Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Easy (Score 1) 395

Yea dont mix personal and business.

Make the laptop minus its hard dusk, business.
The hard disk, you replace with your own. I am working on such a laptop.
If the company wants their laptop, and its data, they get the old HD with the pristine
software install. NOT my hard disk, that I paid for.
( it was dirt cheap, and I can do the sway myself ).

If they suponea it, I drop my hard disks in battery acid.
OPPS. Sorry, I lost all my data...( offsite back ups? I may know who has them, but certinally not where...)

And every time I have a valuable brain fart, on my time,
I email myself, with a date stamp.

If I was working in such a nazi IP environment, Id start looking at the door,
and how to get out. ( The last company I worked for that had this kind of envionment? Down to 2 employees from 175)

Comon..... Suponea me! Look! The machine is BRAND NEW? I never touched it, except for the high score on Solitare....

Comment Re:Why? (Score 0) 169

VMS => Yes, and Multics too. ( Your forkin A right )

Windows => "Worthless coagulated clot of speghetti." That would be a no.
Windows should not be 'preserved' it should be "Castrated so it doesnt pass on its genes to future generations" -Hunter S Tompson

ReactOS => Mabye.

Plan9 => YES!

ONX => Possible.

Tron. => Insert Quarter for next game

zOS = Which one? Zos ZOS or zOS? This one is a little forkin crazy.

Comment Re:Why? (Score 4, Insightful) 169

Overgeneralization.

Old source code gives us ideas, like looking at the design philosophy behind the code, and the ultimate operation of the software. These are actually *priceless* artifacts, and since they are mostly digital ( reserive the right for first pun... they are 'Digital' ), the study and the disemination of the early code is of extrodinary value to coders and software architects.

Of course its also invaluable to have their nemisises Multics and VMS alos preserved. I personally got an enourmous amount of respect for K&R reading the source code for the kernel (the V4), and the proto compiler. K&R, and the linux/GNU write well, wereas their MS counterparts wirte pretty crappy stuff.  I would also venture to guess that the code alone can serve as an example of how to write code.

I will look forward to taking a detailed 'History of the UNIX Kernel' class in the near future.

Comment Horse_Rubbish (Score -1, Flamebait) 316

It is ABSOLUTE Horse rubbish. complete and utter balderdash. There are Sooo many examples of how this is completely false. $100,000,000? Get a superdome. Duh! It has a OC-48 plug on the back, and enough backend communication hardware ( at System bus speeds ) to get a lot of syncing of the shards.

Perfect example is Dungeon Siege. Seamless, can possibly have a lot of users, and developed for a lot less than $100,000,000.

This guy is just complaining about EVE. Get a LIFE!

But finally, what is your world going to look like, either they are going to trash the place like PYST, or they are going to be so far apart, it will be like walking in the desert.

"The team is hard at work building our first release..." Ahh this guy is just looking for venture capitol. Buy NCSoft and start with the code base for Tabula Rasa. Geez...seems like this guy has a petulance for NIH!( Not invented Here ) and MMR ( Make Me Rich! )

Books

Digitizing Literary Treasures Leads To New Finds 132

storagedude writes "The WSJ has a cool article on how the race to digitize literary treasures has led to a trove of new discoveries. Quoting: 'Improved technology is allowing researchers to scan ancient texts that were once unreadable — blackened in fires or by chemical erosion, painted over or simply too fragile to unroll. Now, scholars are studying these works with X-ray fluorescence, multispectral imaging used by NASA to photograph Mars and CAT scans used by medical technicians ... By taking high-resolution digital images in 14 different light wavelengths, ranging from infrared to ultraviolet, Oxford scholars are reading bits of papyrus that were discovered in 1898 in an ancient garbage dump in central Egypt. So far, researchers have digitized about 80% of the collection of 500,000 fragments, dating from the 2nd century B.C. to the 8th century A.D. The texts include fragments of unknown works by famous authors of antiquity, lost gospels and early Islamic manuscripts.'"
Businesses

Why Game Exclusivity Deals Are Feeding the Hate 205

Parz writes "The recent announcement that the upcoming Ghostbusters game will be a timed PlayStation exclusive in the PAL territories — revealed a mere month before release — has set a nasty precedent which could have long-term repercussions for the industry. This Gameplayer article explores how this generation of gaming has spiraled into a tit-for-tat war on third-party exclusivity deals instigated by Sony and Microsoft, and the effect it is having on the psychology of the consumers. The Ghostbusters developers aren't pleased by Sony's deal, and the Guardian questions whether the game will be big enough to really affect console sales."

