Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Worse? (Score 1) 324

This is a complete misunderstanding of the chemistry involved.

Increased dissolved CO2 concentrations (pCO2) make it much HARDER, not easier for corals and shellfish to fix calcium carbonate.

The reaction is:
Ca2+ + 2HCO3- CaCo3 + H2O + CO2
This reaction can go in either direction. It needs to run from left to right to create coral and shells. Increase the concentration of CO2 in the water and you increase the pressure in the other direction (right to left, i.e. dissolution of CaCO3 rather than accretion).

Comment Re:Governmentally Correct (Score 1) 391

I see the email to HR and the council as self-righteous and attempting to undermine my authority.

I see a "reply all" in a situation like this as friendly and open discussion - as long as it is diplomatically worded and not in legalese. A private email to me or (separately) to the person who sent the email would also be good, but further action would then be needed to undo the damage. If was anonymous, it would signal a lack of trust, which I'd find disturbing, but understandable.

Comment It isn't a question of sympathy (Score 1) 646

The question isn't whether you have sympathy for the companies and individuals who will be directly affected. The question is: how much will YOU be affected by all the companies and individuals who are too lazy or ignorant to take steps 1,2 or 3? Might you have given your credit card details to one of those companies? Might you depend on another in some business sense? Might a few tens of thousands of those individuals have their computers turned into parts of botnets that will be used to attack your systems, or systems you rely on?

Censorship

Submission + - Anonymous Wants To Take Down The Great Firewall of China 1

An anonymous reader writes: Anonymous China has hacked and defaced hundreds of Chinese government, company, and other general websites to the point where China even acknowledged the attacks. The hacking has continued against various websites, but even more importantly, the group has declared a new target: the so-called Great Firewall of China.

Comment Re:There's an easier answer ... in fact several (Score 1) 391

Really, just report them (#2). There's nothing they can do in retaliation without it costing them $$$.

Sure they can. They can give lukewarm (accurate but unenthusiastic) performance evaluations and references. They can choose not to put your name forward when asked to identify rising stars to whom others in the organization should be paying attention. They can listen less carefully to the proposals you put forward and give your training requests just a little less priority. They can not invite you to after-work drinks where you'd hear about opportunities ("Z will be putting out a call for proposals next week - get started now if you have an idea, because you won't have much time once the call goes out") or the kind of office gossip that could help you to work around office politics (e.g. "X doesn't get on with Y, so don't get Y involved if you want X's support on a project"). It happens all the time. It can happen without them even setting out to give you a hard time, or realizing that they are doing it. If you don't get out quickly, it's enough to jettison a career.

Comment Re:Governmentally Correct (Score 1) 391

I guess you'd need to know the personalities involved.
If someone on my team sent the email you suggested, I'd tag them as hostile, difficult to work with, not to be trusted, and a game-player. Yes, I'd be scrabbling to put out the fire and make sure Marketing knew it had done the wrong thing, but I'd also be looking for ways to avoid having to rely on the person who had sent that email in future. Am I oversensitive? Perhaps, but I'd be anticipating trouble from them.

If someone on my team sent the version I suggested, I'd say "Yeah, good catch. Thanks." I'd make sure it was passed on to whoever had sent or received the original email, if they hadn't already seen it and hope that was the end of it. Am I working in an organisation that would encourage astroturfing in the first place? No, but I have to believe that most people in management even in those companies - like most people anywhere - are just trying to get by and do the right thing.

Submission + - Student president candidate brings paid astroturfing to higher education 1

grimsnaggle writes: Stewart MacGregor-Dennis, a candidate for Stanford student president, has brought paid astroturfing to higher education. An unofficial Stanford blog post outlines the extent of his antics, including purchasing more followers than the sum total of the Stanford student body. Astroturfing is for more than customer reviews, it seems.

Comment Re:Depends on how you type it... (Score 2) 391

This strikes me as a very aggressive email and would only be appropriate if the work environment is already strained and management has shown that it can't be trusted to handle suggestions or discussion in a fair and open manner. Escalating the matter to HR and the general council before even opening a discussion is hostile.

