Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:It is curious... (Score 1) 764

To take your excellent idea on profiling and expand it. Maybe Amazon found that dealing with government requests about those books was too expensive, and thus chose to stop selling them so they would have fewer government requests to deal with?

Image

Winnie-the-Pooh Parodied In Wookie-the-Chew 58

pickens writes "Erik Hayden writes in the Atlantic that children will see endearing portraits of Chewbacca rendered in the style of "Winnie-the-Pooh" in the book of drawings "Wookie the Chew," a tribute to the combined genius of George Lucas, A.A.Milne and E.H.Sheppard, by artist James Hance released on September 1st. Samples from the book are available at Hance's web site. Hance bases his right to parody Winnie-the-Pooh on Fair Use as parody under which certain uses of copyrighted works, which would otherwise be considered infringing, are permissible. Interestingly enough, the rights to the original Winnie-the-Pooh were the subject of an 18-year feud in which Walt Disney corporation fought off a challenge to its ownership of the rights ending in 2009 when a judge in Los Angeles struck out a claim against Disney lodged by the family of Stephen Slesinger, a comic book pioneer who bought the copyright to Pooh in 1930 from the bear's British creator, A.A. Milne. Stories of Pooh's adventures were originally created by Milne in the 1920s, based on a toy bear owned by the author's son, Christopher Robin."
Security

Malware Targets Shortcut Flaw In Windows, SCADA 214

tsu doh nimh writes "Anti-virus researchers have discovered a new strain of malicious software that spreads via USB drives and takes advantage of a previously unknown vulnerability in the way Microsoft Windows handles '.lnk' or shortcut files. Belarus-based VirusBlokAda discovered malware that includes rootkit functionality to hide the malware, and the rootkit drivers appear to be digitally signed by Realtek Semiconductor, a legitimate hi-tech company. In a further wrinkle, independent researcher Frank Boldewin found that the complexity and stealth of this malware may be due to the fact that it is targeting SCADA systems, or those designed for controlling large, complex and distributed control networks, such as those used at power and manufacturing plants. Meanwhile, Microsoft says it's investigating claims that this malware exploits a new vulnerability in Windows."

Comment Re:Practicality (Score 2, Interesting) 251

I agree that you want to have your team working together. But what about the idea of "come up with you you think this should work". By coming at it from different perspectives there are more possibilities to come up with something interesting.

Ideally you could blend the best ideas from both. That said, in many ways this isn't practical from today's business perspective, where resources are so thin, that you can barely get one fully staffed team.

Comment Re:CC (Score 1) 467

I was going back to school to become a teacher. In so doing I had to take a Trig course. I did so online from my local community college. It really refreshed my math skills (that were ~20 years old).

Keep in mind I had taken through Series and Diff Eq. in college, so I had mastered the material previously. (Don't ask why I needed trig. in spite of having had the upper level courses. Just a magic hoop to jump through).

-Chris

Comment Re:Of course not. (Score 1) 338

But what if my code is compiling, I'm running an import script, and checking code into source control as I answer the poll? Could I be "working" in that case?

Also, there are studies that distractions from tasks help creativity. If your consciousness is distracted, but you sub-conscious is working on the problem, are you working?

Any company that pays me to answer slashdot polls also is probably paying me to click on Google Adsense web sites to drive up revenue.

Not sure I would want that job. Pay may not be the best.

Networking

Nmap 5.20 Released 36

ruphus13 writes "Nmap has a new release out, and it's a major one. It includes a GUI front-end called Zenmap, and, according to the post, 'Network admins will no doubt be excited to learn that Nmap is now ready to identify Snow Leopard systems, Android Linux smartphones, and Chumbies, among other OSes that Nmap can now identify. This release also brings an additional 31 Nmap Scripting Engine scripts, bringing the total collection up to 80 pre-written scripts for Nmap. The scripts include X11 access checks to see if X.org on a system allows remote access, a script to retrieve and print an SSL certificate, and a script designed to see whether a host is serving malware. Nmap also comes with netcat and Ndiff. Source code and binaries are available from the Nmap site, including RPMs for x86 and x86_64 systems, and binaries for Windows and Mac OS X. '"

Slashdot Top Deals

Real Programmers don't eat quiche. They eat Twinkies and Szechwan food.

Working...