Comment Re:Difficult? (Score 1) 315

But what are all those business users to do who want to run their legacy Windows 2000 apps? Hmm. They will find a way to run legacy Windows 2000 apps that 1) rely on some over priced virutalization technology that will be buggy and late, while spending other peoples money, or 2) some tech will dream up a solution, will cost the company nothing, the CIO wont know how its done, they'll piss the techie off, by cutting off his free carrot juice, he'll leave, and they will switch to plan 1).

I have yet to see a legacy app ( with the important exception of the Oakland Dept of Justice ) that cannot run well or better under Windows 2000, and/or be supported unter its terminal services. It took Microsoft 9 years to get the software to be as good as it gets. Most of the third party virtulization products are good, and the free ones are great. The underlying OS is still Microsoft's and still not very secure, ( Just kicked a trojan off a companies server :), but it works well for the most part.
Google

Google Urges National Inventory of Radio Spectrum 79

Hugh Pickens writes "Google, the wireless industry, and consumer advocates have come together to support a bill that would require the federal government to take a complete inventory of the national airwaves to determine what spectrum is being used, how it is being used and who is using it. The government needs to clean up its sloppy record keeping, they say, or the US risks running out of wireless capacity with the increasing use of the mobile Internet. 'Radio spectrum is a natural resource, something that here in the US is owned by all of us American citizens,' wrote Richard Whitt, Google's counsel for telecom and media. 'Most of us don't give it much thought — and yet use of these airwaves is precisely what makes many of our modern communication systems possible.' The new law, if passed, would require the Federal Communications Commission and the National Telecommunications & Information Administration to report on the use of all spectrum bands between 300 megahertz and 3.5 gigahertz, including information on the licenses or government user operating in each band and whether the spectrum is actually in use. The unusual alliance between Google, public interest groups, and big telecommunications companies may be temporary. The telecom companies want to have the opportunity to buy any extra spectrum at an auction while Google advocates the use of new technologies that would allow the spectrum to be shared by whoever needs it."

Comment Re:Hardware Virtualization needed. (Score 1) 315

Funny, Im supporting a user just that way. They just bought a IntelBox, and OS 9 works perfectly under an emulator. ( In fact, its more than twice as fast as the native system it replaced )

No more OS 9 <i>from apple</> and since when is a third party solution not an option...Ohhh your at the apple store talking to the geniuses...

sorry, my bad.
Security

Virginia Health Database Held For Ransom 325

An anonymous reader writes "The Washington Post's Security Fix is reporting that hackers broke into servers at the Virginia health department that monitors prescription drug abuse and replaced the homepage with a ransom demand. The attackers claimed they had deleted the backups, and demanded $10 million for the return of prescription data on more than 8 million Virginians. Virginia isn't saying much about the attacks at the moment, except to acknowledge that they've involved the FBI, and that they've shut down e-mail and a whole mess of servers for the state department of health professionals. The Post piece credits Wikileaks as the source, which has a copy of the ransom note left behind by the attackers."
Communications

Al-Qaeda Used Basic Codes, Calling Cards, Hotmail 285

jd writes "In startling revelations, convicted terrorist Ali Saleh Kahlah al-Marri admitted that Al Qaeda used public telephones, pre-paid calling cards, search engines and Hotmail. Al-Marri 'used a '10-code' to protect the [phone] numbers — subtracting the actual digits in the phone numbers from 10 to arrive at a coded number.' The real story behind all this is that the terrorists weren't using sophisticated methods to avoid detection or monitoring — which tells us just how crappy SIGINT really is right now. If the NSA needs to wiretap the whole of the US because they can't break into a Hotmail account, you know they've got problems. FindLaw has a copy of al-Marri's plea agreement (the tech-related information begins on page 12), and the LA Times has further details on his case."

Slashdot Top Deals

Two can Live as Cheaply as One for Half as Long. -- Howard Kandel

Working...