Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Why are Libs so enamored with taxes? (Score 4, Insightful) 623

How many of those 25k affiliates "forgot" to include their affiliate income?.......

So anyone who has a different opinion from yours is a law breaker?
Or is that what you do when you think you can get away with it?

Amazon's position has been tested all the way to the Supreme Court.
Amazon is in the right and CA is trying to do something the Constitution prohibits.
Nuff Said!

Comment Re:Am I reading this correctly? (Score 1) 417

OS X doesn't fail. It is either Java or Flash that gets the system in trouble.
You may have noticed that the Pwn2Own contest is run against stock systems.
Now that flash and java are not on the system when it ships lets see who fails first.

And just as a side note the person who crashes OS X first is an Apple hater.
If he was a windows hater I wonder which system would go down first......

Even with that OS X passes the first day of testing. So does windows.
It is only when they can get to the keyboard and send the browser to a website that the system gets in trouble.
 

Comment Re:But who is good and who is Evil? (Score 1) 415

Death threats sounds like a good way for him to try and save face.
I doubt if anyone actually threatened his life. That would be stupid and these people seem to be anything BUT stupid.
I can imagine a lot of heckling and embarrassment during the talk.
For someone with his ego that might seem worse than death!

Comment Re:AGAIN, Sony? (Score 3) 491

How is Apple worse?
When did they root kit your iPod or iPhone?
Who did they take to court for jail breaking?

The answer is they have not done either of these.
You are free to hate Apple or Sony or MSFT.
Just please be accurate when you rant.

Businesses

When Smart People Make Bad Employees 491

theodp writes "Writing for Forbes, CS-grad-turned-big-time-VC Ben Horowitz gives three examples of how the smartest people in a company can also be the worst employees: 1. The Heretic, who convincingly builds a case that the company is hopeless and run by a bunch of morons; 2. The Flake, who is brilliant but totally unreliable; 3. The Jerk, who is so belligerent in his communication style that people just stop talking when he is in the room. So, can an employee who fits one of these poisonous descriptions, but nonetheless can make a massive positive contribution to a company, ever be tolerated? Quoting John Madden's take on Terrell Owens, Horowitz gives a cautious yes: 'If you hold the bus for everyone on the team, then you'll be so late that you'll miss the game, so you can't do that. The bus must leave on time. However, sometimes you'll have a player that's so good that you hold the bus for him, but only him.' Ever work with a person who's so good that he/she gets his/her own set of rules? Ever been that person yourself?"

MIT Media Lab Researcher Prints Playable Flute 85

What if making an acoustic instrument was a matter of hitting 'print'? MIT Media Lab researcher Amit Zoran did just that. He created a flute using the Objet Geometries Connex500 3D printer. The instrument is playable and the results are surprisingly good for a first attempt. As an aside, rumour has it that Amit has a bumper sticker that reads: My other printer prints food.
Power

Samsung Develops Power-Sipping DDR4 Memory 152

Alex writes with this excerpt from TechSpot: "Samsung Electronics has announced that it completed development of the industry's first DDR4 DRAM module last month, using 30nm class process technology, and provided 1.2V 2GB DDR4 unbuffered dual in-line memory modules (UDIMM) to a controller maker for testing. The new DDR4 DRAM module can achieve data transfer rates of 2.133Gbps at 1.2V, compared to 1.35V and 1.5V DDR3 DRAM at an equivalent 30nm-class process technology, with speeds of up to 1.6Gbps. In a notebook, the DDR4 module reduces power consumption by 40 percent compared to a 1.5V DDR3 module. The module makes use of Pseudo Open Drain (POD) technology, which allows DDR4 DRAM to consume just half the electric current of DDR3 when reading and writing data."
Networking

Apple Patent Hints at Net-Booting Cloud Strategy 156

An anonymous reader writes "Apple has received a patent that hints at the intent of providing network computers that will boot through a 'net-booted environment.' It may seem that Apple is moving slowly into the cloud computing age and that it has many assets that are simply not leveraged in what could be a massive cloud environment that could cause more than just a headache for Google and Microsoft. However, it appears that Apple has been working for some time on an operating system, conceivably a version of a next-generation Mac OS or iOS, that could boot computers and other devices via an Internet connection."
Crime

Unwise — Search History of Murder Methods 532

nonprofiteer writes "Mark Jensen's home computer revealed Internet searches for botulism, poisoning, pipe bombs and mercury fulminate. A website was visited that explained how to reverse the polarity of a swimming pool — the Jensens had a pool — by switching the wires around, likening the result to the 4th of July. The State pointed out the absence of Internet searches on topics like separation, divorce, child custody or marital property. Julie Jensen died as a result of ethylene glycol in her system, an ingredient found in antifreeze. On the morning of her death, someone attempted to 'double-delete' (apparently unsuccessfully) the computer's browsing history, which included a search for 'ethylene glycol poisoning.'" What if searches for devious, undetectable methods of murder were in everyone's history?
Bug

Microsoft Confirms Zero-Day Hours After Exploit 53

CWmike writes "Microsoft confirmed on Tuesday an unpatched vulnerability in Windows just hours after a hacking toolkit published an exploit for the bug. A patch is under construction, but Microsoft does not plan to issue an emergency update to fix the flaw. The bug was first discussed Dec. 15 at a South Korean security conference, but got more attention Tuesday when the open-source Metasploit penetration tool posted an exploit module crafted by researcher Joshua Drake. Metasploit says successful attacks are capable of compromising victimized PCs, then introducing malware to the machines to pillage them for information or enlist them in a criminal botnet."
The Internet

Rushkoff Proposes We Fork the Internet 487

Shareable writes "Douglas Rushkoff: 'The moment the "net neutrality" debate began was the moment the net neutrality debate was lost. For once the fate of a network — its fairness, its rule set, its capacity for social or economic reformation — is in the hands of policymakers and the corporations funding them — that network loses its power to effect change. The mere fact that lawmakers and lobbyists now control the future of the net should be enough to turn us elsewhere.' And he goes on to suggest citizens fork the Internet & makes a call for ideas how to do that."

Slashdot Top Deals

Happiness is twin floppies.

Working...