Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Submission + - NY: Freedom of Information Req's Do Not Include BBerry's PIN-to-PIN Msg System (nydailynews.com)

wrekkuh writes: The Daily News is reporting that if aides of New York's Governor Andrew Cuomo cannot speak in person or by telephone with the Governor, they are told to use BlackBerry's PIN-to-PIN messaging system — a function that leaves no lasting trail because it bypasses data-saving email servers. Consequently, a Freedom of Information request for all e-mails to and from Governor Cuomo's office resulted in an empty reply from the Records Access Officer -

"Please be advised that the New York State Executive Chamber has conducted a diligent search, but does not possess records responsive to your request."

Communications

Submission + - The Hivemind Singularity (theatlantic.com)

An anonymous reader writes: Alan Jacobs at The Atlantic writes about a book called New Model Army, which takes the idea of Anonymous — a loose, self-organizing collective with a purpose — and adds twenty-five years of technological advancement. The book's author, Adam Roberts, 'asks us to imagine a near future when electronic communications technologies enable groups of people to communicate with one another instantaneously, and on secure private networks invulnerable, or nearly so, to outside snooping.' With the arrival of high-tech communications technology, such groups wouldn't be limited to enacting their will from behind a computer screen: they could form actual armies. 'Again, each NMA organizes itself and makes decisions collectively: no commander establishes strategy and gives orders, but instead all members of the NMA communicate with what amounts to an advanced audio form of the IRC protocol, debate their next step, and vote. Results of a vote are shared to all immediately and automatically, at which point the soldiers start doing what they voted to do. ... They are proud of their shared identity, and tend to smirk when officers of more traditional armies want to know who their "ringleaders" are. They have no ringleaders; they don't even have specialists: everyone tends the wounded, not just some designated medical corps, and when they need to negotiate, the negotiating team is chosen by army vote. Each soldier does what needs to be done, with need determined by the NMA which each has freely joined.' Let's hope resistance isn't futile.

Comment Re:If anyone wondered what to use the Q for (Score 1) 121

Exactly what i was thinking. Also, this quote from the submission... "Running your favorite media-center software on small, cheap, embedded hardware is about to become a hassle-free reality." is a little confusing to me because, well, i have a hassle-free installation of my favorite media-center software (XBMC) on small, cheap, embedded hardware already, as many others do as well.

Further to the point, can anyone tell the court what the hardware requirements for compiling Jelly Bean or Ice Cream Sandwich is?
Education

Submission + - Looking for recommendations for training

SouthSeaDragon writes: "I'm a computer professional who has performed most of the functions that could be expected over a 39 year career, including hardware maintenance and repair, sitting on a 800 support line, developing a help desk application from the ground up (terminal-based), writing a software manual, plus developing and teaching software courses. In recent years, I've worked for computer software vendors doing pre-sales support generally for infrastructure products including applications, app servers, integration with Java based messaging and ESB product and most recently a Business Rules product. I was laid off recently due to a restructuring and am now trying to figure out the next phase. With the WIA displaced worker grants now available I am attempting to figure out what training would be good to pursue. I am hearing that "the Cloud" is the next big thing, but I'm also looking into increasing my development skills with a current language. I wonder what the readers might suggest for new directions."
HP

Submission + - Pre To Postmortem: The Inside Story of the Death of Palm and webOS (theverge.com)

SomePgmr writes: "Thirty-one. That's the number of months it took Palm, Inc. to go from the darling of International CES 2009 to a mere shadow of itself, a nearly anonymous division inside the HP machine without a hardware program and without the confidence of its owners. Thirty-one months is just barely longer than a typical American mobile phone contract. Understanding exactly how Palm could drive itself into irrelevance in such a short period of time will forever be a subject of Valley lore."
Power

Submission + - Solar Impulse Completes First Solar Intercontinental Flight (solarimpulse.com)

An anonymous reader writes: Slashdotters may remember the Solar Impulse — the world's first 100% solar-powered airplane — from last year when it made its public debut. Today the Solar Impulse made news again as it successfully completed the world's first solar-powered intercontinental flight — a pivotal step that paves the way for the plane's first trip around the world in 2014.
Security

Submission + - Mitt Romney's Hotmail And Dropbox Accounts Hacked (gawker.com)

wrekkuh writes: Someone has contacted Gawker claiming to have compromised the presumptive GOP candidate Mitt Romney's Hotmail and Dropbox accounts. Gawker has confirmed the hack involved resetting the Hotmail account's password via correctily answering 'ole Mitt's security question.

It is interesting to note the hacker did not provide screenshots of his access to Mr. Romney's account. It seems hackers have learned not to make that mistake again, as we saw 4 years ago when Sara Palin's e-mail account was hacked, & the fact that the hacker did provide screenshots of his access which helped in tracking him down.

The kicker? Sara Palin's e-mail account was hacked the same exact way; An easily guessable security question.

Submission + - If You Can't Secure IPv6. Don't Turn it On. (esecurityplanet.com) 1

darthcamaro writes: Lots of hoopla today about World IPv6 Launch day. The day the pundits tells us that we should be switching to IPv6. Well not all pundits, the Chief Security Officer of VeriSign (you know the guys the run the root DNS and .com) doesn't think IPv6 should be turned on by a whole lot of people. The problem is network security devices in many cases don't scan IPv6. So if you turn IPv6 on, you're screwed.
"If you don't have that visibility into IPv6, you should probably consider explicitly disabling IPv6 on your systems until you can take a very concerted approach to enabling IPv6 in a secure manner," McPherson said.

Security

Submission + - Google Fixes 2-Factor Auth. Flaw Used in CloudFlare Attack (krebsonsecurity.com)

tsu doh nimh writes: An attack late last week that compromised the personal and business Gmail accounts of Matthew Prince, chief executive of Web content delivery system CloudFlare, revealed a subtle but dangerous security flaw in the 2-factor authentication process used in Google Apps for business customers. Google has since fixed the glitch, but the attack also apparently succeeded because someone at AT&T got social engineered into forwarding a voicemail account to a device the attackers controlled. Prince has posted a timeline of the attack, showing the process by which he and the perpetrators exchanged control over his account 10 times in 15 minutes.
Your Rights Online

Submission + - Stuxnet/Flame/Duqu uses GPL code: release it! (crysys.hu)

David Gerard writes: "It seems the authors of Stuxnet/Duqu/Flame used the LZO library, which is straight-up GPL. And so, someone has asked the US government to release the code under the GPL. (Other code uses various permissive licenses. As works of the US
federal government, the rest is of course public domain.) Perhaps the author could enlist the SFLC to send a copyright notice to the US government..."

Your Rights Online

Submission + - Fourth European Committee Rejects ACTA (zeropaid.com)

Dangerous_Minds writes: Last month, ACTA was rejected by three European committees (the industry committee, the civil liberties committee, and the legal affairs committee). Now, the fourth European committee, the the Development Committee, has voted to reject ACTA as well, making it zero for four. ZeroPaid is offering a quick timeline of the series of blows to ACTA all last month as well. The next stop for ACTA will be the lead committee, the Trade Committee which is scheduled to hand down a decision later this month on June 21. From there, it'll head to the full house for a vote in July.

Slashdot Top Deals

HELP!!!! I'm being held prisoner in /usr/games/lib!

Working...