Slashdot stories can be listened to in audio form via an RSS feed, as read by our own robotic overlord.
According to Robertson, the Model M is an artifact from a time when high-end computing was still the province of industry, not pleasure. But while today's manufacturers have long since abandoned the concept of durability and longevity, refurbished Model Ms are still available from aficionados like Brandon Ermita, a Princeton University IT manager who recovers them from supply depots and recycling centers and sells them through his site, ClickyKeyboards. "For the very few that still appreciate the tactile feel of a typewriter-based computer keyboard and can still appreciate the simplicity of black letters on white keys, one can still seek out and own an original IBM model M keyboard — a little piece of early computing history," says Ermita. As one Reddit user recently commented, "Those bastards are the ORIGINAL gaming keyboards. No matter how much you abuse it, you'll die before it does.""
Researchers at IBM's X-Force research team have seen a new version of Cridex, which is also known as Bugat and Feodo, using some of the same techniques that GOZ used to such good effect. Specifically, the new strain of malware has adopted GOZ's penchant for using HTML injections, and the researchers say the technique is nearly identical to the way that GOZ handled it.
"There are two possible explanations for this. First, someone from the GOZ group could have moved to the Bugat team. This would not be the first time something like this has happened, which we've witnessed in other cases involving Zeus and Citadel; however, it is not very likely in this case since Bugat and GOZ are essentially competitors, while Zeus and Citadel are closely related. The second and more likely explanation is that the Bugat team could have analyzed and perhaps reversed the GOZ malware before copying the HTML injections that made GOZ so highly profitable for its operators," Etay Maor, a senior fraud prevention strategist at IBM, wrote in an analysis of the new malware.
Newman writes: "With next-generation technology like non-volatile memories and PCIe SSDs, there are going to be more resources in addition to the CPU that need to be scheduled to make sure everything fits in memory and does not overflow. I think the time has come for Linux – and likely other operating systems – to develop a more robust framework that can address the needs of future hardware and meet the requirements for scheduling resources. This framework is not going to be easy to develop, but it is needed by everything from databases and MapReduce to simple web queries."