Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Earth's Inner Core Rotation Slower Than Estimat (Score 1) 223

Since space travel like that is all about the coasting, fuel state wouldn't be a problem.

Coasting is a big part of space travel (one of Newton's laws says an object in motion will stay in motion until another force acts upon it), but is it really possible to plan out a perfect space journey without need for fuel-assisted adjustments? Of course not. You can run out of gas in space.

Businesses

Best Places To Work In IT 2010 205

CWmike writes "These top-rated IT workplaces combine choice benefits with hot technologies and on-target training. Computerworld's 17th annual report highlights the employers firing on all cylinders. The Employer Scorecard ranks IT firms based on best benefits, retention, training, diversity, and career development. Also read what IT staffs have to say about job satisfaction. How's your workplace, IT folk?" Read below for a quick look at the top 10 IT workplaces according to this survey.

Comment Re:It's not violence (Score 1) 236

The GP point still stands: sex (which harms nobody) is taboo while violence (most definitely harmful) is commonplace in cinema and literature.

I disagree. I think sex can be harmful in a number of situations: molestation/abuse creates psychological harm to the victim, unwanted pregnancy can derail long-term goals, and STD's are not "harmless", especially if they aren't treated.

Piracy

Study Claims $41.5 Billion In Portable Game Piracy Losses Over Five Years 316

Gamasutra reports that Japan's Computer Entertainment Suppliers Association conducted a study to estimate the total amount of money lost to piracy on portable game consoles. The figure they arrived at? $41.5 billion from 2004 to 2009. Quoting: "CESA checked the download counts for the top 20 Japanese games at what it considers the top 114 piracy sites, recording those figures from 2004 to 2009. After calculating the total for handheld piracy in Japan with that method, the groups multiplied that number by four to reach the worldwide amount, presuming that Japan makes up 25 percent of the world's software market. CESA and Baba Lab did not take into account other popular distribution methods for pirated games like peer-to-peer sharing, so the groups admit that the actual figures for DS and PSP software piracy could be much higher than the ¥3.816 trillion amount the study found."

Comment Re:Cyber warfare: FUD for vendors. (Score 1) 205

we live in a world where grocery stores continue to make sales when the cash registers are broken

I went to Giant Eagle the other day and their computers were "down" from a recent t-storm. I waited around 15 minutes or so as the store gradually filled up with irate customers (they were NOT making sales) until I finally left and just went down the road to a gas station for my gallon of milk.

Comment Who cares? (Score 1) 117

*WHOOSH* That's the sound of the importance of users' MAC addresses being publicized flying over my head. Why should anybody be concerned if the RIAA, or Google, or anybody else knows your MAC address?

I fail to see how your NIC's MAC address can be used to extract sensitive or private information. I don't know of any way that it can be cross-referenced or traced. Whenever you are requesting information from a server, doesn't every hop along the way replace the "source MAC address" in the IP packet headers with its own MAC address? The only way, then, for your MAC address to become relevant to outside investigations would be if your default gateway were examined.

Every investigation I have heard of involves IP addresses, not MAC addresses. Hypothetical situation: let's say EvilBob logs into his neighbor's unprotected wireless access point and torrents a few albums. Unfortunately, the RIAA was hosting those songs as bait to catch evil-doers like EvilBob who steal music. The RIAA decides to take action against EvilBob. However, they don't know EvilBob's name. All they know is his neighbor's IP address. They pull a few strings and probably convince EvilBob's neighbor's ISP to release account information such as the name and address under which the Internet service is registered. So the RIAA sends a letter to that address and EvilBob's neighbors scratch their head for awhile, then hopefully end up enabling some security on their access point.

Let's say EvilBob is a part of something more nefarious, like trying to incite riots against government officials. In tihs case, it's not the RIAA who goes to the ISP but the government. The ISP gives relevant information to the feds and they bust down the doors of EvilBob's neighbor's house and confiscate all their computer equipment. Soon they discover that there is nothing illegal on these machines and concur a neighbor was using the unprotected wireless network to perpetrate his crimes. At this point, the AP can be examined and the MAC address of a certain NIC (if it has not been spoofed) can be identified as belonging to the machine that sent/received said illegal material. If they want to find EvilBob, I believe they are giong to have to search the whole city block in search of that MAC address and hope that a) the MAC address they got from the AP was not spoofed and b) EvilBob wasn't parked outside and is 1000 miles away in another country right now, installing botnets in public libraries in Florida.

Why is anybody worried about this issue? I feel like I'm taking crazy pills here!

Comment Re:Use in the workplace (Score 1) 97

I don't agree that an employer has the right to spy on employees without their consent as a condition of using the computer.

It IS their right... but you ARE allowed to disagree.

If you are so worried that an employee is going to goof off, then maybe you don't have a clue how to manage your employees.

I'M not a manager, I'm just a general-purpose technician. If a local business manager calls me and says he wants to limit Facebook access, I'm not going to advise him on his managerial skills. I am going to blacklist *.facebook.com on the local DNS server or use a DynDNS account with blacklisting/filtering and point the offender's NIC to that address. If he insists that he has made the decision that he wants spyware installed, guess what - I'll install it for him (assuming it's legal).

In short, if an employee can maintain a satisfactory enough output that they retain their job, and have time to goof off, then you evidently don't have enough for them to do.

I would absolutely hate to have a job where I have to maintain "satisfactory output" and have nothing to do, and out of boredom surf Facebook. I have a friend who feels this way, and spends literally hours a day sitting at his desk playing games on his Droid, making $40,000/yr. That actually pisses me off and I hope I don't ever degenerate into somebody who feels like I need a babysitter as a boss who spoonfeeds me work and checks in on me to make sure I'm busy.

Comment Re:Use in the workplace (Score 3, Interesting) 97

The name of the software company ("CyberSpy") sure seems to imply that its marketing strategy is to appeal to the obsessive stalker who needs a convenient way to spy on another person and steal their passwords, read their email, etc. I personally knew a guy that was so obsessed with his ex that he tricked her into d/l a similar spy program with very similar functionality to CyberSpy and all he did was change the filename of the install package to something a little less obvious (unicorns_with_flowers.jpg.exe was a good example).

I agree that the most legitimate use of this software would be for employers to monitor their employees. An employer who owns the computers its employees are using has a right to install spyware without employee's knowledge... duh. They are handing out paychecks and if they don't want their employees farting around on Facebook all afternoon, it's their right to "spy" and verify that rules are not being broken.

Hardware

Submission + - BP Spill Effort in Hands of Underwater Pilots

theodp writes: Ground control to Major Tito. The work Tito Collasius does sounds a little like science fiction: Men on ships flicking joysticks that control robots the size of trucks as they rove miles beneath the sea in near-freezing depths no man could hope to reach. But BP's spill efforts rest in the hands of underwater remote-operated vehicle (ROV) pilots, who 'fly' the ROVs from command centers aboard ships, joy sticks in hand and large banks of screens in front of them offering a view of the challenges they confront in the waters below. ROVs are typically used for commercial (as in the oil industry), oceanographic (science research and exploration), and military (mine reconnaissance and recovery) missions. If you're interested in joining Tito, training's available.
Censorship

Submission + - Porn sites pop up in China (skunkpost.com)

crimeandpunishment writes: It may only be a temporary glitch, but it's one that's providing some pleasure for internet users in China. Previously blocked websites, including ones with pornography, are suddenly accessible in China. The country has a long history of cracking down on online pornography. One analyst says it's far more likely that this is a glitch, not a change in internet censorship policy.

Slashdot Top Deals

"You shouldn't make my toaster angry." -- Household security explained in "Johnny Quest"

Working...