Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:They ruined what made it successful already. (Score 1) 87

LinkedIn's value early on was that people added their real life connections.

I disagree. I saw no value with LinkedIn. I don't need to duplicate my real life connections at an online service that can then sell that information or harass my connections with solicitations.

It grew when recruiters started friending everyone they contacted so their search network could grow.

This was the exact moment I dumped LinkedIn... when recruiters started trying to harvest contact info for my former employers out of me. They already do that in the real world. I don't need to get twice as much of their bullshit.

Comment Re:It would be an error code (Score 3, Informative) 255

Just to clarify, if a web site is being blocked, then that web site can not send an error page to the client making the request.

The error would come from whichever device is blocking the web site, and it would prevent forwarding of any data packets to the blocked site. The blocked site can't return an error page because it has no way of knowing someone trying to access it was blocked. Whatever device is doing the blocking is the one that can send an error code, if at all.

Returning an html error page would be entirely optional, and I seriously doubt whomever is doing the blocking would give a rat's ass about a fancy custom error page. If they did, it might make for a nice amplifier in a DDoS attack. ;-)

Comment Re:Dog and cats! Living together! Mass hysteria!!! (Score 1) 416

New technologies have allowed us to incentivize the mining of prior cost prohibitive oil fields.

You do realize that your statement illustrates exactly what happens when you hit peak production of any limited resource, don't you? The invisible-hand-of-the-free-markets don't spend money on developing new technology to better extract resources if those resource cheap and abundant to get to.

Comment Re:Encryption: (Score 1) 505

To avoid the direct link between two people, avoid the direct link between two people.
Person 1 posts it into a group. Posting can be done in plain text, in code, inside a binary or just something like "John has a big moustage"
Person 2 reads this message and knows it is time to do whatever he needs to do. Or he replies in yet another group as a reply. e.g. an image of cat, that means he agrees.

The weakness with this kind of communication is that at some point before the sending of the signals, the meaning of the signals has to be communicated. But interception of that point of communication that reveals relationships and makes later communications easier to detect and decipher.

Comment Re:Not fully open source (Score 1) 98

Help me out here. The Adapteva sales pitch is claiming you get faster time to market by not having to do any FPGA programming (ANSI-C and OpenCL for the multicore coprocessors). The Zynq processor seems to be just for the host OS, which they say can run Ubuntu out of the box and they provide open source development tools for everything else. No mention of Xilinx anywhere that I can see. Am I missing something?

Comment Re:Better plots? (Score 1) 1029

...or maybe it is something else like social media. I've noticed recently that more of my friends post their opinions on new movies and when they pan something, their friends listen and don't bother going to see the film themselves. True, this happened before social media, but now I think these reviews by friends reach more people in a shorter period of time and are much more effective than a review by a paid movie critic.

Comment Re:I'm amazed... (Score 4, Informative) 1737

You mean kind of like this case where a black woman, in the same state as Zimmerman, fires two warning shots in the air when an ex-husband she had a restraining order on because he had a history of violence, gets 20 years in prison and no one was hurt! And to add insult to injury the judge refused to let her use the Stand Your Ground law as her defense!

Submission + - Business is Booming in the 'Zero-Day' Game

HonorPoncaCityDotCom writes: Want to be a millionaire? Forget about writing the next killer Andriod app as Nicole Perlroth and David E. Sanger write in the NY Times that all over the world, from South Africa to South Korea, business is booming in “zero days,” the coding flaws in software like Microsoft Windows that can give a buyer unfettered access to a computer. The average attack persists for almost a year — 312 days — before it is detected, according to Symantec, the maker of antivirus software. Until then it can be exploited or “weaponized” by both criminals and governments to spy on, steal from or attack their target. Ten years ago, hackers would hand knowledge of such flaws to Microsoft and Google free in exchange for a T-shirt but increasingly the market for 0-day exploits, has begun to migrate into the commercial space (PDF) as the market for information about computer vulnerabilities has turned into a gold rush. Companies like Vupen charge customers an annual $100,000 subscription fee to shop through its catalog, and then charges per sale. to countries who want to use the flaws in pursuit of the kind of success that the United States and Israel achieved three summers ago when they attacked Iran’s nuclear enrichment program with a computer worm that became known as “Stuxnet.” Israel, Britain, Russia, India and Brazil are some of the biggest spenders but North Korea is also in the market, as are some Middle Eastern intelligence services. "If someone comes to you with a bug that could affect millions of devices and says, ‘You would be the only one to have this if you pay my fee,’ there will always be someone inclined to pay it," says Howard Schmidt, a former White House cybersecurity coordinator. “Unfortunately, dancing with the devil in cyberspace has been pretty common.”

Submission + - What Medical Tests Should Teach Us about the NSA Surveillance Program

Davak writes: In many ways finding the small amount of terrorists within the United States is like screening a population of people for a rare disease. A physician explains why collecting excessive data is actually dangerous. Each time a test is run, the number of people incorrectly identified quickly dwarfs the correct matches. Just like in medicine, being incorrectly labelled has serious consequences.

Submission + - Whistleblowing IT Director Fired by FL State Attorney

An anonymous reader writes: Ben Kruidbos, the IT director for the Florida State Attorney's Office who'd spoken up when important cellphone evidence he'd extracted from Trayvon Martin's cellphone was withheld by the state from the defense, was fired by messenger at 7:30 PM, after closing arguments in the Zimmerman case. He was told that he could not be "trusted to set foot in this office," and that he was being fired for incompetence. Kruidbos had received a merit pay raise earlier this year. The firing letter also blames him for consulting a lawyer, an obvious sign of evil.

Comment Re:Patents cause progress stoppage (Score 2) 87

The music industry is a good example of that. With a single song you have a copyright for the owner of the musical score and a copyright for the owner of the lyrics (not necessarily the creators of the music and lyrics or the same owner for both). If anyone performs the song, you would need to pay a license fee to the owners for 75 years beyond the death of the author in some cases (often the owner had nothing to do with creating the music and none of the licensing fees go to the real artists or their families).

Next, you have a phonogram copyright on recordings of a performance (donated by a circle with a letter P inside it). This is the one that can go on forever. Record companies can release new copies of old music just before the old recording's copyright expires. The license fees to the owner of the song were already paid for the original performance, and since they are just re-releasing the same performance they don't have to pay another license fee. But they can claim a new extension to the phonogram copyright.

So, say you digitize a record whose copyright has expired and give it away for free on the internet. Record companies can muddy the waters enough to claim you just copied one of their re-releases instead of a public domain record. You are guilty until you can prove yourself innocent.

On the other hand, record collectors would say that without this behavior, old public domain recordings would be lost forever.

Comment Re:It's a about money. (Score 3, Interesting) 211

In the early 1980's the BBC made a drama called "Threads" which had occasional narration interrupting the story to explain the science behind the effects of nuclear war. Anyone who thinks nuclear war is winnable, or that we've never had enough nukes to destroy the world should watch it... the entire thing.

There are no lone-wolf heroes or other typical US movie industry bullcrap, just cold, stark, depressing realism. You can watch it for free on YouTube....

http://www.youtube.com/watch?v=_MCbTvoNrAg

Slashdot Top Deals

The optimum committee has no members. -- Norman Augustine

Working...