Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Submission + - Cyber attack hits RBS and NatWest online customers on payday (theguardian.com)

An anonymous reader writes: The RBS banking group has revealed it suffered a cyber attack on its online services that left customers struggling to log on for nearly an hour – just as monthly pay cheques were arriving in accounts. ..

The bank said it did not know the identity of the perpetrators or why they had chosen to attack the bank. However, it is the second time RBS has been the victim of a DDoS.

Submission + - Silicon Valley's Big Lie

HughPickens.com writes: Danny Crichton writes at TechCrunch that startups in Silicon Valley run on an alchemy of ignorance and amnesia and that lying is a requisite and daily part of being a founder, the grease that keeps the startup flywheel running. Most startups fail. The vast, vast majority of startup employees will never exercise their options, let alone become millionaires while doing it. But founders have little choice as they sell their company to everyone, whether investors, employees, potential employees, or clients. "Founders have to tell the lie – that everything is fine, that a feature is going to launch even though the engineer for that feature hasn’t been hired yet, that payroll will run even though the VC dollars are still nowhere on the horizon," writes Crichton. "For one of the most hyper-rational populations in the world, Silicon Valley runs off a myth about startup success, of the lowly founder conquering the world."

Crichton says that Silicon Valley needs a new transparent approach toward information, but also need to understand that startups are inherently risky – and accept the lies that come with them. Founders can’t expect to hide the term sheets and their liquidation preferences from employees who ask and informed employees have a right to know what they are getting into. "We still need that Big Lie to function. We still need to dream about the possibility of success in order to realize it," concludes Chrichton. "With greater transparency comes a responsibility on the part of everyone in the startup ecosystem to understand and empathize with the plight of founders trying to build their companies."

Comment Parenting (Score 5, Insightful) 381

How about instead of trying to introduce draconian inappropriate laws that will no doubt be misused to censor other sites the government properly fund the enforcement of existing laws? We already have very effective parental neglect laws and if a child as young as the Childline survey suggests is accessing pornography surely the parents are neglectful?

Submission + - Ask Slashdot: Wireless PC-to-TV solution? 1

jez9999 writes: I have a slightly unusual requirement. I don't want to use some console like an Xbox, Steam Machine, etc. I just have a desktop PC which I use for most of the stuff I do (gaming, video, work, etc.), and it's upstairs. From time to time, I'd like to use it downstairs.

Is there a wireless solution that will let me take control of the PC from downstairs, using the TV (HDMI) as the screen, and the TV's speakers to replace my desktop speakers? Ideally there would be a wireless transmitter in the PC, and a downstairs wireless receiver box into which I could plug the keyboard, mouse, and of course, the TV via an HDMI cable. Obviously Bluetooth wireless peripherals won't do for this as there's no line of sight between downstairs and the upstairs PC, and besides, I prefer wired peripherals anyway which I can actually plug in to something (no battery recharging needed).

Submission + - Critical BIND denial-of-service flaw could disrupt large portions of Internet (networkworld.com)

alphadogg writes: Attackers could exploit a new vulnerability in BIND, the most popular Domain Name System (DNS) server software, to disrupt the Internet for many users. The vulnerability affects all versions of BIND 9, from BIND 9.1.0 to BIND 9.10.2-P2, and can be exploited to crash DNS servers that are powered by the software. The vulnerability announced and patched by the Internet Systems Consortium https://www.isc.org/blogs/cve-... is critical because it can be used to crash both authoritative and recursive DNS servers with a single packet.

Submission + - Lessons Learned Building a Git-Based Knowledge Base for my SaaS product (wisecashhq.com)

thbar writes: I built a "Knowledge Base" (help site) for my SaaS app, using Jekyll, Ruby, Markdown and GitHub. I’m sharing a Jekyll template you can start from for similar situations, as well as what I learned building this.

This allows collaborative work with someone who is less technical, without giving access to the main app source code.

Read more in the article.

Media

Submission + - Smart phones not replacing other media for news ac (sciencedaily.com)

wjousts writes: Despite the fears of traditional media, a new report suggests that smart phones might not be replacing other media for news access, but instead are complementing it. As reported by ScienceDaily:

In a first-of-its-kind study, researchers found that mobile media technologies such as smart phones aren't taking people away from relying on traditional media sources such as newspapers or television.

Instead, mobile media are filling the spaces in people's daily routine in which other media sources are either unavailable or inconvenient to use.


Submission + - 20 User Interface icon sets for developers (tutorialcadet.com)

An anonymous reader writes: This time we’ve created a list of 20 user interface icon sets which developers can use in their applications. These icon sets are perfect for web based and smartphone application UI design.
Programming

Submission + - Linux process states, signals, and job control (ksplice.com)

An anonymous reader writes: How does disown let a remote job continue running even after you kill the shell that spawned it? Where do zombie processes come from? What is an ``uninterruptible sleep'', and how can we use it to temporarily fake a load average of 1500? Ksplice gives us a hands-on introduction to Linux process states, a fundamental concept in the Linux kernel.
Microsoft

Submission + - Despite 2.3mln Downloads IE9 Still Faces Issues (eweekeurope.co.uk)

jhernik writes: "Microsoft claims massive interest in Internet Explorer 9 but long-term dominance challenges lie ahead

Microsoft claims more than 2.35 million downloads of Internet Explorer 9 in the new browser’s first 24 hours of release.

“That is over 27 downloads every second,” Ryan Gavin, senior director for Internet Explorer, wrote in a March 16 posting on The Windows Blog, “or over 240 downloads every nine seconds.” The number of IE9 downloads in 24 hours, apparently, is double that of the IE9 Beta and “four times that of the IE9 RC”."

Space

Submission + - MESSENGER In Orbit Around Mercury (jhuapl.edu)

krswan writes: From the NASA press release: "At 9:10 p.m. EDT, engineers in the MESSENGER Mission Operations Center at the Johns Hopkins University Applied Physics Laboratory (APL) in Laurel, Md., received the anticipated radiometric signals confirming nominal burn shutdown and successful insertion of the MESSENGER probe into orbit around the planet Mercury."

If you don't know much about this little spacecraft, check out its website. Designed with a completely passive cooling system, it will stay at 600C on the sun side, but room temperature behind the sunshade. During its 6 year journey it used its solar panels as sails, using the solar wind instead of thrusters to adjust its trajectory. Over then next year it will build a high-rez map of Mercury, and maybe determine if there is really ice hiding in polar craters on Mercury.

Submission + - The Best Use of Email--Along with Dos and Don&rsqu (yourthoughtpartner.com)

An anonymous reader writes: I appreciate technology as much as the next person, but I draw the line when it comes to inappropriate use of email. My email is exploding – literally. From unsolicited political or personal messages to the dreaded “reply all” on group communication, I’ve seen countless examples of blunders and misuse. I think we all have.
Ubuntu

Submission + - Lessons Learned from Canonical, Banshee, and GNOME (ostatic.com)

An anonymous reader writes: Ubuntu has not broken any open source rules in the Banshee debate, but have they violated the open source ethics? Susan Linton’s take on the whole issue.

Slashdot Top Deals

"Go to Heaven for the climate, Hell for the company." -- Mark Twain

Working...