Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Submission + - Google drops authorship with picture from search results.

qubezz writes: Did you notice the pictures of "experts" in your Google search results over the last few years? If a webmaster wanted a site to appear fancy and stand out in search results, a Google Plus profile had to link to your site, and pages recognized as articles needed continuous creation.

The "Authorship" feature, which rolled out in 2011 as another part of the Google+ social and real name marketing push, had its author profile pictures pulled from the search results in June this year. The remainder of the feature is now finally dead, with little fanfare.

Emil Protalinski at thenextweb.com (note the importance of author?) reports:

Google today stopped showing authorship in search results, meaning articles will no longer include a link to the Google+ profile of their author. The company says that it found the information isn’t as useful to its users as it hoped, and in some cases even distracts from the overall search results.

Comment Pot calling the kettle black (Score 1) 110

Centurylink (which in this territory acquired Qwest, which was the local baby bell USWest after the AT&T breakup) does their own slimy anti-competitive tricks with their monopoly.

While DSL providers were required to allow third-party ISPs as a choice to customers (where the copper is Centurylink but the ISP is your choice), they limited the third party ISPs to 7mbps connections while rolling out their own ISP service at 30mbps. Whereas the ISPs provide professional and business class service, Centurylink's service is of course crummy PPPoE dialup with constant dropping and changing IP address, making it pretty much useless for anything except looking at web pages and impossible to use with most off the shelf network hardware.

They are hardly the ones to be speaking about preventing competition.

Comment Re:And here I'm hoping... (Score 1) 681

Windows 8 has already made itself incompatible with most non-x64 processors anyway. It requires SSE2, PAE, and NX bit, which are features that CPUs, say a Pentium 4 Extreme Edition 3.46GHz or a Pentium 4 HT 571 3.8GHz, do not offer. Doesn't matter that you have 8GB of RAM and an SSD in them. Believe me, these CPUs are fine for just about any office task.

Windows 8 runs on crap tablet hardware but won't run on CPUs that can run MFLOPS around them due to a few CPU features.

Comment TV and monitor manufacturers also (Score 1) 289

This has been happening for many years in computer monitors and televisions also. There will be an initial version sold for a few months that gets the reviews, and then the specs are changed - completely different LCD panels made by different manufacturers are substituted silently, often with different technology. Anecdotally early versions of an Acer monitor having a MPVA panel, and then the exact same model then shipping with TN panels that pale in performance compared to the original. With monitors, you are buying an AO Optronics panel in a box labeled Samsung, so when the same model gets you something inferior to both specifications and original reviews, it borders on fraud.

Comment Re:Legacy file systems should be illegal (Score 1) 396

The problem is, neither ZFS or Btrfs would have stopped an arbitrary bit inside an arbitrary file from becoming corrupt....

I think you should have a look at this 10 year old blog post: https://blogs.oracle.com/elowe...
ZFS can use single and double-parity (like RAID5 with two parity drives, but no failure if power is pulled during writing). In addition, it has bit scrubbing where all data is verified regularly.

Submission + - The Government Can No Longer Track Your Cell Phone Without a Warrant 1

Jason Koebler writes: The government cannot use cell phone location data as evidence in a criminal proceeding without first obtaining a warrant, an appeals court ruled today, in one of the most important privacy decisions in recent memory.
"In short, we hold that cell site location information is within the subscriber’s reasonable expectation of privacy," the United States Court of Appeals for the Eleventh Circuit ruled. "The obtaining of that data without a warrant is a Fourth Amendment violation."

Comment Re:like those are hard to see on teh intarwebs (Score 1) 110

And these scumbags even register and hold for ransom domain names put into their domain search tool. That's right - search to see if a domain is available using the Godaddy site, and it will be registered by Godady themselves or "partners", and sold off to the highest bidder, or suddenly have a $500 asking price. http://www.billhartzer.com/pag...

Comment No good comments? Not a comment worthy article. (Score 1) 120

The linked article, which I did read, seems to have no thesis. It meanders from "C compilers can be subverted" to "see if people leave their purses out to judge if a neighborhood is safe". It is as if a high schooler had to write a paper on trust, and cut a paragraph out of each of the top 20 web search results.

