Page All:
Page 1
Milky Way warps.
Google starts using DRM. DRM sucks and Google sucks. Any company that uses DRM to 'protect' their content is stupid. Move along, nothing to see here.
Matsushita (Panasonic) to open new plasma plant.
Novell offers security software for Linux.
Milky Way warps.
Quote
Using computer models, the team showed that the Magellanic Clouds could warp the shape of the Milky Way, but only if they were moving through a thick halo of hypothetical dark matter. Dark matter can’t be directly observed because it neither emits nor reflects visible light or other electromagnetic radiation. However, its presence has been inferred from the gravitational effect it has on visible matter such as stars and galaxies. Astronomers believe that dark matter may make up as much as 90 percent of the mass in the universe.
Google starts using DRM. DRM sucks and Google sucks. Any company that uses DRM to 'protect' their content is stupid. Move along, nothing to see here.
Quote
Google's DRM will make its first appearance as part of a new video downloading service. Page revealed that customers will be able to buy TV shows from CBS, NBA basketball games and a host of other content with Google serving as the delivery broker for the video. This move mimics other technology companies - most notably Apple - which have struck deals with large media houses to send video over the web for a fee.
Matsushita (Panasonic) to open new plasma plant.
Quote
Matsushita, the world's largest consumer electronics maker known for its Panasonic brand, said the factory would be built next to an existing plant in Amagasaki in western Japan and start operations next July. The company will spend 180 billion yen ($1.57 billion) on the factory, which will hit full capacity by March 2009, when it will be able to churn out the equivalent of 500,000 42-inch panels a month, or 6 million per year.
Novell offers security software for Linux.
Quote
AppArmor lets an administrator create a profile that describes which files a given application may use. The software then enforces that profile. Consquently, if a remote attacker takes over that application, it's more difficult for the attacker to use the application for malicious purposes, such as taking over the entire computer.