Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Will Stallman Kill the "Linux Revolution?" 741

frdmfghtr writes "The October 30 issue of Forbes Magazine has an article speculating that Richard Stallman's efforts to rewrite the GPL could threaten to 'tear it apart.' The article describes how the GPLv3 is expected to be incompatible with the GPLv2, causing trouble for Linux vendors such as Novell and Red Hat. The article wraps it up: 'And a big loser, eventually, could be Stallman himself. If he relents now, he likely would be branded a sellout by his hard-core followers, who might abandon him. If he stands his ground, customers and tech firms may suffer for a few years but ultimately could find a way to work around him. Either way, Stallman risks becoming irrelevant, a strange footnote in the history of computing: a radical hacker who went on a kamikaze mission against his own program and went down in flames, albeit after causing great turmoil for the people around him.'"

Same Old, Same Old at HP? 72

theodp writes "Computerworld Editor-in-Chief Don Tenant expresses astonishment at HP's cluelessness in the wake of its boardroom leak investigation fiasco, noting that HP CEO Mark Hurd's choice for a new Chief Ethics Officer was Hurd's go-to guy at NCR when the boss wanted internal leaks investigated." From the article: "It seems incomprehensible that no one at HP could foresee that appointing a former Hurd colleague to the ethics oversight position might be perceived as a shameless attempt by Hurd to keep from being further sullied by the scandal. But there's another dimension to all this that's even more baffling. Nearly two weeks before HP announced Hoak's appointment, BusinessWeek ran a story that recounted how Hurd had to deal with a number of internal investigations at NCR, including probes of leaks of sensitive information on Yahoo message boards."

Decoy Files on P2P Sites Become Ad Vehicles 200

Carl Bialik from WSJ writes "Some record labels hire outside companies to plant fake files on peer-to-peer sites. Now, labels are turning these decoy files into vehicles for marketing to music pirates by inserting promotional material into the files, such as an eight-minute clip from a Jay-Z concert, the Wall Street Journal reports." From the article: "'The concept here is making the peer-to-peer networks work for us,' says Jay-Z's attorney, Michael Guido. 'While peer-to-peer users are stealing the intellectual property, they are also the active music audience,' and 'this technology allows us to market back to them.'"

Microsoft's Guidelines for Customer Privacy 63

jcatcw writes "Microsoft has released its 'Privacy Guidelines for Developing Software Products and Services.' According to Peter Cullen, chief privacy strategist, Microsoft has learned about protecting user's data from such endeavors as Hailstorm and WGA. 'Certainly that and other things have contributed to us thinking deeply with how we provide security and privacy, as well as respect and control with how their information is used,' he said. 'We think others should join in this discussion.'"

Slashdot Top Deals

Reactor error - core dumped!

Working...