Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment K-Meleon (Score 1) 475

I'm posting this using K-Meleon on an old notebook with minimal memory (256 MB...with a bunch of that allocated for the video). K-Meleon is built on the Mozilla Gecko engine.

It's fast, stable, and lightweight. You won't see a lot of CSS3 effects, but otherwise, it's a fine small footprint browser, even for a tab-heavy user like myself. You can use a number of older Firefox extensions with a little work, and it responds to the usual Firefox performance tweaks as well.

Comment Re:Why do you do it? (Score 1) 227

I did an advertisement for a business a couple of years ago using an image we found on Flickr. The photography was great, the subject matter was perfect for our theme (relating to a sci-fi collectibles business), and the ad was successful.

Our approach was a little different, however.

First, we contacted the owner of the photo to get permission. Our attitude going in was that we were planning to use this for commercial purposes, so we offered to pay the person a competitive rate for their work (much to their delight). We negotiated payment and put the photographer's name in the ad.

In the end, we ended up with a loyal customer who brought more friends to the business, and a fun, memorable ad.

So, sure. I'm in favor of people sharing their photos. And if you enjoy someone's work enough to want to use it commercially, why not get permission and offer reasonable compensation? There's a chance you'll build a good relationship, and you'll encourage them to do more work.

Honestly, it seems like it would be more costly to rip them off. The initial work might be free, but the potential lost revenue from angry customers and would-be customers would probably more than offset any savings.

Submission + - Superhero move may save black holes from nakedness (newscientist.com)

An anonymous reader writes: NewScientist reports that black holes may dodge the speeding "bullets" that would otherwise strip them naked – and pose problems for Einstein's theory of general relativity.

Submission + - Exactly what data do ISPs record? (bbc.co.uk)

An anonymous reader writes: In this article (BBC) it is stated that a 'spy' working for GCHQ/MI6 who was found dead in his flat, in suspicious circumstances had "occasionally spent between 30 minutes and an hour on bondage sites". How exactly did they gather this precise information? How can the time spent on a particular site be recorded, for example in the user's history: clock starts from initial click on Site A — Link 1 to finishing at Site A — Final Link Clicked? Or would this data have been provided by the ISP?
Wireless Networking

Submission + - FCC On Net Neutrality (softview.co.in)

srimadman writes: FCC's major net neutrality decision today, but the Commission hasn't actually released the full text of the order yet, specific reasons the FCC gives for regulating wireless broadband more lightly than wireline is the release of Android.
Piracy

Submission + - RIAA, MPAA recruit MasterCard as Internet Police (myce.com) 1

An anonymous reader writes: Two weeks ago, MasterCard felt the wrath of Anonymous Operation Payback-style DDoS attacks after refusing to process payments that were intended to fund WikiLeaks, the website which began leaking confidential US diplomatic cables last month. Now, the company is preparing to head down another controversial path by pledging to deny transactions which support websites that host pirated movies, music, games, or other copyrighted content.

MasterCard lobbyists have also been in talks with entertainment industry trade groups, including the Recording Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA), and have made it clear that the company will support the Combating Online Infringement and Counterfeits Act (COICA), sources close to the talks have said.

Submission + - Bee disease breakthrough (bbc.co.uk) 1

moorhens writes: The BBC is describing new research that could save honeybees from the deadly Varroa mite. Unlike other treatments that have to balance the prospect of killing the mites against killing the bees themselves, this uses a genetic switch to turn the mites into their own worst enemy. Worldwide, the Varroa mite has been ravaging honeybee populations, either as a result of direct parasitism or by transmitting viruses. If this research does result in a practical medicine for bees, perhaps this will provide an answer to colony collapse disorder that has been decimating US bees. In Europe, we haven't had CCD (whatever you may read elsewhere), but Varroa alone is enough to wipe out an untreated colony in three years.
Censorship

Submission + - Spanish Web Censorship Voted Down (zeropaid.com)

Dangerous_Minds writes: ZeroPaid is reporting that a part of the Sinde Act (named after Spanish filmmaker and Culture Minister Ángeles González-Sinde) which would allow the Culture Ministry to force ISPs to block websites suspected of facilitating copyright infringement, was voted down recently in Spain. This comes on the heals of Wikileaks exposing the amount of pressure US industry was putting on Spain to implement laws like the three strikes law seen in HADOPI in France. The Asociación de Internautas (Assocation of Internet Users), an organization who called the legislation an assault on Spanish democracy, is currently celebrating the news as a victory for Spanish democracy (Spanish).
Google

