Apr 22 2009

Ubuntu 9.04 ‘Jaunty Jackalope’ Major Improvements

Ubuntu 9.04 will represent the next upgrade from either 8.04 Long Term Release (LTR), which is supported through April 2011; or the 8.10 standard release, which is supported through 2010.

Share

Apr 22 2009

Digg Blog: DUI.Stream and MXHR

“Although we usually wait until a feature is fully baked before showing off the technology behind it, we’re just too excited about this new project to keep it to ourselves.” Schnikes that’s fast!

Share

Apr 22 2009

Bluetooth 3.0 may pave way for iPhones that sync wirelessly.

The next version of the Bluetooth short-range wireless protocol officially launched this week, promising an eightfold speed increase that could help device makers like Apple offer true wireless syncing on their handheld products in about a year’s time.

Share

Apr 22 2009

F-Secure Suggests Ditching Adobe Reader For Free PDF Viewers

hweimer writes “Yesterday at RSA security conference, F-Secure’s chief research officer recommended dropping Adobe Reader for viewing PDF files because of the huge amount of targeted attacks against it. Instead, he pointed to PDFreaders.org, a website maintaining a list of free and open source PDF viewers.”

Read more of this story at Slashdot.

Share

Apr 22 2009

Designing DNA Circuits To Brew Tastier Beer

Al writes “Researchers at Boston University have developed a way to predict the behavior or different DNA segments and make synthetic biology a little bit more reliable. James Collins and colleagues have built libraries of component parts and a mathematical modeling system to help them predict the behavior of parts of a gene network. Like any self-respected bunch of grad students, they decided to demonstrate the approach by making beer. They engineered gene promoters to control when flocculation occurs in brewers yeast, which allowed them to finely control the flavor of the resulting beer.”

Read more of this story at Slashdot.

Share

Apr 22 2009

A Cyber-Attack On an American City

Bruce Perens writes “Just after midnight on Thursday, April 9, unidentified attackers climbed down four manholes in the Northern California city of Morgan Hill and cut eight fiber cables in what appears to have been an organized attack on the electronic infrastructure of an American city. Its implications, though startling, have gone almost un-reported. So I decided to change that.”

Read more of this story at Slashdot.

Share

Apr 22 2009

"Good Enough" Computers Are the Future

An anonymous reader writes “Over on the PC World blog, Keir Thomas engages in some speculative thinking. Pretending to be writing from the year 2025, he describes a world of ‘Good Enough computing,’ wherein ultra-cheap PCs and notebooks (created to help end-users weather the ‘Great Recession’ of the early 21st century) are coupled to open source operating systems. This is possible because even the cheapest chips have all the power most people need nowadays. In what is effectively the present situation with netbooks writ large, he sees a future where Microsoft is priced out of the entire desktop operating system market and can’t compete. It’s a fun read that raises some interesting points.”

Read more of this story at Slashdot.

Share

Apr 22 2009

Kindle 2 Tear-Down Reveals Price of Components

adeelarshad82 writes “Amazon’s wildly popular Kindle 2 got a good old fashioned tear-down from the folks at market research firm iSuppli. According to the organization, the Kindle 2’s manufacturing cost is almost half as much as its retail price.”

Read more of this story at Slashdot.

Share

Apr 22 2009

Intel Cache Poisoning Is Dangerously Easy On Linux

Julie188 writes “A researcher recently released proof-of-concept code for an exploit that allows a hacker to overrun an Intel CPU cache and plant a rootkit. A second, independent researcher has examined the exploit and noted that it is so simple and so stealthy that it is likely out in the wild now, unbeknownst to its victims. The attack works best on a Linux system with an Intel DQ35 motherboard with 2GB of memory. It turns out that Linux allows the root user to access MTR registers incredibly easily. With Windows this exploit can be used, but requires much more work and skill and so while the Linux exploit code is readily available now, no Windows exploit code has, so far, been released or seen. This attack is hardware specific, but unfortunately, it is specific to Intel’s popular DQ35 motherboards.”

Read more of this story at Slashdot.

Share

Apr 22 2009

Head First Rails

Anita Kuno writes “I suggested Head First Rails to a friend before I even finished it. He was asking me questions that I didn’t have time to answer, and I knew the book could explain better than I. My friend is impatient, and I was uncertain what his experience would be. At first he was frustrated, but I assured him the answers were in the book. The incremental style of Head First Rails includes some exercises that are designed to fail to reinforce the learning process. I was confident that his answer would be found in the pages and he trusted me enough to go back and continue the exercises. He later told me he is very happy with the book and grateful that I suggested it.” Read on for the rest of Anita’s review.

Read more of this story at Slashdot.

Share