Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:its not good enough for google (Score 0) 166

Okay, lots of fans for Finland here. Sure, they have some tech industry there. But they are still rural. Name three major metros in Finland, anyone ?? Helsinki, um, um....

Let's compare with Arkansas for instance, shall we ? Anyone want to debate that it is rural ? Anyone want to debate there is tech industry there ? Walmart, UoA RFID research center, Acxiom, Tyson Foods, Arkansas Best Freight -- all major tech consumers & employers.

Cell phone coverage everywhere ? Sure. Running water everywhere ? Probably.

Paper mills ? Yep, got them too. I don't know who designed them, but a paper mill is a big ugly smelly thing that unless otherwised purpposed, will remain a hulking ghost if decommissioned.

Finland is definitely remote relative to the core of Europe, is sparsely populated, and in fact refers to itself as a 'rural European nation' (google "rural finland").

So, I don't undertand what your argument is. Are you just punking on the fact that the guy was making a joke and I tried to turn it serious ? If that's it, then grow up and join the adult table.

If you believe that Finland is the premier urban oasis of Western Europe, maybe you ought to go there & look around for yourself. Then tell me what you think.

Comment Re:its not good enough for google (Score 0) 166

Change is inevitable. I'm pretty surprised to see anyone here taking the luddite stance.

Think of it this way though. Finland is basically rural Europe. Investing in information industry in rural Europe, Google is leading the envelope is spurring information technology job growth in rural areas, where unemployment is highest (definitely true in the U.S. anyway).

Bringing IT workers in usually will raise the general technology if not education level in a given rural setting (see datacenters in South Carolina and Alabama for instance). That will tend to improve school systems and other services to a certain degree. Granted a datacenter isn't a massive employer, but it can start or contribute to a positive trend.

So, converting a mammoth eyesore that can't be profitable in hard industry space to a net job producer ? How can you argue against that ?

Security

Submission + - Social engineering: Are your ID badges showing? (csoonline.com)

SarahS writes: "Johnny Long (of Google Hacking fame, interviewed here) claims that the easiest way to "hack" into a company isn't with a computer — it's by putting on a fake ID badge and walking in the door like you mean it. If no one at your company is actually verifying badges, then too bad for you, the social engineer just got inside. In this excerpt on CSOonline.com from Long's book, No Tech Hacking, the author explains — with photo proof — why it's so easy for social engineers to create fake ID cards. "Traveling in tech circles, I've seen my share of lanyard clutter, but this nice lady took the prize for most neck-flair toted by a female. As I drew closer, I realized that her badge was decidedly governmental in appearance. ... As she continued chatting into the phone, I swung around to the other side of her and stepped in as close as I could without triggering her (admittedly impaired) stalker detection system. Less than a foot away from her, I snapped the photo below. This particular badge is issued to government employees stationed at the Pentagon. The Post-It note reminds her to "bring a copy of yesterday's all hands to DSS H.Q.'""
Security

Submission + - FTC says 8.3 million hit with identity theft (networkworld.com)

coondoggie writes: "The Federal Trade Commission today released a survey showing that 8.3 million American adults, or almost 4% of all American adults, were victims of identity theft in 2005. A Gartner study in 2006 said ID theft victims numbered 15 million victims. Of the 2005 victims, the FTC said 3.2 million experienced misuse of their existing credit card accounts; 3.3 million experienced misuse of non-credit card accounts; and 1.8 million victims found that new accounts were opened or other frauds were committed using their personal identifying information.The survey found that the costs associated with identity theft varied widely. In at least half of all incidents, thieves obtained goods or services worth $500 or less. In 10 percent of cases, however, thieves got at least $6,000 worth of goods or services. http://www.networkworld.com/community/node/22306"
Security

