Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
IBM

Submission + - 'Jeopardy!' pits man against computer in Round 1 (denverpost.com)

PolygamousRanchKid writes: In the "Jeopardy!" battle of man vs. machine, man and machine were neck-and-neck on Monday.

Human player Brad Rutter and the supercomputer named Watson ended an initial round tied at $5,000. The other challenger, human Ken Jennings, was far behind with $2,000. Rutter (the show's all-time money-winner with $3.25 million) and Jennings (who has the longest winning streak at 74 games) are the most successful players in "Jeopardy!" history. Watson, named for IBM founder Thomas J. Watson, is powered by 10 racks of computer servers running the Linux operating system. Read more: 'Jeopardy!' pits man against computer in

Round 1 — The Denver Post http://www.denverpost.com/technology/ci_17391282#ixzz1E14JyiC8 Read The Denver Post's Terms of Use of its content: http://www.denverpost.com/termsofuse

News

Submission + - The true cost of publishing on the Amazon Kindle (pcpro.co.uk)

Barence writes: Ever wondered why Kindle newspapers and magazines don't have many photos? PC Pro has done an analysis of the costs of publishing on The Kindle and discovered that Amazon effectively taxes newspapers and magazines for including more images. Amazon applies "delivery charges" to publishers at the cost of $0.15 per MB/10p per MB. At those prices, PC Pro claims it's cheaper to mail out a physical magazine than have it delivered electronically on The Kindle. What's more, publishers have no control over the price of their newspaper or magazine: Amazon sets the prices itself, leading to huge customer complaints for titles such as The Economist.

Comment Re:Why did they even need passwords? (Score 1) 236

What I'm left wondering is why someone should need a username and password to comment on a blog post on their sites. Do they have a reputation system? Does it really prevent spam? Or is it just to gather a list of email addresses that they might sell later? There must be a better way to accomplish the little functionality that their login requirement provides. Especially now that they have to deal with the fact that their login system was not secure.

There are two primary reasons to require logins:
1) A registration system with a captcha is highly-effective at preventing spam on your blog comments or forum posts.
2) To a greater or lesser degree, it prevents people from impersonating you. Sure there are ways to trick this (create a username that's one lookalike character off, etc.) but on the whole it makes it easier to recognize who you're talking to.

Education

Gulf Oil Spill Disaster — Spawn of the Living Dead 228

grrlscientist writes "A recently published study, intended to provide data to commercial fisheries in the Gulf of Mexico so they maximize their catch of Yellowfin Tuna, Thunnus albacares, whilst avoiding bycatch of critically endangered Atlantic (Northern) Bluefin Tuna, Thunnus thynnus, suggests that the Deepwater Horizon oil leak may devastate the endangered Atlantic bluefin population, causing it to completely collapse or possibly go extinct."
Media

Submission + - Woman fined $1.9M for downloading 24 songs (cnn.com)

Karrde712 writes: A Federal jury found a Minnesota woman guilty of copyright violations put forth by the RIAA. The jury awarded a fine of $80,000 for each of 24 songs that she downloaded. The woman and her lawyers were shocked at the size of the fine and plan to appeal.

Comment Action Quake 2 (Score 1) 739

My first experience with Linux was Red Hat 6.2. I installed it on some leftover hardware I had lying around after an upgrade and followed a HOWTO I found on the web to install an Action Quake 2 server. It ran for six months without a reboot until I had to take it home for the summer.

Comment Re:is the safest, most reliable OS we've ever buil (Score 1) 1010

I'd like to set the record straight on your comments about the "other high profile distro" that "let attackers actually sign some rogue packages with their private key". This is verifiably false on all points.

The full description of how this attack took place is available here: https://www.redhat.com/archives/fedora-announce-list/2009-March/msg00010.html

No software vulnerability was exploited. It was a classic case of social engineering. A hacker was able to gain access to an ssh key providing access to the build infrastructure and uploaded a set of modified packages. They were designed to snoop for the passwords necessary to use the signing server. The intrusion was detected and repaired before any infected packages were signed.

Please do at least a trivial amount of homework before throwing about accusations.

The failing of the first distribution was in their insistence upon forking a private copy of the crypto libraries that the community at large refused to even look at, which is why the error went undiscovered for so long. This was a failure of the developers to follow the core tenets of collaborative development, and should serve to prove the effectiveness of community development rather than imply that open-source is somehow less secure.

Comment Cell Tower Internet (Score 3, Insightful) 588

One service that's becoming popular with laptop users would be the EVDO/3G adapters. These allow laptop computers (or, with USB versions, any computer) access to the EVDO (Verizon) and 3G (AT&T, T-Mobile) high-speed networks in most regions. Living in Massachusetts myself, I happen to know that the signal is very strong for both of these services in most populated areas. Basically, you can get broadband access from the cell tower networks for about $60/month (citing Verizon's price for 5GB monthly allowance).

Both services offer speeds that are roughly equivalent to consumer DSL lines. While it is more expensive than DSL in most locations, if they're not going to run DSL, FiOS or digital cable lines out to you, then you don't have a lot of choices.
Microsoft

Submission + - Microsoft downplays Vista speech vulnerability

john-da-luthrun writes: Microsoft has attempted to downplay reports that Vista's speech recognition capabilities could be hijacked by malicious websites in order to irretrievably delete user data. An MP3 file could be used to instruct the PC to delete a file and empty the trash. Microsoft's line is that there is "little if any need to worry" about this, as it would only work if the speech recognition feature is activated and the microphone and speakers are switched on. So if you're using speech recognition without a microphone or speakers, then presumably you're safe...
Windows

Submission + - Vista Family Discount Keys Found Not Compatible

acousticiris writes: Many (if not all) users who took advantage of Microsoft's Vista Family Discount have been issued invalid installation keys and cannot install Windows Vista Home Premium. Microsoft says, "There is no expected time period for a fix at this time." According to the article, the keys are valid for something, just not Windows Vista. Perhaps it's just too simple to issue these folks new keys and send them on their way.
Announcements

Submission + - Search for Jim Gray called off

Karrde712 writes: From the article: "The Coast Guard planned to call off its search early Thursday for an acclaimed computer scientist whose sailboat has disappeared off Northern California. Despite unusually calm weather, searchers have exhausted any area Jim Gray could have drifted or sailed after leaving for a solo sailing trip Sunday to scatter his mother's ashes at sea, a Coast Guard spokesman said."
Windows

Some 'Next-Gen' DVDs May Not Work With Vista 293

schnikies79 wrote to mention an article on the Times Online site, where they report that a 'substantial number' of Vista PCs will be unable to play HD-DVDs or Blu-ray discs, as a result of DRM requirements made by the operating system. From the article: "Dave Marsh, the lead program manager for video at Microsoft, said that if the PC used a digital connection to link with the monitor or television, then it would require the highest level of content protection, known as HDCP, to play the discs. If it did not have such protection, Vista would shut down the signal, he said."

Slashdot Top Deals

Two can Live as Cheaply as One for Half as Long. -- Howard Kandel

Working...