×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

Submissions

top

Is the Ubuntu Edge a good fit for the enterprise?

tsamsoniw tsamsoniw writes  |  about 9 months ago

tsamsoniw (1731366) writes "The tech community has been abuzz over the past week over Canoncial's Ubuntu Edge campaign — enough so for a lively Ask Me Anything interview on Reddit with the company's CEO, Mark Shuttleworth. There's no denying that the company's vision of a cutting-edge "superphone" that doubles as a PC and that runs both desktop Ubuntu and Android is intriguing to gadget-loving geeks, open source advocates, and developers. While Canonical is understandably focused on securing buy-in from those groups, the company also has its sights set on a market that could make or break the project: enterprise users.
Just how eager is Canonical to secure enterprise backing? One of the packages (or "perks") in the company's $32 million Indiegogo campaign is called the Enterprise 100 Bundle. For $80,000, a contributor will receive "100 Ubuntu Edge smartphones, plus access to best-practice workshops and 30 days of online support to help CIOs and IT managers integrate Ubuntu for Android into the workplace."
InfoWorld challenged Canonical to lay out the business case for the Ubuntu Edge, both from a technology and financial perspective. The company's head of engineering Victor Palau (read: an actually in-the-trenches techie, not a marketing executive) accepted the challenge."

Link to Original Source
top

Calif. attorney general: We need to crack down on companies that don't encrypt

tsamsoniw tsamsoniw writes  |  about 9 months ago

tsamsoniw (1731366) writes "California Attorney Kamala Harris says her office will start cracking down on companies in the Golden State that don't encrypt customer data and fall victim to data breaches; she's also calling on the state to pass a law requiring companies to use encryption. That's just one of the recommendations in the state's newly released data breach report, which says 131 companies in California suffered data breaches in 2012, affecting 2.5 million residents."
Link to Original Source
top

Fast and furious: 7 protoype apps primed for the gigabit Internet

tsamsoniw tsamsoniw writes  |  about 10 months ago

tsamsoniw (1731366) writes "Mozilla and The National Science Foundation recently doled out hundreds of thousands of dollars to winners of the Mozilla Ignite awards, for which developers submitted prototype apps primed for the faster, smarter Internet of the future. Here's a look at standout submissions, which range from a high-quality, open source Web conferencing application to tools for collaborating in 3D environments."
Link to Original Source
top

Mozilla: Unlike FB and Twitter single sign-in, Persona protects user privacy

tsamsoniw tsamsoniw writes  |  1 year,8 days

tsamsoniw (1731366) writes "Mozilla today unveiled Persona Beta 2, the newest edition of the organization's open authentication system. The release includes Identity Bridging, which lets user sign in to Persona-supported sites using their existing webmail accounts, starting with Yahoo. Mozilla used the releases as an opportunity to bash social sign-in offerings from Facebook and Twitter, which "conflate the act of signing into a website with sharing access to your social network, and often granting the site permission to publish on your behalf," said Lloyd Hilaiel, technical lead for Mozilla Persona. He added that they are built in such a way that social providers have full visibility into a user's browsing behavior."
Link to Original Source
top

Cyber criminals tying up emergency phone lines through TDoS attacks, DHS warns

tsamsoniw tsamsoniw writes  |  1 year,16 days

tsamsoniw (1731366) writes "Emergency-service providers and other organizations are being targeted with TDoS (telephony denial of service) attacks, according to a security alert [PDF] from the Department of Homeland Security and the FBI, obtained by security expert Brian Krebs. TDoS attacks use high volumes of automated calls to tie up target phone systems, halting incoming and outgoing calls. Perpetrators are using the attacks to extort cash from target organizations, who receive a call from a representative from a purported payday loan company, who demands payment of $5,000 for an outstanding debt — usually speaking in an unspecified "strong accent.""
Link to Original Source
top

One in six Amazon S3 storage buckets are ripe for data-plundering

tsamsoniw tsamsoniw writes  |  1 year,21 days

tsamsoniw writes "Using a combination of relatively low-tech techniques and tools, security researchers have discovered that they can access the contents of one in six Amazon Simple Storage Service (S3) buckets whose owners had them set to Public instead of Private. All told, researchers discovered and explored nearly 2,000 public buckets, according to Rapid 7 Senior Security Consultant Will Vandevanter, from which they gathered a list of more than 126 billion files, many of which contained sensitive information such as source code and personal employee information. Researchers noted that S3 URLs are all predictable and public facing, which make it that much easier to find the buckets in the first place with a scripting tool."
Link to Original Source
top