Submission + - Israel to Test Hijacking Warning System

Iphtashu Fitz writes: Starting next year, Israel will be requiring all airlines flying into its airports to use a new system to identify hijacked planes. The system is meant to specifically protect against 9/11 style attacks but can also identify "classic" hijackings as well. Although details are sketchy, pilots will apparently be required to use a Security Code System device that would require a PIN to be entered, and possibly a voice print as well. The device is the size of a credit card and not tied to a specific aircraft. Pilots that fail to input the proper PIN and/or voice print would be denied entry into Israeli airspace, and if they continue would be considered hostile. If a hijacker were to incapacitate the flight crew he would likely not know the PIN and also not have a voice print of the pilot. If the hijacker forces the pilot at gunpoint to enter the PIN and voice print the pilot could simply enter an alternate PIN that would notify air traffic controllers of the hijacking. In either case the device would notify controllers of a dangerous situation much sooner.
Oracle

Submission + - Omar Tazi, Oracle, and Open Source (bmc.com)

An anonymous reader writes: Omar Tazi gave a presentation about Oracle's various open source activities. This blog gives the details for those who weren't there in person. There's some pretty amazing details, aside from running their business completely on Linux, they now boast over 9,000 developers depending on Linux everyday. They've also made contributions to Apache and Eclipse. The blog also covers what Unbreakable Linux is, and is not. Pretty informative overall.

Feed 2 Qubits In Action, New Step Towards The Quantum Computer (sciencedaily.com)

Researchers have succeeded in carrying out calculations with two quantum bits, the building blocks of a possible future quantum computer. Quantum computers have superior qualities in comparison to the type of computers currently in use. If they are realised, then quantum computers will be able to carry out tasks that are beyond the abilities of all normal computers.
Microsoft

Submission + - Leading journals reject Word 2007 files

Jayx writes: Two leading academic journals have said they will not accept manuscripts written in Microsoft's Office 2007 suite. The decision was made because the latest version of Word is no longer compatible with Mathematical Markup Language (MathML), the de facto standard for writing equations in text documents, according to recent notices posted on the Web sites of both Science and Nature journals. In Office 2007, Microsoft's own Office MathML is used for equations. "Because of changes Microsoft made in its recent Word release that are incompatible with our internal workflow, which was built around previous versions of the software, Science cannot, at present, accept any files in the new .docx format produced through Microsoft Word 2007, either for initial submission or for revision," Science journal stated on its site.
United States

House To Vote On Paper Trail and OSS Voting Bill 258

Spamicles writes "A vote is imminent for the bill that is a direct response to problems in the 2006 elections. This legislation would create a paper trail for elections, require a manual audit of every federal election, and open the source code of voting software in certain circumstances. The bill currently has 216 co-sponsors and is expected to be brought to the floor of the House and passed any day."
Intel

Submission + - Intel V8 Octa-Core System, Full Performance Tests

MojoKid writes: In the April time frame, details of Intel's dual-socket 8-core system dubbed "V8" became available but only preliminary performance numbers were shown. The platform consists of quad-core Xeon processors in an Intel 5000X chipset-based motherboard, along with FBDIMM (Fully Buffered DIMM) serial memory. This follow-on article goes into significantly more detail on the platform and showcases many more performance metrics on a Windows Vista 64-bit installation. The POV-Ray and Cinebench 95 benchmark numbers alone are something to smile about.
Networking

Submission + - EVDO For Home Users?

Torrey Clark writes: "With speeds now up to 2.5MBit, will we see more home users choose to use an EVDO service like Verizon Wireless' "BroadbandAccess" where cable or DSL is just out of reach?"

Feed Genome Mapped For Mite-borne Typhus (sciencedaily.com)

Scientists have mapped and analyzed the genome for mite-borne typhus. A highly unexpected finding is that bacteria, too, can have genomes with a great deal of repeated material.

Slashdot Top Deals

THEGODDESSOFTHENETHASTWISTINGFINGERSANDHERVOICEISLIKEAJAVELININTHENIGHTDUDE

Working...