Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:You have friends (Score 1) 171

But yeah, people shouldn't be surprised that publicly documenting every facet of your life results in less privacy, for you, and for everyone you know.

That isn't the surprise. The surprise is that even if you go out of your way to not publicly document some things (such as high school), this information can be found out through your friends list.

The Almighty Buck

Scientists Develop Financial Turing Test 184

KentuckyFC writes writes to share a new online test that is being touted as the "financial Turing test." The web-based exercise asks users to distinguish between real and randomly generated financial data. "Various economists argue that the efficiency of a market ought to be clearly evident in the returns it produces. They say that the more efficient it is, the more random its returns will be and a perfect market should be completely random. That would appear to give the lie to the widespread belief that humans are unable to tell the difference between financial market returns and, say, a sequence of coin tosses. However, there is good evidence that financial markets are not random (although they do not appear to be predictable either). Now a group of scientists have developed a financial Turing test to find out whether humans can distinguish real financial data from the same data randomly rearranged. Anybody can take the test and the results indicate that humans are actually rather good at this kind of pattern recognition."

Submission + - Microsoft’s Creative Destruction (nytimes.com) 1

blitzkrieg3 writes: Dick Brass, a former Microsoft Vice President, penned a scathing critique of the corporate culture at Microsoft in a New York Times Op-Ed today. Internal power struggles kept technologies like ClearType and the Windows tablet from becoming revolutionary products. He writes:

Internal competition is common at great companies. It can be wisely encouraged to force ideas to compete. The problem comes when the competition becomes uncontrolled and destructive. At Microsoft, it has created a dysfunctional corporate culture in which the big established groups are allowed to prey upon emerging teams, belittle their efforts, compete unfairly against them for resources, and over time hector them out of existence.


Microsoft

Submission + - Why Microsoft is failing (nytimes.com)

homesalad writes: There's an excellent op ed in the Times today by Dick Brass, vice president of Microsoft from 1997 to 2004, that gives some examples of why Microsoft fails to innovate even while developing some interesting products. The author blames "internecine warfare" from much of the issue, and talks about a few innovative ideas that stagnated for years because of a "dysfunctional corporate culture". Interesting reading for anyone who wonders how a profiteering, monopolistic software company can be brought down by profiteering and monopolistic departments within.

Comment Re:Lots of content (Score 4, Insightful) 198

Actually, even your negative synopsis of the piece flies in the face of conventional wisdom, which is that attacks of Chinese origin are all a carefully orchestrated by the ruthless and scheming Chinese government.

Security researchers have identified the attacks against Google to be largely from the Chinese government, as were the politically motivated attacks against the Dala Lama and other Tibetan exiles. There is almost no doubt that the majority of the hacking that goes on in China (and elsewhere) is of the sort that TFA reports on, but linking it to the recent attacks on Google and other US government contractors is disingenuous.

Music

Bach Launches Updated MP3 Format 279

An anonymous reader writes to tell us that Bach Technology has rolled out an updated MP3 file format in a bid to combat music piracy. Dubbed "MusicDNA," the new format offers embedded "updatable premium content" like lyrics, videos, news updates, and album artwork. "Using the new technology, music labels and bands will be able to send updates to the music files – with tour dates, interviews or updates to social networking pages – while illegally-downloaded files remain static. ... No major labels have signed up to use MusicDNA so far, but British record company Beggars Group and US label Tommy Boy are both on board. However, the files are likely to be more expensive than MP3 files – according to the BBC – and will have to compete with Apple's iTunes LP, which already provides additional content such as bonus tracks, lyrics and video interviews."
Image

Facebook Master Password Was "Chuck Norris" Screenshot-sm 319

I Don't Believe in Imaginary Property writes "A Facebook employee has given a tell-all interview with some very interesting things about Facebook's internals. Especially interesting are all the things relating to Facebook privacy. Basically, you don't have any. Nearly everything you've ever done on the site is recorded into a database. While they fire employees for snooping, more than a few have done it. There's an internal system to let them log into anyone's profile, though they have to be able to defend their reason for doing so. And they used to have a master password that could log into any Facebook profile: 'Chuck Norris.' Bruce Schneier might be jealous of that one."

Comment Re:The link is broken (Score 1) 344

Not only that, but even if you fix the double h and put the requisite slashes after the colon, you get this [warning, link doesn't work]. So you think, "oh I see, they forgot to put the dot in between 'government' and 'html'!" It is then that you realize the url has no slashes or periods at all.