Submission + - Is Apple mimicking Google by planning to expand vo (dbune.com)

dbune writes: Speculation is rife that Apple is planning to expand the voice-based actions on their devices. As of now, iPhone has very limited voice-based actions, which are very basic to say the least. And on the other hand, Android users have a range of voice-based actions at their disposal. Google has steadfastly been expanding their capability of Voice Search and Voice Actions. Voice commands can be used for...
Transportation

Submission + - Boeing, Boeing ... Gone? 1

Hugh Pickens writes: "The Seattle Times reports that as Boeing prepares to announce yet another delay for the 787 Dreamliner — at least three months, possibly six or more — the crucial jet program is in even worse shape than it appears with problems go well beyond the latest setback, an in-flight electrical fire last month that has grounded the test planes. Meanwhile, on the production side, one veteran employee on the 787 said he's witnessing "the perfect storm of manufacturing hell." The global supply chain is at a standstill, and outside the Everett factory the rows of partly finished jets will take many months to complete. "The purpose of flight tests is to find out what you did wrong," says a senior engineer who expects the 787 will ultimately prove successful. "But the amount of stuff we are finding is horrible. We shouldn't be dealing with this many issues this late in the program." Jon Talton writes that Boeing has bet the company on the Dreamliner and now faces cost overruns of $12 billion or more. "The experience of doing the 787 on the cheap with a globalized supply chain should shake the foundations of "Welchism," the brutal management style, intimidating anti-employee bias and mania for quick results of retired General Electric chief executive Jack Welch," writes Talton. "Boeing is running out of time to ensure its "game changer" doesn't change the game permanently in favor of Airbus and new competitors.""
Microsoft

Submission + - Microsoft: mules, not phishing victims, lose money (microsoft.com)

An anonymous reader writes: Our examination of mules has interesting implications. First, it suggests that it is not the victims of phishing and keylogging that lose money but money mules. Second, mule recruitment is the major bottleneck in the fraud pipeline: without them stolen credentials are worth little. Third, this explains why credentials sell for small fractions of their face value; i.e. there is an insufficient supply of mules to drain the number of compromised accounts. Finally, it shows there is no shortage of compromised accounts. Thus a reduction in the rate of account compromise will not reduce fraud at all, at least until account compromise is at a level small enough that it becomes the bottleneck. The only effective way to reduce online fraud is by making mule recruitment even harder.
Security

Submission + - How Can the Independent Media Defend from DDoS? (net-security.org) 2

Orome1 writes: Thanks to the attacks executed by hacktivist group Anonymous against sites of companies that have (in their eyes) wronged WikiLeaks, the DDoS attack has once again become a well-known method of temporarily silencing one's opposition and crippling its agenda or preventing it to reach its economic goals. And it's not just a method reserved for loosely formed groups of like-minded individuals who share a common goal, but has also been very effectively used to target independent media and human rights sites such as Survival International and many others.

Submission + - Your brain on autocomplete (bigthink.com)

another similar writes: In a society where innate math skills were killed by the calculator 40 years ago and the Oregon Department of Education recently decided that students can use spell check [oregonlive.com] on state writing exams, it's interesting to see how autocomplete drives our thought/search patterns.

In The United States of Autocomplete [BigThink.com], Frank Jacobs walks through autocomplete suggestions for each of the 50 states with some interesting/funny/scary results. The autocomplete for Kentucky is Kentucky Fried Chicken (no surprise), while Michigan is Michigan Football (well, maybe this time of year). The autocomplete for Oregon is Oregon Trail, but given their latest pronouncement, they'll likely accept Oregon Trial, as well.

Completing a similar experiment for China provided some oddities (Inner Mongolian UFO, Beijing traffic jam) and one that had me laughing — the autocomplete for the city/state of Macau is Macauly Caulkin. Ouch.

Science

Submission + - Genome Sequencing Time can be Reduced to Minutes (thinq.co.uk)

Stoobalou writes: DNA unravelled while you wait

Scientists from Imperial College London have patented technology which could unravel the human genome in minutes.

Current tools which sequence DNA are incredibly complex, time-consuming and expensive but new research suggests that, within ten years, the entire human genome could be sequenced in minutes and at a fraction of the cost.

Slashdot Top Deals

Remember to say hello to your bank teller.

Working...