Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:It has to happen (Score 5, Insightful) 154

Just a thought. Forget actual failure. What happens when they have IP data or licensed data that is being hosted by a cloud provider, or company to company lawsuit. Court case starts. Could or would they they seize all computers / servers that could house the data? What would happen to the other peoples data that resides on the same physical hardware?

Comment Re:ALL IS GOOD !! (Score 2) 270

Speaking of you can post your own petition. Here goes! https://wwws.whitehouse.gov/petitions/!/petition/congressional-reform-act-2011-congress-must-equally-abide-all-laws-they-impose-american-people/s3DTkzrl sopa had senators back of because enough people took notice. If more then just 25K sign it shows we are looking and paying attention.

Comment Re:Smeagol (Score 1) 722

You do understand the these same people who are now fighting for budget cuts before approving to raise the debt ceiling are the same people that voted and approved the spending to begin with? House votes to approve spending on items. Then the credit card that this was put onto is now coming due. So now the tea party wants to put controls on spending??? What happened to when the budget was up for voting, did they miss that part?

Comment Same old story (Score 1) 307

This has always been Apple's business model. In the past they did the same thing with their computer business. If you want to make an application to run on our computers you owe us a cut. So all programmers went over to pc / dos. No cut. Fast forward and pc / windows has major market share of the business. They lost the computer war doing this business practice. Why do they think its going to work again this time? I expect we will be seeing history repeating its self.

Comment Re:I'm not sure I like this... (Score 1) 58

That is also why in your contract with your marketing agency (fly by night or not) that you say no spamming allowed and if that is broken, the contract has liability and penalties for the marketing agency. The purpose of that contract is so if you get sued for spamming then you pass those cost to the marketing agency that actually performed the action. It is all standard when dealing with a 3rd party vendor in business.

Comment Re:Healthcare (Score 2, Insightful) 235

WAY off topic but.
Actually they are not in charge of health care. It is called regulations. The same kind that they used to have on the banks, before they removed them and it all went to hell. The same kind that used to be on CC and how much they could charge you interest, before they removed that then everyone got to see rates from 20% to 30%.
It is and only will be health insurance regulations. but you just keep on believing that its a take over and its all going to come out bad for you.
Start using your brain and stop living in a world of wordsmiths.

Comment Re:Associated costs (Score 4, Informative) 475

The big difference between lawyer and most other skills is that as a IT person someone asks me for advice, I am not held accountable.
A lawyer who is asked for advice by the very nature of answering is giving "Legal Advice" and can be held accountable even if it is in the setting of a party or casual question.
Makes it a lot harder for a lawyer to just answer a quick easy question.

Comment Re:When will Apple learn... (Score 1) 298

When will apple learn what they should have learned in the 90's.
DOS, Windows, vs Apple.
Apple: Must pay us royalties to make software for our system. Must play by our rules. Etc...
Dos: Anyone can make software for our systems. You market and sell it, it is all yours!!!

Dos , Windows Major market share Apple ....

Comment Re:Cap (Score 3, Informative) 423

That idea that they learned is a joke. here is a quote from a news site comparing the BP blow out to an earlier one.

79 Mexico oil spill
Attempted Fixes

# They attempted to put a cone over the top, calling it operation Sombrero (as oppose to Top-Hat)

# They attempted to plug up the leak by pumping rocks, mud and seawater into it

Pemex pumped cement and salt water into Ixtoc for months before finally bringing the runaway well under control and sealing it with cement plugs.

Pemex's scramble to come up with other solutions while the relief wells were being drilled will sound familiar to those who have followed BP's efforts to stop the oil gushing out of its ruptured well.

Divers tried to manually operate the blowout preventer but this effort was unsuccessful and over the next several months Pemex tried a variety of solutions, including a plan to force metal spheres into the well to cut the flow of oil and lowering a steel structure over the spill to capture the crude.

BP is trying similar schemes but the huge water depth it is operating at is vastly complicating its efforts.

Does any of that sound like BP learned anything from an almost exact issue as theirs?

In both cases natural gas flowed unnoticed into the well being drilled, causing an explosion. In both cases a critical piece of fail-safe equipment -- the blowout preventer -- failed. And in both cases the operators struggled to quickly staunch the flow of oil into the Gulf of Mexico.

Here are some links.
http://www.reuters.com/article/idUSTRE64N57U20100524
http://caps.fool.com/Blogs/an-identical-oil-spill/399603

Comment Re:uhhh (Score 1) 545

OK 2 issues.
1) he kept the default password - bad on him
2) they broke into his router with out his permission - bad on them.

Last time I checked if I see that a school website has a default SA password and I log in and change it to a secure password.
I then send them an email stating hey you had the default so I changed it. Here is the new password. If I remember correctly no matter how much better it was for the greater good, the cops still show up and arrest me. I still go to PITA prison. I still get sued by the school for breaking into their network.

How is this any different no matter what he password he had on his router?

Submission + - Apple: 400 iTunes Accounts Hacked (pcworld.com)

jriding writes: Apple now admits 400 iTunes accounts were hacked and used by a Vietnamese developer, Thuat Nguyen, to push his iPhone apps to best seller status over the weekend. But here is the zinger; Apple is saying it was no big deal. Four hundred accounts equals 0.0003 percent of the over 150 million iTunes account holders, Apple points out.

The downplaying of the hack comes as little consolation to many who believed Apple's walled garden would offer protection from rogue developers and hackers. After all, Apple runs a very tight ship when it comes to the App Store. (See related: Apple's iPhone App Fraud: Where Were the App Police?)

Slashdot Top Deals

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...