Comment Re:Thankful for the FOSS drivers on older hardware (Score 1) 134

The open source driver needs to be good; the latest version of the ATI proprietary driver has dropped support for relatively new cards - anything before HD 5000 series. This means that cards that include very good h.264 decoding engines such as the AMD Radeon HD 3850 256MB reviewed can no longer use the latest driver. In Ubuntu 14.04 this also means that trying the older last-supporting driver version no longer works, one would need to downgrade the x server version used in the distro.

This is one of the few cases where hardware on Linux becomes "obsolete" far sooner than it should because of lacking manufacturer's driver support (as opposed to many hardware devices like gameports, scanners, and printers that lost their Windows support in Vista but continue working on Linux). This will make me more wary not of Linux, but of the manufacturers that pull such shenanigans.

Comment Re:Price a bit steep for lowest end platform (Score 1) 109

You can get an almost identically-specified Windows 8.1 Nokia Lumia 520 for $59.99, no contract. The only thing it's missing is a camera flash and a front-facing camera for video chats (Skype still works, it just points the wrong way.)

The latest developer rev of Windows Phone has word flow keyboard, which turns touch-screen typing from painfully intolerable to pretty cool.

Even Blackberry, giving it's Playbooks away to developers, couldn't get the adoption jump-started, so I don't know how an overpriced Firefox phone will succeed, although I would hope it would. Every other smartphone except for Blackberry wants to own your personal data and your life in their cloud and profit from everything sold in their store.

Comment Re:Descent + SpaceOrb 360 (Score 1) 251

I have a Logitech Cyberman II controller still (can be seen here). It has a true six-axis knob and eight buttons - you never have to touch the keyboard. Twist the knob right to look right, twist down to look down; push forward to move forward, pull knob up to move up - revolutionary. I don't think most understand how awesome these controllers are, or how disappointing it is that game port support was completely removed by Windows 7 (and previously took a hack to add back into Vista) and that these controllers disappeared from Logitech joystick software updates before that.

Descent had several direct-to-metal ports, pre-directx or OpenGL, for video cards such as the Rendition Verite and S3 Virge. I tossed all my CDs of games unplayable without the old hardware a while ago. None of these cards won though, as the 3dfx Voodoo stomped them all for Quake.

Submission + - Blizzard sues Starcraft II cheat authors in US Court (torrentfreak.com)

qubezz writes: The torrent news site TorrentFreak was first to report that Monday this week Blizzard filed a lawsuit in US District court in California against the programmers behind the popular Starcraft II cheat “ValiantChaos MapHack.”

The complaint seeks relief from "direct copyright infringement", "contributory copyright infringement", "vicarious copyright infringement", "trafficking in circumvention devices", etc. The suit seeks the identity of individuals, as it fishes for names of John Does 1-10, in addition to seeking an injunction against the software (which remains on sale) and punitive damages. Blizzard claims losses from diminished user experiences, and also that "when users of the Hacks download, install, and use the Hacks, they directly infringe Blizzard’s copyright in StarCraft II, including by creating unauthorized derivative works".

Submission + - Oracle Deflects Blame for Troubled Oregon Health Care Site (itworld.com)

itwbennett writes: Oracle is gearing up for a fight with officials in Oregon over its role developing an expensive health insurance exchange website that still isn't fully operational. In a letter obtained by the Oregonian newspaper this week, Oracle co-president Safra Catz said that Oregon officials have provided the public with a 'false narrative' concerning who is to blame for Cover Oregon's woes. In the letter, Catz pointed out that Oregon's decision to act as their own systems integrator on the project, using Oracle consultants on a time-and-materials basis, was 'criticized frequently by many'. And as far as Oracle is concerned, 'Cover Oregon lacked the skills, knowledge or ability to be successful as the systems integrator on an undertaking of this scope and complexity,' she added.

Submission + - Tor Blacklisting Exit Nodes Vulnerable to Heartbleed (threatpost.com)

msm1267 writes: The Tor Project has published a list of 380 exit relays vulnerable to the Heartbleed OpenSSL vulnerability that it will reject. This comes on the heels of news that researcher Collin Mulliner of Northeastern University in Boston found more than 1,000 vulnerable to Heartbleed where he was able to retrieve plaintext user traffic.

Mulliner said he used a random list of 5,000 Tor nodes from the Dan.me.uk website for his research; of the 1,045 vulnerable nodes he discovered, he recovered plaintext traffic that included Tor plaintext announcements, but a significant number of nodes leaked user traffic in the clear.

Slashdot Top Deals

The use of money is all the advantage there is to having money. -- B. Franklin

Working...