Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:At the ISP's cost? (Score 1) 157

Relax, people will only pay so much for service from [the ISPs]. Supply and Demand is still in effect.

Supply and demand only works on good which it is possible to give up or replace. Given our societies dependency on the internet, the monopoly or duopoly state of service providers here in the US, and the relative lack of competition or differentiating factors between firms here in the US, it is still concerning. :-\

Comment Re:What's the difference? (Score 1) 83

I suspect that there are two factors:
...

2. Ideological: American Exceptionalism is a hell of a drug. By virtue of our status as the Good Guys, what we do is Good until proven evil, and often even Good after being proven evil. The sinister, repressive, communist state of the cunning chinaman, on the other hand...

We've always been at war with Eurasia, perhaps?

Comment Computer Simulation, modelling human iteraction? (Score 1) 283

Ok, so they investigated computer simulations of three different models of communication within a population. Everyone talks to everyone else, special hub people who talk to lots of people, and everyone with equal number of connections. Then they sprinkled in special people who's opinions couldn't be changed, and let them talk.

Couple Questions:
How did they determine whether listening to someone influenced a persons opinion?
Seems likely that in a given population, a minority of committed individuals like this would naturally self segregate, possibly even leaving the population voluntarily.
Did they model the continual rotation of population? Even the luckiest individual is around to spread his/her opinion for 100 years.

Submission + - Stopping Terror with Social Networks/Technology (slashdot.org)

GillBates0 writes: "In the wake of the recent terrorist attacks in Mumbai and Norway, we saw how people used technology to collaborate and help each other online (e.g. for rides, blood donations, etc). I am toying with the idea of creating a website where people can report suspicious objects by clicking a picture. Once uploaded to the website and geolocated (via an App), the location could be flagged on a Google Map, so others can avoid it. If enough people report the object, the website could automatically dial local authorities (perhaps each city should have one). It's kinda "surveillance for the people, by the people", especially in areas where government surveillance isn't adequate. It would harness the power of technology and the masses to improve public vigilance, warn other people in the area, in real time. There are privacy implications, and there's probably a huge scope for misuse, but it would save lives. What do people think?"

Submission + - Student faces 15 years for 'Anonymous' hacktivism (rawstory.com)

derGoldstein writes: TheRawStory reports: "A journalism student at the University of Nevada at Las Vegas who used the online alias "No" and "MMMM" faces 15 years in prison and $500,000 in fines if she is convicted of hacking charges related to the group "Anonymous."... the FBI arrested 20-year-old Mercedes Renee Haefer last week for allegedly participating in distributed denial of service (DDoS) attacks against PayPal’s website." Anonymous responds through @AnonymousIRC: "[they] should know this will not make us stop. Quite the opposite. Expect a shitstorm in case of conviction."
ISS

Submission + - NASA Tentatively Approves Combining SpaceX Flights (spacenews.com)

thomst writes: Space News reports that NASA has given tentative approval for SpaceX to combine the two remaining flights designed to prove the Hawthorne, Calif., company can deliver cargo to the international space station, according to William Gerstenmaier, NASA’s associate administrator for space operations, although formal approval for the mission is still pending. If NASA does approve the plan, SpaceX's Dragon capsule would be the first civilian spacecraft actually to dock with the International Space Station. According to NASA spokesman Joshua Buck, the current plan calls for SpaceX to launch a Dragon capsule aboard a Falcon 9 rocket on Nov. 30, which would then rendezvous and dock with the space station on Dec. 7 — a day that would live in spaceflight history.
Google

Submission + - _Are Google+ Hangouts the Next Hackerspaces? (makezine.com)

ptorrone writes: "MAKE Magazine is reporting on the current trends of makers and hackers adopting google+ faster than Facebook. MAKE goes on to show how hackerspaces and individual makers are using google+ hangout video, with up to 10 participants, to show and share their projects. The article also brings up features needed for the google+ hangout tool as well as how to stream the video sessions to services like Ustream so an audience can watch the hackerspace "show-and-tells" without hitting the 10 person limit."

Submission + - Someone is Trying to Trademark "Bitcoin" (uspto.gov)

An anonymous reader writes: The USPTO (US Patent and Trademark Office) is now showing the following trademark:

Word Mark BITCOIN
Goods and Services IC 036. US 100 101 102. G & S: Financial services, namely, providing a virtual currency for use by members of an on-line community via a global computer network. FIRST USE: 20110622. FIRST USE IN COMMERCE: 20110622
http://tess2.uspto.gov/bin/showfield?f=doc&state=4006:m6lrvi.2.1

The claim that "Bitcoin" was first used June 22nd, 2011 is patently false. Even a simple google search would easily prove otherwise. So what is the nefarious purpose behind this application?

Google

Submission + - Google Drops Entire .CO.CC Domain Over Spam (threatpost.com)

Trailrunner7 writes: In a rare and sweeping move, Google has removed all of the sites hosted on .co.cc domains from its search results, saying that because such a large percentage of the sites on that freehosting provider are low-quality or spammy, they decided to de-index all of them.

In its most recent report on the scope and spread of phishing sites, The Anti-Phishing Working Group compiled stats that show that seven percent of all phishing domains were hosted on .cc domains in the second half of 2010. More than 4,900 phishing attacks originated from .cc domains in that period, the group said.

Security

Submission + - Panda risks labelling LulzSec stupid (itpro.co.uk)

twoheadedboy writes: "Panda Security has chosen to lambast the now defunct hacking group LulzSec, saying the group's work was more "stupidism" than "hacktivism." In its report covering the second quarter of 2011, the security company also took the opportunity to criticise Anonymous. Given how Anonymous has reacted to criticism in the past, notably in the case of HBGary, is Panda taking a big risk?"

Comment Re:i wonder.... (Score 2) 119

Isn't LOIC one of the preferred tools of Anonymous? It shouldn't be that difficult to track down the developers. The project has both SourceForge and Github accounts.

Isn't it a valid tool for stress testing websites developed by several individuals collectively? Sounds like you want to blame the creator of dynamite because some people use it to blow up bridges. Just because a tool can be used for a wrong purpose doesn't mean we blame the maker. Blame those who use it that way.

Slashdot Top Deals

"Protozoa are small, and bacteria are small, but viruses are smaller than the both put together."

Working...