Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Don't Go All-in at Once (Score 1) 452

Key question: do you need to work with MS Exchange? If so, ask yourself whether you have a suitable replacement for MS Outlook. Pretty much anything else, office workers can adjust to, but most live in Outlook. Not being able to identify coworkers, set up meetings, in the familiar way is damn-near an impossible sell. Thunderbird etc isn't really a convincing answer. Of course, if you moved all that onto their personal smartphones first, then the proposition changes...

Comment Re:1980s fuzzy search called (Score 1) 275

a problem for transliterations

Nah, there's no exemption for roman alphabet spelling, they get that wrong too. Not long ago there was a US Secretary of State with a French name "Boucher" didn't get pronounced "booshay", but "bowtshur". This guy must have had the whole of the corps diplomatique giggling inside.

Comment Re:Linux kernel (Score 1) 373

Code quality in the Linux kernel varies a lot per individual driver or subsystem

Well, Linus uses a broader definition of kernel than is customary, referring to a monolithic (macro) kernel. If you really seek elegance in OS code, you start by looking at microkernels, stripped of all the device-dependent clutter. Harmony, for instance was a mere 20 kbyte kernel, even on 68K architectures. http://books.google.com/books?id=xvOpC0_r14wC&pg=PA100 http://www.researchgate.net/publication/234826460_Harmony_as_an_object-oriented_operating_system This led to the even more succinct MQX, which is embedded in quajjillions of devices.http://en.wikipedia.org/wiki/MQX

Submission + - Black Markets For Hackers Are Maturing

An anonymous reader writes: Black and gray markets for computer hacking tools, services and byproducts such as stolen credit card numbers continue to expand, creating an increasing threat to businesses, governments and individuals, according to a new RAND Corporation study. Hacking used to be an activity that was mainly carried out by individuals working alone, but over the last 15 years the world of hacking has become more organized and reliable. In certain respects, cybercrime can be more lucrative and easier to carry out than the illegal drug trade. What makes these black markets notable is their resilience and sophistication. Even as consumers and businesses have fortified their activities in reaction to security threats, cybercriminals have adapted.

Slashdot Top Deals

This file will self-destruct in five minutes.

Working...