Twitter-shaming can cost you your job - whether you're giving or receiving

tsamsoniw tsamsoniw writes  |  1 year,27 days

tsamsoniw writes "Hoping to strike a blow against sexism in the tech industry, developer and tech evangelist Adria Richards took to Twitter to complain about two male developers swapping purportedly offensive jokes at PyCon. The decision has set into motion a chain of events that illustrate the impact a tweet or two can make in this age of social networking: One the developers and Richards have since lost their jobs, and even the chair of PyCon has been harassed for his minor role in the incident."
Link to Original Source
top

Deleted cloud files can be recovered from smartphones, researchers find

tsamsoniw tsamsoniw writes  |  1 year,29 days

tsamsoniw writes "Researchers from the University of Glasgow have discovered that they could fully recover images, audio files, PDFs, and Word documents deleted from Dropbox, Box, and SugarSync, using both an HTC Android smartphone and an iPhone. They created 20 different test files, including Words docs, PDFS, and JPGs, uploaded them via a PC to the various services, and synced the services with the mobile devices. They accessed and manipulated the files in varying ways (e,g accessing them online once, saving them offline), then used a forensics toolkit to attempt to reconstruct files with artifacts saved to the phone."
Link to Original Source
top

Cyber squatters grab up more than 600 'Pope Francis' domain names

tsamsoniw tsamsoniw writes  |  about a year ago

tsamsoniw writes "Although the newly appointed Pope Francis I has proven himself technologically savvy enough to use Twitter, the Vatican dropped the ball when it came to quickly registering a domain name for the pontiff after his appointment earlier this month: Within hours, cyber squatters grabbed up more than 600 domain names containing derivations of the pontiff's name, including popefrancisi.com, popefrancis.co.uk, popefrancis.org, and popefrancis.fr, according to domain-name company names.co.uk."
Link to Original Source
top

U.S. to China: Please stop hacking our companies, if you don't mind

tsamsoniw tsamsoniw writes  |  about a year ago

tsamsoniw writes "The U.S. government has at long last called out the Chinese government for tolerating, if not outright supporting, cyber attacks against American businesses. In a speech yesterday, President Barack Obama's National Security Advisor Tom Donilon called on China to acknowledge that cyber crime poses a threat to international trade; to investigate and put a stop to cyber crime emanating from China; and to work with the United States to "establish acceptable norms of behavior in cyberspace." Donilon's speech comes on the heels of a report released by security company Mandiant that laid out evidence of a cyber espionage outfit dubbed APT1 is actually a branch of the Chinese military called PLA (People's Liberation Army) Unit 61398."
Link to Original Source
top

Gnome co-founder explains why he dumped Linux for Mac

tsamsoniw tsamsoniw writes  |  about a year ago

tsamsoniw writes "Miguel de Icaza, co-founder of the Gnome and Mono projects, has revealed that he dumped Linux months ago in favor of Mac OS, citing fragmentation and incompatibilities among the various Linux versions as the reasons for his switch. In a post to his personal blog, he wrote that he has long recommended Macs to new users and has gifted them to friends and family, adding that 'Linux just never managed to cross the desktop chasm.' The Linux Foundation's response: 'We agree with Miguel that Apple makes great products. As to the broader question, we see Linux diversity as its strength rather than a weakness.'"
Link to Original Source
top

Obama Administration declares 'It's time to legalize cell phone unlocking'

tsamsoniw tsamsoniw writes  |  about a year ago

tsamsoniw writes "The Obama Administration and the FCC today came out in favor of changing new legislation that makes it difficult for consumers to unlock their rightfully owned mobile devices — cell phones, smartphones, and tablets — without risk of fines, jail time, or other criminal penalties. The announcements come on the heels of a successful online petition campaign to change a recent Library of Congress ruling made the unlocking of smartphones purchased after Jan. 26 illegal. Notably, neither the White House nor the FCC came out with any definitive recommendations for rewording the Library of Congress's ruling. They said that the Obama administration, Congress, the FCC, and the National Telecommunications and Information Administration (NTIA) need to hash that out."
Link to Original Source
top

Test your SSDs or risk massive data loss, researchers warn

tsamsoniw tsamsoniw writes  |  about a year ago

tsamsoniw writes "Companies adopting flash-based SSDs as a cornerstone to the data center storage systems are risking "massive data loss" due to power outages, according to a new study by researchers from the University of Ohio and HP Labs. In exposing 15 SSDs from five different vendors to power loss, researchers found that 13 suffered such failures as bit corruption, metadata corruption, and total device failure. The paper did not specify which vendors' drives were used."
Link to Original Source
top