Better to clarify first, go in friendly and assume ignorance rather than evil is behind the request. Maybe "reply all" something along the lines of "we might want to be careful since this could be seen as astroturfing [link to wikipedia article]. Honest recommendations of the app from those who use it are a good, but let's not go too far."

Submission + - Niceness May Largely Be Determined by DNA

An anonymous reader writes: Human kindness has traditionally been regarded as something people learn through experience, but scientists have discovered that some people are actually born with genes that predispose them towards niceness. Past research found that levels of oxytocin and vasopressin hormones influence how people treat one another, especially in close relationships.
Encryption

Submission + - Super-privacy-protecting ISP in the planning (cnet.com)

h00manist writes: Nicholas Merrill ran a New York based ISP and got tired of federal "information requests". He is planning another ISP, which would be built from the ground up for privacy. Everything encrypted, maximum technical and legal resistance to information requests. Merrill has formed an advisory board with members including Sascha Meinrath from the New America Foundation; former NSA technical director Brian Snow; and Jacob Appelbaum from the Tor Project. Kickstarter-like IndieGoGo has a project page.
Privacy

Submission + - Polish Authorities Abuse Access to Users Data

bs0d3 writes: In 2011, Polish authorities requested users' traffic data retained by telcos and ISPs over 1.85 million times-half a million times more than in 2010. Poland's data retention law allows authorities to use the retained data in an almost limitless range of scenarios, including petty civil offenses and minor criminal investigations. Moreover, Polish authorities-ranging from law enforcement to intelligence agencies-can access the retained data without independent oversight and at no cost. Law enforcement agencies have no obligation to inform citizens that their privacy has been compromised.

The Polish data retention law mirrored the 2006 European Data Retention Directive and is very similar to some aspects of CISPA. As in Poland, people everywhere are constantly relying on mobile companies and cloud services to communicate and store their most precious information on the network. We are leaving digital footprints at every moment that reveal the most sensitive information of our daily lives. As a result, governments are increasingly interested to access this vast amount of information.
HP

Submission + - HP Ships Switches With Malware Infected Flash Cards (securityweek.com)

wiredmikey writes: HP has warned of a security vulnerability associated with its ProCurve 5400 zl switches that contain compact flash cards that the company says may be infected with malware. The company warned that using one of the infected compact flash cards in question on computer could result in the system being compromised.

According to HP, the potential threat exists on HP 5400 zl series switches purchased after April 30, 2011 with certain serial numbers listed in the security advisory.

This issue once again brings attention to the security of the electronics supply chain which has been a hot topic as of late. In March 2012, a consortium of experts published a preview of standards meant to improve the security of the global supply chain for commercial software and hardware products. The standards are the work of The Open Group, and are supported by companies ranging from Boeing to Oracle to IBM.

Science

Submission + - Non-Newtonian Fluids Fill Potholes (sciencemag.org) 1

sciencehabit writes: So-called non-Newtonian fluids are the stars of high school science demonstrations. In one example, an ooey-gooey batter made from corn starch and water oozes like a liquid when moved slowly. But punch it, or run across a giant puddle of it, and it becomes stiff like a solid. Now, a group of college students has figured out a new use for the strange stuff: filler for potholes.
Microsoft

Submission + - End of Windows XP support era signals beginning of security nightmare (networkworld.com) 1

colinneagle writes: Microsoft’s recent announcement that it will end support for the Windows XP operating system in two years signals the end of an era for the company, and potentially the beginning of a nightmare for everyone else.

When Microsoft cuts the chord on XP in two years it will effectively leave millions of existing Windows-based computers vulnerable to continued and undeterred cyberattacks, many of which hold the potential to find their way into consumer, enterprise and even industrial systems running the latest software.

Although most of the subsequent security issues appear to be at the consumer level, it may not be long until they find a way into corporate networks or industrial systems, Miller says.

Even scarier, Sarwate says many SCADA systems for industrial networks still run a modified version of XP, and are not in a position to upgrade. Because much of the software running on SCADA systems is not compatible with traditional Microsoft OS capabilities, an OS upgrade would entail much more work than it would for a home or corporate system.

Slashdot Top Deals

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...