more for the software and who are legally using it. The app is asking for access to users' Twitter accounts, but does not give the reason why it is asking, so the author of the article concluded (rightly) that things were being done deliberately. Would you want your legally purchased software to send out messages to all of your contacts on Twitter or on other social networks saying that you were a software pirate? Would you excuse the writers of the software if it was just an error in their piracy detection measures?"
concealment sends this quote from an article at ReadWriteWeb: "Tech billionaire and Dallas Mavericks owner Mark Cuban says he is fed up with Facebook and will take his business elsewhere. He's sick of getting hit with huge fees to send messages to his team's fans and followers. Two weeks ago Cuban tweeted out a screen grab of an offer he'd received from Facebook. The social network wanted to charge him $3,000 to reach 1 million people. Along with the screen grab, Cuban wrote, 'FB is blowing it? This is the first step. The Mavs are considering moving to Tumblr or to new MySpace as primary site.'"
the_newsbeagle writes "It's hard to determine what the unconscious brain is doing since, after all, we're not aware of it. But in a neat set of experiments, researchers from the Hebrew University of Jerusalem's consciousness lab found evidence that the unconscious brain can parse language and perform simple arithmetic. The researchers flashed colorful patterns at test subjects that took up all their attention and allowed for the subliminal presentation of sentences or equations. In the language processing experiment, researchers found that subjects became consciously aware of a sentence sooner if it was jarring and nonsensical (like, for example, the sentence 'I ironed coffee')."
EthanV2 writes "The Wall Street Journal cites a report which quotes a 'person familiar with negotiations between the two tech giants,' apparently confirming this special price hike for Apple. The source said: 'Samsung Electronics recently asked Apple for a significant price raise in (the mobile processor known as) application processor. Apple first disapproved it, but finding no replacement supplier, it accepted the [increase].'"
Penurious Penguin writes "The Wall Street Journal, in correspondence with Chevron representatives, reveals that back in 2010, Stuxnet reached Chevron, where it managed to infect — but not significantly affect — the oil giant's network. According to a Chevron representative speaking to CNET, the issue was 'immediately addressed ... without incident.' The Stuxnet worm is believed to be the work of the U.S. and Israel, and this report is confirmation that it struck well wide of its intended targets. Chevron's general manager of the earth sciences department, Mark Koelmel, said to CIO Journal, 'I don't think the U.S. government even realized how far it had spread ... I think the downside of what they did is going to be far worse than what they actually accomplished.'"
cheesecake23 writes "Many talking heads have attributed Obama's success to an unmatched 'ground game.' Now, inside reports from campaign volunteers suggest that Project Orca, a Republican, tech-based voter monitoring effort with 37,000 volunteers in swing states, turned out to be an epic failure due to dismal IT. Problems ranged from state-wide incorrect PINs, to misleading and delayed information packets delivered to volunteers, to a server outage and missing redirection of secure URLs."
MassDosage writes "In a remarkable show of good timing Presentation Patterns turned up on my desk for review within days of me having been asked to give a presentation at a large tech conference. So I decided to read the book as I worked on my presentation and apply any lessons learned as I worked my way through it. The word "patterns" in the book's title will be known to most software developers as a reference to the seminal 'Gang of four' software design patterns book which codified common solutions to software problems. The concept of patterns originated in building architecture with the idea being that by categorizing and naming solutions to problems, a common vocabulary could be built up that allowed practitioners in a certain field to communicate more effectively. This was hugely successful and has spawned the idea of looking for patterns in many other areas which is where this book comes in." Read on for the rest of Mass Dosage's review.
An anonymous reader writes "Der Spiegel reports that Germany has exported more electricity this year than ever before, despite beginning to phase out nuclear power. In the first three quarters of 2012, Germany sent 12.3 terawatt hours of electricity across its borders. The country's rapid expansion into renewable energy is credited with the growth. However, the boost doesn't come without a price. The German government's investments into its new energy policy will end up costing hundreds of billions of dollars over the next two decades, and it still relies on imports for its natural gas needs. It also remains to be seen whether winter will bring power shortages. Is Germany a good example of forward-looking energy policy?"
concealment sends in a story at Time that goes behind the scenes with the team of data crunchers that powered many of the Obama campaign's decisions in the lead-up to the election. From the article: "For all the praise Obama's team won in 2008 for its high-tech wizardry, its success masked a huge weakness: too many databases. Back then, volunteers making phone calls through the Obama website were working off lists that differed from the lists used by callers in the campaign office. Get-out-the-vote lists were never reconciled with fundraising lists. It was like the FBI and the CIA before 9/11: the two camps never shared data. ... So over the first 18 months, the campaign started over, creating a single massive system that could merge the information collected from pollsters, fundraisers, field workers and consumer databases as well as social-media and mobile contacts with the main Democratic voter files in the swing states. The new megafile didn't just tell the campaign how to find voters and get their attention; it also allowed the number crunchers to run tests predicting which types of people would be persuaded by certain kinds of appeals. Call lists in field offices, for instance, didn't just list names and numbers; they also ranked names in order of their persuadability, with the campaign's most important priorities first. About 75% of the determining factors were basics like age, sex, race, neighborhood and voting record. Consumer data about voters helped round out the picture. 'We could [predict] people who were going to give online. We could model people who were going to give through mail. We could model volunteers,' said one of the senior advisers about the predictive profiles built by the data. 'In the end, modeling became something way bigger for us in '12 than in '08 because it made our time more efficient.'"
beeudoublez writes "Apple was ordered to pay $368 million today to a software company named VirnetX over patents related to Apple's FaceTime technology. Apple engineers testified they didn't pay attention to any patents when building FaceTime. 'The jury, which had sat through the five-day trial, ruled that Apple infringed two patents: one for a method of creating a virtual private network (VPN) between computers, and another for solving DNS security issues. ... It's not the first time VirnetX has won a payout from a major tech firm: the company bagged $105.7m from Microsoft two years ago, and it may not be the last either. VirnetX has a separate case against Apple pending with the International Trade Commission and it has court cases against Cisco, Avaya and Siemens scheduled for trial next year.'" It's not all bad news for Apple today, though — according to Ars, they've won a new patent for a rounded rectangle (D670,286).
Velcroman1 writes "No smartphones. No exploding pens. No ejector seats. No rocket-powered submarines. 'It's a brave new world,' gadget-maker Q tells James Bond in the new film Skyfall. The new film, released on the 50th anniversary of the storied franchise, presents a gadget-free Bond fighting with both brains and brawn against a high-tech villain with computer prowess Bill Gates would be envious of. What inspired such a villain? 'Stuxnet,' producer Michael G. Wilson said. 'There is a cyberwar that has been going on for some time, and we thought we'd bring that into the fore and let people see how it could be going on.'"