alphadogg writes "Once vehemently opposed to open-source software, Microsoft has warmed to the development model over the years and will now take the unusual step of incorporating an open-source program developed by Linus Torvalds into its own development tools. Microsoft is integrating the widely used Git, a distributed revision control and source code management system, into its Visual Studio IDE and Team Foundation Server, two of the company's main tools for enterprise developers."
Slashdot Deals: Deal of the Day - Pay What You Want for the Learn to Code Bundle, includes AngularJS, Python, HTML5, Ruby, and more. ×
Lasrick writes "Dawn Stover has another great piece detailing why renewable energy will never provide us with all our energy needs. She deconstructs the unrealistic World Wildlife Fund report (co-written by several solar companies) that claims renewables will be able to provide 100% of the energy needs of several countries by 2050. From the article: 'When renewable energy experts get together, they tend to rhapsodize about the possibilities, believing that this will somehow inspire others to make their visions come true. But ambitious plans to power entire countries on solar energy (or wind or nuclear power, for that matter) don't have a snowball's chance in Australia. Such schemes are doomed to fail, and not because of the economic "reality" or the political "reality" -- however daunting those may be. They are doomed because of the physical reality: It's simply not physically possible for the world's human population to continue growing in numbers, affluence, and energy consumption without trashing the planet.'"
walterbyrd sends this news from ZDNet: "The U.S. Patent & Trademark Office approved Apple's request to trademark the design and layout of its stores last week, according to patent office records. ... Apple has requested that no store be allowed to replicate various features, including 'a clear glass storefront surrounded by a panelled facade' or an 'oblong table with stools... set below video screens flush mounted on the back wall.'"
An anonymous reader writes "In a February 2013 ACM Queue / Communications of the ACM article, A decade of OS access-control extensibility, Robert Watson at the University of Cambridge credits 2000s-era DARPA security research, distributed via FreeBSD, for the success of sandboxing in desktop, mobile, and embedded systems such as Mac OS X, iOS, and Juniper's Junos router OS. His blog post about the article argues that OS security extensibility is just as important as more traditional file system (VFS) and device driver extensibility features in kernels — especially in embedded environments where UNIX multi-user security makes little sense, and where tradeoffs between performance, power use, functionality, and security are very different. This seems to fly in the face of NSA's recent argument argument that one-size-fits-all SELinux-style Type Enforcement is the solution for Android security problems. He also suggests that military and academic security researchers overlooked the importance of app-store style security models, in which signed application identity is just as important as 'end users' in access control."
Qedward writes "As the UK prepares to shake up the way computer science is taught in schools, Redmond is warning that the UK risks falling behind other countries in the race to develop and nurture computing talent, if 'we don't ensure that all children learn about computer science in primary schools.' With 100,000 unfilled IT jobs but only 30,500 computer science graduates in the UK last year, MS believes: 'By formally introducing children to computer science basics at primary school, we stand a far greater chance of increasing the numbers taking the subject through to degree level and ultimately the world of work.'"
MTorrice writes "For decades, scientists studying oil spills have relied on the same analytical methods when tracking the movement of oil and assessing a spill's environmental impact. But these techniques miss an entire class of compounds that could account for about half of the total oil in some samples, according to research presented last week at the Gulf of Mexico Oil Spill & Ecosystem Science Conference, in New Orleans. These chemicals could explain the fate of some of the oil released in the 2010 Deepwater Horizon accident and other spills, the researchers say."
An anonymous reader writes "'Right now, there are brilliant students from all over the world sitting in classrooms at our top universities,' President Obama explained to the nation Tuesday in his pitch for immigration reform. 'They are earning degrees in the fields of the future, like engineering and computer science...We are giving them the skills to figure that out, but then we are going to turn around and tell them to start the business and create those jobs in China, or India, or Mexico, or someplace else. That is not how you grow new industries in America. That is how you give new industries to our competitors. That is why we need comprehensive immigration reform." If the President truly fears that international students will use skills learned at U.S. colleges and universities to the detriment of the United States if they return home (isn't a rising tide supposed to lift all boats?) — an argument NYC Mayor Bloomberg advanced in 2011 ('we are investing millions of dollars [actually billions] to educate these students at our leading universities, and then giving the economic dividends back to our competitors – for free') — then wouldn't another option be not providing them with the skills in the first place?"
pigrabbitbear writes "We are strangely territorial when it comes to our wireless networks. The idea of someone siphoning off our precious bandwidth without paying for it is, for most people, completely unacceptable. But the Open Wireless Movement wants to change all that. 'We are trying to create a movement where people are willing to share their network for the common good,' says Adi Kamdar, an activist with the Electronic Frontier Foundation. 'It's a neighborly thing to do.' That's right, upstanding citizen of the Internet, you can be a good neighbor just by opening your wireless network to strangers — or so the line goes. The ultimate vision is one of neighborhoods completely void of passwords, where any passerby can quickly jump on your network and use Google Maps to find directions or check their email or do whatever they want to do (or, whatever you decide they can do)."
redletterdave writes "According to the 30-count indictment released by the Central District of California, 27-year-old hacker Karen 'Gary' Kazaryan allegedly hacked his way into hundreds of online accounts, using personal information and nude or semi-nude photos of his victims to coerce more than 350 female victims to show him their naked bodies, usually over Skype. By posing as a friend, Kazaryan allegedly tricked these women into stripping for him on camera, capturing more than 3,000 images of these women to blackmail them. Kazaryan was arrested by federal agents on Tuesday; if convicted on all 30 counts, including 15 counts of computer intrusion and 15 counts of aggravated identity theft, Kazaryan could face up to 105 years in federal prison."
