----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
|
1. |
File-Sharing Battle Leaves Musicians Caught in Middle. Many musicians have found themselves watching helplessly as the recording industry has begun suing their fans. By Neil Strauss. |
2. |
A Tech Company Wins Big in the War on Terror. For L-3 Communications, a company that specializes in selling technology devices, the bottom line is thwarting terror. By Amy Kover. |
3. |
Whatever Will Be Will Be Free on the Internet. The recording industry's long-running battle against online music piracy has come to resemble one of those whack-a-mole arcade games. By Steve Lohr. |
4. |
The Music Industry Reveals Its Carrots and Sticks. The lawsuits against sharers of music files are battling a public that finds it hard to distinguish among several sorts of copying. By Adam Liptak. |
5. |
Beyond File-Sharing, a Nation of Copiers. Like file-sharing, cutting and pasting from the Internet is just one part of a broader shift toward all copying, all the time. By John Leland. |
----------------------------------------------------------------------
CNET News.com - Front Door
----------------------------------------------------------------------
|
6. |
Utility computing: Turning on the spigot. Utility, or on-demand, computing is the idea of delivering applications, storage or processing power on a pay-per-use basis. |
7. |
Security: Trouble in mind. From viruses and worms to spam, fraud and theft, security problems have become perhaps the biggest headache in the high-tech industry today. |
8. |
What labor shortage?. Experts at Wharton find that conventional wisdom about the impact of a smaller baby bust and an aging population of boomers is misleading--if not outright wrong. |
9. |
Editor's note: A new and improved News.com. CNET News.com celebrates seven years of award-winning tech journalism this month. Jai Singh, its founder and editor in chief, shares his vision for the next seven years, which includes a site redesign. |
10. |
Audiocast archive. Open HTML container page. |
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
|
11. |
IEEE to Standardize OS Security Components |
12. |
Security Versus Science |
13. |
Can Lotus Notes R3 Prior Art Save The Browser? |
14. |
Fame, Fortune and Micropayments |
15. |
The Economist on Open Source in Government |
16. |
Response to Spider Robinson on the State of Sci-Fi |
17. |
Half-Life 2, ATI, NVIDIA, and a Sack of Cash |
----------------------------------------------------------------------
Hack the Planet
----------------------------------------------------------------------
|
18. |
Dan Egnor: "Somewhere deep inside the secret headquarters of the RedHat/GNOME/Ximian/Mozilla Cabal, there's a hidden document with a list of everything in Unix you know and love, marked with a date for its final expurgation. I think 'ls' is slated to be finally replaced with a symlink to 'nautilus' in 2007. Except that symlinks will have been replaced by ".shortcut" files, which are interpreted by the Mono implementation of GNOME-VFS." |
19. |
Scott McCloud: Misunderstanding Micropayments: BitPass, Shirky and The Good Idea that Refuses to Die. He has an obvious error in saying that there are mental transaction costs in a system where the customer never sees the payments, but it doesn't invalidate his other arguments. |
20. |
EE Times: Dueling video codecs square off at broadcast conference. Here are the preliminary H.264 licensing terms: $0.25 per unit for encoding and decoding. What happened to the H.264 royalty-free baseline? The Windows Media Video 9 license fee is $0.10 per unit for decoding and $0.25 for encode and decode. |
21. |
IEEE Begins Standard to Create Baseline for More Secure Operating Systems. It will be interesting to see how much security they're willing to trade off for compatibility. Wait, here it is: "The TOE is not expected to be able to sufficiently mitigate risks resulting from application of sophisticated attack methods." |
22. |
Cory Doctorow: New Sidekick features, just in the nick of time. "Party like it's 1982!" Since the Hiptop is totally dependent on servers run by the carriers, I wonder how it would interact with number portability. |
----------------------------------------------------------------------
The Register
----------------------------------------------------------------------
|
23. |
Govt restricts access to snooping powers. 'Dramatically cut down' |