Why a good green tablet computer is hard to find

tsamsoniw tsamsoniw writes  |  about a year ago

tsamsoniw writes "Green laptops and computers were all the rage not long ago, with hardware makers such as Apple and HP crowing each time they rolled out a new machine that earned an EPEAT Gold rating. Now, though, if you peruse the EPEAT registry for a green "tablet notebook," you'll come up with one listing: the Xplore iX104C5 DMSR. No iPad, no Surface, no Kindle, no Galaxy. So what gives? For starters, the Energy Star spec briefly covered tablets, but not anymore, which means no tablet can be slapped with an Energy Star or EPEAT sticker. Energy Star is working on a new spec that will likely include tablets, while EPEAT is working on new criteria as well. But also potentially problematic is that some vendors — particularly Apple and Microsoft — aren't designing their tablets to be easily repairable, as evidenced by iFixit's Tablet Repairability scorecard. (Dell, by contrast, is doing an admirable job.)"
Link to Original Source
top

Microsoft stealthily pilots Mac Office and Office 365 accredidation program

tsamsoniw tsamsoniw writes  |  about a year ago

tsamsoniw writes "Microsoft has launched a pilot program to train and accredit Apple techs and consultants on Office for Mac and Office 365, but you wouldn't know it from perusing the Microsoft website or even reaching out to the company's public relations team. The Microsoft Office for Mac Accredited Support Professional accreditation is real, though it's currently being pushed only by MacTech, an Apple technology journal that's hosting the program at various events this year. It points to growing acceptance and usage of Mac products in the business world."
Link to Original Source
top

Linux-savvy IT pros are in high demand, low supply

tsamsoniw tsamsoniw writes  |  about a year ago

tsamsoniw writes "IT professionals with Linux chops — particularly systems administrator — are in high demand and short supply, according to a new survey from Dice. Over 90 percent of hiring managers surveyed said they plan to hire at least one Linux professional in the next six months — though nine out of 10 respondents also said that it's "somewhat difficult" or "very difficult" to find experienced Linux pros. That demand — driven by trends such as open-cloud development, Big Data, and increasing migration to Linux — has helped push the average salary for Linux pros up 9 percent to this past year, to $90,853."
Link to Original Source
top

Adobe hopes a pop-up dialog box will thwart Flash attacks via Office docs

tsamsoniw tsamsoniw writes  |  about a year ago

tsamsoniw writes "In the wake of the most recent zero-day attacks exploiting Flash Player, Adobe claims that it's worked hard to make Player secure — and that most SWF exploits stem from users opening infected Office docs attached to emails. The company has a solution, though: A forthcoming version of Flash Player will detect when it's being launched from Office and will present users with a dialog box with vague warnings of a potential threat."
Link to Original Source
top

Is Apple now the PC leader? Depends on your definition of PC

tsamsoniw tsamsoniw writes  |  about a year ago

tsamsoniw writes "While research companies including IDC and Gartner deemed HP the PC leader for Q4 2012, Canalys has a different perspective. The analyst firm has declared Apple the top PC vendor for the past quarter, thanks in part to the booming success of the iPad and the iPad mini. By Canalys's reckoning, Amazon, too, now beats out the likes of Acer and Asus as a leading PC vendors, having shipped 4.6 million Kindles in Q4."
Link to Original Source
top

Amazon to mint virtual coins that can be spent only Kindle apps

tsamsoniw tsamsoniw writes  |  about a year ago

tsamsoniw (1731366) writes "Amazon has announced that later this year, it will start offering Amazon Coins, a form of digital currency customers can use to buy apps, games, or in-app content for the Kindle — but not, say, music or videos or subscriptions or anything else for the device. The company said it will dole out millions of Amazon Coins to customers when the program goes live, so developers should get their apps submitted and approved by April 25th. Each coin is worth one cent, and developers will still get the same 70 percent cut they would per sale as they would if a customer used standard currency. Or to paraphrase an old episode of "The Simpsons, "It's money made just for Kindle apps, and it works like regular money, but it's, er, fun.""
Link to Original Source
top

Apple ticks off Mac users with silent shutdown of Java 7

tsamsoniw tsamsoniw writes  |  about a year ago

tsamsoniw writes "Apple yesterday silently blocked the latest version of Java 7 from running on OS X 10.6 Snow Leopard or higher via its XProtect antimalware tool. Mac users in the Apple forums expressed confusion and irritation over the company's decision to abruptly kill Java without warning, explanation, or guidance on how to reenable it. "This is a nightmare for enterprise Java users," wrote one forum user. "Oracle EBusiness uses Java as a Web application. For Apple to do this, and not even give a heads-up to their customers who utilize Macs for enterprise, is horrendous customer service.""
Link to Original Source

Journals

tsamsoniw has no journal entries.

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Sign up for Slashdot Newsletters
Create a Slashdot Account

Loading...