kthreadd writes "Luis Villa has an interesting discussion on the topic of not licensing at all, what he calls POSS or Post Open Source Software. With a flood of new hackers flocking to places like GitHub which doesn't impose any particular requirements for hosted projects, the future of Open Source may very well be diminishing. Skip licensing, just commit to GitHub. What legal ramifications will this have on the free and open source community going forward?" From the article: "If some 'no license' sharing is a quiet rejection of the permission culture, the lawyer’s solution (make everyone use a license, for their own good!) starts to look bad. This is because once an author has used a standard license, their immediate interests are protected – but the political content of not choosing a license is lost. Or to put it another way: if license authors get their wish, and everyone uses a license for all content, then, to the casual observer, it looks like everyone accepts the permission culture. This could make it harder to change that culture — to change the defaults — in the long run. So how might we preserve the content of the political speech against the permission culture, while also allowing for use in that same, actually-existing permission culture?"
Grench writes "Search giant Google is providing funding to the Raspberry Pi Foundation to give 15,000 new Raspberry Pi Model B computers to schools all around the United Kingdom. Google Giving's partnership with the Raspberry Pi Foundation is a significant investment in UK IT education; it is hoped this will help turn around the decline in UK schoolkids going on to study IT in colleges or universities. The Foundation said, 'CoderDojo, Code Club, Computing at Schools, Generating Genius, Teach First and OCR will each be helping us identify those kids, and will also be helping us work with them. ... Grants like this show us that companies like Google aren’t prepared to wait for government or someone else to fix the problems we’re all discussing, but want to help tackle them themselves.' 15,000 Model B units at $35 each would run $525,000."
An anonymous reader sends this excerpt from an article at Bloomberg giving an inside look at how the Libor scandal happened: "Every morning, from his desk by the bathroom at the far end of Royal Bank of Scotland Group Plc’s trading floor overlooking London’s Liverpool Street station, Paul White punched a series of numbers into his computer. White, who had joined RBS in 1984, was one of the employees responsible for the firm’s submissions for the London interbank offered rate, or Libor, the global benchmark for more than $300 trillion of contracts from mortgages and student loans to interest-rate swaps. Behind him sat Neil Danziger, a derivatives trader who had worked at the bank since 2002. On the morning of March 27, 2008, Tan Chi Min, Danziger’s boss in Tokyo, told him to make sure the next day’s submission in yen would increase, Bloomberg Markets magazine will report in its March issue. 'We need to bump it way up high, highest among all if possible,' [Tan wrote]. ... Events like those that took place on RBS’s trading floor ... are at the heart of what is emerging as the biggest and longest-running scandal in banking history. ... For years, traders at Deutsche Bank AG, UBS AG, Barclays, RBS and other banks colluded with colleagues responsible for setting the benchmark and their counterparts at other firms to rig the price of money, according to documents obtained by Bloomberg and interviews with two dozen current and former traders, lawyers and regulators. UBS traders went as far as offering bribes to brokers to persuade others to make favorable submissions on their behalf, regulatory filings show."
fluor2 writes "Team XBMC have released XBMC 12 'Frodo.' Features for XBMC 12 include: HD audio support (including DTS-MA and Dolby True-HD) via the new XBMC AudioEngine (OS X/iOS not yet available), live TV and PVR support, h.264 10-bit (aka Hi10P), 64-bit support in OS X to match the 64-bit support in Linux, improved image support, support for the Raspberry Pi, initial support for the Android platform, improved AirPlay support across all platforms, improved controller support in Windows and Linux, advanced filtering in the library, video library tags to complement movie sets, advanced UPnP sharing, and more!"
dp619 writes "Ross Gardler, of Apache Fame, has written a guest post on the Outercurve Foundation blog advocating that universities accelerate the research process through a collaborative sharing and development of research software while examining reasons why many have been reluctant to publish their source code. Quoting: 'These highly specialized software solutions are not rarely engineered for reuse. They are often hacks to answer a specific question quickly. ... What many academic researchers fail to understand is that this specialization problem is not unique to research projects. Most software developers will seek to provide an adequate solution to their specific problem, as quickly as possible. They don't seek to build a perfect, all-purpose, tool set that can be reused in every conceivable circumstance. They simply solve the problem at hand and move on to the next one. The difference is that open source developers will do this incremental problem solving using shared code. They will share that code in incremental steps rather than wait until they've built the complete system they need but is too specific for others to use. Other people will reuse and improve on the initial solution, perhaps generalizing it a little in the process. There is no need to share the details of why one needs a 'green widget' nor is there any reason to prevent someone modifying it so it can be either a 'green widget' or a 'blue widget.'"
redletterdave writes "Mozilla announced on Tuesday that it has been named the 'Most Trusted Internet Company For Privacy' in 2012, according to a new independent study released by the Ponemon Institute early this morning (PDF). Ponemon Institute surveyed more than 100,000 adult-aged consumers over a 15-week period ending in December 2012; of the 6,704 respondents, representing 25 different industries, Mozilla was ranked the top Internet and social media company. While this is a great achievement for Mozilla, especially considering this was their first year making the list, Mozilla's team took note of the fact that 'Internet and social media' was still the least trustworthy sector out of the 25 total industries listed. 'It means we as an industry all have a lot more work to do,' Mozilla wrote on its blog."