For everyone's hilarious enjoyment, here is the full text of the broken url

hhttp:latimesblogslatimescomentertainmentnewsbuzz201001avatar-pulled-from-2d-screens-by-chinese-governmenthtml

Censorship

2-D Avatar To Be Pulled From Theaters In China 344

SimonTheSoundMan notes that Avatar is being pulled from screens in China for being too successful, and too provocative in its anti-authoritarian message. (The 3-D and IMAX versions will remain.) "The communist nation's state-run movie distributor China Film Group is unexpectedly yanking the James Cameron-directed blockbuster Avatar from 1,628 2-D screens this week in favor of a biography of the ancient philosopher Confucius starring Chow-Yun Fat. ... According to a report in the Hong Kong newspaper Apple Daily, the move was made at the urging of propaganda officials who are concerned that Avatar is taking too much market share from Chinese films and drawing unwanted attention to the sensitive issue of forced evictions."

Comment Re:Tear down (Score 1) 406

I think you're missing the whole crux of their argument. Yes, IE was the source of at least one of the security holes, but France and Germany are mandating switching as though it's some sort of panacea. IE was just one link in the chain of exploits used in the attack. Maybe destroying one link in the chain destroys the chain, but it is more likely that they will find a different link to continue the attack. Like maybe a zero day in Firefox or one of these known exploits.

I truly believe that Firefox and probably Chrome is a more secure browser than IE, and I completely agree with the recommendation from France and Germany. But even if Google had no IE they would not have been completely protected from the attacks, and both countries aren't completely protected by some memo mandating the end of IE. To think so is foolishness. Don't let one poorly written PCWorld article convince you otherwise.

Comment Re:Costs? (Score 1) 660

Now e-mail: encryption could be very nice but how am I going to get keys from my correspondents? Do I have to manually ask them to send me or so? It seems so. I am not aware of any automated method to get their public key. ssh is transparent in key exchange, https too. E-mail not (yet). Besides, is there any (formal) standard to encrypt mail? And if I cc: to several recipients that means the e-mail has to be split before encrypting already. Makes it quite expensive when you're on a slow uplink.

The problem with key exchange is that there is no central authority. Thinking about it in a TLS kind of way, every cert is a self signed cert.

Comment Re:Wireless is the future though (Score 1) 115

It sounds like a good idea on the outset, but weather this will actually increase neutral networks through carrier competition depends on 3 things:
1. Lock in: Google has done a pretty good job of fighting against handset lock in, but we will never get past the fact that we have both CDMA and GSM networks, and even the GSM networks don't have the same 3G. So you will never be able to bring your latest and greatest unlocked phone to Verizon from AT&T, for example. Couple this with the fact that most phones have to be "unlocked" even to work on another network with the same protocol and you have a real problem. Even without handset lock in, every wireless provider will require you to sign a 2 year contract, meaning you won't be able to change phone service so easily.
2. Carrier Collusion: When one provider upped the price of texting from 10 cents to 20, every other provider followed suit. They could easily do the same thing by switching off access to Hulu at the same time.
3. Consumer Awareness: If every consumer really makes net neutrality their top priority, than they can affect change with the new competition, assuming there is no lock in and collusion between networks. The problem is, most people care more about the other things, mostly network quality and price. If you spend $75 for provider A's neutral network, but provider B blocks Hulu but gives you an alternative site provided by them, as well as free cable TV and unlimited on demand for as part of a $60 "double play" package, most people will forget their principals and go with the better value.

Comment Re:Central Authority? (Score 3, Interesting) 115

RTFA, but yes:

While Google and Verizon disagree about the degree of authority the FCC has to oversee network management, they seem to concur about the agency's limited powers in other areas. Although Congress has given the Commission oversight over radio and television broadcasters, these mandates should not be transferred over to the Internet, the companies warn. There is "no sound reason to impose communications laws or regulations on the robust marketplace of Internet content, applications, and services."

This whole "Google will work it out with ISPs on a case by case basis" is probably the scariest development in net neutrality in a long time. The only reading I can have of it is that Verizon had something that Google wanted, and they said "not until you change your stance on net neutrality". Net neutrality advocates have lost a big partner here.

Slashdot Top Deals

"Confound these ancestors.... They've stolen our best ideas!" - Ben Jonson

Working...