Designing Drop-Down Menus: Examples and Best Practices
As a general rule, most Web developers, especially usability enthusiasts, say it is bad practice to use drop-down menus because they are confusing, annoying and oftentimes dysfunctional. From a design standpoint, however, drop-down menus are an excellent feature because they help clean up a busy layout.
Canadian Songwriters’ Collective Licensing Bid Goes Voluntary
Last year, the Songwriters Association of Canada (SAC) proposed a plan to legalize the file sharing of copyrighted songs, which involved a small monthly fee to people using an internet connection. Critics of the plan complained that it amounted to another tax, and the Canadian recording industry said it violated copyright law. Now, as an anonymous reader writes, “The SAC has renewed its bid to legalize peer-to-peer file sharing in return for a levy on Internet service. The SAC is now calling for the plan to be voluntary, with both consumers and creators having the right to opt-out. ACTRA, the leading performer group in Canada, now says it is also supportive of a legalized approach with the prospect of extending the plan to video sharing.”
Read more of this story at Slashdot.
All Five Smartphones Survive Pwn2Own Contest
CWmike writes “Although three of the four browsers that were targets in the PWN2OWN hacking contest quickly fell to a pair of researchers, none of the smartphones were successfully exploited. TippingPoint had offered ,000 for each exploit on any of the phones, which included the iPhone and the BlackBerry, as well as phones running the Windows Mobile, Symbian and Android operating systems. ‘With the mobile devices so limited on memory and processing power, a lot of [researchers’] main exploit techniques are not able to work,’ said TippingPoint’s Terri Forslof. ‘Take, for example, [Charlie] Miller’s Safari exploit,’ referring to Miller’s 10-second hack of a MacBook via an unpatched Safari vulnerability that he’d known about for more than a year. ‘People wondered why wouldn’t it work on the iPhone, why didn’t he go for the ,000?’ she said. ‘The vulnerability is absolutely there, but it’s a lot tougher to exploit on the iPhone.'” Chrome was the only browser at the contest that was not successfully exploited. We previously discussed day one of the contest, and a summary of day two is available as well.
Read more of this story at Slashdot.
AT&T Has Begun Issuing RIAA Takedown Notices
suraj.sun writes with this excerpt from CNet: “AT&T, one of the nation’s largest Internet service providers, confirmed on Tuesday the company is working with the recording industry to combat illegal file sharing. At a digital music conference in Nashville, Jim Cicconi, a senior executive for AT&T told the audience that the ISP has begun issuing takedown notices to people accused of pirating music by the Recording Industry Association of America, according to one music industry insider who was present. In December, the RIAA, the lobbying group of the four largest recording companies, announced the group would no longer pursue an antipiracy strategy that focused on suing individuals, but rather would seek the help of broadband providers to stem the flow of pirated content. The RIAA said an undisclosed number of ISPs had agreed to cooperate but declined to name them. This is important because the RIAA has said that repeat offenders faced the possibility of losing service — at least temporarily — as part of the music industry’s ‘graduated response’ plan.”
Read more of this story at Slashdot.
Kernel Hackers On Ext3/4 After 2.6.29 Release
microbee writes “Following the Linux kernel 2.6.29 release, several famous kernel hackers have raised complaints upon what seems to be a long-time performance problem related to ext3. Alan Cox, Ingo Molnar, Andrew Morton, Andi Keen, Theodore Ts’o, and of course Linus Torvalds have all participated. It may shed some light on the status of Linux filesystems. For example, Linus Torvalds commented on the corruption caused by writeback mode, calling it ‘idiotic.'”
Read more of this story at Slashdot.
German Police Raid Homes of Wikileaks.de Domain Owner
BountyX writes “First and foremost, wikileaks.org is back up after downtime due to server load; however, the German government wants to keep the site down. According to their twitter page, police have raided the home of Wikileaks.de domain owner Theodor Reppe (PDF) over internet censorship lists that were leaked two weeks ago. What the Australian government’s secret ACMA internet censorship blacklist has to do with Germany is a mystery. This case is a prime example of multiple governments collaborating in support of censorship.” Reader iter8 provides a link to coverage on Wikileaks itself, which says that police searched Reppe’s homes in both Dresden and Jena, and adds: “According to police, the reason for the search was ‘distribution of pornographic material’ and ‘discovery of evidence.’ Wikileaks has published censorship lists for Australia, Thailand, Denmark and other countries. Included on the lists are references to sites alleged to contain pornography, including child pornography. Wikileaks has not published any images from the sites.”
Read more of this story at Slashdot.
Is Ballmer conceding victory to Linux Netbooks?
Geek warriors plotting to overthrow Twitter (LAT)
Esteemed online voices @LeoLaporte and @DaveWiner are sounding the alarm about Twitter’s increasing platform dominance. “It’s a very dangerous network because it’s all centralized,” Winer said. Both critics have installed their own smaller, open-source micro-messaging systems outside of Twitter’s domain, i.e., Evan Prodromou’s Laconica